Search results for: secure technology acceptance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8549

Search results for: secure technology acceptance

8429 The Roles of Aesthetics and Information Quality on Intention to Continued Used of Digital Library within the Context of UTAUT2

Authors: Shahruhaida Adayu Mohd Paili, Abd Latif Abdul Rahman, Asmadi Mohammed Ghazali

Abstract:

Digital library was developed by many organizations, especially universities. The digital library can be considered as a new information system. Digital library brings many benefits to the users. There are many researches that have investigated the importance of the digital library, the acceptance, and continuance use of digital library. The investigation towards the digital library is important and it is crucial to understand the reason why users accept and continued use of digital library. Users can search the information and available resources through the digital library website. It is important to know the user’s perception towards the aesthetics of the digital library. Besides that, because of digital library provided information to the users, the researcher also needed to investigate the quality of information in digital library. This study used Extending the Unified Theory of Acceptance and Use of Technology (UTAUT2) in order to know the user’s intention to continued use of digital library.

Keywords: digital library, aesthetics, information quality, intention to continued use of digital library, UTAUT2

Procedia PDF Downloads 349
8428 Leveraging NFT Secure and Decentralized Lending: A Defi Solution

Authors: Chandan M. S., Darshan G. A., Vyshnavi, Abhishek T.

Abstract:

In the evolving world of technology and digital assets, non-fungible tokens (NFTs) have emerged as the latest advancement. These digital assets represent ownership of intangible items and hold significant value. Unlike cryptocurrencies, like Ethereum or Bitcoin, NFTs cannot be exchanged due to their nature. Each NFT has an indivisible value. NFTs not only pave the way for financial services but also open up fresh opportunities for creators, buyers and artists. To revolutionize financing in the DeFi space, this proposed approach utilizes NFTs generated from digital arts. By eliminating intermediaries, this innovative method ensures trust and security in transactions. The idea entails automating borrower-lender interactions through contracts while securely storing data using blockchain technology. Borrowers can obtain funding by leveraging assets such as estate, artwork and collectibles that are often illiquid. The key component of this system is contracts that independently execute lending agreements and collateral transfers within predefined parameters. By leveraging the Ethereum blockchain, this project aims to provide consumers with access to a platform offering a wide range of financial services. The demonstration illustrates how NFT lending and borrowing is managed through contracts, providing a secure and trustworthy transaction environment.

Keywords: blockchain, defi, NFT, ethereum, marketplace

Procedia PDF Downloads 20
8427 Guests’ Satisfaction and Intention to Revisit Smart Hotels: Qualitative Interviews Approach

Authors: Raymond Chi Fai Si Tou, Jacey Ja Young Choe, Amy Siu Ian So

Abstract:

Smart hotels can be defined as the hotel which has an intelligent system, through digitalization and networking which achieve hotel management and service information. In addition, smart hotels include high-end designs that integrate information and communication technology with hotel management fulfilling the guests’ needs and improving the quality, efficiency and satisfaction of hotel management. The purpose of this study is to identify appropriate factors that may influence guests’ satisfaction and intention to revisit Smart Hotels based on service quality measurement of lodging quality index and extended UTAUT theory. Unified Theory of Acceptance and Use of Technology (UTAUT) is adopted as a framework to explain technology acceptance and use. Since smart hotels are technology-based infrastructure hotels, UTATU theory could be as the theoretical background to examine the guests’ acceptance and use after staying in smart hotels. The UTAUT identifies four key drivers of the adoption of information systems: performance expectancy, effort expectancy, social influence, and facilitating conditions. The extended UTAUT modifies the definitions of the seven constructs for consideration; the four previously cited constructs of the UTAUT model together with three new additional constructs, which including hedonic motivation, price value and habit. Thus, the seven constructs from the extended UTAUT theory could be adopted to understand their intention to revisit smart hotels. The service quality model will also be adopted and integrated into the framework to understand the guests’ intention of smart hotels. There are rare studies to examine the service quality on guests’ satisfaction and intention to revisit in smart hotels. In this study, Lodging Quality Index (LQI) will be adopted to measure the service quality in smart hotels. Using integrated UTAUT theory and service quality model because technological applications and services require using more than one model to understand the complicated situation for customers’ acceptance of new technology. Moreover, an integrated model could provide more perspective insights to explain the relationships of the constructs that could not be obtained from only one model. For this research, ten in-depth interviews are planned to recruit this study. In order to confirm the applicability of the proposed framework and gain an overview of the guest experience of smart hotels from the hospitality industry, in-depth interviews with the hotel guests and industry practitioners will be accomplished. In terms of the theoretical contribution, it predicts that the integrated models from the UTAUT theory and the service quality will provide new insights to understand factors that influence the guests’ satisfaction and intention to revisit smart hotels. After this study identifies influential factors, smart hotel practitioners could understand which factors may significantly influence smart hotel guests’ satisfaction and intention to revisit. In addition, smart hotel practitioners could also provide outstanding guests experience by improving their service quality based on the identified dimensions from the service quality measurement. Thus, it will be beneficial to the sustainability of the smart hotels business.

Keywords: intention to revisit, guest satisfaction, qualitative interviews, smart hotels

Procedia PDF Downloads 172
8426 MGAUM—Towards a Mobile Government Adoption and Utilization Model: The Case of Saudi Arabia

Authors: Mohammed Alonazi, Natalia Beloff, Martin White

Abstract:

This paper presents a proposal for a mobile government adoption and utilization model (MGAUM), which is a framework designed to increase the adoption rate of m-government services in Saudi Arabia. Recent advances in mobile technologies such are Mobile compatibilities, The development of wireless communication, mobile applications and devices are enabling governments to deliver services in new ways to citizens more efficiently and economically. In the last decade, many governments around the globe are utilizing these advances effectively to develop their next generation of e-government services. However, a low adoption rate of m-government services by citizens is a common problem in Arabian countries, including Saudi Arabia. Yet, to our knowledge, very little research has been conducted focused on understanding the factors that influence citizen adoption of these m-government services in this part of the world. A set of social, cultural and technological factors have been identified in the literature, which has led to the formulation of associated research questions and hypotheses. These hypotheses will be tested on Saudi citizens using questionnaires and interview methods based around the technology acceptance model. A key objective of the MGAUM framework is to investigate and understand Saudi citizens perception towards adoption and utilization of m-government services.

Keywords: e-government, m-government, citizen services quality, technology acceptance model, Saudi Arabia, adoption framework.

Procedia PDF Downloads 277
8425 Integration of Technology in Business Education: Emerging Voices from Business Education Classrooms in Nigeria Secondary Schools

Authors: Clinton Chidiebere Anyanwu

Abstract:

Secondary education is a vital part of a virtuous circle of economic growth within the context of a globalised knowledge economy. The teaching of Business Education entails teaching learners the essentials, rudiments, assumptions, and methods of business. Hence, it was deemed necessary for the study to investigate technology integration in Business Education. Drawing from the theoretical frameworks of technological pedagogical content knowledge (TPACK), and unified theory of acceptance and use of technology (UTAUT), the study observes teachers’ level of technology use in Business Education classrooms. Using a mixed-methods sequential explanatory design, probability, and purposive sampling, the majority of participants were found to be not integrating technology to an acceptable level and a small percentage was. After an analysis of constructs from UTAUT, some of this could be attributed to the lack of facilitating conditions in the teaching and learning of Business Education. The implication of the study findings is that poor investment in technology integration in secondary schools in Nigeria affects pedagogical implementations and effective teaching and learning of Business Education subjects. The study concludes that if facilitating conditions and professional development are considered to address the shortfalls in terms of TPACK, technology integration will become a reality in secondary schools in Nigeria.

Keywords: business education, secondary education, technology integration, TPACK, UTAUT

Procedia PDF Downloads 176
8424 Aliens in Space: Reflections on an Applied Theatre Project in a Medium Secure Hospital

Authors: Ashley Barnes

Abstract:

This paper will consider the ways in which varied notions of Space played a central role in a 12-week drama project with patients in a Medium Secure Hospital in the UK. In the project, the patients devised and performed a series of sketches, inspired by Science Fiction films, which echoed their own experience of alienation. During the project, the familiar and rigorously regulated Activity Room became a site of imagination, adventure and laughter; transforming the atmosphere of the hospital and allowing the patients to be transported to another space entirely. A space that was as much in their heads as in the physical domain. It will be argued that, although work created in an institution such as a Medium Secure Hospital is infused with hegemonic associations and meanings, the starting point for such work should be to seek an empty space in which the participants can allow their imaginations to be released. This work sits within a range of contexts and will be consciously interdisciplinary. It will draw from Human Geography and Criminology, as well as Performance and Applied Theatre Literature. It is hoped that this paper will build upon the literature that relates to the very particular environment of Secure Hospitals and to provide a starting point for further practical exploration.

Keywords: criminal justice, mental health, science fiction films, space and place

Procedia PDF Downloads 191
8423 Study on the Overseas Dissemination and Acceptance of the English Translation of YU Hua’s to Live

Authors: Luo Xi

Abstract:

Taking the English translation of Yu Hua's To Live as an example, this paper makes a quantitative description and qualitative analysis of its overseas dissemination and acceptance from the perspective of the actual audience -- readers. It is found that the English translation of To Live has been widely disseminated and accepted overseas. The book has been well received overseas. With the English version of To Live, overseas readers have an in-depth understanding of Chinese history, politics, and culture. At the same time, the work shows the admirable qualities of Chinese people. It also conveys the core human values. And thus, overseas readers have gained a deeper understanding of life and are spiritually inspired. From the perspective of readers, this paper studies the successful overseas dissemination of the English translation of Yu Hua's To Live to provide a reference for the further overseas dissemination of Chinese culture.

Keywords: to live, english translation, overseas dissemination and acceptance, readers’ comments

Procedia PDF Downloads 47
8422 Verifiable Secure Computation of Large Scale Two-Point Boundary Value Problems Using Certificate Validation

Authors: Yogita M. Ahire, Nedal M. Mohammed, Ahmed A. Hamoud

Abstract:

Scientific computation outsourcing is gaining popularity because it allows customers with limited computing resources and storage devices to outsource complex computation workloads to more powerful service providers. However, it raises some security and privacy concerns and challenges, such as customer input and output privacy, as well as cloud cheating behaviors. This study was motivated by these concerns and focused on privacy-preserving Two-Point Boundary Value Problems (BVP) as a common and realistic instance for verifiable safe multiparty computing. We'll look at the safe and verifiable schema with correctness guarantees by utilizing standard multiparty approaches to compute the result of a computation and then solely using verifiable ways to check that the result was right.

Keywords: verifiable computing, cloud computing, secure and privacy BVP, secure computation outsourcing

Procedia PDF Downloads 61
8421 The Role of Trust in Intention to Use Prescribed and Non-prescribed Connected Devices

Authors: Jean-michel Sahut, Lubica Hikkerova, Wissal Ben Arfi

Abstract:

The Internet of Things (IoT) emerged over the last few decades in many fields. Healthcare can significantly benefit from IoT. This study aims to examine factors influencing the adoption of IoT in eHealth. To do so, an innovative framework has been developed which applies both the Technology Acceptance Model (TAM) and the United Theory of Acceptance and Use of Technology (UTAUT) model and builds on them by analyzing trust and perceived-risk dimensions to predict intention to use IoT in eHealth. In terms of methodology, a Partial Least Approach Structural Equation Modelling was carried out on a sample of 267 French users. The findings of this research support the significant positive effect of constructs set out in the TAM (perceived ease of use) on predicting behavioral intention by adding the effects identified for UTAUT variables. This research also demonstrates how perceived risk and trust are significant factors for models examining behavioral intentions to use IoT. Perceived risk enhanced by the trust has a significant effect on patients’ behavioral intentions. Moreover, the results highlight the key role of prescription as a moderator of IoT adoption in eHealth. Depending on whether an individual has a prescription to use connected devices or not, ease of use has a stronger impact on adoption, while trust has a negative impact on adoption for users without a prescription. In accordance with the empirical results, several practical implications can be proposed. All connected devices applied in a medical context should be divided into groups according to their functionality: whether they are essential for the patient’s health and whether they require a prescription or not. Devices used with a prescription are easily accepted because the intention to use them is moderated by the medical trust (discussed above). For users without a prescription, ease of use is a more significant factor than for users who have a prescription. This suggests that currently, connected e-Health devices and online healthcare systems have to take this factor into account to better meet the needs and expectations of end-users.

Keywords: internet of things, Healthcare, trust, consumer acceptance

Procedia PDF Downloads 111
8420 The Next Frontier for Mobile Based Augmented Reality: An Evaluation of AR Uptake in India

Authors: K. Krishna Milan Rao, Nelvin Joseph, Praveen Dwarakanath

Abstract:

Augmented and Virtual Realties is quickly becoming a hotbed of activity with millions of dollars being spent on R & D and companies such as Google and Microsoft rushing to stake their claim. Augmented reality (AR) is however marching ahead due to the spread of the ideal AR device – the smartphone. Despite its potential, there remains a deep digital divide between the Developed and Developing Countries. The Technological Acceptance Model (TAM) and Hofstede cultural dimensions also predict the behaviour intention to uptake AR in India will be large. This paper takes a quantified approach by collecting 340 survey responses to AR scenarios and analyzing them through statistics. The Survey responses show that the Intention to Use, Perceived Usefulness and Perceived Enjoyment dimensions are high among the urban population in India. This along with the exponential smartphone indicates that India is on the cusp of a boom in the AR sector.

Keywords: mobile augmented reality, technology acceptance model, Hofstede, cultural dimensions, India

Procedia PDF Downloads 217
8419 Assessing the Adoption of Health Information Systems in a Resource-Constrained Country: A Case of Uganda

Authors: Lubowa Samuel

Abstract:

Health information systems, often known as HIS, are critical components of the healthcare system to improve health policies and promote global health development. In a broader sense, HIS as a system integrates data collecting, processing, reporting, and making use of various types of data to improve healthcare efficacy and efficiency through better management at all levels of healthcare delivery. The aim of this study is to assess the adoption of health information systems (HIS) in a resource-constrained country drawing from the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model. The results indicate that the user's perception of the technology and the poor information technology infrastructures contribute a lot to the low adoption of HIS in resource-constrained countries.

Keywords: health information systems, resource-constrained countries, health information systems

Procedia PDF Downloads 86
8418 Accessible Mobile Augmented Reality App for Art Social Learning Based on Technology Acceptance Model

Authors: Covadonga Rodrigo, Felipe Alvarez Arrieta, Ana Garcia Serrano

Abstract:

Mobile augmented reality technologies have become very popular in the last years in the educational field. Researchers have studied how these technologies improve the engagement of the student and better understanding of the process of learning. But few studies have been made regarding the accessibility of these new technologies applied to digital humanities. The goal of our research is to develop an accessible mobile application with embedded augmented reality main characters of the art work and gamification events accompanied by multi-sensorial activities. The mobile app conducts a learning itinerary around the artistic work, driving the user experience in and out the museum. The learning design follows the inquiry-based methodology and social learning conducted through interaction with social networks. As for the software application, it’s being user-centered designed, following the universal design for learning (UDL) principles to assure the best level of accessibility for all. The mobile augmented reality application starts recognizing a marker from a masterpiece of a museum using the camera of the mobile device. The augmented reality information (history, author, 3D images, audio, quizzes) is shown through virtual main characters that come out from the art work. To comply with the UDL principles, we use a version of the technology acceptance model (TAM) to study the easiness of use and perception of usefulness, extended by the authors with specific indicators for measuring accessibility issues. Following a rapid prototype method for development, the first app has been recently produced, fulfilling the EN 301549 standard and W3C accessibility guidelines for mobile development. A TAM-based web questionnaire with 214 participants with different kinds of disabilities was previously conducted to gather information and feedback on user preferences from the artistic work on the Museo del Prado, the level of acceptance of technology innovations and the easiness of use of mobile elements. Preliminary results show that people with disabilities felt very comfortable while using mobile apps and internet connection. The augmented reality elements seem to offer an added value highly engaging and motivating for the students.

Keywords: H.5.1 (multimedia information systems), artificial, augmented and virtual realities, evaluation/methodology

Procedia PDF Downloads 101
8417 Secure Texting Used in a Post-Acute Pediatric Skilled Nursing Inpatient Setting: A Multidisciplinary Care Team Driven Communication System with Alarm and Alert Notification Management

Authors: Bency Ann Massinello, Nancy Day, Janet Fellini

Abstract:

Background: The use of an appropriate mode of communication among the multidisciplinary care team members regarding coordination of care is an extremely complicated yet important patient safety initiative. Effective communication among the team members(nursing staff, medical staff, respiratory therapists, rehabilitation therapists, patient-family services team…) become essential to develop a culture of trust and collaboration to deliver the highest quality care to patients are their families. The inpatient post-acute pediatrics, where children and their caregivers come for continuity of care, is no exceptions to the increasing use of text messages as a means to communication among clinicians. One such platform is the Vocera Communications (Vocera Smart Mobile App called Vocera Edge) allows the teams to use the application and share sensitive patient information through an encrypted platform using IOS company provided shared and assigned mobile devices. Objective: This paper discusses the quality initiative of implementing the transition from Vocera Smartbage to Vocera Edge Mobile App, technology advantage, use case expansion, and lessons learned about a secure alternative modality that allows sending and receiving secure text messages in a pediatric post-acute setting using an IOS device. This implementation process included all direct care staff, ancillary teams, and administrative teams on the clinical units. Methods: Our institution launched this transition from voice prompted hands-free Vocera Smartbage to Vocera Edge mobile based app for secure care team texting using a big bang approach during the first PDSA cycle. The pre and post implementation data was gathered using a qualitative survey of about 500 multidisciplinary team members to determine the ease of use of the application and its efficiency in care coordination. The technology was further expanded in its use by implementing clinical alerts and alarms notification using middleware integration with patient monitoring (Masimo) and life safety (Nurse call) systems. Additional use of the smart mobile iPhone use include pushing out apps like Lexicomp and Up to Date to have it readily available for users for evident-based practice in medication and disease management. Results: Successful implementation of the communication system in a shared and assigned model with all of the multidisciplinary teams in our pediatric post-acute setting. In just a 3-monthperiod post implementation, we noticed a 14% increase from 7,993 messages in 6 days in December 2020 to 9,116messages in March 2021. This confirmed that all clinical and non-clinical teams were using this mode of communication for coordinating the care for their patients. System generated data analytics used in addition to the pre and post implementation staff survey for process evaluation. Conclusion: A secure texting option using a mobile device is a safe and efficient mode for care team communication and collaboration using technology in real time. This allows for the settings like post-acute pediatric care areas to be in line with the widespread use of mobile apps and technology in our mainstream healthcare.

Keywords: nursing informatics, mobile secure texting, multidisciplinary communication, pediatrics post acute care

Procedia PDF Downloads 172
8416 Vocational and Technical Educators’ Acceptance and Use of Digital Learning Environments Beyond Working Hours: Implications for Work-Life Balance and the Role of Integration Preference

Authors: Jacinta Ifeoma Obidile

Abstract:

Teachers (vocational and technical educators inclusive) use Information and Communications Technology (ICT) for tasks outside of their normal working hours. This expansion of work duties to non-work time challenges their work-life balance. However, there has been inconsistency in the results on how these relationships correlate. This, therefore, calls for further research studies to examine the moderating mechanisms of such relationships. The present study, therefore, ascertained how vocational and technical educators’ technology acceptance relates to their work-related ICT use beyond their working hours and work-life balance, as well as how their integration affects these relationships. The population of the study comprised 320 Vocational and Technical Educators from the Southeast geopolitical zone of Nigeria. Data were collected from the respondents using the structured questionnaire. The questionnaire was validated by three experts. The reliability of the study was conducted using 20 vocational and technical educators from the South who were not part of the population. The overall reliability coefficient of 0.81 was established using Cronbach’s alpha method. The data collected was analyzed using Structural equation modeling. Findings, among others, revealed that vocational and technical educators’ work-life balance was mediated by increased digital learning environment use after work hours, although reduced by social influence.

Keywords: vocational and technical educators, digital learning environment, working hours, work-life balance, integration preference

Procedia PDF Downloads 15
8415 The Role of the Defense and Future War in Ukraine

Authors: Matthew J. Flynn

Abstract:

In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus.

Keywords: cyber, domains, future war, Putin, Ukraine

Procedia PDF Downloads 75
8414 Blockchain-Based Decentralized Architecture for Secure Medical Records Management

Authors: Saeed M. Alshahrani

Abstract:

This research integrated blockchain technology to reform medical records management in healthcare informatics. It was aimed at resolving the limitations of centralized systems by establishing a secure, decentralized, and user-centric platform. The system was architected with a sophisticated three-tiered structure, integrating advanced cryptographic methodologies, consensus algorithms, and the Fast Healthcare Interoperability Resources (HL7 FHIR) standard to ensure data security, transaction validity, and semantic interoperability. The research has profound implications for healthcare delivery, patient care, legal compliance, operational efficiency, and academic advancements in blockchain technology and healthcare IT sectors. The methodology adapted in this research comprises of Preliminary Feasibility Study, Literature Review, Design and Development, Cryptographic Algorithm Integration, Modeling the data and testing the system. The research employed a permissioned blockchain with a Practical Byzantine Fault Tolerance (PBFT) consensus algorithm and Ethereum-based smart contracts. It integrated advanced cryptographic algorithms, role-based access control, multi-factor authentication, and RESTful APIs to ensure security, regulate access, authenticate user identities, and facilitate seamless data exchange between the blockchain and legacy healthcare systems. The research contributed to the development of a secure, interoperable, and decentralized system for managing medical records, addressing the limitations of the centralized systems that were in place. Future work will delve into optimizing the system further, exploring additional blockchain use cases in healthcare, and expanding the adoption of the system globally, contributing to the evolution of global healthcare practices and policies.

Keywords: healthcare informatics, blockchain, medical records management, decentralized architecture, data security, cryptographic algorithms

Procedia PDF Downloads 31
8413 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 29
8412 Developing a Smart Card Using Internet of Things-Uni-C

Authors: Enji E. Alzamzami, Kholod A. Almwallad, Rahaf J. Alwafi, Roaa H. Alansari, Shatha S. Alshehri, Aeshah A. Alsiyami

Abstract:

This paper demonstrates a system that helps solve the congestion problem at the entrance gates and limits the spread of viruses among people in crowded environments, such as COVID-19, using the IoT (Internet of Things). This system may assist in organizing the campus entry process efficiently by developing a smart card application supported by NFC (Near Field Communication) technology through which users' information could be sent to a reader to share it with the server and allow the server to perform its tasks and send a confirmation response for the request either by acceptance or rejection.

Keywords: COVID-19, IoT, NFC technology, smart card

Procedia PDF Downloads 87
8411 Analysis of Conflict and Acceptance Factors on Water and Land Photovoltaic Facility

Authors: Taehyun Kim, Taehyun Kim, Hyunjoo Park

Abstract:

Photovoltaic facility occurs conflicts and disputes over environmental issues such as soil runoff, landscapes damage, and ecosystems damage. Because of these problems, huge social and economic cost occurred. The purpose of this study is to analyze resident‘s acceptability and conflict factors on the location of PV facilities, and suggest ways to promote resident’s acceptability and solutions for conflicts. Literature review, cases analysis, and expert interview on the acceptance and conflict factors related to the location of PV facilities are used to derive results. The results of this study are expected to contribute to the minimization of environmental impact and social conflict due to the development of renewable energy in the future.

Keywords: acceptance factor, conflict factor, factor analysis, photovoltaic facility

Procedia PDF Downloads 148
8410 A Fuzzy Mathematical Model for Order Acceptance and Scheduling Problem

Authors: E. Koyuncu

Abstract:

The problem of Order Acceptance and Scheduling (OAS) is defined as a joint decision of which orders to accept for processing and how to schedule them. Any linear programming model representing real-world situation involves the parameters defined by the decision maker in an uncertain way or by means of language statement. Fuzzy data can be used to incorporate vagueness in the real-life situation. In this study, a fuzzy mathematical model is proposed for a single machine OAS problem, where the orders are defined by their fuzzy due dates, fuzzy processing times, and fuzzy sequence dependent setup times. The signed distance method, one of the fuzzy ranking methods, is used to handle the fuzzy constraints in the model.

Keywords: fuzzy mathematical programming, fuzzy ranking, order acceptance, single machine scheduling

Procedia PDF Downloads 307
8409 A Study of Parental Acceptance: Avoidance Attitude and Adjustment of Urban and Rural Junior College Students

Authors: Ramesh K. Adsul, V. R. Shinde, S. S. Jadhav

Abstract:

The main aim of the present study was to explore the effect of various levels of parental acceptance – avoidance attitude on various areas of adjustment of urban and rural junior college students. It was hypothesized that 1. There exists no significant effect of various levels of parental acceptance attitude on adjustment of urban and rural junior college students. 2. There exists no significant effect of various levels of parental avoidance attitude on adjustment of urban and rural junior college students. 3. There would be no significant difference between urban and rural Junior College students on various areas of (home, health, social, and emotional) adjustment. The 847 students (427 boys and 420 girls) studying in 11th class of various Junior colleges in Sangli ,Satara and Kolhapur districts of Maharashtra State, India were selected by random sampling method. Study was conducted by using two psychological tests namely 1. Family Relationship Inventory. 2.Bell’s Adjustment Inventory. One way ANOVA was employed to find out the effect of parental acceptance – avoidance attitude and adjustment in various areas of urban and rural junior college students. ‘t’ test was used to find out the difference between urban and rural students on various areas of adjustment. The results of the study indicate that (1) It is observed that three groups of parental acceptance attitude (PA) are significantly varied on home and social adjustment. It means that PA affects home and social adjustment of adolescents. High PA creates excellent adjustment and low PA creates poor adjustment in adolescents. (2) Study revealed that PV significantly affects adjustment of adolescents. High PV significantly creates poor adjustment in adolescents than average and low PV. (3) There is significant difference between urban and rural adolescents on adjustment. Urban adolescents have better adjustment than rural adolescents.

Keywords: parental acceptance, avoidance attitude, adjustment, urban-rural student

Procedia PDF Downloads 385
8408 Acceptance and Commitment Therapy as a Treatment for Alcohol Use Disorders in South Korea

Authors: Kim Eunha

Abstract:

This study examined a group-based intervention for alcohol use disorders based on the principles of acceptance and commitment therapy (ACT) in patients (N=22; 63.7% female; M = 38.2 years old; 100% South Korean) in a residential alcohol addiction treatment program. Patients were randomly assigned to either ACT group (receiving the ACT intervention) or control group (receiving treatment as usual). The ACT intervention consisted of four 2-hr group sessions scheduled during two weeks. The first session focused on the negative effects of suppression and avoidance, and a rationale for defusion and acceptance using several of the well-known ACT metaphors (e.g., Two Scales Metaphor, Man in the Hole). The second session taught defusion and acceptance skills through such exercises as mindfulness, cutting a sour fruit, naming one’s thoughts, and physicalizing. The third session included another mindfulness exercise and encouraged the participants to identify their values and set up life goals. The last session included more discussion on values and life goals, especially related to family and intimacy. The effects of the interventions were assessed using intent-to-treat analyses. The ACT interventions resulted in smaller immediate gains in motivation to stay sober and reductions in depression, anxiety, and experiential avoidance. In addition, at a 2-month follow up, those who attended the ACT group reported a lower average level of alcohol consumption and higher treatment attendance compared to the control group. These preliminary findings suggest that additional treatment and testing of ACT for alcohol use disorders will be crucial.

Keywords: acceptance and commitment therapy, alcohol use disorders, defusion, values

Procedia PDF Downloads 190
8407 A Double Acceptance Sampling Plan for Truncated Life Test Having Exponentiated Transmuted Weibull Distribution

Authors: A. D. Abdellatif, A. N. Ahmed, M. E. Abdelaziz

Abstract:

The main purpose of this paper is to design a double acceptance sampling plan under the time truncated life test when the product lifetime follows an exponentiated transmuted Weibull distribution. Here, the motive is to meet both the consumer’s risk and producer’s risk simultaneously at the specified quality levels, while the termination time is specified. A comparison between the results of the double and single acceptance sampling plans is conducted. We demonstrate the applicability of our results to real data sets.

Keywords: double sampling plan, single sampling plan, producer’s risk, consumer’s risk, exponentiated transmuted weibull distribution, time truncated experiment, single, double, Marshal-Olkin

Procedia PDF Downloads 453
8406 The Relation between Earnings Management with the Financial Reporting

Authors: Anocha Rojanapanich

Abstract:

The objective of this research is to investigate the effects of earnings management on corporate transparency of the company in Dusit area workplace via financial reporting reliability and stakeholder acceptance as independent variable. And the company in Dusit are are taken as the population and sample. The questionnaire is used to collect data. Exploratory Factor Analysis is implemented to ensure construct validity, and correlation statistic is selected to test the relationship among all variable and the ordinary least squares regression is used to explore the hypothesized. The results show that earnings management has a significant and negative impact on financial reporting reliability, stakeholder acceptance, and corporate transparency. Both financial reporting reliability and stakeholder acceptance have an important and positive effect on corporate transparency, and they are then mediators of the earnings management-corporate transparency relationships.

Keywords: dusit area workplace, earnings management, financial report, business and marketing management

Procedia PDF Downloads 375
8405 Modeling Factors Influencing Online Shopping Intention among Consumers in Nigeria: A Proposed Framework

Authors: Abubakar Mukhtar Yakasai, Muhammad Tahir Jan

Abstract:

Purpose: This paper is aimed at exploring factors influencing online shopping intention among the young consumers in Nigeria. Design/Methodology/approach: The paper adopted and extended Technology Acceptance Model (TAM) as the basis for literature review. Additionally, the paper proposed a framework with the inclusion of culture as a moderating factor of consumer online shopping intention among consumers in Nigeria. Findings: Despite high rate of internet penetration in Nigerian, as well as the rapid advancement of online shopping in the world, little attention was paid to this important revolution specifically among Nigeria’s consumers. Based on the review of extant literature, the TAM extended to include perceived risk and enjoyment (PR and PE) was discovered to be a better alternative framework for predicting Nigeria’s young consumers’ online shopping intention. The moderating effect of culture in the proposed model is shown to help immensely in ascertaining differences, if any, between various cultural groups among online shoppers in Nigeria. Originality/ value: The critical analysis of different factors will assist practitioners (like online retailers, e-marketing managers, website developers, etc.) by signifying which combinations of factors can best predict consumer online shopping behaviour in particular instances, thereby resulting in effective value delivery. Online shopping is a newly adopted technology in Nigeria, hence the paper will give a clear focus for effective e-marketing strategy. In addition, the proposed framework in this paper will guide future researchers by providing a tool for systematic evaluation and testing of real empirical situation of online shopping in Nigeria.

Keywords: online shopping, perceived ease of use, perceived usefulness, perceived enjoyment, technology acceptance model, Nigeria

Procedia PDF Downloads 244
8404 Unified Theory of Acceptance and Use of Technology in Evaluating Voters' Intention Towards the Adoption of Electronic Forensic Election Audit System

Authors: Sijuade A. A., Oguntoye J. P., Awodoye O. O., Adedapo O. A., Wahab W. B., Okediran O. O., Omidiora E. O., Olabiyisi S. O.

Abstract:

Electronic voting systems have been introduced to improve the efficiency, accuracy, and transparency of the election process in many countries around the world, including Nigeria. However, concerns have been raised about the security and integrity of these systems. One way to address these concerns is through the implementation of electronic forensic election audit systems. This study aims to evaluate voters' intention to the adoption of electronic forensic election audit systems using the Unified Theory of Acceptance and Use of Technology (UTAUT) model. In the study, the UTAUT model which is a widely used model in the field of information systems to explain the factors that influence individuals' intention to use a technology by integrating performance expectancy, effort expectancy, social influence, facilitating conditions, cost factor and privacy factor to voters’ behavioural intention was proposed. A total of 294 sample data were collected from a selected population of electorates who had at one time or the other participated in at least an electioneering process in Nigeria. The data was then analyzed statistically using Partial Least Square Structural Equation Modeling (PLS-SEM). The results obtained show that all variables have a significant effect on the electorates’ behavioral intention to adopt the development and implementation of an electronic forensic election audit system in Nigeria.

Keywords: election Audi, voters, UTAUT, performance expectancy, effort expectancy, social influence, facilitating condition social influence, facilitating conditions, cost factor, privacy factor, behavioural intention

Procedia PDF Downloads 40
8403 Electronic Payment Recording with Payment History Retrieval Module: A System Software

Authors: Adrian Forca, Simeon Cainday III

Abstract:

The Electronic Payment Recording with Payment History Retrieval Module is developed intendedly for the College of Science and Technology. This system software innovates the manual process of recording the payments done in the department through the development of electronic payment recording system software shifting from the slow and time-consuming procedure to quick yet reliable and accurate way of recording payments because it immediately generates receipts for every transaction. As an added feature to its software process, generation of recorded payment report is integrated eliminating the manual reporting to a more easy and consolidated report. As an added feature to the system, all recorded payments of the students can be retrieved immediately making the system transparent and reliable payment recording software. Viewing the whole process, the system software will shift from the manual process to an organized software technology because the information will be stored in a logically correct and normalized database. Further, the software will be developed using the modern programming language and implement strict programming methods to validate all users accessing the system, evaluate all data passed into the system and information retrieved to ensure data accuracy and reliability. In addition, the system will identify the user and limit its access privilege to establish boundaries of the specific access to information allowed for the store, modify, and update making the information secure against unauthorized data manipulation. As a result, the System software will eliminate the manual procedure and replace with an innovative modern information technology resulting to the improvement of the whole process of payment recording fast, secure, accurate and reliable software innovations.

Keywords: collection, information system, manual procedure, payment

Procedia PDF Downloads 137
8402 Globalisation and Diplomacy: How Can Small States Improve the Practice of Diplomacy to Secure Their Foreign Policy Objectives?

Authors: H. M. Ross-McAlpine

Abstract:

Much of what is written on diplomacy, globalization and the global economy addresses the changing nature of relationships between major powers. While the most dramatic and influential changes have resulted from these developing relationships the world is not, on deeper inspection, governed neatly by major powers. Due to advances in technology, the shifting balance of power and a changing geopolitical order, small states have the ability to exercise a greater influence than ever before. Increasingly interdependent and ever complex, our world is too delicate to be handled by a mighty few. The pressure of global change requires small states to adapt their diplomatic practices and diversify their strategic alliances and relationships. The nature and practice of diplomacy must be re-evaluated in light of the pressures resulting from globalization. This research examines: how small states can best secure their foreign policy objectives? Small state theory is used as a foundation for exploring the case study of New Zealand. The research draws on secondary sources to evaluate the existing theory in relation to modern practices of diplomacy. As New Zealand lacks the required economic and military power to play an active, influential role in international affairs what strategies are used to exert influence? Furthermore, New Zealand lies in a remote corner of the Pacific and is geographically isolated from its nearest neighbors how does this affect security and trade priorities? The findings note a significant shift since the 1970’s in New Zealand’s diplomatic relations. This shift is arguably a direct result of globalization, regionalism and a growing independence from the traditional bi-lateral relationships. The need to source predictable trade, investment and technology are an essential driving force for New Zealand’s diplomatic relations. A lack of hard power aligns New Zealand’s prosperity with a secure, rules-based international system that increases the likelihood of a stable and secure global order. New Zealand’s diplomacy and prosperity has been intrinsically reliant on its reputation. A vital component of New Zealand’s diplomacy is preserving a reputation for integrity and global responsibility. It is the use of this soft power that facilitates the influence that New Zealand enjoys on the world stage. To weave a comprehensive network of successful diplomatic relationships, New Zealand must maintain a reputation of international credibility. Globalization has substantially influenced the practice of diplomacy for New Zealand. The current world order places economic and military might in the hands of a few, subsequently requiring smaller states to use other means for securing their interests. There are clear strategies evident in New Zealand’s diplomacy practice that draw attention to how other smaller states might best secure their foreign policy objectives. While these findings are limited, as with all case study research, there is value in applying the findings to other small states struggling to secure their interests in the wake of rapid globalization.

Keywords: diplomacy, foreign policy, globalisation, small state

Procedia PDF Downloads 361
8401 Consumer Preferences for Low-Carbon Futures: A Structural Equation Model Based on the Domestic Hydrogen Acceptance Framework

Authors: Joel A. Gordon, Nazmiye Balta-Ozkan, Seyed Ali Nabavi

Abstract:

Hydrogen-fueled technologies are rapidly advancing as a critical component of the low-carbon energy transition. In countries historically reliant on natural gas for home heating, such as the UK, hydrogen may prove fundamental for decarbonizing the residential sector, alongside other technologies such as heat pumps and district heat networks. While the UK government is set to take a long-term policy decision on the role of domestic hydrogen by 2026, there are considerable uncertainties regarding consumer preferences for ‘hydrogen homes’ (i.e., hydrogen-fueled appliances for space heating, hot water, and cooking. In comparison to other hydrogen energy technologies, such as road transport applications, to date, few studies have engaged with the social acceptance aspects of the domestic hydrogen transition, resulting in a stark knowledge deficit and pronounced risk to policymaking efforts. In response, this study aims to safeguard against undesirable policy measures by revealing the underlying relationships between the factors of domestic hydrogen acceptance and their respective dimensions: attitudinal, socio-political, community, market, and behavioral acceptance. The study employs an online survey (n=~2100) to gauge how different UK householders perceive the proposition of switching from natural gas to hydrogen-fueled appliances. In addition to accounting for housing characteristics (i.e., housing tenure, property type and number of occupants per dwelling) and several other socio-structural variables (e.g. age, gender, and location), the study explores the impacts of consumer heterogeneity on hydrogen acceptance by recruiting respondents from across five distinct groups: (1) fuel poor householders, (2) technology engaged householders, (3) environmentally engaged householders, (4) technology and environmentally engaged householders, and (5) a baseline group (n=~700) which filters out each of the smaller targeted groups (n=~350). This research design reflects the notion that supporting a socially fair and efficient transition to hydrogen will require parallel engagement with potential early adopters and demographic groups impacted by fuel poverty while also accounting strongly for public attitudes towards net zero. Employing a second-order multigroup confirmatory factor analysis (CFA) in Mplus, the proposed hydrogen acceptance model is tested to fit the data through a partial least squares (PLS) approach. In addition to testing differences between and within groups, the findings provide policymakers with critical insights regarding the significance of knowledge and awareness, safety perceptions, perceived community impacts, cost factors, and trust in key actors and stakeholders as potential explanatory factors of hydrogen acceptance. Preliminary results suggest that knowledge and awareness of hydrogen are positively associated with support for domestic hydrogen at the household, community, and national levels. However, with the exception of technology and/or environmentally engaged citizens, much of the population remains unfamiliar with hydrogen and somewhat skeptical of its application in homes. Knowledge and awareness present as critical to facilitating positive safety perceptions, alongside higher levels of trust and more favorable expectations for community benefits, appliance performance, and potential cost savings. Based on these preliminary findings, policymakers should be put on red alert about diffusing hydrogen into the public consciousness in alignment with energy security, fuel poverty, and net-zero agendas.

Keywords: hydrogen homes, social acceptance, consumer heterogeneity, heat decarbonization

Procedia PDF Downloads 77
8400 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 346