Search results for: transnational privacy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 578

Search results for: transnational privacy

218 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies

Authors: Alec Wells, Aminu Bello Usman, Justin McKeown

Abstract:

The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.

Keywords: direct voice input, risk, security, technology, trust

Procedia PDF Downloads 159
217 Keyloggers Prevention with Time-Sensitive Obfuscation

Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee

Abstract:

Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.

Keywords: authentication, computer security, keylogger, privacy, information leakage

Procedia PDF Downloads 95
216 The Impact of Undocumented Migration on Human Security in Northern Nigeria

Authors: Targba Aondowase

Abstract:

Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.

Keywords: human security, impact, migration, undocumented

Procedia PDF Downloads 309
215 Urban Dynamics Modelling of Mixed Land Use for Sustainable Urban Development in Indian Context

Authors: Rewati Raman, Uttam K. Roy

Abstract:

One of the main adversaries of city planning in present times is the ever-expanding problem of urbanization and the antagonistic issues accompanying it. The prevalent challenges in urbanization such as population growth, urban sprawl, poverty, inequality, pollution, congestion, etc. call for reforms in the urban fabric as well as in planning theory and practice. One of the various paradigms of city planning, land use planning, has been the major instruments for spatial planning of cities and regions in India. Zoning regulation based land use planning in the form of land use and development control plans (LUDCP) and development control regulations (DCR) have been considered mainstream guiding principles in land use planning for decades. In spite of many advantages of such zoning based regulations, over a period of time, it has been critiqued by scholars for its own limitations of isolation and lack of vitality, inconvenience in business in terms of proximity to residence and low operating cost, unsuitable environment for small investments, higher travel distance for facilities, amenities and thereby higher expenditure, safety issues etc. Mixed land use has been advocated as a tool to avoid such limitations in city planning by researchers. In addition, mixed land use can offer many advantages like housing variety and density, the creation of an economic blend of compatible land use, compact development, stronger neighborhood character, walkability, and generation of jobs, etc. Alternatively, the mixed land use beyond a suitable balance of use can also bring disadvantages like traffic congestion, encroachments, very high-density housing leading to a slum like condition, parking spill out, non-residential uses operating on residential premises paying less tax, chaos hampering residential privacy, pressure on existing infrastructure facilities, etc. This research aims at studying and outlining the various challenges and potentials of mixed land use zoning, through modeling tools, as a competent instrument for city planning in lieu of the present urban scenario. The methodology of research adopted in this paper involves the study of a mixed land use neighborhood in India, identification of indicators and parameters related to its extent and spatial pattern and the subsequent use of system dynamics as a modeling tool for simulation. The findings from this analysis helped in identifying the various advantages and challenges associated with the dynamic nature of a mixed use urban settlement. The results also confirmed the hypothesis that mixed use neighborhoods are catalysts for employment generation, socioeconomic gains while improving vibrancy, health, safety, and security. It is also seen that certain challenges related to chaos, lack of privacy and pollution prevail in mixed use neighborhoods, which can be mitigated by varying the percentage of mixing as per need, ensuring compatibility of adjoining use, institutional interventions in the form of policies, neighborhood micro-climatic interventions, etc. Therefore this paper gives a consolidated and holistic framework and quantified outcome pertaining to the extent and spatial pattern of mixed land use that should be adopted to ensure sustainable urban planning.

Keywords: mixed land use, sustainable development, system dynamics analysis, urban dynamics modelling

Procedia PDF Downloads 151
214 Representation of Memory of Forced Displacement in Central and Eastern Europe after World War II in Polish and German Cinemas

Authors: Ilona Copik

Abstract:

The aim of this study is to analyze the representation of memories of the forced displacement of Poles and Germans from the eastern territories in 1945 as depicted by Polish and German feature films between the years 1945-1960. The aftermath of World War II and the Allied agreements concluded at Yalta and Potsdam (1945) resulted in changes in national borders in Central and Eastern Europe and the large-scale transfer of civilians. The westward migration became a symbol of the new post-war division of Europe, new spheres of influence separated by the Iron Curtain. For years it was a controversial topic in both Poland and Germany due to the geopolitical alignment (the socialist East and capitalist West of Europe), as well as the unfinished debate between the victims and perpetrators of the war. The research premise is to take a comparative view of the conflicted cultures of Polish and German memory, to reflect on the possibility of an international dialogue about the past recorded in film images, and to discover the potential of film as a narrative warning against totalitarian inclinations. Until now, films made between 1945 and 1960 in Poland and the German occupation zones have been analyzed mainly in the context of artistic strategies subordinated to ideology and historical politics. In this study, the intention is to take a critical approach leading to the recognition of how films work as collective memory media, how they reveal the mechanisms of memory/forgetting, and what settlement topoi and migration myths they contain. The main hypothesis is that feature films about forced displacement, in addition to the politics of history - separate in each country - reveal comparable transnational individual experiences: the chaos of migration, the trauma of losing one's home, the conflicts accompanying the familiar/foreign, the difficulty of cultural adaptation, the problem of lost identity, etc.

Keywords: forced displacement, Polish and German cinema, war victims, World War II

Procedia PDF Downloads 48
213 Cultivating Responsible AI: For Cultural Heritage Preservation in India

Authors: Varsha Rainson

Abstract:

Artificial intelligence (AI) has great potential and can be used as a powerful tool of application in various domains and sectors. But with the application of AI, there comes a wide spectrum of concerns around bias, accountability, transparency, and privacy. Hence, there is a need for responsible AI, which can uphold ethical and accountable practices to ensure that things are transparent and fair. The paper is a combination of AI and cultural heritage preservation, with a greater focus on India because of the rich cultural legacy that it holds. India’s cultural heritage in itself contributes to its identity and the economy. In this paper, along with discussing the impact culture holds on the Indian economy, we will discuss the threats that the cultural heritage is exposed to due to pollution, climate change and urbanization. Furthermore, the paper reviews some of the exciting applications of AI in cultural heritage preservation, such as 3-D scanning, photogrammetry, and other techniques which have led to the reconstruction of cultural artifacts and sites. The paper eventually moves into the potential risks and challenges that AI poses in cultural heritage preservation. These include ethical, legal, and social issues which are to be addressed by organizations and government authorities. Overall, the paper strongly argues the need for responsible AI and the important role it can play in preserving India’s cultural heritage while holding importance to value and diversity.

Keywords: responsible AI, cultural heritage, artificial intelligence, biases, transparency

Procedia PDF Downloads 156
212 Negotiating Space, Reconstructing Identity, and Community Literacy Practices: Case Study of Indonesian Domestic Workers in Hong Kong

Authors: Pratiwi Retnaningdyah, Sofie Dewayani

Abstract:

Foreign domestic workers are arguably one of the most exploited and subordinated groups of women in the labor division under global capitalism. However, foreign domestic workers (FDWs) actively engage in activities to negotiate the prevailing structures of power in the transnational labor market. This paper seeks to understand the significance of Indonesian Domestic Workers (IDWs) cultural representations in relation to the themes of literacy and space. In particular, this paper addresses the issue of how IDWs in Hong Kong make use of the practice of suitcase libraries to make meaning of space within material limits. The term ‘suitcase libraries’ is used to refer to a literacy practice of book borrowing at outdoor public spaces in Hong Kong during IDWs’ days off. The books are displayed in open suitcases and mats, with IDWs both as administrators and consumers engaged in the practice. This paper argues that suitcase libraries can be considered representing Thirdspace in the form of a vernacular, grassroots literacy practice that creates a productive space of resistance and community empowerment. Employing participant observation and a textual analysis of IDWs’ literacy narratives, the study traced IDWs’ literacy trajectories to the period of IDWs’ permanent return to Indonesia. Through extended engagement in community literacy practices in their hometowns, former IDWs develop their literacy capital and break the stereotypes of uneducated and passive maids and change them into literate figures. In the context of literacy movement that has gained momentum in Indonesia recently, the practice of IDWs’ suitcase libraries is also useful as a reference point to further investigate how community literacy sponsors in Indonesia also create Thirdspace and develop literacy capital through community libraries (TBM, Taman Baca Masyarakat).

Keywords: identity, Indonesian domestic workers, literacy narratives, Thirdspace

Procedia PDF Downloads 145
211 Big Data Applications for Transportation Planning

Authors: Antonella Falanga, Armando Cartenì

Abstract:

"Big data" refers to extremely vast and complex sets of data, encompassing extraordinarily large and intricate datasets that require specific tools for meaningful analysis and processing. These datasets can stem from diverse origins like sensors, mobile devices, online transactions, social media platforms, and more. The utilization of big data is pivotal, offering the chance to leverage vast information for substantial advantages across diverse fields, thereby enhancing comprehension, decision-making, efficiency, and fostering innovation in various domains. Big data, distinguished by its remarkable attributes of enormous volume, high velocity, diverse variety, and significant value, represent a transformative force reshaping the industry worldwide. Their pervasive impact continues to unlock new possibilities, driving innovation and advancements in technology, decision-making processes, and societal progress in an increasingly data-centric world. The use of these technologies is becoming more widespread, facilitating and accelerating operations that were once much more complicated. In particular, big data impacts across multiple sectors such as business and commerce, healthcare and science, finance, education, geography, agriculture, media and entertainment and also mobility and logistics. Within the transportation sector, which is the focus of this study, big data applications encompass a wide variety, spanning across optimization in vehicle routing, real-time traffic management and monitoring, logistics efficiency, reduction of travel times and congestion, enhancement of the overall transportation systems, but also mitigation of pollutant emissions contributing to environmental sustainability. Meanwhile, in public administration and the development of smart cities, big data aids in improving public services, urban planning, and decision-making processes, leading to more efficient and sustainable urban environments. Access to vast data reservoirs enables deeper insights, revealing hidden patterns and facilitating more precise and timely decision-making. Additionally, advancements in cloud computing and artificial intelligence (AI) have further amplified the potential of big data, enabling more sophisticated and comprehensive analyses. Certainly, utilizing big data presents various advantages but also entails several challenges regarding data privacy and security, ensuring data quality, managing and storing large volumes of data effectively, integrating data from diverse sources, the need for specialized skills to interpret analysis results, ethical considerations in data use, and evaluating costs against benefits. Addressing these difficulties requires well-structured strategies and policies to balance the benefits of big data with privacy, security, and efficient data management concerns. Building upon these premises, the current research investigates the efficacy and influence of big data by conducting an overview of the primary and recent implementations of big data in transportation systems. Overall, this research allows us to conclude that big data better provide to enhance rational decision-making for mobility choices and is imperative for adeptly planning and allocating investments in transportation infrastructures and services.

Keywords: big data, public transport, sustainable mobility, transport demand, transportation planning

Procedia PDF Downloads 34
210 Non-State Actors and Their Liabilities in International Armed Conflicts

Authors: Shivam Dwivedi, Saumya Kapoor

Abstract:

The Israeli Supreme Court in Public Committee against Torture in Israel v. Government of Israel observed the presence of non-state actors in cross-border terrorist activities thereby making the role of non-state actors in terrorism the center of discussion under the scope of International Humanitarian Law. Non-state actors and their role in a conflict have also been traversed upon by the Tadic case decided by the International Criminal Tribunal for the former Yugoslavia. However, there still are lacunae in International Humanitarian Law when it comes to determining the nature of a conflict, especially when non-state groups act within the ambit of various states, for example, Taliban in Afghanistan or the groups operating in Ukraine and Georgia. Thus, the objective of writing this paper would be to observe the ways by which non-state actors particularly terrorist organizations could be brought under the ambit of Additional Protocol I. Additional Protocol I is a 1977 amendment protocol to the Geneva Conventions relating to the protection of victims of international conflicts which basically outlaws indiscriminate attacks on civilian populations, forbids conscription of children and preserves various other human rights during the war. In general, the Additional Protocol I reaffirms the provisions of the original four Geneva Conventions. Since provisions of Additional Protocol I apply only to cases pertaining to International Armed Conflicts, the answer to the problem should lie in including the scope for ‘transnational armed conflict’ in the already existing definition of ‘International Armed Conflict’ within Common Article 2 of the Geneva Conventions. This would broaden the applicability of the provisions in cases of non-state groups and render an international character to the conflict. Also, the non-state groups operating or appearing to operate should be determined by the test laid down in the Nicaragua case by the International Court of Justice and not under the Tadic case decided by the International Criminal Tribunal for Former Yugoslavia in order to provide a comprehensive system to deal with such groups. The result of the above proposal, therefore, would enhance the scope of the application of International Humanitarian Law to non-state groups and individuals.

Keywords: Geneva Conventions, International Armed Conflict, International Humanitarian Law, non-state actors

Procedia PDF Downloads 351
209 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 249
208 Regulating Transnational Corporations and Protecting Human Rights: Analyzing the Efficiency of International Legal Framework

Authors: Stellina Jolly

Abstract:

July 18th to August 19th 2013 has gone down in the history of India for undertaking the country’s first environment referendum. The Supreme Court had ruled that the Vedanta Group's bauxite mining project in the Niyamgiri Hills of Orissa will have to get clearance from the gram sabha, which will consider the cultural and religious rights of the tribals and forest dwellers living in Rayagada and Kalahandi districts. In the Niyamgiri hills, people of small tribal hamlets were asked to voice their opinion on bauxite mining in their habitat. The ministry has reiterated its stand that mining cannot be allowed on the Niyamgiri hills because it will affect the rights of the Dongria Kondhs. The tribal person who occupies the Niyamgiri Hills in Eastern India accomplished their first success in 2010 in their struggle to protect and preserve their existence, culture and land against Vedanta a London-based mining giant. In August, 2010 Government of India revoked permission for Vedanta Resources to mine bauxite from hills in Orissa State where the Dongria Kondh live as forest dwellers. This came after various protests and reports including amnesty report wherein it highlighted that an alumina refinery in eastern India operated by a subsidiary of mining company. Vedanta was accused of causing air and water pollution that threatens the health of local people and their access to water. The abuse of human rights by corporate is not a new issue it has occurred in Africa, Asia and other parts of the world. Paper focuses on the instances and extent of human right especially in terms of environment violations by corporations. Further Paper details on corporations and sustainable development. Paper finally comes up with certain recommendation including call for a declaration by United Nations on Corporate environment Human Rights Liability.

Keywords: environment, corporate, human rights, sustainable development

Procedia PDF Downloads 450
207 A Study on the Impact of Artificial Intelligence on Human Society and the Necessity for Setting up the Boundaries on AI Intrusion

Authors: Swarna Pundir, Prabuddha Hans

Abstract:

As AI has already stepped into the daily life of human society, one cannot be ignorant about the data it collects and used it to provide a quality of services depending up on the individuals’ choices. It also helps in giving option for making decision Vs choice selection with a calculation based on the history of our search criteria. Over the past decade or so, the way Artificial Intelligence (AI) has impacted society is undoubtedly large.AI has changed the way we shop, the way we entertain and challenge ourselves, the way information is handled, and has automated some sections of our life. We have answered as to what AI is, but not why one may see it as useful. AI is useful because it is capable of learning and predicting outcomes, using Machine Learning (ML) and Deep Learning (DL) with the help of Artificial Neural Networks (ANN). AI can also be a system that can act like humans. One of the major impacts be Joblessness through automation via AI which is seen mostly in manufacturing sectors, especially in the routine manual and blue-collar occupations and those without a college degree. It raises some serious concerns about AI in regards of less employment, ethics in making moral decisions, Individuals privacy, human judgement’s, natural emotions, biased decisions, discrimination. So, the question is if an error occurs who will be responsible, or it will be just waved off as a “Machine Error”, with no one taking the responsibility of any wrongdoing, it is essential to form some rules for using the AI where both machines and humans are involved.

Keywords: AI, ML, DL, ANN

Procedia PDF Downloads 66
206 A Comparison of Methods for Neural Network Aggregation

Authors: John Pomerat, Aviv Segev

Abstract:

Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.

Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning

Procedia PDF Downloads 131
205 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 101
204 A Cross-Cultural Analysis of Ethical Standards in Social and Behavioral Research

Authors: Xiwu Feng

Abstract:

The paper is to analyze research ethics in social and behavioral sciences from a cross-cultural perspective. A multi-phase study investigated implementations of ethical standards and guidelines in higher institutions in China. Institutional policies and procedures on human subject research and perceptions of human subject protection were assessed in the Chinese research universities from different regions. The findings of the study indicate that the implementations of ethical standards and guidelines vary from institution to institution and from region to region. Education and cultural backgrounds of the participants influence their perceptions of the welfare and privacy of human subjects. The results of the study reveal great differences and complexities in ethical standards for the protection of human subjects of research in contrast to the Western world. The Chinese collectivistic values and the cooperative-harmonious democracy play a significant role in perceiving and implementing ethical guidelines. Chinese researchers find themselves a long way to go before seeing implementations of regulations and guidelines on human subject research in social and behavioral sciences.

Keywords: ethical standards, human subjects, research ethics, social and behavioral research

Procedia PDF Downloads 179
203 Holistic Urban Development: Incorporating Both Global and Local Optimization

Authors: Christoph Opperer

Abstract:

The rapid urbanization of modern societies and the need for sustainable urban development demand innovative solutions that meet both individual and collective needs while addressing environmental concerns. To address these challenges, this paper presents a study that explores the potential of spatial and energetic/ecological optimization to enhance the performance of urban settlements, focusing on both architectural and urban scales. The study focuses on the application of biological principles and self-organization processes in urban planning and design, aiming to achieve a balance between ecological performance, architectural quality, and individual living conditions. The research adopts a case study approach, focusing on a 10-hectare brownfield site in the south of Vienna. The site is surrounded by a small-scale built environment as an appropriate starting point for the research and design process. However, the selected urban form is not a prerequisite for the proposed design methodology, as the findings can be applied to various urban forms and densities. The methodology used in this research involves dividing the overall building mass and program into individual small housing units. A computational model has been developed to optimize the distribution of these units, considering factors such as solar exposure/radiation, views, privacy, proximity to sources of disturbance (such as noise), and minimal internal circulation areas. The model also ensures that existing vegetation and buildings on the site are preserved and incorporated into the optimization and design process. The model allows for simultaneous optimization at two scales, architectural and urban design, which have traditionally been addressed sequentially. This holistic design approach leads to individual and collective benefits, resulting in urban environments that foster a balance between ecology and architectural quality. The results of the optimization process demonstrate a seemingly random distribution of housing units that, in fact, is a densified hybrid between traditional garden settlements and allotment settlements. This urban typology is selected due to its compatibility with the surrounding urban context, although the presented methodology can be extended to other forms of urban development and density levels. The benefits of this approach are threefold. First, it allows for the determination of ideal housing distribution that optimizes solar radiation for each building density level, essentially extending the concept of sustainable building to the urban scale. Second, the method enhances living quality by considering the orientation and positioning of individual functions within each housing unit, achieving optimal views and privacy. Third, the algorithm's flexibility and robustness facilitate the efficient implementation of urban development with various stakeholders, architects, and construction companies without compromising its performance. The core of the research is the application of global and local optimization strategies to create efficient design solutions. By considering both, the performance of individual units and the collective performance of the urban aggregation, we ensure an optimal balance between private and communal benefits. By promoting a holistic understanding of urban ecology and integrating advanced optimization strategies, our methodology offers a sustainable and efficient solution to the challenges of modern urbanization.

Keywords: sustainable development, self-organization, ecological performance, solar radiation and exposure, daylight, visibility, accessibility, spatial distribution, local and global optimization

Procedia PDF Downloads 38
202 Representation and Agency in the Life Writings of Taiwanese Disabled Women

Authors: Su-Lin Yu

Abstract:

In recent years, we have witnessed the growing scholarship on transnational theorizing and activism within disability. In particular, the universalizing discourses of disability formulated in the Global North seem inadequate in engaging the vast diversity of discourses of disability that emerge in global and local policies as well as the everyday experiences of disabled people in the Global South. This study will further consider the future possibilities of how Taiwanese and global disability studies might interchange disability knowledge. First, this study will determine how a local literature of disability can be formed in Taiwan by examining life writings written by Taiwanese disabled women. Both the texts and the personal experiences are treated as social products which can, through their discourses, offer insight into the socio-cultural practices and norms of disability and womanhood in Taiwan. This paper argues that more than by the impairment in itself, the experiences of disabled women are shaped by the social and cultural discourses and practices that define disability and womanhood as well as the normative roles, places, and contexts associated with them. Simultaneous analysis of disability and womanhood exemplifies the way in which disability operates in a complex interaction with the socio-cultural discourses and practices of womanhood, thus producing gender-differentiated disabling obstacles for disabled women. Another purpose of this study is to gain an understanding of the transformative experience of women with disabilities and their perceptions of the self. Designed to provide positive, realistic pictures of the lives of women with disabilities and the social, economic, and political issues they face, their life writings demonstrate how they as disabled women simultaneously struggle with writing a new identity and creating an ethical narrative. These strong and articulate women construct narratives that attempt to recount the remarkable journey that transformed them from dependent women to community activists and writers who speak forcefully about the needs of people with disabilities. More than a story of one woman's struggle for independence, their writing, then, is a testimony to the importance of community building and organizing to enable local people with disabilities to live fulfilling lives.

Keywords: gender, disability, representation, agency

Procedia PDF Downloads 267
201 Development of Entrepreneurship in Industry on the Basis of Regulation of Transnational Production Chains in the Russian Arctic

Authors: E. N. Vetrova, L.V. Lapochkina, N. V. Nikulina

Abstract:

In the national economy, entrepreneurship plays the role of a buffer between economy and policy for it contributes to improving budget effectiveness and decreasing dependence of economy on the state. Entrepreneurship in industry makes it possible to increase the added value that is formed in production chains and to decrease dependence on import. Under the current circumstances, when sanctions are being imposed, this is especially relevant for Russia and for the realization of projects in the Russian Arctic. However, development of entrepreneurship in industry requires an enlightened state policy. The purpose of the research is elaboration of recommendations for improving economic effectiveness of the realization of the Arctic projects on the basis of conceptual proposals for the development of entrepreneurship in industry. The paper presents the studies of the extractive industry role in the Russian economy and proves its raw material character. The analysis of production chains in industry on the basis of the conception of the added value global chains demonstrated a low added value formed by Russian companies. The study of changes in the structure of economy based on systemic, statistical and comparative analyses revealed no positive changes in the structure of economy over the period under consideration. This is a manifestation of ineffectiveness of the Russian industrial policy in general and within the Arctic region in particular. The authors identified the problems information and implementation of the state industrial policy in the Arctic region and in the development of national entrepreneurship, analyzed the shortcomings of the current state policy in the sphere of the Russian industry. On the basis of the conducted studies, the authors formulated conceptual approaches to change the state policy in the Arctic. The basic idea of the authors is to substantiate the focus of the state regulation on the development of entrepreneurship in industry in the process of the Russian Arctic exploration. At the same time another problem is solved–that of the development of the manufacturing industry in the southern regions of the northwestern part of Russia. The criterion of effectiveness in this case is the economic effectiveness.

Keywords: entrepreneurship in industry, global chains of the added value, government regulation, industrial policies, production chains in the arctic region, economic effectiveness

Procedia PDF Downloads 362
200 Regulating the Emerging Platform Economy in Ethiopia: Issues in the Ride-Hailing Platforms

Authors: Nebiat Lemenih Lenger

Abstract:

Today, the digital economy is evolving faster than ever in Ethiopia. Platforms that provide a ride-hailing service are growing fast in the country. The market welcomed them as they disrupt it with quality services and lower prices. This revolution is, however, not without challenges. These include cybersecurity breaches, facilitating illegal economic activities, and challenging concepts of privacy. To mitigate the risks and utilize the benefits, appropriate regulation should be introduced in the economy. By identifying legal and institutional gaps in Ethiopia`s digital economy, this research work assists the government`s effort to create a better digital economy. Moreover, this study, being a pioneer study in the area, will be an input for further studies in academia. The research employs a qualitative legal research method and analyzes various legal and policy instruments in Ethiopia in comparison with best international experiences. As this research applies a qualitative research method, a grounded theory method of data analysis is used. The research concluded that Ethiopia is far from designing appropriate legal and regulatory infrastructures. Due to the government monopoly of the sector, there is poor digital infrastructure in the country. The existing labor laws have no specific provisions on the rights and obligations of gig workers.

Keywords: Ethiopia, gig economy, digital, ride-hailing, regulation

Procedia PDF Downloads 52
199 An Intelligent Watch-Over System Using an IoT Device, for Elderly People Living by Themselves

Authors: Hideo Suzuki, Yuya Kiyonobu, Kotaro Matsushita, Masaki Hanada, Rie Suzuki, Noriko Niijima, Noriko Uosaki, Tadao Nakamura

Abstract:

People often worry about their elderly family members who are living by themselves or staying alone somewhere. An intelligent watch-over system for such elderly people, using a Raspberry Pi IoT device, has been newly developed to monitor those who live or stay separately from their families and alert them if a problem occurs. The system consists of motion sensors and temperature-humidity combined sensors that are located at seven points within an elderly person's home. The intelligent algorithms of the system detect signs and the possibility of unhealthy situations arising for the elderly relative; e.g., an unusually long bathing time, or a visit to a restroom, too high a room temperature, etc., by using data cached by the sensors above, at seven points within their house. The system gives more consideration to the elderly person's privacy, by using the sensors above, instead of using cameras and microphones placed around the house. The system invented and described here, can send a Twitter direct message to designated family members when an elderly relative is possibly in an unhealthy condition. Thus the system helps decrease family members' anxieties regarding their elderly relatives and increases their sense of security.

Keywords: elderly person, IoT device, Raspberry Pi, watch-over system

Procedia PDF Downloads 191
198 Applying ASHRAE Standards on the Hospital Buildings of UAE

Authors: Hanan M. Taleb

Abstract:

Energy consumption associated with buildings has a significant impact on the environment. To that end, and as a transaction between the inside and outside and between the building and urban space, the building skin plays an especially important role. It provides protection from the elements; demarcates private property and creates privacy. More importantly, it controls the admission of solar radiation. Therefore, designing the building skin sustainably will help to achieve optimal performance in terms of both energy consumption and thermal comfort. Unfortunately, with accelerating construction expansion, many recent buildings do not pay attention to the importance of the envelope design. This piece of research will highlight the importance of this part of the creation of buildings by providing evidence of a significant reduction in energy consumption if the envelopes are redesigned. Consequently, the aim of this paper is to enhance the performance of the hospital envelope in order to achieve sustainable performance. A hospital building sited in Abu Dhabi, in the UAE, has been chosen to act as a case study. A detailed analysis of the annual energy performance of the case study will be performed with the use of a computerised simulation; this is in order to explore their energy performance shortcomings. The energy consumption of the base case will then be compared with that resulting from the new proposed building skin. The results will inform architects and designers of the savings potential from various strategies.

Keywords: ASHREA, building skin, building envelopes, hospitals, Abu Dhabi, UAE, IES software

Procedia PDF Downloads 333
197 High-Value Health System for All: Technologies for Promoting Health Education and Awareness

Authors: M. P. Sebastian

Abstract:

Health for all is considered as a sign of well-being and inclusive growth. New healthcare technologies are contributing to the quality of human lives by promoting health education and awareness, leading to the prevention, early diagnosis and treatment of the symptoms of diseases. Healthcare technologies have now migrated from the medical and institutionalized settings to the home and everyday life. This paper explores these new technologies and investigates how they contribute to health education and awareness, promoting the objective of high-value health system for all. The methodology used for the research is literature review. The paper also discusses the opportunities and challenges with futuristic healthcare technologies. The combined advances in genomics medicine, wearables and the IoT with enhanced data collection in electronic health record (EHR) systems, environmental sensors, and mobile device applications can contribute in a big way to high-value health system for all. The promise by these technologies includes reduced total cost of healthcare, reduced incidence of medical diagnosis errors, and reduced treatment variability. The major barriers to adoption include concerns with security, privacy, and integrity of healthcare data, regulation and compliance issues, service reliability, interoperability and portability of data, and user friendliness and convenience of these technologies.

Keywords: big data, education, healthcare, information communication technologies (ICT), patients, technologies

Procedia PDF Downloads 176
196 Audience Engagement in UNHCR Social Media Stories of Displaced People: Emotion and Reason in a Global Public Debate

Authors: Soraya Tharani

Abstract:

Social media has changed how public opinion is shaped by enabling more diversified and inclusive participation of audiences. New online forums provide spaces in which governments, NGOs and other organizations can create content and receive feedback. These forums are sites where debate can constitute public opinion. Studies of audience engagement can give an understanding of how different voices from the civil society participate in debates and how discussions can reinforce or bring into question established societal beliefs. The UN’s refugee agency, UNHCR, produces audio-visual stories about displaced people for global audiences on social media platforms. The availability of many views in these forums can give insight into how dialogues regarding transnational issues are formed. The public sphere, as defined by Habermas, is a discursive arena where reasoned debate can take place. Habermas’ concept is combined with theories on celebrity advocacy, and discussions about the role and effect celebrities have in raising public awareness for humanitarian issues. The personal and public lives of celebrities often create emotional engagement from their fans and other audiences. In this study, quantitative and qualitative methods have been used on YouTube comments for uncovering how emotion and reason are constituted in a global public debate on celebrity endorsed UNHCR stories of displaced people. The study shows that engagement intensity is not equally distributed between comment threads; comments presented as facts or emotional claims are often supported by recourse to intertextuality, and specific linguistic strategies are used to put forward emotional and reasoned claims regarding individual and group identities. The findings from this research aim to contribute to an understanding of audience engagement on issues of human survival and solidarity in a global social media public sphere.

Keywords: emotions, engagement, global public sphere, linguistic strategies, reason, refugees, social media, UNHCR

Procedia PDF Downloads 118
195 A Comprehensive Survey on Machine Learning Techniques and User Authentication Approaches for Credit Card Fraud Detection

Authors: Niloofar Yousefi, Marie Alaghband, Ivan Garibay

Abstract:

With the increase of credit card usage, the volume of credit card misuse also has significantly increased, which may cause appreciable financial losses for both credit card holders and financial organizations issuing credit cards. As a result, financial organizations are working hard on developing and deploying credit card fraud detection methods, in order to adapt to ever-evolving, increasingly sophisticated defrauding strategies and identifying illicit transactions as quickly as possible to protect themselves and their customers. Compounding on the complex nature of such adverse strategies, credit card fraudulent activities are rare events compared to the number of legitimate transactions. Hence, the challenge to develop fraud detection that are accurate and efficient is substantially intensified and, as a consequence, credit card fraud detection has lately become a very active area of research. In this work, we provide a survey of current techniques most relevant to the problem of credit card fraud detection. We carry out our survey in two main parts. In the first part, we focus on studies utilizing classical machine learning models, which mostly employ traditional transnational features to make fraud predictions. These models typically rely on some static physical characteristics, such as what the user knows (knowledge-based method), or what he/she has access to (object-based method). In the second part of our survey, we review more advanced techniques of user authentication, which use behavioral biometrics to identify an individual based on his/her unique behavior while he/she is interacting with his/her electronic devices. These approaches rely on how people behave (instead of what they do), which cannot be easily forged. By providing an overview of current approaches and the results reported in the literature, this survey aims to drive the future research agenda for the community in order to develop more accurate, reliable and scalable models of credit card fraud detection.

Keywords: Credit Card Fraud Detection, User Authentication, Behavioral Biometrics, Machine Learning, Literature Survey

Procedia PDF Downloads 89
194 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 165
193 Slöjd International: Translating and Tracking Nordic Curricula for Holistic Health, 1890s-1920s

Authors: Sasha Mullally

Abstract:

This paper investigates the transnational circulation of European Nordic ideas about and programs for manual education and training over the decades spanning the late 19th and early 20th centuries. Based on the unexamined but voluminous correspondence (English-language) of Otto Salomon, an internationally famous education reformer who popularized a form of manual training called "slöjd" (anglicized as "sloyd"), this paper examines it's circulation and translation across global cultures. Salomon, a multilingual promoter of new standardized program for manual training, based his curricula on traditional handcrqafts, particularly Swedish woodworking. He and his followers claimed that the integration of manual training and craft work provided primary and secondary educators with an opportunity to cultivate the mental, but also the physical, and tangentially, the spiritual, health of children. While historians have examined the networks who came together in person to train at his slöjd school for educators in western Sweden, no one has mapped the international community he cultivated over decades of letter writing. Additionally, while the circulation of his ideas in Britain and Germany, as well as the northeastern United States has been placed in a broader narrative of "western" education reform in the Progressive or late Victorian era, no one has examined the correspondence for evidence of the program's wider international appeal beyond Europe and North America. This paper fills this gap by examining the breadth of his reach through active correspondence with educators in Asia (Japan), South America (Brazil), and Africa (South Africa and Zimbabwe). As such, this research presents an opportunity to map the international communities of education reformers active at the turn of the last century, compare and contrast their understandings of and interpretations of "holistic" education, and reveal the ways manual formation was understood to be foundational to the healthy development of children.

Keywords: history of education, history of medicine and psychiatry, child health, child formation, internationalism

Procedia PDF Downloads 76
192 Quantitative and Qualitative Analysis: Predicting and Improving Students’ Summative Assessment Math Scores at the National College for Nuclear

Authors: Abdelmenen Abobghala, Mahmud Ahmed, Mohamed Alwaheshi, Anwar Fanan, Meftah Mehdawi, Ahmed Abuhatira

Abstract:

This research aims to predict academic performance and identify weak points in students to aid teachers in understanding their learning needs. Both quantitative and qualitative methods are used to identify difficult test items and the factors causing difficulties. The study uses interventions like focus group discussions, interviews, and action plans developed by the students themselves. The research questions explore the predictability of final grades based on mock exams and assignments, the student's response to action plans, and the impact on learning performance. Ethical considerations are followed, respecting student privacy and maintaining anonymity. The research aims to enhance student engagement, motivation, and responsibility for learning.

Keywords: prediction, academic performance, weak points, understanding, learning, quantitative methods, qualitative methods, formative assessments, feedback, emotional responses, intervention, focus group discussion, interview, action plan, student engagement, motivation, responsibility, ethical considerations

Procedia PDF Downloads 46
191 Forensic Analysis of Signal Messenger on Android

Authors: Ward Bakker, Shadi Alhakimi

Abstract:

The amount of people moving towards more privacy focused instant messaging applications has grown significantly. Signal is one of these instant messaging applications, which makes Signal interesting for digital investigators. In this research, we evaluate the artifacts that are generated by the Signal messenger for Android. This evaluation was done by using the features that Signal provides to create artifacts, whereafter, we made an image of the internal storage and the process memory. This image was analysed manually. The manual analysis revealed the content that Signal stores in different locations during its operation. From our research, we were able to identify the artifacts and interpret how they were used. We also examined the source code of Signal. Using our obtain knowledge from the source code, we developed a tool that decrypts some of the artifacts using the key stored in the Android Keystore. In general, we found that most artifacts are encrypted and encoded, even after decrypting some of the artifacts. During data visualization, some artifacts were found, such as that Signal does not use relationships between the data. In this research, two interesting groups of artifacts were identified, those related to the database and those stored in the process memory dump. In the database, we found plaintext private- and group chats, and in the memory dump, we were able to retrieve the plaintext access code to the application. Nevertheless, we conclude that Signal contains a wealth of artifacts that could be very valuable to a digital forensic investigation.

Keywords: forensic, signal, Android, digital

Procedia PDF Downloads 55
190 Mobile Systems: History, Technology, and Future

Authors: Shivendra Pratap Singh, Rishabh Sharma

Abstract:

The widespread adoption of mobile technology in recent years has revolutionized the way we communicate and access information. The evolution of mobile systems has been rapid and impactful, shaping our lives and changing the way we live and work. However, despite its significant influence, the history and development of mobile technology are not well understood by the general public. This research paper aims to examine the history, technology and future of mobile systems, exploring their evolution from early mobile phones to the latest smartphones and beyond. The study will analyze the technological advancements and innovations that have shaped the mobile industry, from the introduction of mobile internet and multimedia capabilities to the integration of artificial intelligence and 5G networks. Additionally, the paper will also address the challenges and opportunities facing the future of mobile technology, such as privacy concerns, battery life, and the increasing demand for high-speed internet. Finally, the paper will also provide insights into potential future developments and innovations in the mobile sector, such as foldable phones, wearable technology, and the Internet of Things (IoT). The purpose of this research paper is to provide a comprehensive overview of the history, technology, and future of mobile systems, shedding light on their impact on society and the challenges and opportunities that lie ahead.

Keywords: mobile technology, artificial intelligence, networking, iot, technological advancements, smartphones

Procedia PDF Downloads 60
189 Estimating View-Through Ad Attribution from User Surveys Using Convex Optimization

Authors: Yuhan Lin, Rohan Kekatpure, Cassidy Yeung

Abstract:

In Digital Marketing, robust quantification of View-through attribution (VTA) is necessary for evaluating channel effectiveness. VTA occurs when a product purchase is aided by an Ad but without an explicit click (e.g. a TV ad). A lack of a tracking mechanism makes VTA estimation challenging. Most prevalent VTA estimation techniques rely on post-purchase in-product user surveys. User surveys enable the calculation of channel multipliers, which are the ratio of the view-attributed to the click-attributed purchases of each marketing channel. Channel multipliers thus provide a way to estimate the unknown VTA for a channel from its known click attribution. In this work, we use Convex Optimization to compute channel multipliers in a way that enables a mathematical encoding of the expected channel behavior. Large fluctuations in channel attributions often result from overfitting the calculations to user surveys. Casting channel attribution as a Convex Optimization problem allows an introduction of constraints that limit such fluctuations. The result of our study is a distribution of channel multipliers across the entire marketing funnel, with important implications for marketing spend optimization. Our technique can be broadly applied to estimate Ad effectiveness in a privacy-centric world that increasingly limits user tracking.

Keywords: digital marketing, survey analysis, operational research, convex optimization, channel attribution

Procedia PDF Downloads 143