Search results for: user behaviour
3921 Highly Glazed Office Spaces: Simulated Visual Comfort vs Real User Experiences
Authors: Zahra Hamedani, Ebrahim Solgi, Henry Skates, Gillian Isoardi
Abstract:
Daylighting plays a pivotal role in promoting productivity and user satisfaction in office spaces. There is an ongoing trend in designing office buildings with a high proportion of glazing which relatively increases the risk of high visual discomfort. Providing a more realistic lighting analysis can be of high value at the early stages of building design when necessary changes can be made at a very low cost. This holistic approach can be achieved by incorporating subjective evaluation and user behaviour in computer simulation and provide a comprehensive lighting analysis. In this research, a detailed computer simulation model has been made using Radiance and Daysim. Afterwards, this model was validated by measurements and user feedback. The case study building is the school of science at Griffith University, Gold Coast, Queensland, which features highly glazed office spaces. In this paper, the visual comfort predicted by the model is compared with a preliminary survey of the building users to evaluate how user behaviour such as desk position, orientation selection, and user movement caused by daylight changes and other visual variations can inform perceptions of visual comfort. This work supports preliminary design analysis of visual comfort incorporating the effects of gaze shift patterns and views with the goal of designing effective layout for office spaces.Keywords: lighting simulation, office buildings, user behaviour, validation, visual comfort
Procedia PDF Downloads 1753920 A Preliminary Investigation on Factors That Influence Road Users' Speeding Behaviour on Selected Roads in Peninsular Malaysia
Authors: Farah Fazlinda Binti Mohamad, Ahmad Saifizul Abdullah, Mohamed Rehan Karim , Jamilah Mohamad, Siti Hikmah Musthar
Abstract:
Road safety is an important issue in Malaysia. It become important as it is discussed widely throughout printed and electronic media. Most of the news portrays on road accident and fatalities have increased the concern of everyone. This issue affects everyone's life as everyone shares the roads. The most vulnerable victims are the road user who uses the roads every day. It is appalling when World Health Organization (WHO) reported that in every 100,000 of population in Malaysia, 23 fatalities recorded due to road accident alone. This figure is quite alarming and requires serious attention. Furthermore, research by Malaysian Institute of Road Safety Research concluded that that speeding has contributed to 60% of all road accident in the country. Therefore, this study aims to elucidate the factors that influence road users’ speeding behaviour on selected roads in Peninsular Malaysia. To achieve this, set of questionnaires has distributed to 500 respondents on selected roads in Peninsular Malaysia. The respondents came from various demographic backgrounds in order to have a fair opinion on the issue. Using descriptive analysis, the results have indicated that psychological factors such as emotion and attitude of road user are the prominent factors that influence the road user’s speeding behaviour. Furthermore, the results have shown that male road users were dominant in speeding compared to female, which led to increased vulnerability to road injuries and fatalities. These findings are very useful in order for us to understand road users’ driving behaviour. Relevant authorities should also revise the existing countermeasures and find ways to reduce road accident. Engineers and road experts could cooperate in designing new road specifications for the road user. Nevertheless, it is important to comprehend this speeding issue and factors associated with it. Each road user should take this matter seriously and responsibly as road safety is a responsibility of all.Keywords: countermeasures, psychological, road safety, speeding
Procedia PDF Downloads 5013919 A Preliminary Investigation on Factors that Influence Malaysian Road User’s Close Following Behaviour
Authors: Siti Hikmah Musthar, Ahmad Saifizul, Mohamed Rehan Karim, Jamilah Mohamad, Farah Fazlinda Mohamad
Abstract:
This paper aims to look at the situation of close following behaviour from the introductory phase before conducting a profound investigation and discussion on this subject. Close following behaviour is known as behaviour during when drivers follow front vehicle with headways lower than two-second. As such, the study of close-following is important due to the degree of negative consequences this behaviour can cause commonly identified as rear-end collision especially when road safety is concerned. This paper presents a preliminary results of close-following behaviour among selected respondents (n=515) in Peninsular Malaysia at selected highways and federal roads. Respondents were interviewed with survey questions tending to examine their actual driving behaviour related to close-following and their perception towards the subject of close following. Selected findings (four selected questions) are discussed in this paper of which identified as essential for deliberation (as opposed to other questions in the survey questionnaire) as far as a preliminary discussion is concerned. Through the statistical test of one-way ANOVA, study found that gender of drivers is not significant to influence drivers to close follow but instead, type of vehicle the respondent drives had more significant to influence drivers to have tendency to perform close following behaviour.Keywords: close-following, driver behaviour, rear-end crash, road safety
Procedia PDF Downloads 3863918 Discovering User Behaviour Patterns from Web Log Analysis to Enhance the Accessibility and Usability of Website
Authors: Harpreet Singh
Abstract:
Finding relevant information on the World Wide Web is becoming highly challenging day by day. Web usage mining is used for the extraction of relevant and useful knowledge, such as user behaviour patterns, from web access log records. Web access log records all the requests for individual files that the users have requested from the website. Web usage mining is important for Customer Relationship Management (CRM), as it can ensure customer satisfaction as far as the interaction between the customer and the organization is concerned. Web usage mining is helpful in improving website structure or design as per the user’s requirement by analyzing the access log file of a website through a log analyzer tool. The focus of this paper is to enhance the accessibility and usability of a guitar selling web site by analyzing their access log through Deep Log Analyzer tool. The results show that the maximum number of users is from the United States and that they use Opera 9.8 web browser and the Windows XP operating system.Keywords: web usage mining, web mining, log file, data mining, deep log analyzer
Procedia PDF Downloads 2173917 The Impact of Built Environment Design on Users’ Psychology to Foster Pro-Environmental Behavior in University Open Spaces
Authors: Rehab Mahmoud El Sayed, Toka Fahmy Nasr, Dalia M. Rasmi
Abstract:
Environmental psychology studies the interaction between the user and the environment. This field is crucial in understanding how the built environment affects human behaviour, moods and feelings. Studying and understanding the aspects and influences of environmental psychology is a crucial key to investigating how the design can influence human behaviour to be environmentally friendly. This is known as pro-environmental behaviour where human actions are sustainable and impacts the environment positively. Accordingly, this paper aims to explore the impact of built environment design on environmental psychology to foster pro-environmental behaviour in university campus open spaces. In order to achieve this, an exploratory research method was conducted where a detailed study of the influences of environmental psychology was done and clarified its elements. Moreover, investigating the impact of design elements on human psychology took place. Besides, an empirical study of the outdoor spaces of the British University in Egypt occurred and a survey for students and staff was distributed. The research concluded that the four main psychological aspects are mostly influenced by the following design elements colours, lighting and thermal comfort respectively. Additionally, focusing on these design elements in the design process will create a sustainable environment. As a consequence, the pro-environmental behaviour of the user will be fostered.Keywords: environmental psychology, pro-environmental behavior, sustainable environment, psychological influences
Procedia PDF Downloads 513916 User Experience Measurement of User Interfaces
Authors: Mohammad Hashemi, John Herbert
Abstract:
Quantifying and measuring Quality of Experience (QoE) are important and difficult concerns in Human Computer Interaction (HCI). Quality of Service (QoS) and the actual User Interface (UI) of the application are both important contributors to the QoE of a user. This paper describes a framework that measures accurately the way a user uses the UI in order to model users' behaviours and profiles. It monitors the use of the mouse and use of UI elements with accurate time measurement. It does this in real-time and does so unobtrusively and efficiently allowing the user to work as normal with the application. This real-time accurate measurement of the user's interaction provides valuable data and insight into the use of the UI, and is also the basis for analysis of the user's QoE.Keywords: user modelling, user interface experience, quality of experience, user experience, human and computer interaction
Procedia PDF Downloads 4683915 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.Keywords: actuator, user authentication, security evaluation, haptic actuator
Procedia PDF Downloads 3203914 Interactive Multiple Functions User Interface
Authors: Manjit Singh Sidhu, Waleed Maqableh, Jee Geak Ying
Abstract:
Tangible user interfaces (TUI) that employ markers in the augmented reality (AR) environment has hampered the interactivity between the user and the software application. This is because the user lacks focus on visualizing the contents due to the interaction mechanisms whereby multiple markers may need to be used to perform a particular function. In this research, we have designed a novel TUI user interface where multiple functions could be triggered similar to a natural keyboard thus allowing user to focus more on its digital contents such as 2D/3D, text input, animation and sound. Test results of the user interface with potential users and HCI experts revealed that the multiple functions user interface was new, preferred and appreciated more as opposed to marker based user interface.Keywords: multimedia, augmented reality, engineering, user interface, visualization
Procedia PDF Downloads 4143913 The Factors that Effect to User Satisfaction of Information System in Bangkok Hospital
Authors: Somchai Buaroong
Abstract:
This research attempted to study information system success in dimensions of the user satisfaction level and to find the association between the independent factors of the user experiences, user knowledge, and user attitude. The study sample was selected using simple random sampling that comprised of 190 users who had used the Bangkok HIS. The data were reported from 165 questionnaires. The results found that the user satisfaction was at a moderate level, user satisfaction on the information quality and system quality was at a moderate level, while satisfaction on service quality was at a high level. The computer knowledge of the user was at a moderate level, and the user attitude was at a positive level. The participation of the user was at a low level and the participation in decision and in evaluation was at a low level; however participation in implementation and in benefit was at a moderate.Keywords: information system success, hospital information system, user attitude, user satisfaction
Procedia PDF Downloads 2883912 Consumer Behaviour Model for Apparel E-Tailers Using Structural Equation Modelling
Authors: Halima Akhtar, Abhijeet Chandra
Abstract:
The paper attempts to analyze the factors that influence the Consumer Behavior to purchase apparel through the internet. The intentions to buy apparels online were based on in terms of user style, orientation, size and reputation of the merchant, social influence, perceived information utility, perceived ease of use, perceived pleasure and attractiveness and perceived trust and risk. The basic framework used was Technology acceptance model to explain apparels acceptance. A survey was conducted to gather the data from 200 people. The measures and hypotheses were analyzed using Correlation testing and would be further validated by the Structural Equation Modelling. The implications of the findings for theory and practice could be used by marketers of online apparel websites. Based on the values obtained, we can conclude that the factors such as social influence, Perceived information utility, attractiveness and trust influence the decision for a user to buy apparels online. The major factors which are found to influence an online apparel buying decision are ease of use, attractiveness that a website can offer and the trust factor which a user shares with the website.Keywords: E-tailers, consumer behaviour, technology acceptance model, structural modelling
Procedia PDF Downloads 1533911 Shopping Behaviour of Ethnic Groups in Indian Culture
Authors: Hari Govindmishra, Sarabjot Singh
Abstract:
The study offers an approach to understand different determinants of shopping behaviour, and the effect of ethnicity on shopping behaviour. The results reveal that the Indian culture is composite in nature and because of which there is no difference between different ethnic groups in their preference for three shopping behaviour determinants, viz., status consciousness, need for touch and companion opinion. The research model investigates the relevant relationship between these constructs by using a structural equation modelling approach, which reveals that status consciousness, need for touch and companion opinion are significant determinants of shopping behaviour. Consequently, the shopping behaviour managers have to understand the collective nature of Indian ethnic consumers in their shopping behaviour.Keywords: ethnic groups, status consciousness, companion opinion, need for touch, shopping behaviour
Procedia PDF Downloads 4133910 Personal Characteristics Related to Hasty Behaviour in Korea
Authors: Sun Jin Park, Kyung-Ja Cho
Abstract:
This study focused on characteristics related to hasty behaviour. To investigate the relation between personal characteristics and hasty behaviour, 601 data were collected, 335 males and 256 females answered their own 'social avoidance and distress’, ‘anxiety’, ‘sensation seeking', 'hope', and ' hasty behaviour. And then 591 data were used for the analysis. The factor analysis resulted hasty behaviour consisted of 5 factors, time pressure, isolation, uncomfortable situation, boring condition, and expectation of reward. The result showed anxiety, sensation seeking, and hope related to hasty behaviour. Specifically, anxiety was involved in every hasty behaviour. This result means that psychological tension and worry are related to hasty behaviour in common. 'Social avoidance and distress', 'sensation seeking' and 'hope' influenced on hasty behaviour under time pressure, in isolation, in expectation of rewards respectively. This means that each factor of hasty behaviour has anxiety as its basis, expressed through a varied nature.Keywords: hasty behaviour, social avoidance and distress, anxiety, sensation seeking, hope
Procedia PDF Downloads 2813909 The Impact of Living at Home during the COVID-19 on Young Children’s Disruptive Behaviours
Authors: Zhou Yuwei
Abstract:
This study used the multidimensional rating scale for disruptive behaviour in preschool children (parent version) to assess changes in the disruptive behaviour (tantrums, disobedience, aggression, and low level of concern for others) of 200 young children in Nanjing, Jiangsu Province, China, before and after living at home during the new crown epidemic, and five additional teachers of young children were selected to conduct interviews on the performance and changes in their disruptive behaviour at school. The following conclusions were drawn from the questionnaires and interviews: (1) 49% of the children showed a decrease in disruptive behaviour compared to the pre-epidemic period; (2) boys were more disruptive than girls due to individual factors; (3) children with a decrease in disruptive behaviour were more likely to have democratic and authoritative parenting styles due to parental education and upbringing; and the higher the level of parental education, the greater the decrease in disruptive behaviour. (4) For parents who worked outside the home during the epidemic and who did not work, disruptive behaviour scores were higher for their children. Meanwhile, disruptive behaviour was more pronounced the longer the child used electronic devices. The longer the parent-child interaction, the less disruptive behaviour was evident.Keywords: disruptive behaviour, home life, children, COVID-19
Procedia PDF Downloads 723908 Time-Series Load Data Analysis for User Power Profiling
Authors: Mahdi Daghmhehci Firoozjaei, Minchang Kim, Dima Alhadidi
Abstract:
In this paper, we present a power profiling model for smart grid consumers based on real time load data acquired smart meters. It profiles consumers’ power consumption behaviour using the dynamic time warping (DTW) clustering algorithm. Due to the invariability of signal warping of this algorithm, time-disordered load data can be profiled and consumption features be extracted. Two load types are defined and the related load patterns are extracted for classifying consumption behaviour by DTW. The classification methodology is discussed in detail. To evaluate the performance of the method, we analyze the time-series load data measured by a smart meter in a real case. The results verify the effectiveness of the proposed profiling method with 90.91% true positive rate for load type clustering in the best case.Keywords: power profiling, user privacy, dynamic time warping, smart grid
Procedia PDF Downloads 1023907 User Modeling from the Perspective of Improvement in Search Results: A Survey of the State of the Art
Authors: Samira Karimi-Mansoub, Rahem Abri
Abstract:
Currently, users expect high quality and personalized information from search results. To satisfy user’s needs, personalized approaches to web search have been proposed. These approaches can provide the most appropriate answer for user’s needs by using user context and incorporating information about query provided by combining search technologies. To carry out personalized web search, there is a need to make different techniques on whole of user search process. There are the number of possible deployment of personalized approaches such as personalized web search, personalized recommendation, personalized summarization and filtering systems and etc. but the common feature of all approaches in various domains is that user modeling is utilized to provide personalized information from the Web. So the most important work in personalized approaches is user model mining. User modeling applications and technologies can be used in various domains depending on how the user collected information may be extracted. In addition to, the used techniques to create user model is also different in each of these applications. Since in the previous studies, there was not a complete survey in this field, our purpose is to present a survey on applications and techniques of user modeling from the viewpoint of improvement in search results by considering the existing literature and researches.Keywords: filtering systems, personalized web search, user modeling, user search behavior
Procedia PDF Downloads 2443906 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness
Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo
Abstract:
Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness
Procedia PDF Downloads 633905 Analyzing Behaviour of the Utilization of the Online News Clipping Database: Experience in Suan Sunandha Rajabhat University
Authors: Siriporn Poolsuwan, Kanyarat Bussaban
Abstract:
This research aims to investigate and analyze user’s behaviour towards the utilization of the online news clipping database at Suan Sunandha Rajabhat University, Thailand. Data is gathered from 214 lecturers and 380 undergraduate students by using questionnaires. Findings show that most users knew the online news clipping service from their friends, library’s website and their teachers. The users learned how to use it by themselves and others learned by training of SSRU library. Most users used the online news clipping database one time per month at home and always used the service for general knowledge, up-to-date academic knowledge and assignment reference. Moreover, the results of using the online news clipping service problems include the users themselves, service management, service device- computer and tools – and the network, service provider, and publicity. This research would be benefit for librarians and teachers for planning and designing library services in their works and organization.Keywords: online database, user behavior, news clipping, library services
Procedia PDF Downloads 2813904 Behaviour of Rc Column under Biaxial Cyclic Loading-State of the Art
Authors: L. Pavithra, R. Sharmila, Shivani Sridhar
Abstract:
Columns severe structural damage needs proportioning a significant portion of earthquake energy can be dissipated yielding in the beams. Presence of axial load along with cyclic loading has a significant influence on column. The objective of this paper is to present the analytical results of columns subjected to biaxial cyclic loading.Keywords: RC column, Seismic behaviour, cyclic behaviour, biaxial testing, ductile behaviour
Procedia PDF Downloads 3233903 Producing Graphical User Interface from Activity Diagrams
Authors: Ebitisam K. Elberkawi, Mohamed M. Elammari
Abstract:
Graphical User Interface (GUI) is essential to programming, as is any other characteristic or feature, due to the fact that GUI components provide the fundamental interaction between the user and the program. Thus, we must give more interest to GUI during building and development of systems. Also, we must give a greater attention to the user who is the basic corner in the dealing with the GUI. This paper introduces an approach for designing GUI from one of the models of business workflows which describe the workflow behavior of a system, specifically through activity diagrams (AD).Keywords: activity diagram, graphical user interface, GUI components, program
Procedia PDF Downloads 4313902 Efficient Position Based Operation Code Authentication
Authors: Hashim Ali, Sheheryar Khan
Abstract:
Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication
Procedia PDF Downloads 2353901 Ethical Leadership and Employee Creative Behaviour: A Case Study of a State-Owned Enterprise in South Africa
Authors: Krishna Kistan Govender, Alex Masianoga
Abstract:
The aim of this explanatory study was to critically understand how ethical leadership impacts employee creative behaviour, as well as the creative behaviour dimensions, in a South African transport and logistics SOE. A quantitative study was conducted using a pre-developed questionnaire, and data for 160 middle and executive managers was analysed through structural equation modelling and multiple regression techniques conducted with the Smart PLS statistical software. All five hypothesized relationships were supported, and it was confirmed that ethical leadership has a significant positive influence on employee creative behaviour, as well as on each of the creative behaviour dimensions, namely: idea exploration, idea generation, idea championing, and idea implementation.Keywords: ethical leaders, employee creative behaviour, state-owned enterprises, South Africa
Procedia PDF Downloads 863900 An Explanatory Study into the Information-Seeking Behaviour of Egyptian Beggars
Authors: Essam Mansour
Abstract:
The key purpose of this study is to provide first-hand information about beggars in Egypt, especially from the perspective of their information seeking behaviour including their information needs. The researcher tries to investigate the information-seeking behaviour of Egyptian beggars with regard to their thoughts, perceptions, motivations, attitudes, habits, preferences as well as challenges that may impede their use of information. The research methods used were an adapted form of snowball sampling of a heterogeneous demographic group of participants in the beggary activity in Egypt. This sampling was used to select focus groups to explore a range of relevant issues. Data on the demographic characteristics of the Egyptian beggars showed that they tend to be men, mostly with no formal education, with an average age around 30s, labeled as low-income persons, mostly single and mostly Muslims. A large number of Egyptian beggars were seeking for information to meet their basic needs as well as their daily needs, although some of them were not able to identify their information needs clearly. The information-seeking behaviour profile of a very large number of Egyptian beggars indicated a preference for informal sources of information over formal ones to solve different problems and meet the challenges they face during their beggary activity depending on assistive devices, such as mobile phones. The high degree of illiteracy and the lack of awareness about the basic rights of information as well as information needs were the most important problems Egyptian beggars face during accessing information. The study recommended further research to be conducted about the role of the library in the education of beggars. It also recommended that beggars’ awareness about their information rights should be promoted through educational programs that help them value the role of information in their life.Keywords: user studies, information-seeking behaviour, information needs, information sources, beggars, Egypt
Procedia PDF Downloads 2933899 Characteristics of Football Spectators Using Second Screen
Authors: Florian Pfeffel, Christoph A. Kexel, Peter Kexel, Maria Ratz
Abstract:
The parallel usage of different media channels has increased recently owing to technological advances. Second Screen describes the use of a second device by television viewers to consume further content which is related to the program they are watching. This study analysed the characteristics of football spectators regarding their media consumption in relation to Second Screen usage while watching a football match on TV. The existing literature on Second Screen usage is still very limited, especially in the context of particular broadcasting settings such as sport or even more specific such as football matches. Therefore, the primary research objective was to reveal first insights into the user behaviour of football spectators regarding Second Screen services. The survey, which was conducted among German football supporters in 2015, revealed some characteristics such as the identification and involvement into the sports which are related to an increased use of Second Screen services. One important finding for football supporters was that at the time of a match they have a lower parallel media usage compared to other TV broadcastings. Nevertheless, if supporters used a second device while watching a match on TV, then they were using specific Second Screen services. This means they searched for more content related information. The findings on the habits and characteristics of people who are using Second Screen services are relevant for future developments in that area as well as for marketing decisions.Keywords: media consumption, second screen, sport marketing, user behaviour
Procedia PDF Downloads 3593898 Assessing the Factors Mediating the Attitude-Behaviour Gap in Sustainable Fashion Consumerism
Abstract:
With the rise of fast-fashion, over consumerism and overproduction, the fashion industry is believed to be one of the most polluting industry. It is a matter of importance today to further understand the factors involved in green consumerism to enhance sustainable fashion. One of the critical issues in also evaluating green consumerism, particularly in fashion, is the attitude-behaviour gap. Indeed, many consumers report a positive attitude towards sustainable fashion consumerism, but this attitude is not always actioned into behaviour. This study aims to further investigate the attitude-behaviour gap in sustainable fashion consumerism. S triangulation of qualitative and quantitative methods was used. Focus groups were used to gain opinions and understanding of the barriers to sustainable fashion consumption. A quantitative online questionnaire was then used to quantify the barriers identified in Study 1 and measure their influence on the attitude-behaviour gap. The results suggest that knowledge about sustainable fashion is the key factor in the attitude-behaviour gap in sustainable fashion consumerism. Accessibility was also identified as a factor, but this relationship is more complex. It is suggested that knowledge is the main factor in the attitude-behaviour gap and that once knowledge is controlled for, accessibility will become a main factor. The present study is the first one to identify the factors involved in sustainable fashion consumerism.Keywords: fashion, consumer behaviour, sustainable consumerism, attitude-behavioural gap
Procedia PDF Downloads 1463897 A Goms Model for Blind Users Website Navigation
Authors: Suraina Sulong
Abstract:
Keyboard support is one of the main accessibility requirements for web pages and web applications for blind user. But it is not sufficient that the blind user can perform all actions on the page using the keyboard. In addition, designers of web sites or web applications have to make sure that keyboard users can use their pages with acceptable performance. We present GOMS models for navigation in web pages with specific task given to the blind user to accomplish. These models can be used to construct the user model for accessible website.Keywords: GOMS analysis, usability factor, blind user, human computer interaction
Procedia PDF Downloads 1273896 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application
Authors: Senthuran Manoharan, Rathesan Sivagananalingam
Abstract:
One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.Keywords: authentication, adaptive authentication, machine learning, security
Procedia PDF Downloads 1983895 Urban Logistics Dynamics: A User-Centric Approach to Traffic Modelling and Kinetic Parameter Analysis
Authors: Emilienne Lardy, Mariam Lafkihi, Eric Ballot
Abstract:
Efficient city logistics requires a comprehensive understanding of traffic dynamics, particularly as it pertains to kinetic parameters influencing energy consumption and trip duration estimations. While real-time traffic information is increasingly accessible, current high-precision forecasting services embedded in route planning often function as opaque 'black boxes' for users. These services, typically relying on AI-processed counting data, fall short in accommodating open design parameters essential for management studies, notably within Supply Chain Management. This work revisits the modeling of traffic conditions in the context of city logistics, emphasizing its significance from the user’s point of view, with two focuses. Firstly, the focus is not on the vehicle flow but on the vehicles themselves and the impact of the traffic conditions on their driving behaviour. This means opening the range of studied indicators beyond vehicle speed to describe extensively the kinetic and dynamic aspects of driving behaviour. To achieve this, we leverage the Art. Kinema parameters are designed to characterize driving cycles. Secondly, this study examines how the driving context (i.e., exogenous factors to the traffic flow) determines the mentioned driving behaviour. Specifically, we explore it investigates how accurately the kinetic behaviour of a vehicle can be predicted based on a limited set of exogenous factors, such as time, day, road type, orientation, slope, and weather conditions. To answer this question, statistical analysis was conducted on real-world driving data, which includes high-frequency measurements of vehicle speed. A Generalized Linear Model has been established to link kinetic parameters with independent categorical contextual variables. The results include the analysis of the regression’s accuracy, as well as the utilization of the regression’s results in freight distribution scenario elaboration and analysis for Supply Chain Management purposes.Keywords: driving context, generalized linear model, kinetic behaviour, real world driving data
Procedia PDF Downloads 273894 Leadership Style and Organizational Culture on Unethical Work Behaviour among Employees
Authors: Ojo Adeshina Akinwumi
Abstract:
This study investigated leadership style and organizational culture as predictors of unethical work behaviour among employees in corporate organizations. This study adopted an expo facto research design. Two Hundred and Seventy-Four (274) employees (149 males, 125 females) sampled from the organization participated in the study. Their ages ranged from 19 to 65, with a mean of 36.36 years and a standard deviation of 10.43. Unethical Work Behaviour was measured using Unethical Work Behaviour Scale (UWBC), Organizational Culture was measured using Organizational Culture Scale, (and OCS and Leadership Styles were measured using Multifactor Leadership Questionnaire (LSMLQ). Two hypotheses were formulated and tested using Pearson Product Moment Correlation and Multiple Regressions Analysis. Results indicated that leadership styles had no significant relationship with unethical work behaviour (r(274)=.09;>0.05). However, organizational culture had a significant relationship with unethical work behaviour (r(274)=.15;p,0.05). Lastly, leadership style and organizational culture jointly predicted unethical work behaviour among employees. [F (2, 273) =3.65, p<0.05). Findings from this study were discussed in line with existing literature. It was also recommended that leadership styles and organizational culture should be improved upon in order to reduce unethical work behaviour by employees.Keywords: leadership style, organizational culture, unethical work behavior, employees in corporate organisations in Nigeria
Procedia PDF Downloads 723893 The Effect of Fibre Orientation on the Mechanical Behaviour of Skeletal Muscle: A Finite Element Study
Authors: Christobel Gondwe, Yongtao Lu, Claudia Mazzà, Xinshan Li
Abstract:
Skeletal muscle plays an important role in the human body system and function by generating voluntary forces and facilitating body motion. However, The mechanical properties and behaviour of skeletal muscle are still not comprehensively known yet. As such, various robust engineering techniques have been applied to better elucidate the mechanical behaviour of skeletal muscle. It is considered that muscle mechanics are highly governed by the architecture of the fibre orientations. Therefore, the aim of this study was to investigate the effect of different fibre orientations on the mechanical behaviour of skeletal muscle.In this study, a continuum mechanics approach–finite element (FE) analysis was applied to the left bicep femoris long head to determine the contractile mechanism of the muscle using Hill’s three-element model. The geometry of the muscle was segmented from the magnetic resonance images. The muscle was modelled as a quasi-incompressible hyperelastic (Mooney-Rivlin) material. Two types of fibre orientations were implemented: one with the idealised fibre arrangement, i.e. parallel single-direction fibres going from the muscle origin to insertion sites, and the other with curved fibre arrangement which is aligned with the muscle shape.The second fibre arrangement was implemented through the finite element method; non-uniform rational B-spline (FEM-NURBs) technique by means of user material (UMAT) subroutines. The stress-strain behaviour of the muscle was investigated under idealised exercise conditions, and will be further analysed under physiological conditions. The results of the two different FE models have been outputted and qualitatively compared.Keywords: FEM-NURBS, finite element analysis, Mooney-Rivlin hyperelastic, muscle architecture
Procedia PDF Downloads 4533892 Consumer Trust in User-Generated Brand Recommendations on Social Networking Sites
Authors: Minimol M. C.
Abstract:
The study provides insights into the consumer’s trust on user generated brand recommendations on social networking sites and also investigates the role of ad scepticism in generating consumer trust in user generated brand recommendations. The work contributes to a better understanding of trust development in the context of social networking sites. Specifically, the study reveals that not all dimensions of trustworthiness are equal. The individual user characteristics vary according to the person. The major finding of this study is that high degrees of trust toward user generated brand recommendations can be generated on the basis of high trust toward social networking sites and ad scepticism. Consumers trust the user generated brand recommendations based on the individual’s trust in the particular social networking platform and the level of their individual ad-scepticism. The study pinpoints that as consumers’ trust in user generated brand recommendations is affected by their trust in social networking sites, it is influenced by benevolence, integrity, the propensity to trust, and individual user characteristics to a great extent, and hence, it is imperative for brands should attempt to build on these factors so that they can engage consumers to generate user generated content on social media.Keywords: Consumer trust, user-generated brand recommendations, ad scepticism, social networking sites
Procedia PDF Downloads 68