Search results for: websites
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 324

Search results for: websites

234 Subtitled Based-Approach for Learning Foreign Arabic Language

Authors: Elleuch Imen

Abstract:

In this paper, it propose a new approach for learning Arabic as a foreign language via audio-visual translation, particularly subtitling. The approach consists of developing video sequences appropriate to different levels of learning (from A1 to C2) containing conversations, quizzes, games and others. Each video aims to achieve a specific objective, such as the correct pronunciation of Arabic words, the correct syntactic structuring of Arabic sentences, the recognition of the morphological characteristics of terms and the semantic understanding of statements. The subtitled videos obtained can be incorporated into different Arabic second language learning tools such as Moocs, websites, platforms, etc.

Keywords: arabic foreign language, learning, audio-visuel translation, subtitled videos

Procedia PDF Downloads 28
233 Determination of the Needs for Development of Infertility Psycho-Educational Program and the Design of a Website about Infertility for University Students

Authors: Bahar Baran, Şirin Nur Kaptan, D.Yelda Kağnıcı, Erol Esen, Barışcan Öztürk, Ender Siyez, Diğdem M Siyez

Abstract:

It is known that some factors associated with infertility have preventable characteristics and that young people's knowledge levels in this regard are inadequate, but very few studies focus on effective prevention studies on infertility. Psycho-educational programs have an important place for infertility prevention efforts. Nowadays, considering the households' utilization rates from technology and the Internet, it seems that young people have applied to websites as a primary source of information related to a health problem they have encountered. However, one of the prerequisites for the effectiveness of websites or face-to-face psycho-education programs is to consider the needs of participants. In particular, it is expected that these programs will be appropriate to the cultural infrastructure and the diversity of beliefs and values in society. The aim of this research is to determine what university students want to learn about infertility and fertility and examine their views on the structure of the website. The sample of the research consisted of 9693 university students who study in 21 public higher education programs in Turkey. 51.6 % (n = 5002) were female and 48.4% (n = 4691) were male. The Needs Analysis Questionnaire developed by the researchers was used as data collection tool in the research. In the analysis of the data, descriptive analysis was conducted in SPSS software. According to the findings, among the topics that university students wanted to study about infertility and fertility, the first topics were 'misconceptions about infertility' (94.9 %), 'misconceptions about sexual behaviors' (94.6 %), 'factors affecting infertility' (92.8 %), 'sexual health and reproductive health' (92.5 %), 'sexually transmitted diseases' (92.7 %), 'sexuality and society' (90.9 %), 'healthy life (help centers)' (90.4 %). In addition, the questions about how the content of the website should be designed for university students were analyzed descriptively. According to the results, 91.5 % (n = 8871) of the university students proposed to use frequently asked questions and their answers, 89.2 % (n = 8648) stated that expert video should be included, 82.6 % (n = 8008) requested animations and simulations, 76.1 % (n = 7380) proposed different content according to sex and 66 % (n = 6460) proposed different designs according to sex. The results of the research indicated that the findings are similar to the contents of the program carried out in other countries in terms of the topics to be studied. It is suggested to take into account the opinions of the participants during the design of website.

Keywords: infertility, prevention, psycho-education, web based education

Procedia PDF Downloads 185
232 Comparison of the Common Factors of the Top Academic Elementary Schools to the Average Elementary Schools in California: Looking beyond School Leadership

Authors: Lindy Valdez, Daryl Parker

Abstract:

Introduction: There has been much research on academic achievement in elementary schools. Most of the research has been on school leadership. While research has focused on the role of leadership on school improvement, little research has examined what variables the top elementary schools have in common. To undertake school improvement, it is important to understand what factors the best schools share. The purpose of this study was to examine data of the “Best Elementary Schools in California,” based on academic achievement as rated by three prominent websites and determine if these schools had any common factors which were different than the statewide averages. The variables examined included access to subject matter specialists (physical education, art, and music), librarians, after school programs, class size, socioeconomic status, and diversity. The participants consisted of the top public elementary schools in California based on the websites i)https://www.niche.com/k12/search/best-schools/, ii)https://www.finder.com/best-schools-california,and iii)https://www.schooldigger.com/go/CA/schoolrank.aspx. The data for subject matter specialists (physical education, art, and music), librarians, after school programs, class size, socioeconomic status, and diversity were collected from these top schools and compared to California statewide averages. Results indicate that top public elementary schools in California have a high number of subject matter specialists that teach physical education, art, and music. These positions are on the decline in the average public elementary school in California, but the top schools have abundant access to these specialists. The physical education specialist has the highest statistically significant difference between the nationwide average and the top schools—librarians, and after school programs are also most commonly high in top public elementary schools in California. The high presence of these programs may be aiding academic achievement in less visible ways. Class size is small, socio-economic status is high, and diversity is low among top public elementary schools in California when compared to the statewide average public elementary schools in California. The single largest area of discrepancy was between physical education specialists in a top school and their state and nationwide averages. The socioeconomic status of schools and parents may be an underlining factor affecting several other variables. This affluence could explain how these schools were able to have access to subject matter specialists, after-school activities, and, therefore, more opportunities for physical activity and greater learning opportunities affecting academic achievement.

Keywords: academic achievement, elementary education, factors, schools

Procedia PDF Downloads 101
231 The Effectiveness of Rebranding as a Comparative Study of Ghanaian Business Using the Principles of Corporate Rebranding

Authors: Kennedy Gbenu, Richmond Kweku Frempong

Abstract:

Rebranding has become a very important strategic tool for companies wanting to succeed in the ever competitive business world using the principles of rebranding Moisescu. Two businesses in Ghana (Ghana Commercial Bank and Vodafone Ghana) have been used to ascertain how rebranding of these organizations was done using the principles in their effort to rebrand themselves and to stay relevant. A secondary research mainly on literature surrounding rebranding, official websites of the organizations under study have also been used extensively. After a basic comparative study undertaken two firms (GCB and VODAFONE) seems to be using the first three principles and reaping from it as provided by Moisescu. This goes to show that rebranding should not be done in vacuum but should be guided by such principles so as to achieve the full potential of any kind of investments made.

Keywords: brands, corporate branding, innovation, case studies

Procedia PDF Downloads 365
230 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 107
229 Citizen Participation in Smart Cities: Singapore and Tokyo

Authors: Thomas Benson

Abstract:

Smart cities have been heralded as multi-faceted entities which utilise information and communication technologies to enhance citizen participation. The purpose of this paper is to outline authoritative definitions of smart cities and citizen participation and investigate smart city citizen-centrism rhetoric by examining urban governance and citizen participation processes. Drawing on extant literature and official city government documents and websites, Singapore (Singapore) and Tokyo (Japan) are chosen as comparable smart city case studies. For the smart city to be truly realised, this paper concludes that smart cities must do more to incorporate genuine citizen participation mechanisms.

Keywords: citizen participation, smart cities, urban governance, Singapore, Tokyo

Procedia PDF Downloads 116
228 Experimental Analysis of Tools Used for Doxing and Proposed New Transforms to Help Organizations Protect against Doxing Attacks

Authors: Parul Khanna, Pavol Zavarsky, Dale Lindskog

Abstract:

Doxing is a term derived from documents, and hence consists of collecting information on an organization or individual through social media websites, search engines, password cracking methods, social engineering tools and other sources of publicly displayed information. The main purpose of doxing attacks is to threaten, embarrass, harass and humiliate the organization or individual. Various tools are used to perform doxing. Tools such as Maltego visualize organization’s architecture which helps in determining weak links within the organization. This paper discusses limitations of Maltego Chlorine CE 3.6.0 and suggests measures as to how organizations can use these tools to protect themselves from doxing attacks.

Keywords: advanced persistent threat, FOCA, OSINT, PII

Procedia PDF Downloads 220
227 Training as a Service for Electronic Warfare

Authors: Toan Vo

Abstract:

Electronic attacks, illegal drones, interference, and jamming are no longer capabilities reserved for a state-sponsored, near-peer adversary. The proliferation of jammers on auction websites has lowered the price of entry for electronics hobbyists and nefarious actors. To enable local authorities and enforcement bodies to keep up with these challenges, this paper proposes a training as a service model to quickly and economically train and equip police departments and local law enforcement agencies. Using the U.S Department of Defense’s investment in Electronic Warfare as a guideline, a large number of personnel can be trained on effective spectrum monitoring techniques using commercial equipment readily available on the market. Finally, this paper will examine the economic benefits to the test and measurement industry if the TaaS model is applied.

Keywords: training, electronic warfare, economics, law enforcement

Procedia PDF Downloads 67
226 Support Services in Open and Distance Education: An Integrated Model of Open Universities

Authors: Evrim Genc Kumtepe, Elif Toprak, Aylin Ozturk, Gamze Tuna, Hakan Kilinc, Irem Aydin Menderis

Abstract:

Support services are very significant elements for all educational institutions in general; however, for distance learners, these services are more essential than traditional (face-to-face) counterparts. One of the most important reasons for this is that learners and instructors do not share the same physical environment and that distance learning settings generally require intrapersonal interactions rather than interpersonal ones. Some learners in distance learning programs feel isolated. Furthermore, some fail to feel a sense of belonging to the institution because of lack of self-management skills, lack of motivation levels, and the need of being socialized, so that they are more likely to fail or drop out of an online class. In order to overcome all these problems, support services have emerged as a critical element for an effective and sustainable distance education system. Within the context of distance education support services, it is natural to include technology-based and web-based services and also the related materials. Moreover, institutions in education sector are expected to use information and communication technologies effectively in order to be successful in educational activities and programs. In terms of the sustainability of the system, an institution should provide distance education services through ICT enabled processes to support all stakeholders in the system, particularly distance learners. In this study, it is envisaged to develop a model based on the current support services literature in the field of open and distance learning and the applications of the distance higher education institutions. Specifically, content analysis technique is used to evaluate the existing literature in the distance education support services, the information published on websites, and applications of distance higher education institutions across the world. A total of 60 institutions met the inclusion criteria which are language option (English) and availability of materials in the websites. The six field experts contributed to brainstorming process to develop and extract codes for the coding scheme. During the coding process, these preset and emergent codes are used to conduct analyses. Two coders independently reviewed and coded each assigned website to ensure that all coders are interpreting the data the same way and to establish inter-coder reliability. Once each web page is included in descriptive and relational analysis, a model of support services is developed by examining the generated codes and themes. It is believed that such a model would serve as a quality guide for future institutions, as well as the current ones.

Keywords: support services, open education, distance learning, support model

Procedia PDF Downloads 171
225 The Use of AI to Measure Gross National Happiness

Authors: Riona Dighe

Abstract:

This research attempts to identify an alternative approach to the measurement of Gross National Happiness (GNH). It uses artificial intelligence (AI), incorporating natural language processing (NLP) and sentiment analysis to measure GNH. We use ‘off the shelf’ NLP models responsible for the sentiment analysis of a sentence as a building block for this research. We constructed an algorithm using NLP models to derive a sentiment analysis score against sentences. This was then tested against a sample of 20 respondents to derive a sentiment analysis score. The scores generated resembled human responses. By utilising the MLP classifier, decision tree, linear model, and K-nearest neighbors, we were able to obtain a test accuracy of 89.97%, 54.63%, 52.13%, and 47.9%, respectively. This gave us the confidence to use the NLP models against sentences in websites to measure the GNH of a country.

Keywords: artificial intelligence, NLP, sentiment analysis, gross national happiness

Procedia PDF Downloads 68
224 QoS-CBMG: A Model for e-Commerce Customer Behavior

Authors: Hoda Ghavamipoor, S. Alireza Hashemi Golpayegani

Abstract:

An approach to model the customer interaction with e-commerce websites is presented. Considering the service quality level as a predictive feature, we offer an improved method based on the Customer Behavior Model Graph (CBMG), a state-transition graph model. To derive the Quality of Service sensitive-CBMG (QoS-CBMG) model, process-mining techniques is applied to pre-processed website server logs which are categorized as ‘buy’ or ‘visit’. Experimental results on an e-commerce website data confirmed that the proposed method outperforms CBMG based method.

Keywords: customer behavior model, electronic commerce, quality of service, customer behavior model graph, process mining

Procedia PDF Downloads 379
223 The Effective Operations Competitive Advantages of Mobile Phone Service Providers across Countries: The Case of Middle East Region

Authors: Yazan Khalid Abed-Allah Migdadi

Abstract:

The aim of this study is identifying the effective operations competitive advantages of mobile phone service providers across countries. All Arab countries in the Middle East region were surveyed except Syria, and 27 out of 31 service providers were surveyed. Data collected from corporations’ annual reports, websites and other professional institutions published sources. Multiple linear regression analysis test was used to identify the relationship between operations competitive advantages and market share. The effective operations competitive advantages were; diversity of offers and service accessibility

Keywords: competitive advantage, mobile telecommunication operations, Middle East, service provider

Procedia PDF Downloads 363
222 The Visualizer for Real-Time Analysis of Internet Trends

Authors: Radek Malinský, Ivan Jelínek

Abstract:

The current web has become a modern encyclopedia, where people share their thoughts and ideas on various topics around them. Such kind of encyclopedia is very useful for other people who are looking for answers to their questions. However, with the growing popularity of social networking and blogging and ever expanding network services, there has also been a growing diversity of technologies along with different structure of individual websites. It is, therefore, difficult to directly find a relevant answer for a common Internet user. This paper presents a web application for the real-time end-to-end analysis of selected Internet trends; where the trend can be whatever the people post online. The application integrates fully configurable tools for data collection and analysis using selected webometric algorithms, and for its chronological visualization to user. It can be assumed that the application facilitates the users to evaluate the quality of various products that are mentioned online.

Keywords: Trend, visualizer, web analysis, web 2.0.

Procedia PDF Downloads 232
221 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 300
220 Settlement of Dispute and the Islamic Financial Institutions

Authors: Yusuf Sani Abubakar

Abstract:

This paper investigates mechanisms of settlement of disputes at the Islamic Financial Institutions (IFIs). Dispute settlement at the Islamic Financial Institutions (IFIs) can be both through litigation as well as Alternative Dispute Resolution (ADR). The paper aims to investigate how disputes are settled at the Islamic Financial Institutions (IFIs), as it is natural to have disagreements between different parties involved in the business of Islamic Financial Institutions (IFIs). The paper adopts a qualitative methodology where the sources are taken from journals, books, websites etc. In analyzing the data obtained from the sources, content analysis will be used. In addition to writings on this topic by various writers, this paper will add to the literature and will recommend certain effective ways of solving disputes arising between parties participating in the business of Islamic Financial Institutions (IFIs).

Keywords: Islamic finance, dispute resolution, Islamic financial institutions, litigation

Procedia PDF Downloads 130
219 Proposed Model to Assess E-Government Readiness in Jordan

Authors: Hadeel Abdulatif, Maha Alkhaffaf

Abstract:

E-government is the use of Information and Communication Technology to enrich the access to and delivery of government services to citizens, business partners and employees, Policy makers and regulatory bodies have to be cognizant of the degree of readiness of a populace in order to design and implement efficient e-government programs. This paper aims to provide a transparent situation analyses for the case of e-government official website in Jordan, it focuses on assessing e-government in Jordan; web site assessment by using international criteria for assessing e-government websites, However, the study analyses the environmental factor consisting of cultural and business environment factors. By reviewing the literature the researchers found that government's efforts towards e-government may vary according to the country's readiness and other key implementation factors which will lead to diverse e-government experience; thus, there is a need to study the impact of key factors to implement e-government in Jordan.

Keywords: e-government, environmental factors, website assessment, readiness

Procedia PDF Downloads 264
218 Bridging Consumer Farmer Mobile Application Divide

Authors: Ana Hol

Abstract:

Technological inventions such as websites, blogs, smartphone applications are on a daily basis influencing our decision making, are improving our productivity and are shaping futures of many consumer and service/product providers. This research identifies that these days both customers and providers heavily rely on smart phone applications. With this in mind, iTunes mobile applications store has been studies. It was identified that food related applications used by consumers can broadly be categorized into purchase apps, diaries, tracking health apps, trip farm location apps and cooking apps. On the other hand, apps used by farmers can be classified as: weather apps, pests / fertilizer app and general Facebook apps. With the aim to blur this farmer-consumer divide our research utilizes Context Specific eTransformation Framework and based on it identifies characteristic of the app that would allow this to happen.

Keywords: smart phone applications, SME - farmers, consumer, technology, business innovation

Procedia PDF Downloads 354
217 ISIS and Social Media

Authors: Neda Jebellie

Abstract:

New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.

Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies

Procedia PDF Downloads 450
216 A Comparison Study: Infant and Children’s Clothing Size Charts in South Korea and UK

Authors: Hye-Won Lim, Tom Cassidy, Tracy Cassidy

Abstract:

Infant and children’s body shapes are changing constantly while they are growing up into adults and are also distinctive physically between countries. For this reason, optimum size charts which can represent body sizes and shapes of infants and children are required. In this study, investigations of current size charts in South Korea and UK (n=50 each) were conducted for understanding and figuring out the sizing perspectives of the clothing manufacturers. The size charts of the two countries were collected randomly from online shopping websites and those size charts’ average measurements were compared with both national sizing surveys (SizeKorea and Shape GB). The size charts were also classified by age, gender, clothing type, fitting, and other factors. In addition, the key measurement body parts of size charts of each country were determined and those will be suggested for new size charts and sizing system development.

Keywords: infant clothing, children’s clothing, body shapes, size charts

Procedia PDF Downloads 287
215 eTransformation Framework for the Cognitive Systems

Authors: Ana Hol

Abstract:

Digital systems are in the cognitive wave of the eTransformations and are now extensively aimed at meeting the individuals’ demands, both those of customers requiring services and those of service providers. It is also apparent that successful future systems will not just simply open doors to the traditional owners/users to offer and receive services such as Uber for example does today, but will in the future require more customized and cognitively enabled infrastructures that will be responsive to the system user’s needs. To be able to identify what is required for such systems, this research reviews the historical and the current effects of the eTransformation process by studying: 1. eTransitions of company websites and mobile applications, 2. Emergence of new sheared economy business models as Uber and, 3. New requirements for demand driven, cognitive systems capable of learning and just in time decision making. Based on the analysis, this study proposes a Cognitive eTransformation Framework capable of guiding implementations of new responsive and user aware systems.

Keywords: system implementations, AI supported systems, cognitive systems, eTransformation

Procedia PDF Downloads 211
214 The Code-Mixing of Japanese, English, and Thai in Line Chat

Authors: Premvadee Na Nakornpanom

Abstract:

Language mixing in spontaneous speech has been widely discussed, but not in virtual situations; especially in context of the third language learning students. Thus, this study was an attempt to explore the characteristics of the mixing of Japanese, English and Thai in a mobile chat room by students with their background of Japanese, English, and Thai. The result found that Insertion of Thai and English content words was a very common linguistic phenomenon embedded in the utterances. As chatting is to be ‘relational’ or ‘interactional’, it affected the style of lexical choices to be speech-like, more personal and emotional-related. A Japanese sentence-final question particle“か”(ka) was added to the end of the sentence based on Thai grammar rule. Moreover, some unique characteristics were created. The non-verbal cues were represented in personal, Thai styles by inserting textual representations of images or feelings available on the websites into streams of conversations.

Keywords: code-mixing, Japanese, English, Thai, line chat

Procedia PDF Downloads 614
213 Radical Web Text Classification Using a Composite-Based Approach

Authors: Kolade Olawande Owoeye, George R. S. Weir

Abstract:

The widespread of terrorism and extremism activities on the internet has become a major threat to the government and national securities due to their potential dangers which have necessitated the need for intelligence gathering via web and real-time monitoring of potential websites for extremist activities. However, the manual classification for such contents is practically difficult or time-consuming. In response to this challenge, an automated classification system called composite technique was developed. This is a computational framework that explores the combination of both semantics and syntactic features of textual contents of a web. We implemented the framework on a set of extremist webpages dataset that has been subjected to the manual classification process. Therein, we developed a classification model on the data using J48 decision algorithm, this is to generate a measure of how well each page can be classified into their appropriate classes. The classification result obtained from our method when compared with other states of arts, indicated a 96% success rate in classifying overall webpages when matched against the manual classification.

Keywords: extremist, web pages, classification, semantics, posit

Procedia PDF Downloads 115
212 New Media and the Personal Vote in General Elections: A Comparison of Constituency Level Candidates in the United Kingdom and Japan

Authors: Sean Vincent

Abstract:

Within the academic community, there is a consensus that political parties in established liberal democracies are facing a myriad of organisational challenges as a result of falling membership, weakening links to grass-roots support and rising voter apathy. During the same period of party decline and growing public disengagement political parties have become increasingly professionalised. The professionalisation of political parties owes much to changes in technology, with television becoming the dominant medium for political communication. In recent years, however, it has become clear that a new medium of communication is becoming utilised by political parties and candidates – New Media. New Media, a term hard to define but related to internet based communication, offers a potential revolution in political communication. It can be utilised by anyone with access to the internet and its most widely used platforms of communication such as Facebook and Twitter, are free to use. The advent of Web 2.0 has dramatically changed what can be done with the Internet. Websites now allow candidates at the constituency level to fundraise, organise and set out personalised policies. Social media allows them to communicate with supporters and potential voters practically cost-free. As such candidate dependency on the national party for resources and image now lies open to debate. Arguing that greater candidate independence may be a natural next step in light of the contemporary challenges faced by parties, this paper examines how New Media is being used by candidates at the constituency level to increase their personal vote. The paper will present findings from research carried out during two elections – the Japanese Lower House election of 2014 and the UK general election of 2015. During these elections a sample of candidates, totalling 150 candidates, from the three biggest parties in each country were selected and their new media output, specifically candidate websites, Twitter and Facebook output subjected to content analysis. The analysis examines how candidates are using new media to both become more functionally, through fundraising and volunteer mobilisation and politically, through the promotion of personal/local policies, independent from the national party. In order to validate the results of content analysis this paper will also present evidence from interviews carried out with 17 candidates that stood in the 2014 Japanese Lower House election or 2015 UK general election. With a combination of statistical analysis and interviews, several conclusions can be made about the use of New Media at constituency level. The findings show not just a clear difference in the way candidates from each country are using New Media but also differences within countries based upon the particular circumstances of each constituency. While it has not yet replaced traditional methods of fundraising and activist mobilisation, New Media is also becoming increasingly important in campaign organisation and the general consensus amongst candidates is that its importance will continue to grow along as politics in both countries becomes more diffuse.

Keywords: political campaigns, elections, new media, political communication

Procedia PDF Downloads 201
211 Computing Customer Lifetime Value in E-Commerce Websites with Regard to Returned Orders and Payment Method

Authors: Morteza Giti

Abstract:

As online shopping is becoming increasingly popular, computing customer lifetime value for better knowing the customers is also gaining more importance. Two distinct factors that can affect the value of a customer in the context of online shopping is the number of returned orders and payment method. Returned orders are those which have been shipped but not collected by the customer and are returned to the store. Payment method refers to the way that customers choose to pay for the price of the order which are usually two: Pre-pay and Cash-on-delivery. In this paper, a novel model called RFMSP is presented to calculated the customer lifetime value, taking these two parameters into account. The RFMSP model is based on the common RFM model while adding two extra parameter. The S represents the order status and the P indicates the payment method. As a case study for this model, the purchase history of customers in an online shop is used to compute the customer lifetime value over a period of twenty months.

Keywords: RFMSP model, AHP, customer lifetime value, k-means clustering, e-commerce

Procedia PDF Downloads 291
210 A Bibliographical Research on the Use of Social Media Websites by the Deaf in Brazil

Authors: Juliana Guimarães Faria

Abstract:

The article focus on social networks and deaf people. It aims to analyze the studies done about this topic published in journals, as well as the ones done through dissertations and theses. It also aims to identify the thematic focus of the studies produced and to identify how the deaf relates to social networks, more specifically, trying to identify, starting with those productions, what are the benefits, or not, of social networks for the deaf and if there is some reflection about the way the deaf community has been organizing politically in search of bilingual education and inclusion, making use of the softwares of social networks. After reading, description and analysis of the eleven works identified about social networks and the deaf, we detected three thematic groups: four studies presented discussions about social networks and the socialization of the deaf; four works presented discussions about the contribution of social networks to the linguistic and cognitive development of the deaf; and three works presented discussions about the political bias of the use of social networks in favor of the deaf. We also identified that the works presented an optimistic view of social networks.

Keywords: social networks, deaf, internet, Brazil

Procedia PDF Downloads 376
209 A Framework for Review Spam Detection Research

Authors: Mohammadali Tavakoli, Atefeh Heydari, Zuriati Ismail, Naomie Salim

Abstract:

With the increasing number of people reviewing products online in recent years, opinion sharing websites has become the most important source of customers’ opinions. Unfortunately, spammers generate and post fake reviews in order to promote or demote brands and mislead potential customers. These are notably destructive not only for potential customers but also for business holders and manufacturers. However, research in this area is not adequate, and many critical problems related to spam detection have not been solved to date. To provide green researchers in the domain with a great aid, in this paper, we have attempted to create a high-quality framework to make a clear vision on review spam-detection methods. In addition, this report contains a comprehensive collection of detection metrics used in proposed spam-detection approaches. These metrics are extremely applicable for developing novel detection methods.

Keywords: fake reviews, feature collection, opinion spam, spam detection

Procedia PDF Downloads 383
208 The Guidelines for Promoting Research Articles Publication in Faculty of Science and Technology, Suan Sunandha Rajabhat University Bangkok, Thailand

Authors: Tatsanawalai Utarasakul, Ch. Hirannukhrao

Abstract:

The purpose of this research was to investigate the appropriate guidelines for promoting manuscript publication of the academic staff in Faculty of Science and Technology, Suan Sunandha Rajabhat University (SciSSRU). Data were collected from 88 academic staff of SciSSRU. The qualitative approach and knowledge management were used to determine the guidelines for promoting manuscript publication. In addition, TUNA Model was applied in order to follow the process of knowledge management. Simplified techniques were presented and shared with academic staff in the Knowledge Management exhibition, brochure, and websites. The result of this study revealed that, the comparison of number of manuscript publication of academic staff between academic year 2012 and 2013 is rapidly increasing for 60 percentages.

Keywords: knowledge management, articles, publication, academic staff

Procedia PDF Downloads 378
207 Integrating ICT- Based Applications for Sustainable Tourism Development in Algeria

Authors: Boutkhil Guemide, Chellali Benachaiba

Abstract:

Information and Communication Technology (ICT) has an inevitable impact on different industries and their performances. The tourism industry as the largest and fastest growing industry in the world cannot be excluded from this technology and its huge impacts. ICT provides information about tourist attractions in the different destinations before travelling and may improve tourists’ satisfaction. Although Algeria has great tourism potentials, it still needs to be performed well in promoting its attractions to international tourists via ICT tools yet. This research explores the impact of ICT on foreign tourists’ satisfaction of the tourism industry and uses Algerian tourist agencies as a case study, and proposes a model for the impact of ICT on sustainable tourism. Finally, it is concluded that e-ticketing, e-reservation, online payment, multilingual and updated information websites are essential needs for planning strategies in the field of e-tourism. Also, it is recommended that the tourism authorities should develop e-tourism infrastructures in order to keep up with the competitiveness of this field to enable the country to benefit from the global benefits of the tourism industry.

Keywords: Information and Communications Technology (ICT), tourism, tourists’ satisfaction, sustainable tourism

Procedia PDF Downloads 504
206 The Current Use of Computer Technology in Arabic Language

Authors: Saad Alkahtani

Abstract:

This study aims to identify the extent to which the faculty members who teach Arabic to speakers of other languages in Arabic language institutes at Saudi universities use computer technologies such as language laboratories, websites, software programs, and learning management system (LMS). It also seeks to identify critical difficulties that hinder the use of these technologies by faculty members. The population of the study consisted of 103 faculty members in four Arabic language institutes at Saudi universities. The results of the study showed a disparity in the use of computer technologies in teaching Arabic to non-native speakers. The means of degree of use ranged from 1.20 through 2.83. The study also identified difficulties limiting the use of computer technology in teaching Arabic. And the means of averages of difficulty of use ranged from 1.50 to 2.89. The differences were not statistically significant among the institutes (at 0.05).

Keywords: Arabic language programs, computer technology, using technology in teaching Arabic language, Arabic as a second language, computer skills

Procedia PDF Downloads 428
205 Hospitality Management to Welcome Foreign Guests in the Japanese Lodging Industry

Authors: Shunichiro Morishita

Abstract:

This study examines the factors for attracting foreign guests in the Japanese lodging industry and discusses some measures taken for accepting foreign guests. It reviews three different accommodation providers acclaimed highly by foreign guests, Yamashiroya, Sawanoya and Fuji-Hakone Guest House, and identifies their characteristics. The common points for attracting foreign guests were: 1) making the best use of the old facilities, 2) multilingual signs, guidance and websites, 3) necessary and sufficient communication in English, 4) events and opportunities to experience Japanese culture, 5) omotenashi, warm and homely Japanese hospitality. These findings indicate that foreign guests’ dissatisfaction level can be decreased through internationalization utilizing ICT and by offering multilingual support. On the other hand, their satisfaction level can be increased by encouraging interaction with other guests and local Japanese people, providing events and opportunities to experience Japanese culture and omotenashi, home-style Japanese hospitality.

Keywords: hospitality management, foreign guests, Japanese lodging industry, Omotenashi

Procedia PDF Downloads 126