Abstract: Younger and younger children are now using a smartphone, a device which has become ‘a must have’ and the life of children would be almost ‘unthinkable’ without one. Devices are becoming lighter and lighter but offering an array of options and applications as well as the unavoidable access to the Internet, without which it would be almost unusable. Numerous features such as taking of photographs, listening to music, information search on the Internet, access to social networks, usage of some of the chatting and messaging services, are only some of the numerous features offered by ‘smart’ devices. They have replaced the alarm clock, home phone, camera, tablet and other devices. Their use and possession have become a part of the everyday image of young people. Apart from the positive aspects, the use of smartphones has also some downsides. For instance, free time was usually spent in nature, playing, doing sports or other activities enabling children an adequate psychophysiological growth and development. The greater usage of smartphones during classes to check statuses on social networks, message your friends, play online games, are just some of the possible negative aspects of their application. Considering that the age of the population using smartphones is decreasing and that smartphones are no longer ‘foreign’ to children of pre-school age (smartphones are used at home or in coffee shops or shopping centers while waiting for their parents, playing video games often inappropriate to their age), particular attention must be paid to a very sensitive group, the teenagers who almost never separate from their ‘pets’. This paper is divided into two sections, theoretical and empirical ones. The theoretical section gives an overview of the pros and cons of the usage of smartphones, while the empirical section presents the results of a research conducted in three elementary schools regarding the usage of smartphones and, specifically, their usage during classes, during breaks and to search information on the Internet, check status updates and 'likes’ on the Facebook social network.
Abstract: Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.
Abstract: This study attempts to consider the linkage between management and computer sciences in order to develop the software named “IntelSymb” as a demo application to prove data analysis of non-energy* fields’ diversification, which will positively influence on energy dependency mitigation of countries. Afterward, we analyzed 18 years of economic fields of development (5 sectors) of 13 countries by identifying which patterns mostly prevailed and which can be dominant in the near future. To make our analysis solid and plausible, as a future work, we suggest developing a gateway or interface, which will be connected to all available on-line data bases (WB, UN, OECD, U.S. EIA) for countries’ analysis by fields. Sample data consists of energy (TPES and energy import indicators) and non-energy industries’ (Main Science and Technology Indicator, Internet user index, and Sales and Production indicators) statistics from 13 OECD countries over 18 years (1995-2012). Our results show that the diversification of non-energy industries can have a positive effect on energy sector dependency (energy consumption and import dependence on crude oil) deceleration. These results can provide empirical and practical support for energy and non-energy industries diversification’ policies, such as the promoting of Information and Communication Technologies (ICTs), services and innovative technologies efficiency and management, in other OECD and non-OECD member states with similar energy utilization patterns and policies. Industries, including the ICT sector, generate around 4 percent of total GHG, but this is much higher — around 14 percent — if indirect energy use is included. The ICT sector itself (excluding the broadcasting sector) contributes approximately 2 percent of global GHG emissions, at just under 1 gigatonne of carbon dioxide equivalent (GtCO2eq). Ergo, this can be a good example and lesson for countries which are dependent and independent on energy, and mainly emerging oil-based economies, as well as to motivate non-energy industries diversification in order to be ready to energy crisis and to be able to face any economic crisis as well.
Abstract: This research aims to develop ways of lodging
business management of Bang Khonthi community in Samut
Songkram province that are appropriate with the cultural context of
the Bang Khonthi community.
Eight lodging business owners were interviewed. It was found that
lodging business that are family business must be done with passion,
correct understanding of self, culture, nature, Thai way of life,
thorough, professional development, environmentally concerned,
building partnerships with various networks both community level,
and public sector and business cohorts. Public relations should be
done through media both traditional and modern outlets, such as
websites and social networks to provide customers convenience,
security, happiness, knowledge, love and value when travel to Bang
Khonthi. This will also help them achieve sustainability in business,
in line with the 10 Home Stay Standard Thailand.
Suggestions for operators are as follows: Operators need to
improve their public relations work. They need to use technology in
public relations such as the internet. Management standards must be
improved. Souvenir and local products shops should be arranged in
the compound. Product pricing must be set accordingly. They need to
join hands to help each other. Quality of the business operation
should be raised to meet the standards. Educational measures to
reduce the impact caused by tourism on the community such as
efforts to reduce energy consumption.
Abstract: In this paper, we analyze NEtwork MObility (NEMO) supporting problems in Content-Centric Networking (CCN), and propose the CCN-NEMO which can well support the deployment of the content-centric paradigm in large-scale mobile Internet. The CCN-NEMO extends the signaling message of the basic CCN protocol, to support the mobility discovery and fast trigger of Interest re-issuing during the network mobility. Besides, the Mobile Router (MR) is extended to optimize the content searching and relaying in the local subnet. These features can be employed by the nested NEMO to maximize the advantages of content retrieving with CCN. Based on the analysis, we compare the performance on handover latency between the basic CCN and our proposed CCN-NEMO. The results show that our scheme can facilitate the content-retrieving in the NEMO scenario with improved performance.
Abstract: This paper is a qualitative research report. A group of
students form a public university in a small town in Colombia
participated in this study which aimed at describing to what extend
the use of social ads, published on the internet, helped to develop
their critical thinking skills. Students’ productions, field notes, video
recordings and direct observation were the instruments and
techniques used by the researches in order to gather the data which
was analyzed under the principles of grounded theory and
triangulation. The implementation of social ads into the classroom
evidenced a noticeable improvement in students’ ability to interpret
and argue social issues, as well as, their self-improvement in oral and
written production in English, as a foreign language.
Abstract: E-Learning enables the users to learn at anywhere at
any time. In E-Learning systems, authenticating the E-Learning user
has security issues. The usage of appropriate communication
networks for providing the internet connectivity for E-learning is
another challenge. WiMAX networks provide Broadband Wireless
Access through the Multicast Broadcast Service so these networks
can be most suitable for E-Learning applications. The authentication
of E-Learning user is vulnerable to session hijacking problems. The
repeated authentication of users can be done to overcome these
issues. In this paper, session based Profile Caching Authentication is
proposed. In this scheme, the credentials of E-Learning users can be
cached at authentication server during the initial authentication
through the appropriate subscriber station. The proposed cache based
authentication scheme performs fast authentication by using cached
user profile. Thus, the proposed authentication protocol reduces the
delay in repeated authentication to enhance the security in ELearning.
Abstract: In this research, students’ scientific attitude, computer anxiety, educational use of the Internet, academic achievement, and problematic use of the Internet are analyzed based on different variables (gender, parents’ educational level and daily access to the Internet). The research group involves 361 students from two middle schools which are located in the center of Konya. The “general survey method” is adopted in the research. In accordance with the purpose of the study, percentage, mean, standard deviation, independent samples t--‐test, ANOVA (variance) are employed in the study. A total of four scales are implemented. These four scales include a total of 13 sub-dimensions. The scores from these scales and their subscales are studied in terms of various variables. In the research, students’ scientific attitude, computer anxiety, educational use of the Internet, the problematic Internet use and academic achievement (gender, parent educational level, and daily access to the Internet) are investigated based on various variables and some significant relations are found.
Abstract: Ambient Computing or Ambient Intelligence (AmI) is
emerging area in computer science aiming to create intelligently
connected environments and Internet of Things. In this paper, we
propose communication middleware architecture for AmI. This
middleware architecture addresses problems of communication,
networking, and abstraction of applications, although there are other
aspects (e.g. HCI and Security) within general AmI framework.
Within this middleware architecture, any application developer might
address HCI and Security issues with extensibility features of this
platform.
Abstract: The current web has become a modern encyclopedia,
where people share their thoughts and ideas on various topics around
them. This kind of encyclopedia is very useful for other people who
are looking for answers to their questions. However, with the
growing popularity of social networking and blogging and ever
expanding network services, there has also been a growing diversity
of technologies along with a different structure of individual web
sites. It is therefore difficult to directly find a relevant answer for a
common Internet user. This paper presents a web application for the
real-time end-to-end analysis of selected Internet trends where the
trend can be whatever the people post online. The application
integrates fully configurable tools for data collection and analysis
using selected webometric algorithms, and for its chronological
visualization to user. It can be assumed that the application facilitates
the users to evaluate the quality of various products that are
mentioned online.
Abstract: Rapid developments in technology in the present age
have made it necessary for communities to follow technological
developments and adapt themselves to these developments. One of
the fields that are most rapidly affected by these developments is
undoubtedly education. Determination of the attitudes of preservice
teachers, who live in an age of technology and get ready to raise
future individuals, is of paramount importance both educationally and
professionally. The purpose of this study was to analyze attitudes of
preservice teachers towards technology and some variables that
predict these attitudes (gender, daily duration of internet use, and the
number of technical devices owned). 329 preservice teachers
attending the education faculty of a large university in central Turkey
participated, on a volunteer basis, in this study, where relational
survey model was used as the research method. Research findings
reveal that preservice teachers’ attitudes towards technology are
positive and at the same time, the attitudes of male preservice
teachers towards technology are more positive than their female
counterparts. As a result of the stepwise multiple regression analysis
where factors predicting preservice teachers’ attitudes towards
technology, it was found that duration of daily internet use was the
strongest predictor of attitudes towards technology.
Abstract: Web Usage Mining is the application of data mining
techniques to find usage patterns from web log data, so as to grasp
required patterns and serve the requirements of Web-based
applications. User’s expertise on the internet may be improved by
minimizing user’s web access latency. This may be done by
predicting the future search page earlier and the same may be prefetched
and cached. Therefore, to enhance the standard of web
services, it is needed topic to research the user web navigation
behavior. Analysis of user’s web navigation behavior is achieved
through modeling web navigation history. We propose this technique
which cluster’s the user sessions, based on the K-medoids technique.
Abstract: The Internet of Things (IoT) field has been applied in
industries with different purposes. Sensing Enterprise (SE) is an
attribute of an enterprise or a network that allows it to react to
business stimuli originating on the Internet. These fields have come
into focus recently on the enterprises, and there is some evidence of
the use and implications in supply chain management, while
finding it as an interesting aspect to work on. This paper presents a
revision and proposals of IoT applications in supply chain
management.
Abstract: Since the advances in digital imaging technologies have led to
development of high quality digital devices, there are a lot of illegal copies
of copyrighted video content on the Internet. Also, unauthorized editing is
occurred frequently. Thus, we propose an editing prevention technique for
high-quality (HQ) video that can prevent these illegally edited copies from
spreading out. The proposed technique is applied spatial and temporal gradient
methods to improve the fidelity and detection performance. Also, the scheme
duplicates the embedding signal temporally to alleviate the signal reduction
caused by geometric and signal-processing distortions. Experimental results
show that the proposed scheme achieves better performance than previously
proposed schemes and it has high fidelity. The proposed scheme can be used
in unauthorized access prevention method of visual communication or traitor
tracking applications which need fast detection process to prevent illegally
edited video content from spreading out.
Abstract: Now, the use of renewable energy power generation
has been advanced. In this paper, we compared the usable amount of
resource for photovoltaic power generation which was estimated using
the NEDO formula and the expansion support policy of photovoltaic
power generation which was researched using Internet in the
municipality level in Hokkaido and Aichi Prefecture, Japan. This
paper will contribute to grasp the current situation especially about the
policy. As a result, there were municipalities which seemed to be no
consideration of fitting the amount of resources. We think it would
need to consider the suitability between the resources and policies.
Abstract: Privacy is sacred and would normally be expected and preserved by an individual. Online privacy is no longer about the right to be left alone, but also includes the right not to be monitored. However, with the revelations made by United States National Security Agency former employee Edward Snowden that the government is spying on internet communications, individuals’ privacy can no longer be expected. Therefore, this paper is intended to evaluate law related to privacy protection in the digital domain, who should govern it and whether invasion to a person’s privacy is a necessary justification to preserve national security.
Abstract: Global economy today is full of sophistication. All
over the world, business and marketing practices are undergoing
unprecedented transformation. In realization of this fact, the federal
government of Nigeria has put in place a robust transformation
agenda in order to put Nigeria in a better position to be a competitive
player and in the process transform all sectors of its economy. New
technologies, especially the Internet, are the driving force behind this
transformation. However, technology has inadvertently affected the
way businesses are done thus necessitating the acquisition of new
skills. In developing countries like Nigeria, citizens are still battling
with effective application of those technologies. Obviously, students
of business education need to acquire relevant business knowledge to
be able to transit into the world of work on graduation from school
and compete favorably in the labor market. Therefore, effective
utilization of social media by both teachers and students can help
extensively in empowering students with the needed skills. Social
media which is a group of Internet-based applications built on the
ideological foundations of Web 2.0, that allow the creation and
exchange of user generated content, and if incorporated into the
classroom experience may be the needed answer to unemployment
and poverty in Nigeria as beneficiaries can easily connect with
existing and potential enterprises and customers, engage with them
and reinforce mutual business benefits. Challenges and benefits of
social media use in education in Nigeria universities were revealed in
this study.
Abstract: The rapid development technology and widespread
Internet make business environment changing a lot. In order to stand in
the global market and to keep subsistence, “changing” is unspoken
rule for the company’s survival. The purpose of this paper is building
up change model by using SWOT, strategy map, KPI and change
management theory. The research findings indicate that the company
needs to deal with employee’s resistance emotion firstly before
building up change model. The ways of providing performance
appraisal reward, consulting and counseling mechanisms that will
great help to achieve reducing staff negative emotions and motivate
staff’s efficiencies also. To revise strategy map, modify corporate
culture, and improve internal operational processes which is based on
change model. Through the change model, the increasing growth rate
of net income helps company to achieve the goals and be a leading
brand of precision machinery industry.
Abstract: Radio Frequency Identification (RFID) has become a
key technology in the emerging concept of Internet of Things (IoT).
Naturally, business applications would require the deployment of
various RFID systems developed by different vendors that use
different data formats and structures. This heterogeneity poses a
challenge in developing real-life IoT systems with RFID, as
integration is becoming very complex and challenging. Semantic
integration is a key approach to deal with this challenge. To do so,
ontology for RFID systems need to be developed in order to
annotated semantically RFID systems, and hence, facilitate their
integration. Accordingly, in this paper, we propose ontology for
RFID systems. The proposed ontology can be used to semantically
enrich RFID systems, and hence, improve their usage and reasoning.
Abstract: Cloud Computing refers to applications delivered as
services over the internet, and the datacenters that provide those
services with hardware and systems software. These were earlier
referred to as Software as a Service (SaaS). Scheduling is justified by
job components (called tasks), lack of information. In fact, in a large
fraction of jobs from machine learning, bio-computing, and image
processing domains, it is possible to estimate the maximum time
required for a task in the job. This study focuses on Trust based
scheduling to improve cloud security by modifying Heterogeneous
Earliest Finish Time (HEFT) algorithm. It also proposes TR-HEFT
(Trust Reputation HEFT) which is then compared to Dynamic Load
Scheduling.