Abstract: In line with changes of consumers modern lifestyle has call for the advertising strategy to change. This research is to find out how game with telepresence and product experience embedded in the computer game to affect users- intention to purchase. Game content developers are urging to consider of placing product message as part of game design strategy that can influence the game player-s intention to purchase. Experiment was carried out on two hundred and fifty undergraduate students who volunteered to participate in the Internet game playing activities. A factor analysis and correlation analysis was performed on items designed to measure telepresence, attitudes toward telepresence, and game player intention to purchase the product advertise in the game that respondents experienced. The results indicated that telepresence consist of interactive experience and product experience. The study also found that product experience is positively related to the game players- intention to purchase. The significance of product experience implies the usefulness of an interactive advertising in the game playing to attract players- intention to purchase the advertised product placed in the creative game design.
Abstract: The purpose of this study is to understand how
consumers react to a company's promotional offers with mobile
applications (APP) as premiums. This paper presents the results of an
experimental study where five features of APP were involved: the
cost (free/discounted) for earning APP, the relationship between APP
and the promoted product, the perceived usefulness, the perceived
ease of use, and the perceived playfulness of APP in the context of
light foods purchase. The results support that the above features,
except perceived ease of use, have substantial influences on
consumers' intention to adopt the APP. Among the five features, the
cost for earning APP has the most impact on the adopting intention
of APP. The study also found a positive influence of adopting
intention of APP on the consumer's purchase intention of the
promoted product. Thus, APP-based premiums may enhance the
consumer's purchase intention of a company's promoted products.
Abstract: The aim of this research is to design a collaborative
framework that integrates risk analysis activities into the geospatial
database design (GDD) process. Risk analysis is rarely undertaken
iteratively as part of the present GDD methods in conformance to
requirement engineering (RE) guidelines and risk standards.
Accordingly, when risk analysis is performed during the GDD, some
foreseeable risks may be overlooked and not reach the output
specifications especially when user intentions are not systematically
collected. This may lead to ill-defined requirements and ultimately in
higher risks of geospatial data misuse. The adopted approach consists
of 1) reviewing risk analysis process within the scope of RE and
GDD, 2) analyzing the challenges of risk analysis within the context
of GDD, and 3) presenting the components of a risk-based
collaborative framework that improves the collection of the
intended/forbidden usages of the data and helps geo-IT experts to
discover implicit requirements and risks.
Abstract: This study aims to examine the determinants of
purchase intention in C2C e-commerce. Specifically the role of
instant messaging in the C2C e-commerce contextis investigated. In
addition to instant messaging, we brought in two antecedents of
purchase intention - trust and customer satisfaction - to establish a
theoretical research model. Structural equation modeling using
LISREL was used to analyze the data.We discussed the research
findings and suggested some implications for researchers and
practitioners.
Abstract: In this cyber age, the job market has been rapidly transforming and being digitalized. Submitting a paper-based curriculum vitae (CV) nowadays does not grant a job seeker a high employability rate. This paper calls for attention on the creation of mobile Curriculum Vitae or m-CV (http://mcurriculumvitae. blogspot.com), a sample of an individual CV developed using weblog, which can enhance the job hunter especially fresh graduate-s higher marketability rate. This study is designed to identify the perceptions held by Malaysian university students regarding m-CV grounded on a modified Technology Acceptance Model (TAM). It measures the strength and the direction of relationships among three major variables – Perceived Ease of Use (PEOU), Perceived Usefulness (PU) and Behavioral Intention (BI) to use. The finding shows that university students generally accepted adopting m-CV since they perceived m-CV to be more useful rather than easy to use. Additionally, this study has confirmed TAM to be a useful theoretical model in helping to understand and explain the behavioral intention to use Web 2.0 application-weblog publishing their CV. The result of the study has underlined another significant positive value of using weblog to create personal CV. Further research of m-CV has been highlighted in this paper.
Abstract: This study reports the implementation of Good
Manufacturing Practice (GMP) in a polycarbonate film processing
plant. The implementation of GMP took place with the creation of a
multidisciplinary team. It was carried out in four steps: conduct gap
assessment, create gap closure plan, close gaps, and follow up the
GMP implementation. The basis for the gap assessment is the
guideline for GMP for plastic materials and articles intended for Food
Contact Material (FCM), which was edited by Plastic Europe. The
effective results of the GMP implementation in this study showed
100% completion of gap assessment. The key success factors for
implementing GMP in production process are the commitment,
intention and support of top management.
Abstract: One major issue that is regularly cited as a block to
the widespread use of online assessments in eLearning, is that of the
authentication of the student and the level of confidence that an
assessor can have that the assessment was actually completed by that
student. Currently, this issue is either ignored, in which case
confidence in the assessment and any ensuing qualification is
damaged, or else assessments are conducted at central, controlled
locations at specified times, losing the benefits of the distributed
nature of the learning programme. Particularly as we move towards
constructivist models of learning, with intentions towards achieving
heutagogic learning environments, the benefits of a properly
managed online assessment system are clear. Here we discuss some
of the approaches that could be adopted to address these issues,
looking at the use of existing security and biometric techniques,
combined with some novel behavioural elements. These approaches
offer the opportunity to validate the student on accessing an
assessment, on submission, and also during the actual production of
the assessment. These techniques are currently under development in
the DECADE project, and future work will evaluate and report their
use..
Abstract: Existing literature ondesign reasoning seems to give
either one sided accounts on expert design behaviour based on
internal processing. In the same way ecological theoriesseem to
focus one sidedly on external elementsthat result in a lack of unifying
design cognition theory. Although current extended design cognition
studies acknowledge the intellectual interaction between internal and
external resources, there still seems to be insufficient understanding
of the complexities involved in such interactive processes. As
such,this paper proposes a novelmulti-directional model for design
researchers tomap the complex and dynamic conduct controlling
behaviour in which both the computational and ecological
perspectives are integrated in a vertical manner. A clear distinction
between identified intentional and emerging physical drivers, and
relationships between them during the early phases of experts- design
process, is demonstrated by presenting a case study in which the
model was employed.
Abstract: Several wireless networks security standards have been proposed and widely implemented in both business and home environments in order to protect the network from unauthorized access. However, the implementation of such standards is usually achieved by network administrators without even knowing the standards- weaknesses and strengths. The intention of this paper is to evaluate and analyze the impact over the network-s security due to the implementation of the wireless networks security standards WEP, WPA and WLAN 802.1X.
Abstract: The intention of this study to design the probability optimized sewing sack-s workstation based on ergonomics for productivity improvement and decreasing musculoskeletal disorders. The physical dimensions of two workers were using to design the new workstation. The physical dimensions are (1) sitting height, (2) mid shoulder height sitting, (3) shoulder breadth, (4) knee height, (5) popliteal height, (6) hip breadth and (7) buttock-knee length. The 5th percentile of buttock knee length sitting (51 cm), the 50th percentile of mid shoulder height sitting (62 cm) and the 95th percentile of popliteal height (43 cm) and hip breadth (45 cm) applied to design the workstation for sewing sack-s operator and the others used to adjust the components of this workstation. The risk assessment by RULA before and after using the probability optimized workstation were 7 and 7 scores and REBA scores were 11 and 5, respectively. Body discomfort-abnormal index was used to assess muscle fatigue of operators before adjustment workstation found that neck muscles, arm muscles area, muscles on the back and the lower back muscles fatigue. Therefore, the extension and flexion exercise was applied to relief musculoskeletal stresses. The workers exercised 15 minutes before the beginning and the end of work for 5 days. After that, the capability of flexion and extension muscles- workers were increasing in 3 muscles (arm, leg, and back muscles).
Abstract: The intention of this paper is, to help the user of evolutionary algorithms to adapt them easier to their problem at hand. For a lot of problems in the technical field it is not necessary to reach an optimum solution, but to reach a good solution in time. In many cases the solution is undetermined or there doesn-t exist a method to determine the solution. For these cases an evolutionary algorithm can be useful. This paper intents to give the user rules of thumb with which it is easier to decide if the problem is suitable for an evolutionary algorithm and how to design them.
Abstract: Only recently have water ethics received focused interest in the international water community. Because water is metabolically basic to life, an ethical dimension persists in every decision related to water. Water ethics at once express human society-s approach to water and act as guidelines for behaviour. Ideas around water are often implicit and embedded as assumptions. They can be entrenched in behaviour and difficult to contest because they are difficult to “see". By explicitly revealing the ethical ideas underlying water-related decisions, human society-s relationship with water, and with natural systems of which water is part, can be contested and shifted or be accepted with conscious intention by human society. In recent decades, improved understanding of water-s importance for ecosystem functioning and ecological services for human survival is moving us beyond this growth-driven, supplyfocused management paradigm. Environmental ethics challenge this paradigm by extending the ethical sphere to the environment and thus water or water Resources management per se. An ethical approach is a legitimate, important, and often ignored approach to effect change in environmental decision making. This qualitative research explores principles of water ethics and examines the underlying ethical precepts of selected water policy examples. The constructed water ethic principles act as a set of criteria against which a policy comparison can be established. This study shows that water Resources management is a progressive issue by embracing full public participation and a new planning model, and knowledgegeneration initiatives.
Abstract: The implicit block methods based on the backward
differentiation formulae (BDF) for the solution of stiff initial value
problems (IVPs) using variable step size is derived. We construct a
variable step size block methods which will store all the coefficients
of the method with a simplified strategy in controlling the step size
with the intention of optimizing the performance in terms of
precision and computation time. The strategy involves constant,
halving or increasing the step size by 1.9 times the previous step size.
Decision of changing the step size is determined by the local
truncation error (LTE). Numerical results are provided to support the
enhancement of method applied.
Abstract: Pentachlorophenol (PCP) is a polychlorinated
aromatic compound that is widespread in industrial effluents and is
considered to be a serious pollutant. Among the variety of industrial
effluents encountered, effluents from tanning industry are very
important and have a serious pollution potential. PCP is also formed
unintentionally in effluents of paper and pulp industries. It is highly
persistent in soils and is lethal to a wide variety of beneficial
microorganisms and insects, human beings and animals. The natural
processes that breakdown toxic chemicals in the environment have
become the focus of much attention to develop safe and environmentfriendly
deactivation technologies. Microbes and plants are among
the most important biological agents that remove and degrade waste
materials to enable their recycling in the environment. The present
investigation was carried out with the aim of developing a microbial
system for bioremediation of PCP polluted soils. A number of plant
species were evaluated for their ability to tolerate different
concentrations of pentachlorophenol (PCP) in the soil. The
experiment was conducted for 30 days under pot culture conditions.
The toxic effect of PCP on plants was studied by monitoring seed
germination, plant growth and biomass. As the concentration of PCP
was increased to 50 ppm, the inhibition of seed germination, plant
growth and biomass was also increased. Although PCP had a
negative effect on all plant species tested, maize and groundnut
showed the maximum tolerance to PCP. Other tolerating crops
included wheat, safflower, sunflower, and soybean. From the
rhizosphere soil of the tolerant seedlings, as many as twenty seven
PCP tolerant bacteria were isolated. From soybean, 8; sunflower, 3;
safflower 8; maize 2; groundnut and wheat, 3 each isolates were
made. They were screened for their PCP degradation potentials.
HPLC analyses of PCP degradation revealed that the isolate MAZ-2
degraded PCP completely. The isolate MAZ-1 was the next best
isolate with 90 per cent PCP degradation. These strains hold promise
to be used in the bioremediation of PCP polluted soils.
Abstract: This study examined the underlying dimensions of
brand equity in the chocolate industry. For this purpose, researchers
developed a model to identify which factors are influential in
building brand equity. The second purpose was to assess brand
loyalty and brand images mediating effect between brand attitude,
brand personality, brand association with brand equity. The study
employed structural equation modeling to investigate the causal
relationships between the dimensions of brand equity and brand
equity itself. It specifically measured the way in which consumers’
perceptions of the dimensions of brand equity affected the overall
brand equity evaluations. Data were collected from a sample of
consumers of chocolate industry in Iran. The results of this empirical
study indicate that brand loyalty and brand image are important
components of brand equity in this industry. Moreover, the role of
brand loyalty and brand image as mediating factors in the intention of
brand equity are supported. The principal contribution of the present
research is that it provides empirical evidence of the
multidimensionality of consumer based brand equity, supporting
Aaker´s and Keller´s conceptualization of brand equity. The present
research also enriched brand equity building by incorporating the
brand personality and brand image, as recommended by previous
researchers. Moreover, creating the brand equity index in chocolate
industry of Iran particularly is novel.
Abstract: We identify clawback triggers from firms- proxy
statements (Form DEF 14A) and use the likelihood of restatements to
proxy for financial reporting quality. Based on a sample of 578 U.S.
firms that voluntarily adopt clawback provisions during 2003-2009,
when restatement-based triggers could be decomposed into two types:
fraud and unintentional error, and we do observe the evidence that
using fraud triggers is associated with high financial reporting quality.
The findings support that fraud triggers can enhance deterrent effect of
clawback provision by establishing a viable disincentive against fraud,
misconduct, and otherwise harmful acts. These results are robust to
controlling for the compensation components, to different sample
specifications and to a number of sensitivity.
Abstract: According to the governmental data, the cases of oral
cancers doubled in the past 10 years. This had brought heavy burden to
the patients- family, the society, and the country. The literature
generally evidenced the betel nut contained particular chemicals that
can cause oral cancers. Research in Taiwan had also proofed that 90
percent of oral cancer patients had experience of betel nut chewing. It
is thus important to educate the betel-nut hobbyists to cease such a
hazardous behavior. A program was then organized to establish
several training classes across different areas specific to help ceasing
this particular habit. Purpose of this research was to explore the
attitude and intention toward ceasing betel-nut chewing before and
after attending the training classes. 50 samples were taken from a
ceasing class with average age at 45 years old with high school
education (54%). 74% of the respondents were male in service or
agricultural industries. Experiences in betel-nut chewing were 5-20
years with a dose of 1-20 pieces per day. The data had shown that 60%
of the respondents had cigarette smoking habit, and 30% of the
respondents were concurrently alcoholic dependent. Research results
indicated that the attitude, intentions, and the knowledge on oral
cancers were found significant different between before and after
attendance. This provided evidence for the effectiveness of the training
class. However, we do not perform follow-up after the class.
Noteworthy is the test result also shown that participants who were
drivers as occupation, or habitual smokers or alcoholic dependents
would be less willing to quit the betel-nut chewing. The test results
indicated as well that the educational levels and the type of occupation
may have significant impacts on an individual-s decisions in taking
betel-nut or substance abuse.
Abstract: The issue of unintentional islanding in PV grid
interconnection still remains as a challenge in grid-connected
photovoltaic (PV) systems. This paper discusses the overview of
popularly used anti-islanding detection methods, practically applied
in PV grid-connected systems. Anti-islanding methods generally can
be classified into four major groups, which include passive methods,
active methods, hybrid methods and communication base methods.
Active methods have been the preferred detection technique over the
years due to very small non-detected zone (NDZ) in small scale
distribution generation. Passive method is comparatively simpler
than active method in terms of circuitry and operations. However, it
suffers from large NDZ that significantly reduces its performance.
Communication base methods inherit the advantages of active and
passive methods with reduced drawbacks. Hybrid method which
evolved from the combination of both active and passive methods
has been proven to achieve accurate anti-islanding detection by many
researchers. For each of the studied anti-islanding methods, the
operation analysis is described while the advantages and
disadvantages are compared and discussed. It is difficult to pinpoint a
generic method for a specific application, because most of the
methods discussed are governed by the nature of application and
system dependent elements. This study concludes that the setup and
operation cost is the vital factor for anti-islanding method selection in
order to achieve minimal compromising between cost and system
quality.
Abstract: Clustering techniques have been used by many intelligent software agents to group similar access patterns of the Web users into high level themes which express users intentions and interests. However, such techniques have been mostly focusing on one salient feature of the Web document visited by the user, namely the extracted keywords. The major aim of these techniques is to come up with an optimal threshold for the number of keywords needed to produce more focused themes. In this paper we focus on both keyword and similarity thresholds to generate themes with concentrated themes, and hence build a more sound model of the user behavior. The purpose of this paper is two fold: use distance based clustering methods to recognize overall themes from the Proxy log file, and suggest an efficient cut off levels for the keyword and similarity thresholds which tend to produce more optimal clusters with better focus and efficient size.
Abstract: Cyclic delay diversity (CDD) is a simple technique to
intentionally increase frequency selectivity of channels for orthogonal
frequency division multiplexing (OFDM).This paper proposes a residual
carrier frequency offset (RFO) estimation scheme for OFDMbased
broadcasting system using CDD. In order to improve the RFO
estimation, this paper addresses a decision scheme of the amount of
cyclic delay and pilot pattern used to estimate the RFO. By computer
simulation, the proposed estimator is shown to benefit form propoerly
chosen delay parameter and perform robustly.