Abstract: Does education matter to the quality of our life? The results of extensive studies offer an affirmative answer to this question: high education levels are positively associated with higher income, with more highly qualified professions, with lower risk of unemployment, with better physical health and also, it is said, with more happiness. However, exploring these relationships is far from straightforward. Aside from educational credentials, what properties distinguish functionally literate individuals? How can their personal level of satisfaction be measured? What are the social mechanisms whereby education affects well-being?Using a literacy index and several measures for well-being developed by secondary analysis of the Adult Literacy and Life Skills Survey database, this investigation examined the relationship between literacy skills and subjective wellbeing in several OECD (Organisation for Economic Co-operation and Development) countries. Special attention was been addressed to Italy, and in particular to two regions representing territorial differences in this country: Piedmont and Campania.
Abstract: This paper presents an analytical framework for an
effective online personal knowledge management (PKM) of
knowledge workers. The development of this framework is prompted
by our qualitative research on the PKM processes and cognitive
enablers of knowledge workers in eight organisations selected from
three main industries in Malaysia. This multiple-case research
identifies the relationships between the effectiveness of four online
PKM processes: get/retrieve, understand/analyse, share, and connect.
It also establishes the importance of cognitive enablers that mediate
this relationship, namely, method, identify, decide and drive.
Qualitative analysis is presented as the findings, supported by the
preceded quantitative analysis on an exploratory questionnaire
survey.
Abstract: The increasing development of wireless networks and
the widespread popularity of handheld devices such as Personal
Digital Assistants (PDAs), mobile phones and wireless tablets
represents an incredible opportunity to enable mobile devices as a
universal payment method, involving daily financial transactions.
Unfortunately, some issues hampering the widespread acceptance of
mobile payment such as accountability properties, privacy protection,
limitation of wireless network and mobile device. Recently, many
public-key cryptography based mobile payment protocol have been
proposed. However, limited capabilities of mobile devices and
wireless networks make these protocols are unsuitable for mobile
network. Moreover, these protocols were designed to preserve
traditional flow of payment data, which is vulnerable to attack and
increase the user-s risk. In this paper, we propose a private mobile
payment protocol which based on client centric model and by
employing symmetric key operations. The proposed mobile payment
protocol not only minimizes the computational operations and
communication passes between the engaging parties, but also
achieves a completely privacy protection for the payer. The future
work will concentrate on improving the verification solution to
support mobile user authentication and authorization for mobile
payment transactions.
Abstract: Face recognition in the infrared spectrum has attracted a lot of interest in recent years. Many of the techniques used in infrared are based on their visible counterpart, especially linear techniques like PCA and LDA. In this work, we introduce a probabilistic Bayesian framework for face recognition in the infrared spectrum. In the infrared spectrum, variations can occur between face images of the same individual due to pose, metabolic, time changes, etc. Bayesian approaches permit to reduce intrapersonal variation, thus making them very interesting for infrared face recognition. This framework is compared with classical linear techniques. Non linear techniques we developed recently for infrared face recognition are also presented and compared to the Bayesian face recognition framework. A new approach for infrared face extraction based on SVM is introduced. Experimental results show that the Bayesian technique is promising and lead to interesting results in the infrared spectrum when a sufficient number of face images is used in an intrapersonal learning process.
Abstract: This paper explores the importance of privacy in a
contemporary online world. Crucial to the discussion is the idea of
the Lacanian postmodern fragmented self and the problem of how to
ensure that we have room to fully explore various aspects of our
personalities in an environment which is–or at least feels--safe and
free from observation by others. The paper begins with an
exploration of the idea of the self with particular regard to the ways
in which contemporary life and technology seems to have multiplied
the various faces or masks which we present in different contexts. A
brief history of privacy and surveillance follows. Finally, the paper
ends with an affirmation of the importance of private space as an
essential component of our spiritual and emotional well-being in
today-s wired world.
Abstract: Emotions are related with learning processes and
physiological signals can be used to detect them for the
personalization of learning resources and to control the pace of
instruction. A model of relevant emotions has been developed, where
specific combinations of emotions and cognition processes are
connected and integrated with the concept of 'flow', in order to
improve learning. The cardiac pulse is a reliable signal that carries
useful information about the subject-s emotional condition; it is
detected using a classroom chair adapted with non invasive EMFi
sensor and an acquisition system that generates a ballistocardiogram
(BCG), the signal is processed by an algorithm to obtain
characteristics that match a specific emotional condition. The
complete chair system is presented in this work, along with a
framework for the personalization of learning resources.
Abstract: In terms of total online audience, newspapers are the most successful form of online content to date. The online audience for newspapers continues to demand higher-quality services, including personalized news services. News providers should be able to offer suitable users appropriate content. In this paper, a news article recommender system is suggested based on a user-s preference when he or she visits an Internet news site and reads the published articles. This system helps raise the user-s satisfaction, increase customer loyalty toward the content provider.
Abstract: Citizens are increasingly are provided with choice and
customization in public services and this has now also become a key
feature of higher education in terms of policy roll-outs on personal
development planning (PDP) and more generally as part of the
employability agenda. The goal here is to transform people, in this
case graduates, into active, responsible citizen-workers. A key part of
this rhetoric and logic is the inculcation of graduate attributes within
students. However, there has also been a concern with the issue of
student lack of engagement and perseverance with their studies. This
paper sets out to explore some of these conceptions that link graduate
attributes with citizenship as well as the notion of how identity is
forged through the higher education process. Examples are drawn
from a quality enhancement project that is being operated within the
context of the Scottish higher education system. This is further
framed within the wider context of competing and conflicting
demands on higher education, exacerbated by the current worldwide
economic climate. There are now pressures on students to develop
their employability skills as well as their capacity to engage with
global issues such as behavioural change in the light of
environmental concerns. It is argued that these pressures, in effect,
lead to a form of personalization that is concerned with how
graduates develop their sense of identity as something that is
engineered and re-engineered to meet these demands.
Abstract: This research is to explore the satisfaction for senior
citizens on continuing education in Taiwan. The purpose of this
research aims at the difference on teacher-s teaching, personal
relationship, learning result, materials and environment. Through
different sexual and living area as the background variables, a
questionnaire is adopted as the methodology in this research. Three
results are found in this research. In overall, senior citizens taking
continuing education put the most important attention on personal
relationship but materials and leaning environment put the least. There
is a significant difference on personal relationship, teacher-s teaching
and research result between different sexes. Female senior citizens
attach more importance to teacher-s teaching and learning results but
male senior citizens value on personal relationship. Another
significant difference is shown on teacher-s teaching and personal
relationship because of senior citizens living area. Urban senior
citizens put importance on personal relationship and rural senior
citizens respect teacher-s teaching more.
Abstract: This research assesses the value of the brand personality and its influence on consumer-s decision making, through relational variables, after receiving a text message ad. An empirical study, in which 380 participants have received an SMS ad, confirms that brand personality does actually influence the brand trust as well as the attachment and commitment. The levels of sensitivity and involvement have an impact on the brand personality and the related variables to it.
Abstract: Service discovery is a very important component of Service Oriented Architectures (SOA). This paper presents two alternative approaches to customise the query results of private service registry such as Universal Description, Discovery and Integration (UDDI). The customisation is performed based on some pre-defined and/or real-time changing parameters. This work identifies the requirements, designs and additional mechanisms that must be applied to UDDI in order to support this customisation capability. We also detail the implements of the approaches and examine its performance and scalability. Based on our experimental results, we conclude that both approaches can be used to customise registry query results, but by storing personalization parameters in external resource will yield better performance and but less scalable when size of query results increases. We believe these approaches when combined with semantics enabled service registry will enhance the service discovery methods within a private UDDI registry environment.
Abstract: Work-life balance has been acknowledged and
promoted for the sake of employee retention. It is essential for a
manager to realize the human resources situation within a company to
help employees work happily and perform at their best. This paper
suggests knowledge management and critical thinking are useful to
motivate employees to think about their work-life balance. A
qualitative case study is presented, which aimed to discover the
meaning of work-life balance-s meaning from the perspective of Thai
knowledge workers and how it affects their decision-making towards
work resignation. Results found three types of work-life balance
dimensions; a work- life balance including a workplace and a private
life setting, an organizational working life balance only, and a worklife
balance only in a private life setting. These aspects all influenced
the decision-making of the employees. Factors within a theme of an
organizational work-life balance were involved with systematic
administration, fair treatment, employee recognition, challenging
assignments to gain working experience, assignment engagement,
teamwork, relationship with superiors, and working environment,
while factors concerning private life settings were about personal
demands such as an increasing their salary or starting their own
business.
Abstract: Today, money laundering (ML) poses a serious threat
not only to financial institutions but also to the nation. This criminal
activity is becoming more and more sophisticated and seems to have
moved from the cliché of drug trafficking to financing terrorism and
surely not forgetting personal gain. Most international financial
institutions have been implementing anti-money laundering solutions
(AML) to fight investment fraud. However, traditional investigative
techniques consume numerous man-hours. Recently, data mining
approaches have been developed and are considered as well-suited
techniques for detecting ML activities. Within the scope of a
collaboration project for the purpose of developing a new solution for
the AML Units in an international investment bank, we proposed a
data mining-based solution for AML. In this paper, we present a
heuristics approach to improve the performance for this solution. We
also show some preliminary results associated with this method on
analysing transaction datasets.
Abstract: Learning is the acquisition of new mental schemata, knowledge, abilities and skills which can be used to solve problems potentially more successfully. The learning process is optimum when it is assisted and personalized. Learning is not a single activity, but should involve many possible activities to make learning become meaningful. Many e-learning applications provide facilities to support teaching and learning activities. One way to identify whether the e-learning system is being used by the learners is through the number of hits that can be obtained from the e-learning system's log data. However, we cannot rely solely to the number of hits in order to determine whether learning had occurred meaningfully. This is due to the fact that meaningful learning should engage five characteristics namely active, constructive, intentional, authentic and cooperative. This paper aims to analyze the e-learning activities that is meaningful to learning. By focusing on the meaningful learning characteristics, we match it to the corresponding Moodle e-learning activities. This analysis discovers the activities that have high impact to meaningful learning, as well as activities that are less meaningful. The high impact activities is given high weights since it become important to meaningful learning, while the low impact has less weight and said to be supportive e-learning activities. The result of this analysis helps us categorize which e-learning activities that are meaningful to learning and guide us to measure the effectiveness of e-learning usage.
Abstract: The present study examines the mediating effect of
online flow experience on the relationship between extraversionintroversion,
locus of control and loneliness, and depression and
satisfaction with life. The data was obtained using a structured
questionnaire prepared by adapting standardized scales available from
a sample of 102 engineering students from different technical
institutions at Bhubaneswar, India. The results indicate that there is a
positive significant relationship between introversion, external locus
of control, loneliness, depression and online flow experience, and
extraversion, internal locus of control and satisfaction with life. The
results also suggest that online flow experience mediates the
relationship between the aforementioned variables.
Abstract: Nowadays, computer worms, viruses and Trojan horse
become popular, and they are collectively called malware. Those
malware just spoiled computers by deleting or rewriting important
files a decade ago. However, recent malware seems to be born to earn
money. Some of malware work for collecting personal information so
that malicious people can find secret information such as password for
online banking, evidence for a scandal or contact address which relates
with the target. Moreover, relation between money and malware
becomes more complex. Many kinds of malware bear bots to get
springboards. Meanwhile, for ordinary internet users,
countermeasures against malware come up against a blank wall.
Pattern matching becomes too much waste of computer resources,
since matching tools have to deal with a lot of patterns derived from
subspecies. Virus making tools can automatically bear subspecies of
malware. Moreover, metamorphic and polymorphic malware are no
longer special. Recently there appears malware checking sites that
check contents in place of users' PC. However, there appears a new
type of malicious sites that avoids check by malware checking sites. In
this paper, existing protocols and methods related with the web are
reconsidered in terms of protection from current attacks, and new
protocol and method are indicated for the purpose of security of the
web.
Abstract: Database management systems that integrate user preferences promise better solution for personalization, greater flexibility and higher quality of query responses. This paper presents a tentative work that studies and investigates approaches to express user preferences in queries. We sketch an extend capabilities of SQLf language that uses the fuzzy set theory in order to define the user preferences. For that, two essential points are considered: the first concerns the expression of user preferences in SQLf by so-called fuzzy commensurable predicates set. The second concerns the bipolar way in which these user preferences are expressed on mandatory and/or optional preferences.
Abstract: Social cognitive theory explains the power to inaugurate change is determined by the mutual influence of personal proclivity and social factors which will shape ones- motivations and expectations. In construction industry, green concept offers an opportunity to leave a lighter footprint on the environment. This opportunity, however, has not been fully grasped by many countries. As such, venturing into green construction for many practitioners would be their maiden experience. Decision to venture into new practice such as green construction will be influenced by certain drivers. This paper explores these drivers which is further expanded into motivational factors and later becomes the platform upon which expectation for green construction stands. This theoretical concept of motivation and expectations, which is adapted from social cognitive theory, focus on developers- view because of their crucial role in green application. This conceptual framework, which serves as the basis for further research, will benefit the industry as it elucidate cognitive angles to attract more new entrants to green business.
Abstract: Recommender Systems act as personalized decision
guides, aiding users in decisions on matters related to personal taste.
Most previous research on Recommender Systems has focused on the
statistical accuracy of the algorithms driving the systems, with no
emphasis on the trustworthiness of the user. RS depends on
information provided by different users to gather its knowledge. We
believe, if a large group of users provide wrong information it will
not be possible for the RS to arrive in an accurate conclusion. The
system described in this paper introduce the concept of Testing the
knowledge of user to filter out these “bad users".
This paper emphasizes on the mechanism used to provide robust
and effective recommendation.
Abstract: This paper describes the project and development of a
very low-cost and small electronic prototype, especially designed for
monitoring and controlling existing home automation alarm systems
(intruder, smoke, gas, flood, etc.), via TCP/IP, with a typical web
browser. Its use will allow home owners to be immediately alerted
and aware when an alarm event occurs, and being also able to
interact with their home automation alarm system, disarming, arming
and watching event alerts, with a personal wireless Wi-Fi PDA or
smartphone logged on to a dedicated predefined web page, and using
also a PC or Laptop.