CINXE.COM

Search results for: trustworthiness

<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: trustworthiness</title> <meta name="description" content="Search results for: trustworthiness"> <meta name="keywords" content="trustworthiness"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="trustworthiness" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="trustworthiness"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 69</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: trustworthiness</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">69</span> Evaluating Service Trustworthiness for Service Selection in Cloud Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Maryam%20Amiri">Maryam Amiri</a>, <a href="https://publications.waset.org/abstracts/search?q=Leyli%20Mohammad-Khanli"> Leyli Mohammad-Khanli</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing is becoming increasingly popular and more business applications are moving to cloud. In this regard, services that provide similar functional properties are increasing. So, the ability to select a service with the best non-functional properties, corresponding to the user preference, is necessary for the user. This paper presents an Evaluation Framework of Service Trustworthiness (EFST) that evaluates the trustworthiness of equivalent services without need to additional invocations of them. EFST extracts user preference automatically. Then, it assesses trustworthiness of services in two dimensions of qualitative and quantitative metrics based on the experiences of past usage of services. Finally, EFST determines the overall trustworthiness of services using Fuzzy Inference System (FIS). The results of experiments and simulations show that EFST is able to predict the missing values of Quality of Service (QoS) better than other competing approaches. Also, it propels users to select the most appropriate services. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=user%20preference" title="user preference">user preference</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20service" title=" cloud service"> cloud service</a>, <a href="https://publications.waset.org/abstracts/search?q=trustworthiness" title=" trustworthiness"> trustworthiness</a>, <a href="https://publications.waset.org/abstracts/search?q=QoS%20metrics" title=" QoS metrics"> QoS metrics</a>, <a href="https://publications.waset.org/abstracts/search?q=prediction" title=" prediction"> prediction</a> </p> <a href="https://publications.waset.org/abstracts/72685/evaluating-service-trustworthiness-for-service-selection-in-cloud-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72685.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">287</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">68</span> Unlocking the Power of Social Media for Tourism Marketing: How Travel Bloggers Shape Destination Trust, Travel Intention with the Moderating Role of Trustworthiness on Social Media Posts</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Saad%20Saif">Saad Saif</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Tourism promotion in the digital age is significantly influenced by social media, particularly in developing travel markets such as Pakistan. This study examines how travel bloggers use social media to inspire people to plan journeys and increase trust in destinations. It examines how trustworthiness works as a moderator to enhance the legitimacy of social media posts. This study aims to comprehend the dynamics of social media's influence on the travel and tourism industry. This study investigates the influence of travel bloggers' content, with a focus on tone (positive/negative) and emotional intensity (strong/weak), on prospective Pakistani travelers' travel preferences and levels of trust toward a particular location. The study used an experimental design to validate its hypotheses. The results indicate that the emotive content and tone of bloggers influence travel intentions and that destination trust mediates this relationship. It is interesting to observe that variations in the emotional intensity of positive and negative ratings are not always accompanied by changes in destination trust and travel intent. In addition, the influence of a blogger's review tone on travel intention and destination trust is moderated by the credibility of online reviews, whereas the influence of emotional intensity on these outcomes is unaffected by review credibility. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=tourism%20marketing" title="tourism marketing">tourism marketing</a>, <a href="https://publications.waset.org/abstracts/search?q=destination%20trust" title=" destination trust"> destination trust</a>, <a href="https://publications.waset.org/abstracts/search?q=travel%20intention" title=" travel intention"> travel intention</a>, <a href="https://publications.waset.org/abstracts/search?q=trustworthiness" title=" trustworthiness"> trustworthiness</a> </p> <a href="https://publications.waset.org/abstracts/172841/unlocking-the-power-of-social-media-for-tourism-marketing-how-travel-bloggers-shape-destination-trust-travel-intention-with-the-moderating-role-of-trustworthiness-on-social-media-posts" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/172841.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">72</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">67</span> Assessing the Celebrity Effects on Change in Brand Association and Consumer’s Attitude in a Celebrity-Collaborated Fashion Brand in Hong Kong</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chu%20Wai%20Ching">Chu Wai Ching</a>, <a href="https://publications.waset.org/abstracts/search?q=Kan%20Chi%20Wai"> Kan Chi Wai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Fashion industry is fast moving with intense competitions; it is hard for fashion retailers to stand out among their peers. In order to promote and enhance uniqueness, fashion retailers have collaborated with different brands or celebrity in their marketing campaign recently. As brand-celebrity collaboration is a growing phenomenon in the Hong Kong fashion industry, this research aims to investigate the effect of celebrity on altering consumer’s brand association and the overall attitude towards the co-branded products. One of the popular celebrity-collaborated fashion brands was chosen for this study and a survey was conducted among university students in Hong Kong which yielded 222 responses. By using factor analysis, linear regression and bootstrap test for the mediation, the results show that three celebrity attributes namely “expertise”, “trustworthiness” and “attractiveness” affect the evaluation of the co-branded products. In addition, the change in the association of the brand and co-branded product attributes mediates the relationship between the characteristics of the celebrity and the overall attitude of the co-branded product. The result shows “expertise” of the celebrity has a perfect mediation, while “trustworthiness” and “attractiveness” of the celebrity have partial mediation. This implies that expertise of the celebrity is capable in altering the association towards both the brand and core product attributes and bringing a positive attitude towards the co-brand. The trustworthiness and the attractiveness of the celebrity are able to alter the consumer association towards the brand, but do not guarantee a complete positive attitude towards the co-branded product. This means that change in brand attributes is not a definite mediator as direct relationship may happen or there may be other factors that can affect the relationship between the celebrity’s persuasiveness and the overall attitude towards the co-branded collection. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=brand%20attribute" title="brand attribute">brand attribute</a>, <a href="https://publications.waset.org/abstracts/search?q=brand-celebrity%20collaborations" title=" brand-celebrity collaborations"> brand-celebrity collaborations</a>, <a href="https://publications.waset.org/abstracts/search?q=co-branding" title=" co-branding"> co-branding</a>, <a href="https://publications.waset.org/abstracts/search?q=fashion%20industry" title=" fashion industry"> fashion industry</a> </p> <a href="https://publications.waset.org/abstracts/31410/assessing-the-celebrity-effects-on-change-in-brand-association-and-consumers-attitude-in-a-celebrity-collaborated-fashion-brand-in-hong-kong" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/31410.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">330</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">66</span> Development and Validation of Employee Trust Scale: Factor Structure, Reliability and Validity </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Chua%20Bee%20Seok">Chua Bee Seok</a>, <a href="https://publications.waset.org/abstracts/search?q=Getrude%20Cosmas"> Getrude Cosmas</a>, <a href="https://publications.waset.org/abstracts/search?q=Jasmine%20Adela%20Mutang"> Jasmine Adela Mutang</a>, <a href="https://publications.waset.org/abstracts/search?q=Shazia%20Iqbal%20Hashmi"> Shazia Iqbal Hashmi </a> </p> <p class="card-text"><strong>Abstract:</strong></p> The aims of this study were to determine the factor structure and psychometric properties (i.e., reliability and convergent validity) of the employees trust scale, a newly created instrument by the researchers. The employees trust scale initially contained 82 items to measure employee’s trust toward their supervisors. A sample of 818 (343 females, 449 males) employees were selected randomly from public and private organization sectors in Kota Kinabalu, Sabah, Malaysia. Their ages ranged from 19 to 67 years old with the mean of 34.55 years old. Their average tenure with their current employer was 11.2 years (s.d. = 7.5 years). The respondents were asked to complete the employees trust scale, as well as a managerial trust questionnaire from Mishra. The exploratory factor analysis on employee’s trust toward their supervisor’s extracted three factors, labeled 'trustworthiness' (32 items), 'position status' (11 items) and 'relationship' (6 items) which accounted for 62.49% of the total variance. Trustworthiness factors were re-categorized into three sub factors: competency (11 items), benevolence (8 items) and integrity (13 items). All factors and sub factors of the scales demonstrated clear reliability with internal consistency of Cronbach’s Alpha above 0.85. The convergent validity of the Scale was supported by an expected pattern of correlations (positive and significant correlation) between the score of all factors and sub factors of the scale and the score on the managerial trust questionnaire which measured the same construct. The convergent validity of employees trust scale was further supported by the significant and positive inter correlation between the factors and sub factors of the scale. The results suggest that the employees trust scale is a reliable and valid measure. However, further studies need to be carried out in other groups of sample as to further validate the Scale. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=employees%20trust%20scale" title="employees trust scale">employees trust scale</a>, <a href="https://publications.waset.org/abstracts/search?q=psychometric%20properties" title=" psychometric properties"> psychometric properties</a>, <a href="https://publications.waset.org/abstracts/search?q=trustworthiness" title=" trustworthiness"> trustworthiness</a>, <a href="https://publications.waset.org/abstracts/search?q=position%20status" title=" position status"> position status</a>, <a href="https://publications.waset.org/abstracts/search?q=relationship" title=" relationship"> relationship</a> </p> <a href="https://publications.waset.org/abstracts/34014/development-and-validation-of-employee-trust-scale-factor-structure-reliability-and-validity" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34014.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">470</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">65</span> In Online and Laboratory We Trust: Comparing Trust Game Behavior in Three Environments</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kaisa%20M.%20Herne">Kaisa M. Herne</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanna%20E.%20Bj%C3%B6rkstedt"> Hanna E. Björkstedt</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Comparisons of online and laboratory environments are important for assessing whether the environment influences behavioral results. Trust game behavior was examined in three environments: 1) The standard laboratory setting with physically present participants (laboratory), 2) An online environment with an online meeting before playing the trust game (online plus a meeting); and 3) An online environment without a meeting (online without a meeting). In laboratory, participants were present in a classroom and played the trust game anonymously via computers. Online plus a meeting mimicked the laboratory in that participants could see each other in an online meeting before sessions started, whereas online without a meeting was a standard online experiment in which participants did not see each other at any stages of the experiment. Participants were recruited through pools of student subjects at two universities. The trust game was identical in all conditions; it was played with the same software, anonymously, and with stranger matching. There were no statistically significant differences between the treatment conditions regarding trust or trustworthiness. Results suggest that conducting trust game experiments online will yield similar results to experiments implemented in a laboratory. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=laboratory%20vs.%20online%20experiment" title="laboratory vs. online experiment">laboratory vs. online experiment</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20behavior" title=" trust behavior"> trust behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20game" title=" trust game"> trust game</a>, <a href="https://publications.waset.org/abstracts/search?q=trustworthiness%20behavior" title=" trustworthiness behavior"> trustworthiness behavior</a> </p> <a href="https://publications.waset.org/abstracts/179342/in-online-and-laboratory-we-trust-comparing-trust-game-behavior-in-three-environments" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179342.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">78</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">64</span> Optimizing AI Voice for Adolescent Health Education: Preferences and Trustworthiness Across Teens and Parent</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yu-Lin%20Chen">Yu-Lin Chen</a>, <a href="https://publications.waset.org/abstracts/search?q=Kimberly%20Koester"> Kimberly Koester</a>, <a href="https://publications.waset.org/abstracts/search?q=Marissa%20Raymond-Flesh"> Marissa Raymond-Flesh</a>, <a href="https://publications.waset.org/abstracts/search?q=Anika%20Thapar"> Anika Thapar</a>, <a href="https://publications.waset.org/abstracts/search?q=Jay%20Thapar"> Jay Thapar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Purpose: Effectively communicating adolescent health topics to teens and their parents is crucial. This study emphasizes critically evaluating the optimal use of artificial intelligence tools (AI), which are increasingly prevalent in disseminating health information. By fostering a deeper understanding of AI voice preference in the context of health, the research aspires to have a ripple effect, enhancing the collective health literacy and decision-making capabilities of both teenagers and their parents. This study explores AI voices' potential within health learning modules for annual well-child visits. We aim to identify preferred voice characteristics and understand factors influencing perceived trustworthiness, ultimately aiming to improve health literacy and decision-making in both demographics. Methods: A cross-sectional study assessed preferences and trust perceptions of AI voices in learning modules among teens (11-18) and their parents/guardians in Northern California. The study involved the development of four distinct learning modules covering various adolescent health-related topics, including general communication, sexual and reproductive health communication, parental monitoring, and well-child check-ups. Participants were asked to evaluate eight AI voices across the modules, considering a set of six factors such as intelligibility, naturalness, prosody, social impression, trustworthiness, and overall appeal, using Likert scales ranging from 1 to 10 (the higher, the better). They were also asked to select their preferred choice of voice for each module. Descriptive statistics summarized participant demographics. Chi-square/t-tests explored differences in voice preferences between groups. Regression models identified factors impacting the perceived trustworthiness of the top-selected voice per module. Results: Data from 104 participants (teen=63; adult guardian = 41) were included in the analysis. The mean age is 14.9 for teens (54% male) and 41.9 for the parent/guardian (12% male). At the same time, similar voice quality ratings were observed across groups, and preferences varied by topic. For instance, in general communication, teens leaned towards young female voices, while parents preferred mature female tones. Interestingly, this trend reversed for parental monitoring, with teens favoring mature male voices and parents opting for mature female ones. Both groups, however, converged on mature female voices for sexual and reproductive health topics. Beyond preferences, the study delved into factors influencing perceived trustworthiness. Interestingly, social impression and sound appeal emerged as the most significant contributors across all modules, jointly explaining 71-75% of the variance in trustworthiness ratings. Conclusion: The study emphasizes the importance of catering AI voices to specific audiences and topics. Social impression and sound appeal emerged as critical factors influencing perceived trustworthiness across all modules. These findings highlight the need to tailor AI voices by age and the specific health information being delivered. Ensuring AI voices resonate with both teens and their parents can foster their engagement and trust, ultimately leading to improved health literacy and decision-making for both groups. Limitations and future research: This study lays the groundwork for understanding AI voice preferences for teenagers and their parents in healthcare settings. However, limitations exist. The sample represents a specific geographic location, and cultural variations might influence preferences. Additionally, the modules focused on topics related to well-child visits, and preferences might differ for more sensitive health topics. Future research should explore these limitations and investigate the long-term impact of AI voice on user engagement, health outcomes, and health behaviors. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title="artificial intelligence">artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=trustworthiness" title=" trustworthiness"> trustworthiness</a>, <a href="https://publications.waset.org/abstracts/search?q=voice" title=" voice"> voice</a>, <a href="https://publications.waset.org/abstracts/search?q=adolescent" title=" adolescent"> adolescent</a> </p> <a href="https://publications.waset.org/abstracts/185980/optimizing-ai-voice-for-adolescent-health-education-preferences-and-trustworthiness-across-teens-and-parent" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/185980.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">55</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">63</span> The Effects of Negative Electronic Word-of-Mouth and Webcare on Thai Online Consumer Behavior</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pongsatorn%20Tantrabundit">Pongsatorn Tantrabundit</a>, <a href="https://publications.waset.org/abstracts/search?q=Lersak%20Phothong"> Lersak Phothong</a>, <a href="https://publications.waset.org/abstracts/search?q=Ong-art%20Chanprasitchai"> Ong-art Chanprasitchai</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Due to the emergence of the Internet, it has extended the traditional Word-of-Mouth (WOM) to a new form called &ldquo;Electronic Word-of-Mouth (eWOM).&rdquo; Unlike traditional WOM, eWOM is able to present information in various ways by applying different components. Each eWOM component generates different effects on online consumer behavior. This research investigates the effects of Webcare (responding message) from product/ service providers on negative eWOM by applying two types of products (search and experience). The proposed conceptual model was developed based on the combination of the stages in consumer decision-making process, theory of reasoned action (TRA), theory of planned behavior (TPB), the technology acceptance model (TAM), the information integration theory and the elaboration likelihood model. The methodology techniques used in this study included multivariate analysis of variance (MANOVA) and multiple regression analysis. The results suggest that Webcare does slightly increase Thai online consumer&rsquo;s perceptions on perceived eWOM trustworthiness, information diagnosticity and quality. For negative eWOM, we also found that perceived eWOM Trustworthiness, perceived eWOM diagnosticity and quality have a positive relationship with eWOM influence whereas perceived valence has a negative relationship with eWOM influence in Thai online consumers. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=consumer%20behavior" title="consumer behavior">consumer behavior</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20word-of-mouth" title=" electronic word-of-mouth"> electronic word-of-mouth</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20review" title=" online review"> online review</a>, <a href="https://publications.waset.org/abstracts/search?q=online%20word-of-mouth" title=" online word-of-mouth"> online word-of-mouth</a>, <a href="https://publications.waset.org/abstracts/search?q=Thai%20online%20consumer" title=" Thai online consumer"> Thai online consumer</a>, <a href="https://publications.waset.org/abstracts/search?q=webcare" title=" webcare"> webcare</a> </p> <a href="https://publications.waset.org/abstracts/83221/the-effects-of-negative-electronic-word-of-mouth-and-webcare-on-thai-online-consumer-behavior" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/83221.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">206</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">62</span> The Opinions of Counselor Candidates&#039; regarding Universal Values in Marriage Relationship</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Seval%20Kizildag">Seval Kizildag</a>, <a href="https://publications.waset.org/abstracts/search?q=Ozge%20Can%20Aran"> Ozge Can Aran</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The effective intervention of counselors’ in conflict between spouses may be effective in increasing the quality of marital relationship. At this point, it is necessary for counselors to consider their own value systems at first and then reflect this correctly to the counseling process. For this reason, it is primarily important to determine the needs of counselors. Starting from this point of view, in this study, it is aimed to reveal the perspective of counselor candidates about the universal values in marriage relation. The study group of the survey was formed by sampling, which is one of the prospective sampling methods. As a criterion being a candidate for counseling area and having knowledge of the concepts of the Marriage and Family Counseling course is based, because, that candidate students have a comprehensive knowledge of the field and that students have mastered the concepts of marriage and family counseling will strengthen the findings of this study. For this reason, 61 counselor candidates, 32 (52%) female and 29 (48%) male counselor candidates, who were about to graduate from a university in south-east Turkey and who took a Marriage and Family Counseling course, voluntarily participated in the study. The average age of counselor candidates’ is 23. At the same time, 70 % of the parents of these candidates brought about their marriage through arranged marriage, 13% through flirting, 8% by relative marriage, 7% through friend circles and 2% by custom. The data were collected through Demographic Information Form and a form titled ‘Universal Values Form in Marriage’ which consists of six questions prepared by researchers. After the data were transferred to the computer, necessary statistical evaluations were made on the data. The qualitative data analysis was used on the data which was obtained in the study. The universal values which include six basic values covering trustworthiness, respect, responsibility, fairness, caring, citizenship, determined under the name as ‘six pillar of character’ are used as base and frequency values of the data were calculated trough content analysis. According to the findings of the study, while the value which most students find the most important value in marriage relation is being reliable, the value which they find the least important is to have citizenship consciousness. Also in this study, it is found out that counselor candidates associate the value of being trustworthiness ‘loyalty’ with (33%) as the highest in terms of frequency, the value of being respect ‘No violence’ with (23%), the value of responsibility ‘in the context of gender roles and spouses doing their owns’ with (35%) the value of being fairness ‘impartiality’ with (25%), the value of being caring ‘ being helpful’ with (25%) and finally as to the value of citizenship ‘love of country’ with (14%) and’ respect for the laws ‘ with (14%). It is believed that these results of the study will contribute to the arrangements for the development of counseling skills for counselor candidates regarding value in marriage and family counseling curricula. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=caring" title="caring">caring</a>, <a href="https://publications.waset.org/abstracts/search?q=citizenship" title=" citizenship"> citizenship</a>, <a href="https://publications.waset.org/abstracts/search?q=counselor%20candidate" title=" counselor candidate"> counselor candidate</a>, <a href="https://publications.waset.org/abstracts/search?q=fairness" title=" fairness"> fairness</a>, <a href="https://publications.waset.org/abstracts/search?q=marriage%20relationship" title=" marriage relationship"> marriage relationship</a>, <a href="https://publications.waset.org/abstracts/search?q=respect" title=" respect"> respect</a>, <a href="https://publications.waset.org/abstracts/search?q=responsibility" title=" responsibility"> responsibility</a>, <a href="https://publications.waset.org/abstracts/search?q=trustworthiness" title=" trustworthiness"> trustworthiness</a>, <a href="https://publications.waset.org/abstracts/search?q=value%20system" title=" value system"> value system</a> </p> <a href="https://publications.waset.org/abstracts/69433/the-opinions-of-counselor-candidates-regarding-universal-values-in-marriage-relationship" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/69433.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">271</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">61</span> Clinical Supervisors Experience of Supervising Nursing Students from a Higher Education Institution</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=J.%20Magerman">J. Magerman</a>, <a href="https://publications.waset.org/abstracts/search?q=P.%20Martin"> P. Martin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nursing students' clinical abilities is highly dependent on the quality of the clinical experience obtained while placed in the clinical environment. The clinical environment has amongst other, key role players which include the clinical supervisor. The primary role of the clinical supervisor is to guide nursing students to become the best practice nursing professionals. However, globally literature alludes to the failure of educating institutions to deliver competent nursing professionals to meet the needs of patients and deliver quality patient care. At the participating university, this may be due to various factors such as large student numbers and social and environmental challenges experienced by clinical supervisors. The aim of this study was to explore and describe the lived experiences of clinical supervisors who supervise nursing students at a higher education institution. The study employed a qualitative research approach utilizing a descriptive phenomenological design. Purposive sampling was used to select participants, who supervised first and second year nursing studnets at the higher education institution under study. TH esample comprised of eight clinical supervisors who supervise first and secon year nursing studnets at teh institution under study. Data was collected by means of in-depht interviews. Data was analysed using Collaizzi's seven steps method of qualitative analysis. Five major themes identified , focussed on the experiences regarding time a sa constraint to job productivity, the impact of teh organisational culture on the fluidity of support, interpersonal relationships a sa dynamic communication process, impact on the self, and limited resources. Trustworthiness of the data was ensured by means of applying Guba's model of truth value, applicability, consistency and neutrality. Reflexivity was also used by the researcher to further enhance trustworthiness. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=clinical%20supervision" title="clinical supervision">clinical supervision</a>, <a href="https://publications.waset.org/abstracts/search?q=clinical%20supervisors" title=" clinical supervisors"> clinical supervisors</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing%20students" title=" nursing students"> nursing students</a>, <a href="https://publications.waset.org/abstracts/search?q=clinical%20placements" title=" clinical placements"> clinical placements</a> </p> <a href="https://publications.waset.org/abstracts/37743/clinical-supervisors-experience-of-supervising-nursing-students-from-a-higher-education-institution" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/37743.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">230</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">60</span> Value Clusters of Grade 9 Teachers in the District of Trece Martires City, Division of Cavite: Basis for a Revised Values Education Program (RVEP)&quot;</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Juland%20D.%20Salayo">Juland D. Salayo</a> </p> <p class="card-text"><strong>Abstract:</strong></p> With numerous innovations introduced in the Philippine educational system, the country’s struggle of materializing its national goal of transforming lives ends with great loss. Many agree that the failure to emerge the integral values of the program, framework and the implementers impedes realization. Employing a descriptive-correlational method, it aimed to determine the value clusters of the Grade 9 teachers as assessed by themselves and by the students, the significant difference of the assessed values and the significant difference on the values based on their profile. Respondents were composed of sixty-nine (69) teachers and three hundred forty (340) students using simple random sampling. Through a survey-questionnaire, the study revealed that the teachers have high regards on their self-reliance, honesty and trustworthiness, obedience, politeness and respect and self-discipline and spirituality. In contrast, they have ranked the following values fairly: justice and fairness, courage, responsibility and punctuality and nationalism and patriotism. Having assessed by the students, they have highly regarded their teachers’ self-reliance, responsibility and punctuality, obedience, politeness and respect and fair play and sportsmanship. On the other hand, the student-respondents made a low assessment on the level of the teachers’ justice and fairness, nationalism and patriotism, honesty and trustworthiness and excellence. Using t-test, it showed that there is a significant difference between the assessments of the respondents. Finally, among the demographic profiles, only civil status and age rejected the hypothesis. The following were recommended: provide educators value-enhancement trainings and conferences, organize value-oriented organizations and activities, and make intensive value-campaigns heightening the low-assessed values. Thus, a Revised Values Education Program (RVEP) was made to further meet the objectives of the program, address the needs of its clienteles, and responding to the demands of both education and society towards excellence in service, social and economic revolution, and constructive national goals which are based from integral values. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=values" title="values">values</a>, <a href="https://publications.waset.org/abstracts/search?q=value%20clusters" title=" value clusters"> value clusters</a>, <a href="https://publications.waset.org/abstracts/search?q=values%20education%20program" title=" values education program"> values education program</a>, <a href="https://publications.waset.org/abstracts/search?q=values%20education" title=" values education"> values education</a>, <a href="https://publications.waset.org/abstracts/search?q=teachers%27%20assessed%20values" title=" teachers&#039; assessed values"> teachers&#039; assessed values</a> </p> <a href="https://publications.waset.org/abstracts/39509/value-clusters-of-grade-9-teachers-in-the-district-of-trece-martires-city-division-of-cavite-basis-for-a-revised-values-education-program-rvep" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/39509.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">286</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">59</span> Smart Trust Management for Vehicular Networks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amel%20Ltifi">Amel Ltifi</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20Zouinkhi"> Ahmed Zouinkhi</a>, <a href="https://publications.waset.org/abstracts/search?q=Med%20Salim%20Bouhlel"> Med Salim Bouhlel</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of &lsquo;Active Vehicle&rsquo; which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an &ldquo;Active Vehicle&rdquo; is modeled using Petri Nets. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=active%20vehicle" title="active vehicle">active vehicle</a>, <a href="https://publications.waset.org/abstracts/search?q=cooperation" title=" cooperation"> cooperation</a>, <a href="https://publications.waset.org/abstracts/search?q=petri%20nets" title=" petri nets"> petri nets</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20management" title=" trust management"> trust management</a>, <a href="https://publications.waset.org/abstracts/search?q=VANET" title=" VANET"> VANET</a> </p> <a href="https://publications.waset.org/abstracts/51762/smart-trust-management-for-vehicular-networks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/51762.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">405</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">58</span> Influence of Security Attributes in Component-Based Software Development</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Somayeh%20Zeinali">Somayeh Zeinali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=component-based%20software%20development" title="component-based software development">component-based software development</a>, <a href="https://publications.waset.org/abstracts/search?q=component-based%20software%20engineering" title=" component-based software engineering "> component-based software engineering </a>, <a href="https://publications.waset.org/abstracts/search?q=software%20security%20attributes" title="software security attributes">software security attributes</a>, <a href="https://publications.waset.org/abstracts/search?q=dependability" title=" dependability"> dependability</a>, <a href="https://publications.waset.org/abstracts/search?q=component" title=" component"> component</a> </p> <a href="https://publications.waset.org/abstracts/26037/influence-of-security-attributes-in-component-based-software-development" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/26037.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">559</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">57</span> Qualitative Meta-analysis of ICT4D Implementations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Miftah%20Hassen%20Jemal">Miftah Hassen Jemal</a>, <a href="https://publications.waset.org/abstracts/search?q=Solomon%20Negash"> Solomon Negash</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This study focuses on undertaking a qualitative meta-analysis of qualitative studies conducted on ICT4D implementations. The interpretive approach of synthesis of the interpretation of qualitative studies is adopted to guide the whole process of the study. The traditional criteria of trustworthiness of qualitative studies in terms of transferability, consistency, and credibility are used as quality metrics of the output of the interpretive synthesis process. The findings of the study are anticipated to be of value for policymakers in providing guidance to decisions related to ICT4D implementations. The study is also anticipated to have contributions to research by extracting valuable insights from extant literature and identifying potential areas that warrant further investigation. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=ICT4D%20implementations" title="ICT4D implementations">ICT4D implementations</a>, <a href="https://publications.waset.org/abstracts/search?q=interpretive%20synthesis" title=" interpretive synthesis"> interpretive synthesis</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20meta-analysis" title=" qualitative meta-analysis"> qualitative meta-analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=qualitative%20studies" title=" qualitative studies"> qualitative studies</a> </p> <a href="https://publications.waset.org/abstracts/161060/qualitative-meta-analysis-of-ict4d-implementations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161060.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">155</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">56</span> The Challenge of Assessing Social AI Threats</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Kitty%20Kioskli">Kitty Kioskli</a>, <a href="https://publications.waset.org/abstracts/search?q=Theofanis%20Fotis"> Theofanis Fotis</a>, <a href="https://publications.waset.org/abstracts/search?q=Nineta%20Polemi"> Nineta Polemi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=social%20threats" title="social threats">social threats</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20Intelligence" title=" artificial Intelligence"> artificial Intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=mitigation" title=" mitigation"> mitigation</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20experiment" title=" social experiment"> social experiment</a> </p> <a href="https://publications.waset.org/abstracts/179482/the-challenge-of-assessing-social-ai-threats" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179482.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">65</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">55</span> Effectuation of Interactive Advertising: An Empirical Study on Egyptian Tourism Advertising</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bassant%20Eyada">Bassant Eyada</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanan%20Atef%20Kamal%20Eldin"> Hanan Atef Kamal Eldin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Advertising has witnessed a diffusion and development in technology to promote products and services, increasingly relying on the interactivity between the consumer and the advertisement. Consumers seek, self-select, process, use and respond to the information provided, hence, providing the potential to increase consumers’ efficiency, involvement, trustworthiness, response, and satisfaction towards the advertised product or service. The power of interactive personalized messages shifts the focus of traditional advertising to more concentrated consumers, sending out tailored messages with more specific individual needs and preferences, defining the importance and relevance that consumers attach to the advertisement, therefore, enhancing the ability to persuade, and the quality of decision making. In this paper, the researchers seek to discuss and explore innovative interactive advertising, its’ effectiveness on consumers and the benefits the advertisements provide, through designing an interactive ad to be placed at the international airports promoting tourism in Egypt. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=advertising" title="advertising">advertising</a>, <a href="https://publications.waset.org/abstracts/search?q=effectiveness" title=" effectiveness"> effectiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=interactivity" title=" interactivity"> interactivity</a>, <a href="https://publications.waset.org/abstracts/search?q=Egypt" title=" Egypt"> Egypt</a> </p> <a href="https://publications.waset.org/abstracts/24827/effectuation-of-interactive-advertising-an-empirical-study-on-egyptian-tourism-advertising" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/24827.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">316</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">54</span> Scalable Blockchain Solutions for NGOs: Enhancing Financial Transactions and Accountability</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aarnav%20Singh">Aarnav Singh</a>, <a href="https://publications.waset.org/abstracts/search?q=Jayesh%20Ghatate"> Jayesh Ghatate</a>, <a href="https://publications.waset.org/abstracts/search?q=Tarush%20Pandey"> Tarush Pandey</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Non-Governmental Organizations (NGOs) play a crucial role in addressing societal challenges, relying heavily on financial transactions to fund their impactful initiatives. However, traditional financial systems can be cumbersome and lack transparency, hindering the efficiency and trustworthiness of NGO operations. The Ethereum main-net, while pioneering the decentralized finance landscape, grapples with inherent scalability challenges, restricting its transaction throughput to a range of 15-45 transactions per second (TPS). This limitation poses substantial obstacles for NGOs engaging in swift and dynamic financial transactions critical to their operational efficiency. This research is a comprehensive exploration of the intricacies of these scalability challenges and delves into the design and implementation of a purpose-built blockchain system explicitly crafted to surmount these constraints. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=non-governmental%20organizations" title="non-governmental organizations">non-governmental organizations</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralized%20system" title=" decentralized system"> decentralized system</a>, <a href="https://publications.waset.org/abstracts/search?q=zero%20knowledge%20Ethereum%20virtual%20machine" title=" zero knowledge Ethereum virtual machine"> zero knowledge Ethereum virtual machine</a>, <a href="https://publications.waset.org/abstracts/search?q=decentralized%20application" title=" decentralized application"> decentralized application</a> </p> <a href="https://publications.waset.org/abstracts/179647/scalable-blockchain-solutions-for-ngos-enhancing-financial-transactions-and-accountability" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/179647.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">59</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">53</span> Effectuation of Interactive Advertising: An Empirical Study on Egyptian Tourism Advert</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bassant%20Eyada">Bassant Eyada</a>, <a href="https://publications.waset.org/abstracts/search?q=Hanan%20Atef%20Kamal%20Eldin"> Hanan Atef Kamal Eldin</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Advertising has witnessed a diffusion and development in technology to promote products and services, increasingly relying on the interactivity between the consumer and the advertisement. Consumers seek, self-select, process, use and respond to the information provided, hence, providing the potential to increase consumers’ efficiency, involvement, trustworthiness, response and satisfaction towards the advertised product or service. The power of interactive personalized messages shifts the focus of traditional advertising to more concentrated consumers, sending out tailored messages with more specific individual needs and preferences, defining the importance and relevance that consumers attach to the advertisement, therefore, enhancing the ability to persuade, and the quality of decision making. In this paper, the researchers seek to discuss and explore innovative interactive advertising, its’ effectiveness on consumers and the benefits the advertisements provide, through designing an interactive ad to be placed at the international airports promoting tourism in Egypt. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=advertising" title="advertising">advertising</a>, <a href="https://publications.waset.org/abstracts/search?q=effectiveness" title=" effectiveness"> effectiveness</a>, <a href="https://publications.waset.org/abstracts/search?q=interactivity" title=" interactivity"> interactivity</a>, <a href="https://publications.waset.org/abstracts/search?q=Egypt" title=" Egypt"> Egypt</a> </p> <a href="https://publications.waset.org/abstracts/11990/effectuation-of-interactive-advertising-an-empirical-study-on-egyptian-tourism-advert" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/11990.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">293</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">52</span> Tool for Metadata Extraction and Content Packaging as Endorsed in OAIS Framework</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Payal%20Abichandani">Payal Abichandani</a>, <a href="https://publications.waset.org/abstracts/search?q=Rishi%20Prakash"> Rishi Prakash</a>, <a href="https://publications.waset.org/abstracts/search?q=Paras%20Nath%20Barwal"> Paras Nath Barwal</a>, <a href="https://publications.waset.org/abstracts/search?q=B.%20K.%20Murthy"> B. K. Murthy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Information generated from various computerization processes is a potential rich source of knowledge for its designated community. To pass this information from generation to generation without modifying the meaning is a challenging activity. To preserve and archive the data for future generations it’s very essential to prove the authenticity of the data. It can be achieved by extracting the metadata from the data which can prove the authenticity and create trust on the archived data. Subsequent challenge is the technology obsolescence. Metadata extraction and standardization can be effectively used to resolve and tackle this problem. Metadata can be categorized at two levels i.e. Technical and Domain level broadly. Technical metadata will provide the information that can be used to understand and interpret the data record, but only this level of metadata isn’t sufficient to create trustworthiness. We have developed a tool which will extract and standardize the technical as well as domain level metadata. This paper is about the different features of the tool and how we have developed this. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=digital%20preservation" title="digital preservation">digital preservation</a>, <a href="https://publications.waset.org/abstracts/search?q=metadata" title=" metadata"> metadata</a>, <a href="https://publications.waset.org/abstracts/search?q=OAIS" title=" OAIS"> OAIS</a>, <a href="https://publications.waset.org/abstracts/search?q=PDI" title=" PDI"> PDI</a>, <a href="https://publications.waset.org/abstracts/search?q=XML" title=" XML "> XML </a> </p> <a href="https://publications.waset.org/abstracts/34002/tool-for-metadata-extraction-and-content-packaging-as-endorsed-in-oais-framework" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/34002.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">393</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">51</span> A Tool for Rational Assessment of Dynamic Trust in Networked Organizations</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Simon%20Samwel%20Msanjila">Simon Samwel Msanjila</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Networked environments which provides platforms and environments for business organizations are configured in different forms depending on many factors including life time, member characteristics, communication structure, and business objectives, among others. With continuing advances in digital technologies the distance has become a less barrier for business minded collaboration among organizations. With the need and ease to make business collaborate nowadays organizations are sometimes forced to co-work with others that are either unknown or less known to them in terms of history and performance. A promising approach for sustaining established collaboration has been establishment of trust relationship among organizations based on assessed trustworthiness for each participating organization. It has been stated in research that trust in organization is dynamic and thus assessment of trust level must address such dynamic nature. This paper assess relevant aspects of trust and applies the concepts to propose a semi-automated system for assessing the Sustainability and Evolution of trust in organizations participating in specific objective in a networked organizations environment. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=trust%20evolution" title="trust evolution">trust evolution</a>, <a href="https://publications.waset.org/abstracts/search?q=trust%20sustainability" title=" trust sustainability"> trust sustainability</a>, <a href="https://publications.waset.org/abstracts/search?q=networked%20organizations" title=" networked organizations"> networked organizations</a>, <a href="https://publications.waset.org/abstracts/search?q=dynamic%20trust" title=" dynamic trust "> dynamic trust </a> </p> <a href="https://publications.waset.org/abstracts/36945/a-tool-for-rational-assessment-of-dynamic-trust-in-networked-organizations" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36945.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">431</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">50</span> The Use of Learning Management Systems during Emerging the Tacit Knowledge</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ercan%20Eker">Ercan Eker</a>, <a href="https://publications.waset.org/abstracts/search?q=Muhammer%20Karaman"> Muhammer Karaman</a>, <a href="https://publications.waset.org/abstracts/search?q=Akif%20Aslan"> Akif Aslan</a>, <a href="https://publications.waset.org/abstracts/search?q=Hakan%20Tanrikuluoglu"> Hakan Tanrikuluoglu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Deficiency of institutional memory and knowledge management can result in information security breaches, loss of prestige and trustworthiness and the worst the loss of know-how and institutional knowledge. Traditional learning management within organizations is generally handled by personal efforts. That kind of struggle mostly depends on personal desire, motivation and institutional belonging. Even if an organization has highly motivated employees at a certain time, the institutional knowledge and memory life cycle will generally remain limited to these employees’ spending time in this organization. Having a learning management system in an organization can sustain the institutional memory, knowledge and know-how in the organization. Learning management systems are much more needed especially in public organizations where the job rotation is frequently seen and managers are appointed periodically. However, a learning management system should not be seen as an organizations’ website. It is a more comprehensive, interactive and user-friendly knowledge management tool for organizations. In this study, the importance of using learning management systems in the process of emerging tacit knowledge is underlined. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=knowledge%20management" title="knowledge management">knowledge management</a>, <a href="https://publications.waset.org/abstracts/search?q=learning%20management%20systems" title=" learning management systems"> learning management systems</a>, <a href="https://publications.waset.org/abstracts/search?q=tacit%20knowledge" title=" tacit knowledge"> tacit knowledge</a>, <a href="https://publications.waset.org/abstracts/search?q=institutional%20memory" title=" institutional memory"> institutional memory</a> </p> <a href="https://publications.waset.org/abstracts/40419/the-use-of-learning-management-systems-during-emerging-the-tacit-knowledge" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40419.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">380</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">49</span> Understanding the Communication Practices of Special Educators with Parents of High School Students with Emotional and Behavioral Disorders</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Carolyn%20B.%20Mires">Carolyn B. Mires</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20L.%20Lee"> David L. Lee</a>, <a href="https://publications.waset.org/abstracts/search?q=David%20B.%20McNaughton"> David B. McNaughton</a> </p> <p class="card-text"><strong>Abstract:</strong></p> High school students’ with emotional and behavioral disorders (EBD) are one of the most underserved populations in today's schools. Using a multiple case study methodology, interviews were conducted to examine current practices and perceptions of the communication practices of teachers working with high school students with EBD. These interviews involved questions about general communication instances which occurred each week, communication strategies used each week, and how progress was being made on forming relationships with parents. Results confirm previous researchers’ hypotheses regarding methods, purposes, and regularity of positive communication incidences. Communication that met the positive goals of nurturing and maintaining relationships was open and frequent, reciprocal, and informal. Limitations are discussed as well as issues of trustworthiness. The case study concludes with a discussion and suggestions for high school special educators of students with EBD. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=emotional%20behavioral%20disorders" title="emotional behavioral disorders">emotional behavioral disorders</a>, <a href="https://publications.waset.org/abstracts/search?q=high%20school%20adolescence" title=" high school adolescence"> high school adolescence</a>, <a href="https://publications.waset.org/abstracts/search?q=home-school%20communication" title=" home-school communication"> home-school communication</a>, <a href="https://publications.waset.org/abstracts/search?q=relationships%20between%20parents%20and%20schools" title=" relationships between parents and schools"> relationships between parents and schools</a> </p> <a href="https://publications.waset.org/abstracts/81143/understanding-the-communication-practices-of-special-educators-with-parents-of-high-school-students-with-emotional-and-behavioral-disorders" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/81143.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">276</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">48</span> Rumour Containment Using Monitor Placement and Truth Propagation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amrah%20Maryam">Amrah Maryam</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=online%20social%20networks" title="online social networks">online social networks</a>, <a href="https://publications.waset.org/abstracts/search?q=monitor%20placement" title=" monitor placement"> monitor placement</a>, <a href="https://publications.waset.org/abstracts/search?q=independent%20cascade%20model" title=" independent cascade model"> independent cascade model</a>, <a href="https://publications.waset.org/abstracts/search?q=spread%20of%20misinformation" title=" spread of misinformation"> spread of misinformation</a> </p> <a href="https://publications.waset.org/abstracts/113743/rumour-containment-using-monitor-placement-and-truth-propagation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/113743.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">47</span> Repositioning Religion as a Catalyst for Conflict Resolution in Nigeria </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Samuel%20A.%20Muyiwa">Samuel A. Muyiwa</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Religious chauvinism has attained an alarming status in Contemporary Nigerian society. Arguably, Nigeria is the largest economy and most populous nation in Africa with over 182 million people, the advantages offer by vibrant economy and high population have been sacrificed on the altar of religion. Tolerance, sacrifice, humility, compassion, love, justice, trustworthiness, dedication to the well-being of others, and unity are the universal spiritual principles that lie at the heart of any religion either Christianity or Islam even traditional. Whereas traditional religious practices foreground the beliefs, norms and ritual that are related to the sacred being God because of its quick and immediate consequence of its effect, the new-found religious sentiments have deviated from the norms, thus undermining cosmic harmony in Nigeria because of its long-time consequence of its effect. Religion, which is expected to accelerate growth and motivate people to develop spiritual nuances for the betterment of their communities, has, however occasioned conflict and violence in Nigeria socio-political cosmo. Therefore, this study examines the content of religion in the promotion of peace and unity and its contextual missing link in the promotion of conflict and violence in Nigeria. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=religion%20chauvinism" title="religion chauvinism">religion chauvinism</a>, <a href="https://publications.waset.org/abstracts/search?q=Nigeria" title=" Nigeria"> Nigeria</a>, <a href="https://publications.waset.org/abstracts/search?q=conflict" title=" conflict"> conflict</a>, <a href="https://publications.waset.org/abstracts/search?q=conflict%20resolution" title=" conflict resolution"> conflict resolution</a> </p> <a href="https://publications.waset.org/abstracts/68591/repositioning-religion-as-a-catalyst-for-conflict-resolution-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/68591.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">317</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">46</span> Consumer Trust in User-Generated Brand Recommendations on Social Networking Sites</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Minimol%20M.%20C.">Minimol M. C.</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The study provides insights into the consumer’s trust on user generated brand recommendations on social networking sites and also investigates the role of ad scepticism in generating consumer trust in user generated brand recommendations. The work contributes to a better understanding of trust development in the context of social networking sites. Specifically, the study reveals that not all dimensions of trustworthiness are equal. The individual user characteristics vary according to the person. The major finding of this study is that high degrees of trust toward user generated brand recommendations can be generated on the basis of high trust toward social networking sites and ad scepticism. Consumers trust the user generated brand recommendations based on the individual’s trust in the particular social networking platform and the level of their individual ad-scepticism. The study pinpoints that as consumers’ trust in user generated brand recommendations is affected by their trust in social networking sites, it is influenced by benevolence, integrity, the propensity to trust, and individual user characteristics to a great extent, and hence, it is imperative for brands should attempt to build on these factors so that they can engage consumers to generate user generated content on social media. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=Consumer%20trust" title="Consumer trust">Consumer trust</a>, <a href="https://publications.waset.org/abstracts/search?q=user-generated%20brand%20recommendations" title=" user-generated brand recommendations"> user-generated brand recommendations</a>, <a href="https://publications.waset.org/abstracts/search?q=ad%20scepticism" title=" ad scepticism"> ad scepticism</a>, <a href="https://publications.waset.org/abstracts/search?q=social%20networking%20sites" title=" social networking sites"> social networking sites</a> </p> <a href="https://publications.waset.org/abstracts/153453/consumer-trust-in-user-generated-brand-recommendations-on-social-networking-sites" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/153453.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">101</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">45</span> The Role of Celebrity Endorser in Men&#039;s Grooming Communication</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Susana%20Marques">Susana Marques</a>, <a href="https://publications.waset.org/abstracts/search?q=Cleide%20Abreu"> Cleide Abreu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Presently, more than ever, men’s grooming is seen as a broad category. The problem comes when the previous research about male consumer behavior have neglected some aspects in this subject. The purpose of this investigation is to examine the role of celebrity endorsement in men’s grooming communication to Generation Y. After identifying some gaps in the literature, with regard to this contemporary subject, the most important variables were defined in order to develop the investigation and draw conclusions through statistical analysis and validation, about the role celebrity endorsement as source of credibility in men’s grooming communication. According to the design and methodology, this research was sustained through in depth marketing analysis (secondary data), and primary data collection via online questionnaire, whereby 168 male respondents, from Brazil and Portugal, were exposed to some advertisement pieces in order to express their opinion and feelings. The findings reveal all the relationships among the variables, suggested by the literature, have occurred, presenting a significant relationship in terms of Source Credibility scale dimensions – attractiveness, trustworthiness and expertise. This paper aims to contribute to the existing literature with important conclusions about the role of celebrity endorsement and its credibility in men’s grooming advertisement. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=communication" title="communication">communication</a>, <a href="https://publications.waset.org/abstracts/search?q=celebrity%20endorsement" title=" celebrity endorsement"> celebrity endorsement</a>, <a href="https://publications.waset.org/abstracts/search?q=men%E2%80%99s%20grooming" title=" men’s grooming"> men’s grooming</a>, <a href="https://publications.waset.org/abstracts/search?q=consumer%20behavior" title=" consumer behavior"> consumer behavior</a> </p> <a href="https://publications.waset.org/abstracts/49279/the-role-of-celebrity-endorser-in-mens-grooming-communication" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49279.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">242</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">44</span> Data Security and Privacy Challenges in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amir%20Rashid">Amir Rashid</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud Computing frameworks empower organizations to cut expenses by outsourcing computation resources on-request. As of now, customers of Cloud service providers have no methods for confirming the privacy and ownership of their information and data. To address this issue we propose the platform of a trusted cloud computing program (TCCP). TCCP empowers Infrastructure as a Service (IaaS) suppliers, for example, Amazon EC2 to give a shout box execution condition that ensures secret execution of visitor virtual machines. Also, it permits clients to bear witness to the IaaS supplier and decide if the administration is secure before they dispatch their virtual machines. This paper proposes a Trusted Cloud Computing Platform (TCCP) for guaranteeing the privacy and trustworthiness of computed data that are outsourced to IaaS service providers. The TCCP gives the deliberation of a shut box execution condition for a client's VM, ensuring that no cloud supplier's authorized manager can examine or mess up with its data. Furthermore, before launching the VM, the TCCP permits a client to dependably and remotely acknowledge that the provider at backend is running a confided in TCCP. This capacity extends the verification of whole administration, and hence permits a client to confirm the data operation in secure mode. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20security" title="cloud security">cloud security</a>, <a href="https://publications.waset.org/abstracts/search?q=IaaS" title=" IaaS"> IaaS</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20data%20privacy%20and%20integrity" title=" cloud data privacy and integrity"> cloud data privacy and integrity</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20cloud" title=" hybrid cloud"> hybrid cloud</a> </p> <a href="https://publications.waset.org/abstracts/72497/data-security-and-privacy-challenges-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72497.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">299</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">43</span> Nurses’ Views on ‘Effective Nurse Leader’ Characteristics in Iraq</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=S.%20Abed">S. Abed</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20O%E2%80%99Neill"> S. O’Neill</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This research explored ward nurses&rsquo; views about the characteristics of effective nurse leaders in the context of Iraq as a developing country, where the delivery of health care continues to face disruption and change. It is well established that the provision of modern health care requires effective nurse leaders, but in countries such as Iraq the lack of effective nurse leaders is noted as a major challenge. In a descriptive quantitative study, a survey questionnaire was administered to 210 ward nurses working in two public hospitals in a major city in the north of Iraq. The participating nurses were of the opinion that the effectiveness of their nurse leaders was evident in their ability to demonstrate: good clinical knowledge, effective communication and managerial skills. They also viewed their leaders as needing to hold high-level nursing qualifications, though this was not necessarily the case in practice. Additionally, they viewed nurse leaders&rsquo; personal qualities as important, which included politeness, ethical behaviour, and trustworthiness. When considered against the issues raised in interviews with a smaller group (20) of senior nurse leaders, representative of the various occupational levels, implications identify the need for professional development that focuses on how the underpinning competencies relate to leadership and how transformational leadership is evidenced in practice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=health%20care" title="health care">health care</a>, <a href="https://publications.waset.org/abstracts/search?q=nurse%20education" title=" nurse education"> nurse education</a>, <a href="https://publications.waset.org/abstracts/search?q=nursing%20in%20Iraq" title=" nursing in Iraq"> nursing in Iraq</a>, <a href="https://publications.waset.org/abstracts/search?q=nurse%20leadership" title=" nurse leadership"> nurse leadership</a> </p> <a href="https://publications.waset.org/abstracts/72508/nurses-views-on-effective-nurse-leader-characteristics-in-iraq" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/72508.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">275</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">42</span> Using T-Splines to Model Point Clouds from Terrestrial Laser Scanner</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=G.%20Kermarrec">G. Kermarrec</a>, <a href="https://publications.waset.org/abstracts/search?q=J.%20Hartmann"> J. Hartmann</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Spline surfaces are a major representation of freeform surfaces in the computer-aided graphic industry and were recently introduced in the field of geodesy for processing point clouds from terrestrial laser scanner (TLS). The surface fitting consists of approximating a trustworthy mathematical surface to a large numbered 3D point cloud. The standard B-spline surfaces lack of local refinement due to the tensor-product construction. The consequences are oscillating geometry, particularly in the transition from low-to-high curvature parts for scattered point clouds with missing data. More economic alternatives in terms of parameters on how to handle point clouds with a huge amount of observations are the recently introduced T-splines. As long as the partition of unity is guaranteed, their computational complexity is low, and they are flexible. T-splines are implemented in a commercial package called Rhino, a 3D modeler which is widely used in computer aided design to create and animate NURBS objects. We have applied T-splines surface fitting to terrestrial laser scanner point clouds from a bridge under load and a sheet pile wall with noisy observations. We will highlight their potential for modelling details with high trustworthiness, paving the way for further applications in terms of deformation analysis. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=deformation%20analysis" title="deformation analysis">deformation analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=surface%20modelling" title=" surface modelling"> surface modelling</a>, <a href="https://publications.waset.org/abstracts/search?q=terrestrial%20laser%20scanner" title=" terrestrial laser scanner"> terrestrial laser scanner</a>, <a href="https://publications.waset.org/abstracts/search?q=T-splines" title=" T-splines"> T-splines</a> </p> <a href="https://publications.waset.org/abstracts/130510/using-t-splines-to-model-point-clouds-from-terrestrial-laser-scanner" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/130510.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">41</span> Inclusive Practices in Health Sciences: Equity Proofing Higher Education Programs</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Mitzi%20S.%20Brammer">Mitzi S. Brammer</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Given that the cultural make-up of programs of study in institutions of higher learning is becoming increasingly diverse, much has been written about cultural diversity from a university-level perspective. However, there are little data in the way of specific programs and how they address inclusive practices when teaching and working with marginalized populations. This research study aimed to discover baseline knowledge and attitudes of health sciences faculty, instructional staff, and students related to inclusive teaching/learning and interactions. Quantitative data were collected via an anonymous online survey (one designed for students and another designed for faculty/instructional staff) using a web-based program called Qualtrics. Quantitative data were analyzed amongst the faculty/instructional staff and students, respectively, using descriptive and comparative statistics (t-tests). Additionally, some participants voluntarily engaged in a focus group discussion in which qualitative data were collected around these same variables. Collecting qualitative data to triangulate the quantitative data added trustworthiness to the overall data. The research team analyzed collected data and compared identified categories and trends, comparing those data between faculty/staff and students, and reported results as well as implications for future study and professional practice. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=inclusion" title="inclusion">inclusion</a>, <a href="https://publications.waset.org/abstracts/search?q=higher%20education" title=" higher education"> higher education</a>, <a href="https://publications.waset.org/abstracts/search?q=pedagogy" title=" pedagogy"> pedagogy</a>, <a href="https://publications.waset.org/abstracts/search?q=equity" title=" equity"> equity</a>, <a href="https://publications.waset.org/abstracts/search?q=diversity" title=" diversity"> diversity</a> </p> <a href="https://publications.waset.org/abstracts/168920/inclusive-practices-in-health-sciences-equity-proofing-higher-education-programs" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168920.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">40</span> Good Death as Perceived by the Critically Ill Patients&#039; Family Member</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Wanlapa%20Kunsongkeit">Wanlapa Kunsongkeit</a> </p> <p class="card-text"><strong>Abstract:</strong></p> When a person gets sick, he or she goes to hospital for the treatment. In the case of severe illness, there might be no hope for some patients to recover. In this state, the patients will face anxiety and fear. These feelings make the patients suffer in mind until the time of death or called bad death. These feeling also directly effect to family members who are loved ones and significant persons of the patients. They can help the dying patients to have good death. From literature reviews, many studies focused on good death in patients and nurses. Little is known about good death in family member. Therefore, the qualitative research based on Heideggerian phenomenology aimed to describe good death as perceived by the critically ill patients’ family members. Five informants who were the critically ill patients’ family members at hospital in Chonburi were purposively selected. Data were collected by in-depth interview, observation and critical reflection during January, 2014 to March, 2014 . Cohen, Kahn and Steeves’s (2000) steps guided data analysis. Trustworthiness was maintained throughout the study following Lincoln and Guba’s guidelines. Four themes were emerged, which were no suffering, acceptance of imminent death, preparing for death, and being with the family. This findings provide deep understanding of good death as perceived by the critically ill patients’ family members. It can be basic information for nurses to provide good death nursing care and further explore for development of knowledge regarding good death nursing care. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=good%20death" title="good death">good death</a>, <a href="https://publications.waset.org/abstracts/search?q=family%20member" title=" family member"> family member</a>, <a href="https://publications.waset.org/abstracts/search?q=critically%20ill%20patient" title=" critically ill patient"> critically ill patient</a>, <a href="https://publications.waset.org/abstracts/search?q=phenomenology" title=" phenomenology "> phenomenology </a> </p> <a href="https://publications.waset.org/abstracts/17574/good-death-as-perceived-by-the-critically-ill-patients-family-member" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17574.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">437</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">&lsaquo;</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=trustworthiness&amp;page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=trustworthiness&amp;page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=trustworthiness&amp;page=2" rel="next">&rsaquo;</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">&copy; 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">&times;</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10