risk Friskies Cat Food Coupon By www.couponsurfer.com Published On :: Sun, 03 Nov 2024 14:13:13 EST Print a coupon for $2 off one 12 pack or 24 pack of Friskies Wet Cat Food Full Article
risk Friskies Cat Food Coupon By www.couponsurfer.com Published On :: Sun, 03 Nov 2024 18:53:14 EST Get $2 Cash Back when you buy one 12 pack or 24 pack of Friskies Wet Cat Food Full Article
risk Friskies Cat Food Coupon By www.couponsurfer.com Published On :: Sun, 03 Nov 2024 18:54:00 EST Get $4 Cash Back when you buy one 32 pack or 40 pack of Friskies Wet Cat Food Full Article
risk Friskies Cat Food Coupon By www.couponsurfer.com Published On :: Sun, 03 Nov 2024 18:55:00 EST Print a coupon for $4 off one 32 pack or 40 pack of Friskies Wet Cat Food Full Article
risk New $90 Billion Japan bFundb Eyes Riskier bAssetsb to Boost Returns By www.bloomberg.com Published On :: Thu, 12 Aug 2021 02:35:10 GMT New $90 Billion Japan Fund Eyes Riskier Assets to Boost Returns https://ift.tt/2VMaxpv Full Article
risk IE Asterisk Password Uncover 1.8.5 By www.password-recovery-software.com Published On :: Sat, 12 Jul 2014 12:28:12 -0800 IE Asterisk Password Uncover allows you to view passwords hidden with asterisks in password fields in web pages and ActiveX controls. Comes in handy when you have forgotten your passwords. When you login into a web site with user name and password, you sometimes have the option to store the password in your computer. If you choose to save the password, in the next time that you will visit this site, the password field will be automatically filled with your password, but you won't be able to view it, because the password-box shows the password as sequence of asterisks. This freeware utility reveals the passwords stored behind the asterisks (****) in the web pages of Internet Explorer and ActiveX controls. All the mentioned features are provided with a user friendly graphical interface. Full Article
risk Illegal Bodybuilding Supplements and Their Risks By www.popularfitness.com Published On :: October 21, 2011 The health risks of taking illegal steroids like HGH, Andro, EPO and the unfair competitive advantage they give athletes. Full Article
risk Osteoporosis Risk Factors, Detection and Treatments By www.popularfitness.com Published On :: January 27, 2012 About osteoporosis and the risk factors factors, bone scans for detection and treatments for osteoporosis. Full Article
risk 6 Ways to Reduce Your Risk of Stroke By www.popularfitness.com Published On :: November 21, 2017 Lifestyle changes that will reduce your Chances of suffering a stroke. Full Article
risk Forceful Insecticides & Fertilizers: Home Made Formulas - Order Now - Risk Free! By www.ebizindia.com Published On :: Mon, 13 Dec 2004 11:19:28 PST Finally, obtain a great lawn almost instantly. Quick and easy download now available. Full Article Home & Family -- Garden
risk World Economic Forum: Extreme weather, AI, cybercrime greatest global risks in 2024 By www.crime-research.org Published On :: Wed, 10 Jan 2024 14:00:25 +0100 Jan. 10 (UPI) -- World nations face escalating threats in the coming year from extreme weather, artificial intelligence, and geopolitical tumult,... Full Article
risk RIM's BlackBerry Under Threat from Rivals & Other Risks By www.aurorawdc.com Published On :: 2005-10-24T03:00:00-06:00 Despite RIM's September win in its long-running patent dispute with NTP, the company suffered a real setback last week when a judge refused to delay NTP's appeals court case: The refusual to stay the case comes two months after a... Full Article
risk Uganda: Kampala Vegan Fest Advocates for Plant-Based Diets to Combat Rising Health Risks By allafrica.com Published On :: Tue, 12 Nov 2024 04:55:47 GMT [Nile Post] The event was organised by the Kampala Vegan Fest to encourage Ugandans to make healthier dietary choices that not only improve individual well-being but also contribute to animal welfare and environmental sustainability. Full Article Arts Culture and Entertainment East Africa Health and Medicine Uganda
risk Omega-3 and omega-6 supplements reduce risk of 19 types of cancer By newatlas.com Published On :: Sat, 09 Nov 2024 15:02:00 GMT New research has linked higher plasma levels of the healthy fats omega-3 and omega-6 to a reduced risk of developing particular types of cancer. The study adds to the on-again/off-again relationship that exists between scientists and the common supplements.Continue ReadingCategory: Cancer, Illnesses and conditions, Body & MindTags: Omega Garden Technology, Diet, Cancer, University of Georgia Full Article
risk Reducing Dementia Risk: The Surprising Benefits of a Firm Handshake By ccm.net Published On :: Tue, 05 Nov 2024 14:00:07 +0100 These simple lifestyle changes could protect your brain health and reduce the risk of dementia, here are a few powerful habits that can help keep your mind sharp for years to come. Full Article
risk Vitamin D: The "Wonder" Vitamin? Deficiency Tied to 5 Serious Health Risks By ccm.net Published On :: Wed, 13 Nov 2024 11:00:07 +0100 Vitamin D, also known as the "sunshine vitamin," does much more than strengthen bones; it can support the immune system, lift mood, and even reduce the risk of some severe diseases. Full Article
risk Apple Pay's Visa flaw risks letting hackers drain money from iPhones By www.telegraph.co.uk Published On :: Thu, 30 Sep 2021 05:00:00 GMT Full Article structure:technology topics:organisations/apple topics:organisations/transport-for-london storytype:standard
risk Sadiq Khan bans electric scooters from London’s Tube, trains and buses over fire risk By www.telegraph.co.uk Published On :: Thu, 09 Dec 2021 13:23:55 GMT Full Article structure:technology structure:environment topics:organisations/transport-for-london topics:things/electric-scooters storytype:standard
risk Mitigating third-party risk in today's cyber ecosystem [Q&A] By betanews.com Published On :: Mon, 11 Nov 2024 09:56:34 +0000 As third-party risk continues to be a critical concern for enterprises, the need for effective risk management strategies has never been more pressing. We spoke with Bob Maley, CISO of third-party risk management specialist Black Kite, to get his insights into effective strategies for managing this challenge along with the nuanced risks and necessary tactics to secure enterprise environments against sophisticated threats. BN: How can organizations assess and manage risks associated with emerging technologies? BM: Organizations need a proactive approach that begins with detailed assessments to identify potential risks. These assessments should focus on the technology’s architecture, possible attack vectors,… [Continue Reading] Full Article Article cybersecurity Enterprise Q&A Risk Management Third party
risk How Much Christ is Enough? On the Risk of a Well-Rounded Life By www.ancientfaith.com Published On :: 2024-01-10T06:03:00+00:00 Fr. John Oliver explains why we need the "Four S's" to energize our lives. Full Article
risk If We Do Not Invest Ourselves In the Life of the Kingdom, We Risk Losing Our Souls By www.ancientfaith.com Published On :: 2024-02-27T00:55:06+00:00 It is easy to overlook how often the Lord used money and possessions to convey a spiritual message. Perhaps that is because almost everyone struggles with being overly attached to material things, for they can meet our basic physical needs and provide comfort and a sense of security. Due to our self-centered desires, however, they so easily become false gods as we make them the measure of our lives. As Christ taught, “Where your treasure is, there will your heart be also….You cannot serve both God and mammon.” (Matt. 6: 21, 24) Full Article
risk A Risky Business! By www.ancientfaith.com Published On :: 2023-11-09T22:00:00+00:00 Luke 8: 41-56 How fervent are your prayers? Full Article
risk Resort's regeneration plans at risk, warns council By www.bbc.com Published On :: Wed, 13 Nov 2024 06:18:30 GMT Blackpool's £65m regeneration depends upon planning permission being granted, a public inquiry hears. Full Article
risk School run drivers risking lives By www.bbc.co.uk Published On :: Tue, 22 Oct 2024 05:00:00 GMT A Rugby school's lack of parking restrictions outside gates is a hazard for pupils. Full Article
risk Risk evaluation method of electronic bank investment based on random forest By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 Aiming at the problems of high error rate, low evaluation accuracy and low investment return in traditional methods, a random forest-based e-bank investment risk evaluation method is proposed. First, establish a scientific e-bank investment risk evaluation index system. Then, G1-COWA combined weighting method is used to calculate the weights of each index. Finally, the e-bank investment risk evaluation index data is taken as the input vector, and the e-bank investment risk evaluation result is taken as the output vector. The random forest model is established and the result of e-banking investment risk evaluation is obtained. The experimental results show that the maximum relative error rate of this method is 4.32%, the evaluation accuracy range is 94.5~98.1%, and the maximum return rate of e-banking investment is 8.32%. It shows that this method can accurately evaluate the investment risk of electronic banking. Full Article
risk Study on operational risks and preventive measures of supply chain finance By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The operation of supply chain finance faces various risks, therefore, studying the operational risks of supply chain finance and corresponding preventive measures is of great significance. Firstly, classify the types of operational risks in supply chain finance. Secondly, based on the risk classification results, the decision tree method is used to evaluate the operational risks of supply chain finance. Finally, based on the risk assessment results, targeted risk prevention measures for supply chain finance operations are proposed, such as strengthening supplier management, optimising logistics and warehouse management, risk analysis and monitoring, and strengthening information security and data protection. The case analysis results show that the accuracy of the evaluation results of this method is higher, and the risk coefficient has been significantly reduced after applying this method, indicating that it can effectively reduce supply chain risk. Full Article
risk An effectiveness analysis of enterprise financial risk management for cost control By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 This paper aims to analyse the effectiveness of cost control oriented enterprise financial risk management. Firstly, it analyses the importance of enterprise financial risk management. Secondly, the position of cost control in enterprise financial risk management was analysed. Cost control can be used to reduce the operating costs of enterprises, improve their profitability, and thus reduce the financial risks they face. Finally, a corporate financial risk management strategy is constructed from several aspects: establishing a sound risk management system, predicting and responding to various risks, optimising fund operation management, strengthening internal control, and enhancing employee risk awareness. The results show that after applying the proposed management strategy, the enterprise performs well in cost control oriented enterprise financial risk management, with a cost accounting accuracy of 95% and an audit system completeness of 90%. It can also help the enterprise develop emergency plans and provide comprehensive risk management strategy coverage. Full Article
risk Risk-based operation of plug-in electric vehicles in a microgrid using downside risk constraints method By www.inderscience.com Published On :: 2024-10-07T23:20:50-05:00 To achieve the benefits as much as possible, it is required to identify the available PEV capacity and prepare scheduling plans based on that. The analysis revealed that the risk-based scheduling of the microgrid could reduce the financial risk completely from $9.89 to $0.00 and increases the expected operation cost by 24% from $91.38 to $112.94, in turn. This implies that the risk-averse decision-maker tends to spend more money to reduce the expected risk-in-cost by using the proposed downside risk management technique. At the end, by the help of fuzzy satisfying method, the suitable risk-averse strategy is determined for the studied case. Full Article
risk The discussion of information security risk control in mobile banking By www.inderscience.com Published On :: 2024-10-02T23:20:50-05:00 The emergence of digital technology and the increasing prevalence of smartphones have promoted innovations in payment options available in finance and consumption markets. Banks providing mobile payment must ensure the information security. Inadequate security control leads to information leakage, which severely affects user rights and service providers' reputations. This study uses control objectives for Information and Related Technologies 4.1 as the mobile payment security control framework to examine the emergent field of mobile payment. A literature review is performed to compile studies on the safety risk, regulations, and operations of mobile payments. In addition, the Delphi questionnaire is distributed among experts to determine the practical perspectives, supplement research gaps in the literature, and revise the prototype framework. According to the experts' opinions, 59 control objectives from the four domains of COBIT 4.1 are selected. The plan and organise, acquire and implement, deliver and support, and monitor and evaluate four domains comprised 2, 5, 10, and 2 control objectives that had mean importance scores of > 4.50. Thus, these are considered the most important objectives by the experts, respectively. The results of this study can serve as a reference for banks to construct secure frameworks in mobile payment services. Full Article
risk An empirical study on construction emergency disaster management and risk assessment in shield tunnel construction project with big data analysis By www.inderscience.com Published On :: 2024-07-02T23:20:50-05:00 Emergency disaster management presents substantial risks and obstacles to shield tunnel building projects, particularly in the event of water leakage accidents. Contemporary water leak detection is critical for guaranteeing safety by reducing the likelihood of disasters and the severity of any resulting damages. However, it can be difficult. Deep learning models can analyse images taken inside the tunnel to look for signs of water damage. This study introduces a unique strategy that employs deep learning techniques, generative adversarial networks (GAN) with long short-term memory (LSTM) for water leakage detection i shield tunnel construction (WLD-STC) to conduct classification and prediction tasks on the massive image dataset. The results demonstrate that for identifying and analysing water leakage episodes during shield tunnel construction, the WLD-STC strategy using LSTM-based GAN networks outperformed other methods, particularly on huge data. Full Article
risk Navigating e-customer relationship management through emerging information and communication technologies: moderation of trust and financial risk By www.inderscience.com Published On :: 2024-11-11T23:20:50-05:00 This study examines the relationships between ICTs (e.g., chatbots, virtual assistants, social media platforms, e-mail marketing, mobile marketing, data analytics, interactive voice response, big data analytics, push notifications, cloud computing, and augmented reality) and e-customer relationship management (e-CRM) from the banking industry of China. Similarly, this study unfolds the moderation interference of trust and risk between the association of ICTs and e-CRM, respectively. The study provided a positive nexus between ICTs and e-CRM. On the other side, a significant moderation of trust, as well as financial risk was observed between the correlation of ICTs and customer relationship management. This study endows with insights into ICTs which are critical for achieving e-CRM by streamlining interactions and enhancing their experience. Similarly, trust and financial risk were observed as potential forces that sway the association between ICTs and e-CRM. Full Article
risk Exploring the impact of monetary policy on sustainable development with mediation of e-banking services and moderation of financial risk awareness By www.inderscience.com Published On :: 2024-11-11T23:20:50-05:00 Monetary policy is essential for sustainable growth where effective monetary policies can improve investment, employment, and consumption by fostering a balanced and resilient economy. However, sustainable development is vital for harmonising economic growth, social equity, and environmental preservation. A number of factors have been discussed in the literature that impact sustainable development. However, this study explicitly tries to investigate the nexus among the monetary policy (MP) toward sustainable development (SD) with the mediation of e-banking services (e-BS) and moderation of financial risk management (FRM) from China drawing on stakeholder theory. It discovered a significant connection between monetary policy and sustainable development along with sub-dimensions of SD. Likewise, this study confirmed a positive mediating influence of e-BS between monetary policy and sustainable development. Finally, the study additionally ensured a positive moderation of financial risk between monetary policy and sustainable development, respectively. These outcomes bestow several interesting insights into monetary policy, e-banking services, financial risk management, and sustainable development. Full Article
risk Assessing supply chain risk management capabilities and its impact on supply chain performance: moderation of AI-embedded technologies By www.inderscience.com Published On :: 2024-10-10T23:20:50-05:00 This research investigates the correlation between risk management and supply chain performance (SCP) along with moderation of AI-embedded technologies such as big data analytics, Internet of Things (IoT), virtual reality, and blockchain technologies. To calculate the results, this study utilised 644 questionnaires through the structural equation modelling (SEM) method. It is revealed using SmartPls that financial risk management (FRM) is positively linked with SCP. Second, it was observed that AI significantly moderates the connection between FRM and SCP. In addition, the study presents certain insights into supply chain and AI-enabled technologies and how these capabilities can beneficially advance SCP. Besides, certain implications, both managerial and theoretical are described for the supply chain managers along with limitations for future scholars of the world. Full Article
risk A risk identification method for abnormal accounting data based on weighted random forest By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In order to improve the identification accuracy, accuracy and time-consuming of traditional financial risk identification methods, this paper proposes a risk identification method for financial abnormal data based on weighted random forest. Firstly, SMOTE algorithm is used to collect abnormal financial data; secondly, the original accounting data is decomposed into features, and the features of abnormal data are extracted through random forests; then, the index weight is calculated according to the entropy weight method; finally, the negative gradient fitting is used to determine the loss function, and the weighted random forest method is used to solve the loss function value, and the recognition result is obtained. The results show that the identification accuracy of this method can reach 99.9%, the accuracy rate can reach 96.06%, and the time consumption is only 6.8 seconds, indicating that the risk identification effect of this method is good. Full Article
risk Risk assessment method of power grid construction project investment based on grey relational analysis By www.inderscience.com Published On :: 2024-07-04T23:20:50-05:00 In view of the problems of low accuracy, long time consuming and low efficiency of the existing engineering investment risk assessment method; this paper puts forward the investment risk assessment method of power grid construction project based on grey correlation analysis. Firstly, classify the risks of power grid construction project; secondly, determine the primary index and secondary index of investment risk assessment of power grid construction project; then construct the correlation coefficient matrix of power grid project investment risk to calculate the correlation degree and weight of investment risk index; finally, adopt the grey correlation analysis method to construct investment risk assessment function to realise investment risk assessment. The experimental results show that the average accuracy of evaluating the investment risk of power grid construction projects using the method is 95.08%, and the maximum time consuming is 49 s, which proves that the method has high accuracy, short time consuming and high evaluation efficiency. Full Article
risk A survey on predicting at-risk students through learning analytics By www.inderscience.com Published On :: 2024-07-26T23:20:50-05:00 This paper analyses the adoption of learning analytics to predict at-risk students. A total of 233 research articles between 2004 and 2023 were collected from Scopus for this study. They were analysed in terms of the relevant types and sources of data, targets of prediction, learning analytics methods, and performance metrics. The results show that data related to students' academic performance, socio-demographics, and learning behaviours have been commonly collected. Most studies have addressed the identification of students who have a higher chance of poor academic performance or dropping out of their courses. Decision trees, random forests, and artificial neural networks are the most frequently used techniques for prediction, with ensemble methods gaining popularity in recent years. Classification accuracy, recall, sensitivity, and true positive rate are commonly used as performance metrics for evaluation. The results reveal the potential of learning analytics for informing timely and evidence-based support for at-risk students. Full Article
risk On the Relationship between Warranty and the Risk of Information Asymmetry By Published On :: Full Article
risk Warranty and the Risk of Misinforming: Evaluation of the Degree of Acceptance By Published On :: Full Article
risk Improving Information Security Risk Analysis Practices for Small- and Medium-Sized Enterprises: A Research Agenda By Published On :: Full Article
risk An Empirical Examination of the Effects of CTO Leadership on the Alignment of the Governance of Big Data and Information Security Risk Management Effectiveness By Published On :: 2021-06-03 Aim/Purpose: Board of Directors seek to use their big data as a competitive advantage. Still, scholars note the complexities of corporate governance in practice related to information security risk management (ISRM) effectiveness. Background: While the interest in ISRM and its relationship to organizational success has grown, the scholarly literature is unclear about the effects of Chief Technology Officers (CTOs) leadership styles, the alignment of the governance of big data, and ISRM effectiveness in organizations in the West-ern United States. Methodology: The research method selected for this study was a quantitative, correlational research design. Data from 139 participant survey responses from Chief Technology Officers (CTOs) in the Western United States were analyzed using 3 regression models to test for mediation following Baron and Kenny’s methodology. Contribution: Previous scholarship has established the importance of leadership styles, big data governance, and ISRM effectiveness, but not in a combined understanding of the relationship between all three variables. The researchers’ primary objective was to contribute valuable knowledge to the practical field of computer science by empirically validating the relationships between the CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness. Findings: The results of the first regression model between CTOs leadership styles and ISRM effectiveness were statistically significant. The second regression model results between CTOs leadership styles and the alignment of the governance of big data were not statistically significant. The results of the third regression model between CTOs leadership styles, the alignment of the governance of big data, and ISRM effectiveness were statistically significant. The alignment of the governance of big data was a significant predictor in the model. At the same time, the predictive strength of all 3 CTOs leadership styles was diminished between the first regression model and the third regression model. The regression models indicated that the alignment of the governance of big data was a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness. Recommendations for Practitioners: With big data growing at an exponential rate, this research may be useful in helping other practitioners think about how to test mediation with other interconnected variables related to the alignment of the governance of big data. Overall, the alignment of governance of big data being a partial mediator of the relationship between CTOs leadership styles and ISRM effectiveness suggests the significant role that the alignment of the governance of big data plays within an organization. Recommendations for Researchers: While this exact study has not been previously conducted with these three variables with CTOs in the Western United States, overall, these results are in agreement with the literature that information security governance does not significantly mediate the relationship between IT leadership styles and ISRM. However, some of the overall findings did vary from the literature, including the predictive relationship between transactional leadership and ISRM effectiveness. With the finding of partial mediation indicated in this study, this also suggests that the alignment of the governance of big data provides a partial intervention between CTOs leadership styles and ISRM effectiveness. Impact on Society: Big data breaches are increasing year after year, exposing sensitive information that can lead to harm to citizens. This study supports the broader scholarly consensus that to achieve ISRM effectiveness, better alignment of governance policies is essential. This research highlights the importance of higher-level governance as it relates to ISRM effectiveness, implying that ineffective governance could negatively impact both leadership and ISRM effectiveness, which could potentially cause reputational harm. Future Research: This study raised questions about CTO leadership styles, the specific governance structures involved related to the alignment of big data and ISRM effectiveness. While the research around these variables independently is mature, there is an overall lack of mediation studies as it relates to the impact of the alignment of the governance of big data. With the lack of alignment around a universal framework, evolving frameworks could be tested in future research to see if similar results are obtained. Full Article
risk The Influence of Crisis Management, Risk-Taking, and Innovation in Sustainability Practices: Empirical Evidence From Iraq By Published On :: 2022-09-18 Aim/Purpose: This study examines the impact of decision-making, crisis management, and decision-making on sustainability through the mediation of open innovation in the energy sector. Background: Public companies study high-performance practices, requiring overcoming basic obstacles such as financial crises that prevent the adoption and development of sustainability programs. Methodology: Due to the COVID-19 pandemic, which has led to the closure of businesses in Iraq, a survey was distributed. To facilitate responses, free consultations were offered to help complete the questionnaire quickly. Of the 435 questionnaires answered, 397 were used for further analysis. Contribution: The impact of crises that impede the energy sector from adopting sustainable environmental regulations is investigated in this study. Its identification of specific constraints to open innovation leads to the effectiveness of adopting environmentally friendly policies and reaching high levels of sustainable performance. Findings: The impacts of risk-taking, crisis management, and decision-making on sustainability have been explored. Results show that open innovation fully mediates the relationship between the factors of risk-taking, crisis management, decision-making, and sustainability. Recommendations for Practitioners: The proposed model can be used by practitioners to develop and improve sustainable innovation practices and achieve superior performance. Recommendation for Researchers: Researchers are recommended to conduct in-depth studies of the phenomenon based on theoretical and empirical foundations, especially in light of the relationship between crisis management, decision-making, and risk-taking and their impact on sustainability based on linear and non-compensatory relationships. Impact on Society: This study provides a reference for organizations with similar cultural backgrounds in adopting sustainable practices to minimize pollution in the Iraqi context. Future Research: A more in-depth study can be performed using a larger sample, which not only includes the energy industry but also other industries. Full Article
risk Continuous Use of Mobile Banking Applications: The Role of Process Virtualizability, Anthropomorphism and Virtual Process Failure Risk By Published On :: 2024-03-13 Aim/Purpose: The research aims to investigate the factors that influence the continuous use of mobile banking applications to complete banking monetary transactions. Background: Despite a significant increase in the use of mobile banking applications, particularly during the COVID-19 pandemic, new evidence indicates that the use rate of mobile banking applications for operating banking monetary transactions has declined. Methodology: The study proposed an integrated model based mainly on the process virtualization theory (PVT) with other novel factors such as mobile banking application anthropomorphism and virtual process failure risk. The study model was empirically validated using structural equation modeling analysis on quantitative data from 484 mobile banking application users from Jordan. Contribution: The study focuses on continuing use or post-adoption behavior rather than pre-adoption behavior. This is important since the maximum and long-term viability, as well as the financial investment in mobile banking applications, depend on regular usage rather than first-time use or initial experience. Findings: The results indicate that process virtualizable and anthropomorphism have a strong positive impact on bank customers’ decisions to continue using mobile banking applications to complete banking monetary transactions. Meanwhile, the negative impact of virtualization process failure risk on continuous use has been discovered. The found factors explain 67.5% of the variance in continuous use. Recommendations for Practitioners: The study identified novel, significant factors that affect bank customers’ decisions to use mobile banking applications frequently, and these factors should be examined, matched, satisfied, or addressed when redesigning or upgrading mobile applications. Banks should provide users with clear directions, processes, or tutorials on how to complete monetary transactions effectively. They should also embrace Artificial Intelligence (AI) technology to improve their applications and products with anthropomorphic features like speech synthesizers, Chatbots, and AI-powered virtual bank assistants. This is expected to help bank customers conduct various banking services conveniently and securely, just as if interacting with real people. The study further recommends that banks create and publish clear norms and procedures, as well as promote tolerance and protect consumers’ rights when the process fails or mistakes occur. Recommendation for Researchers: The study provides measurement items that were specifically built for the context of mobile banking applications based on PVT notions. Researchers are invited to reuse, test, and modify existing measurement items, as well as submit new ones if necessary. The study model does not consider psychological aspects like trust and satisfaction, which would provide additional insight into factors affecting continuing use. Researchers could potentially take a different approach by focusing on user resistance and non-adoption. Impact on Society: Financial inclusion is problematic, particularly in underdeveloped nations. According to financial inclusion research, Jordanians rarely utilize mobile banking apps. Continuous usage of mobile banking applications will be extremely beneficial in closing the financial inclusion gap, particularly among women. Furthermore, it could help the country’s efforts to transition to a digital society. Future Research: The majority of study participants are from urban areas. Future studies should focus on consumers who live in rural areas. It was also suggested that the elderly be targeted because they may have different views/perspectives on the continued use of mobile banking applications. Full Article
risk Communicating and Sharing in the Semantic Web: An Examination of Social Media Risks, Consequences, and Attitudinal Awareness By Published On :: 2015-05-22 Empowered by and tethered to ubiquitous technologies, the current generation of youth yearns for opportunities to engage in self-expression and information sharing online with personal disclosure no longer governed by concepts of propriety and privacy. This raises issues about the unsafe online activities of teens and young adults. The following paper presents the findings of a study examining the social networking activities of undergraduate students and also highlights a program to increase awareness of the dangers and safe practices when using and communicating, via social media. According to the survey results, young adults practice risky social networking site (SNS) behaviors with most having experienced at least one negative consequence. Further, females were more likely than males to engage in oversharing as well as to have experienced negative consequences. Finally, results of a post-treatment survey found that a targeted program that includes flyers, posters, YouTube videos, handouts, and in-class information sessions conducted at a Mid-Atlantic Historically Black College or University (HBCU) increased student awareness of the dangers of social media as well as positively influenced students to practice more prudent online behaviors. Full Article
risk Can Designing Self-Representations through Creative Computing Promote an Incremental View of Intelligence and Enhance Creativity among At-Risk Youth? By Published On :: 2016-12-26 Creative computing is one of the rapidly growing educational trends around the world. Previous studies have shown that creative computing can empower disadvantaged children and youth. At-risk youth tend to hold a negative view of self and perceive their abilities as inferior compared to “normative” pupils. The Implicit Theories of Intelligence approach (ITI; Dweck, 1999, 2008) suggests a way of changing beliefs regarding one’s abilities. This paper reports findings from an experiment that explores the impact of a short intervention among at-risk youth and “normative” high-school students on (1) changing ITI from being perceived as fixed (entity view of intelligence) to more flexible (incremental view of intelligence) and (2) the quality of digital self-representations programmed though a creative computing app. The participants were 117 Israeli youth aged 14-17, half of whom were at-risk youth. The participants were randomly assigned to the experimental and control conditions. The experimental group watched a video of a lecture regarding brain plasticity that emphasized flexibility and the potential of human intelligence to be cultivated. The control group watched a neutral lecture about brain-functioning and creativity. Following the intervention, all of the participants watched screencasts of basic training for the Scratch programming app, designed artifacts that digitally represented themselves five years later and reported their ITI. The results showed more incremental ITI in the experimental group compared to the control group and among normative students compared to at-risk youth. In contrast to the research hypothesis, the Scratch projects of the at-risk youth, especially in the experimental condition, were rated by neutral judges as being more creative, more aesthetically designed, and more clearly conveying their message. The results suggest that creative computing combined with the ITI intervention is a way of developing creativity, especially among at-risk youth. Increasing the number of youths who hold incremental views of intelligence and developing computational thinking may contribute to their empowerment and well-being, improve learning and promote creativity. Full Article