scholarly journals AIM against survey fraud

JAMIA Open ◽  
2021 ◽  
Vol 4 (4) ◽  
Author(s):  
Daniel Habib ◽  
Nishant Jha

Abstract Objectives Although there exists a variety of anonymous survey software, this study aimed to develop an improved system that incentivizes responses and proactively detects fraud attempts while maintaining anonymity. Materials and Methods The Anonymous Incentive Method (AIM) was designed to utilize a Secure Hash Algorithm, which deterministically assigned anonymous identifiers to respondents. An anonymous raffle system was established to randomly select participants for a reward. Since the system provided participants with their unique identifiers and passwords upon survey completion, participants were able to return to the survey website, input their passwords, and receive their rewards at a later date. As a case study, the validity of this novel approach was assessed in an ongoing study on vaping in high school friendship networks. Results AIM successfully assigned irreversible, deterministic identifiers to survey respondents. Additionally, the particular case study used to assess the efficacy of AIM verified the deterministic aspect of the identifiers. Discussion Potential limitations, such as scammers changing the entry used to create the identifier, are acknowledged and given practical mitigation protocols. Although AIM exhibits particular usefulness for network studies, it is compatible with a wide range of applications to help preempt survey fraud and expedite study approval. Conclusion The improvements introduced by AIM are 2-fold: (1) duplicate responses can be filtered out while maintaining anonymity and (2) the requirement for the participant to keep their identifier and password for some time before returning to the survey website to claim a reward ensures that rewards only go to actual respondents.

2020 ◽  
Vol 12 (5) ◽  
pp. 1725 ◽  
Author(s):  
Elena Dieckmann ◽  
Leila Sheldrick ◽  
Mike Tennant ◽  
Rupert Myers ◽  
Christopher Cheeseman

This research aimed to develop a simple but robust method to identify the key barriers to the transition from a linear to a circular economy (CE) for end of life products or material. Nine top-tier barrier categories have been identified that influence this transition. These relate to the basic material properties and product characteristics, the availability of suitable processing technology, the environmental impacts associated with current linear management, the organizational context, industry and supply chain issues, external drivers, public perception, the regulatory framework and the overall economic viability of the transition. The method provides a novel and rapid way to identify and quantitatively assess the barriers to the development of CE products. This allows mitigation steps to be developed in parallel with new product design. The method has been used to assess the potential barriers to developing a circular economy for waste feathers generated by the UK poultry industry. This showed that transitioning UK waste feathers to circularity faces significant barriers across numerous categories and is not currently economically viable. The assessment method developed provides a novel approach to identifying barriers to circularity and has potential to be applied to a wide range of end of life materials and products.


2021 ◽  
Vol 13 (3) ◽  
pp. 1507
Author(s):  
Marisol Velázquez-Salazar ◽  
Germán Scalzo ◽  
Carmen Byker Shanks

Valorization of territories with diverse cultures and heritage has multiplied in recent years. This study analyzes the case of colored heirloom corn in Tlaxcala, Mexico, as a potential public good associated with the region’s biocultural heritage. The analysis conducted herein relies on a wide range of literature from relevant theory, including Geographical Indications, Global Value Chains, Community-Based Entrepreneurship, Public Goods, and Sustainable Development, in order to employ case study methodology. We leverage a novel approach to analyze the heirloom corn chain and its publicness. This chain reveals its status as a potential public good that clearly influences biocultural heritage, which has been preserved by several generations. To preserve colored heirloom corn in Tlaxcala, Mexico, a development strategy is needed that links actors and resources, involves the public sector, and furthers expansion of the private sector.


2016 ◽  
Vol 2016 ◽  
pp. 1-7 ◽  
Author(s):  
Yiqin Lu ◽  
Jing Zhai ◽  
Ronghuan Zhu ◽  
Jiancheng Qin

WSN (wireless sensor network) has been used in a wide range of applications nowadays. Sensor networks may often relay critical data; thus, security must be a high priority. However, due to their limited computational, energy, and storage resources, sensor nodes are vulnerable to attack. So how to protect sensor nodes from attacks without raising computational capability and energy consumption is a worthwhile issue. A WAC (wireless authentication center) with mixed encryption named “MEWAC” is proposed. MEWAC is based on MCU (Microcontroller Unit) and WiFi (Wireless Fidelity) module and uses RSA, AES (Advanced Encryption Standard), and SHA-1 (Secure Hash Algorithm 1) to provide high performance authentication and data encryption services for sensor nodes. The experimental results show that MEWAC has the advantages of low cost, low power consumption, good performance, and stability; moreover, the authentication protocol improves the security of WSN and reduces the overhead in node authentication.


2021 ◽  
Vol 7 (1) ◽  
pp. 1-17
Author(s):  
Ganavi M ◽  
Prabhudeva S

Information security dominate the world. All the time we connect to the internet for social media, banking, and online shopping through various applications. Our priceless data may be hacked by attackers. There is a necessity for a better encryption method to enhance information security. The distinctive features of Elliptic Curve Cryptography (ECC) in particular the key atomity, speedy ciphering and preserving bandwidth captivating its use in multimedia encipher. An encryption method is proposed by incorporating ECC, Secure Hash Algorithm – 256 (SHA-256), Arnold transform, and hyperchaos. Randomly generated salt values are concatenated with each pixel of an image. SHA-256 hash is imposed which produces a hash value of 32-bit, later used to generate the key in ECC. Stronger ciphering is done by applying Arnold’s transformation and hyperchaos thereby achieved more randomness in image. Simulation outcomes and analysis show that the proposed approach provides more confidentiality for color images.


2020 ◽  
Vol 3 (2) ◽  
pp. 109-119
Author(s):  
Partono Partono

So far, in implementing school strategies, they tend not to utilize Information and Communication Technology (ICT), despite the availability of ICT resources available. Stages of strategic management are needed to generate the vision, mission, objectives, policy, program, budget, and procedures as well as control and evaluation process as an effort to utilize ICT to improve school quality. Based on the interpretation and the results of the study, it is concluded that schools have organized stages in strategic management that enable schools to have a quality profile. The impact of effective utilization of ICTs for schools is the achievement of effective school management, as per the National Education Standards, which is characterized by effective planning, implementation, control, and evaluation of school ICTs.The purpose of this study is to get a general description, describe, and reveal the Strategic Management of Information and Communication Technology Utilization to Improve the Quality of School Learning in Ciledug Al Musaddadiyah Vocational High School and Garut 1 Vocational High School, both on environmental analysis, strategic formulation, implementation and strategic evaluation. The research method used in this research is the case study method, because the problems studied occur in the place and situation of Ciledug Al Musaddadiyah Vocational School and Vocational High School 1 Garut. The use of case study models in this study is based on the consideration that to provide an overview of the strategic management activities of the use of ICTs carried out at vocational high schools with the ultimate goal of being able to improve the quality of school learning. Based on observations in the field of SMK 1 Garut and SMK Al Musaddadiyah Ciledug Garut is one of the public schools and private schools that have these advantages.


2017 ◽  
Vol 1 (1) ◽  
pp. 196-204
Author(s):  
Sulistiawati Sulistiawati

This research is intended to search and information about the strengthening of Islamic religious education (PAI) through the recitation of furudhul Ainiyah which is carried out in Nurul Jadid Paiton Junior High School. The method of this research is by qualitative method with case study method, to express. That is more intense and deep with the above phenomenon. Technique of completion of data and information is done through interview, observation, study study, and literature study. The findings of this research are 1). Students or students are required to complete the recitation of Furudhul Ainiyah as a condition to take the odd semester and even semester exam and become a requirement for class and graduation increase. 2). the implementation of the furudhul Ainiyah memorization is performed on Thursday and Friday nights and Tuesday nights, and can also be done during normal day breaks, 3). The responsible and recipient of the rote deposit are PAI teachers and their homeroom teachers, 4). For students and students who can not read written Al-qur'an is not subject to rote burden, but get special coaching related to Al-Qur'an reading written by the religious coordinator of students. 5). Memory materials include Aqidah, Fiqih or Amaliyah materials, and daily prayers for students of VII and VIII semerter 1 and 2, while for classes IX semesters 1 and 2 cover the material of the Qur'an and Fiqh. 6). (a). Principal, (b). Vice Principal of the curriculum section, (c). Coordinator of students' religious activities, (d). Teacher / teacher of PAI, (e). Homeroom, (e). Student religious coordinator, (f). Student.


Author(s):  
Sarchil Qader ◽  
Veronique Lefebvre ◽  
Amy Ninneman ◽  
Kristen Himelein ◽  
Utz Pape ◽  
...  

2013 ◽  
Vol 16 (1) ◽  
pp. 59-67

<p>The Soil Science Institute of Thessaloniki produces new digitized Soil Maps that provide a useful electronic database for the spatial representation of the soil variation within a region, based on in situ soil sampling, laboratory analyses, GIS techniques and plant nutrition mathematical models, coupled with the local land cadastre. The novelty of these studies is that local agronomists have immediate access to a wide range of soil information by clicking on a field parcel shown in this digital interface and, therefore, can suggest an appropriate treatment (e.g. liming, manure incorporation, desalination, application of proper type and quantity of fertilizer) depending on the field conditions and cultivated crops. A specific case study is presented in the current work with regards to the construction of the digitized Soil Map of the regional unit of Kastoria. The potential of this map can easily be realized by the fact that the mapping of the physicochemical properties of the soils in this region provided delineation zones for differential fertilization management. An experiment was also conducted using remote sensing techniques for the enhancement of the fertilization advisory software database, which is a component of the digitized map, and the optimization of nitrogen management in agricultural areas.</p>


Sign in / Sign up

Export Citation Format

Share Document