\\n\\n
Released this past November, the list is based on data collected from the Web of Science and highlights some of the world’s most influential scientific minds by naming the researchers whose publications over the previous decade have included a high number of Highly Cited Papers placing them among the top 1% most-cited.
\\n\\nWe wish to congratulate all of the researchers named and especially our authors on this amazing accomplishment! We are happy and proud to share in their success!
Note: Edited in March 2021
\\n"}]',published:!0,mainMedia:null},components:[{type:"htmlEditorComponent",content:'IntechOpen is proud to announce that 191 of our authors have made the Clarivate™ Highly Cited Researchers List for 2020, ranking them among the top 1% most-cited.
\n\nThroughout the years, the list has named a total of 261 IntechOpen authors as Highly Cited. Of those researchers, 69 have been featured on the list multiple times.
\n\n\n\nReleased this past November, the list is based on data collected from the Web of Science and highlights some of the world’s most influential scientific minds by naming the researchers whose publications over the previous decade have included a high number of Highly Cited Papers placing them among the top 1% most-cited.
\n\nWe wish to congratulate all of the researchers named and especially our authors on this amazing accomplishment! We are happy and proud to share in their success!
Note: Edited in March 2021
\n'}],latestNews:[{slug:"intechopen-signs-new-contract-with-cepiec-china-for-distribution-of-open-access-books-20210319",title:"IntechOpen Signs New Contract with CEPIEC, China for Distribution of Open Access Books"},{slug:"150-million-downloads-and-counting-20210316",title:"150 Million Downloads and Counting"},{slug:"intechopen-secures-indefinite-content-preservation-with-clockss-20210309",title:"IntechOpen Secures Indefinite Content Preservation with CLOCKSS"},{slug:"intechopen-expands-to-all-global-amazon-channels-with-full-catalog-of-books-20210308",title:"IntechOpen Expands to All Global Amazon Channels with Full Catalog of Books"},{slug:"stanford-university-identifies-top-2-scientists-over-1-000-are-intechopen-authors-and-editors-20210122",title:"Stanford University Identifies Top 2% Scientists, Over 1,000 are IntechOpen Authors and Editors"},{slug:"intechopen-authors-included-in-the-highly-cited-researchers-list-for-2020-20210121",title:"IntechOpen Authors Included in the Highly Cited Researchers List for 2020"},{slug:"intechopen-maintains-position-as-the-world-s-largest-oa-book-publisher-20201218",title:"IntechOpen Maintains Position as the World’s Largest OA Book Publisher"},{slug:"all-intechopen-books-available-on-perlego-20201215",title:"All IntechOpen Books Available on Perlego"}]},book:{item:{type:"book",id:"3250",leadTitle:null,fullTitle:"Theory and Applications of Monte Carlo Simulations",title:"Theory and Applications of Monte Carlo Simulations",subtitle:null,reviewType:"peer-reviewed",abstract:"The purpose of this book is to introduce researchers and practitioners to recent advances and applications of Monte Carlo Simulation (MCS). Random sampling is the key of the MCS technique. The 11 chapters of this book collectively illustrates how such a sampling technique is exploited to solve difficult problems or analyze complex systems in various engineering and science domains. Issues related to the use of MCS including goodness-of-fit, uncertainty evaluation, variance reduction, optimization, and statistical estimation are discussed and examples of solutions are given. Novel applications of MCS are demonstrated in financial systems modeling, estimation of transition behavior of organic molecules, chemical reaction, particle diffusion, kinetic simulation of biophysics and biological data, and healthcare practices. To enlarge the accessibility of this book, both field-specific background materials and field-specific usages of MCS are introduced in most chapters. The aim of this book is to unify knowledge of MCS from different fields to facilitate research and new applications of MCS.",isbn:null,printIsbn:"978-953-51-1012-5",pdfIsbn:"978-953-51-5724-3",doi:"10.5772/45892",price:119,priceEur:129,priceUsd:155,slug:"theory-and-applications-of-monte-carlo-simulations",numberOfPages:286,isOpenForSubmission:!1,isInWos:1,hash:"bed7d51effabfc6156f85819c2b51b2b",bookSignature:"Victor (Wai Kin) Chan",publishedDate:"March 6th 2013",coverURL:"https://cdn.intechopen.com/books/images_new/3250.jpg",numberOfDownloads:29449,numberOfWosCitations:71,numberOfCrossrefCitations:29,numberOfDimensionsCitations:75,hasAltmetrics:1,numberOfTotalCitations:175,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"April 10th 2012",dateEndSecondStepPublish:"May 1st 2012",dateEndThirdStepPublish:"August 5th 2012",dateEndFourthStepPublish:"November 3rd 2012",dateEndFifthStepPublish:"December 3rd 2012",currentStepOfPublishingProcess:5,indexedIn:"1,2,3,4,5,6,7",editedByType:"Edited by",kuFlag:!1,editors:[{id:"157011",title:"Prof.",name:"Wai Kin (Victor)",middleName:null,surname:"Chan",slug:"wai-kin-(victor)-chan",fullName:"Wai Kin (Victor) Chan",profilePictureURL:"https://mts.intechopen.com/storage/users/157011/images/3423_n.jpg",biography:"Dr. Wai Kin (Victor) Chan is an Associate Professor of the Department of Industrial and Systems Engineering at the Rensselaer Polytechnic Institute (RPI), Troy, NY. He received a Ph.D. degree in industrial engineering and operations research from the University of California, Berkeley in 2005. Dr. Chan has published papers in Operations Research, ACM TOMACS, INFORMS Journal of Service Science, IEEE Transactions, International Journal of Production Research, and Artificial Intelligence Review. Dr. Chan is a recipient of the Pritsker thesis award, the NSF CAREER Award, the IEEE CASE Best Paper Awards, and the INFORMS Service Science Best Paper Award. Dr. Chan serves and has served as a program co-chair of the 2013 Industrial and System Engineering Research Conference, editor of the IEEE Conference on Automation Science and Engineering, associate editor of the IIE Transactions, and track chair of the Winter Simulation Conference. Dr. Chan is a member of INFORMS, IIE, IEEE, and Alpha Pi Mu.",institutionString:null,position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"1",totalChapterViews:"0",totalEditedBooks:"1",institution:{name:"Rensselaer Polytechnic Institute",institutionURL:null,country:{name:"United States of America"}}}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,coeditorOne:null,coeditorTwo:null,coeditorThree:null,coeditorFour:null,coeditorFive:null,topics:[{id:"596",title:"Computational Algorithm",slug:"computational-algorithm"}],chapters:[{id:"43534",title:"Monte Carlo Statistical Tests for Identity of Theoretical and Empirical Distributions of Experimental Data",doi:"10.5772/53049",slug:"monte-carlo-statistical-tests-for-identity-of-theoretical-and-empirical-distributions-of-experimenta",totalDownloads:3065,totalCrossrefCites:1,totalDimensionsCites:8,signatures:"Natalia D. Nikolova, Daniela Toneva-Zheynova, Krasimir Kolev and Kiril Tenekedjiev",downloadPdfUrl:"/chapter/pdf-download/43534",previewPdfUrl:"/chapter/pdf-preview/43534",authors:[{id:"19421",title:"Dr.",name:"Krasimir1",surname:"Kolev",slug:"krasimir1-kolev",fullName:"Krasimir1 Kolev"},{id:"159664",title:"Dr.",name:"Natalia D.",surname:"Nikolova",slug:"natalia-d.-nikolova",fullName:"Natalia D. Nikolova"},{id:"159666",title:"Dr.",name:"Daniela",surname:"Toneva-Zheynova",slug:"daniela-toneva-zheynova",fullName:"Daniela Toneva-Zheynova"},{id:"159668",title:"Prof.",name:"Kiril",surname:"Tenekedjiev",slug:"kiril-tenekedjiev",fullName:"Kiril Tenekedjiev"}],corrections:null},{id:"43533",title:"Monte Carlo Simulations Applied to Uncertainty in Measurement",doi:"10.5772/53014",slug:"monte-carlo-simulations-applied-to-uncertainty-in-measurement",totalDownloads:5048,totalCrossrefCites:9,totalDimensionsCites:33,signatures:"Paulo Roberto Guimarães Couto, Jailton Carreteiro Damasceno and Sérgio Pinheiro de Oliveira",downloadPdfUrl:"/chapter/pdf-download/43533",previewPdfUrl:"/chapter/pdf-preview/43533",authors:[{id:"158935",title:"MSc.",name:"Paulo",surname:"Couto",slug:"paulo-couto",fullName:"Paulo Couto"},{id:"159056",title:"Dr.",name:"Jailton",surname:"Damasceno",slug:"jailton-damasceno",fullName:"Jailton Damasceno"},{id:"159057",title:"Dr.",name:"Sérgio",surname:"Oliveira",slug:"sergio-oliveira",fullName:"Sérgio Oliveira"}],corrections:null},{id:"43535",title:"Fractional Brownian Motions in Financial Models and Their Monte Carlo Simulation",doi:"10.5772/53568",slug:"fractional-brownian-motions-in-financial-models-and-their-monte-carlo-simulation",totalDownloads:3236,totalCrossrefCites:5,totalDimensionsCites:7,signatures:"Masaaki Kijima and Chun Ming Tam",downloadPdfUrl:"/chapter/pdf-download/43535",previewPdfUrl:"/chapter/pdf-preview/43535",authors:[{id:"157312",title:"Prof.",name:"Masaaki",surname:"Kijima",slug:"masaaki-kijima",fullName:"Masaaki Kijima"}],corrections:null},{id:"43536",title:"Monte-Carlo-Based Robust Procedure for Dynamic Line Layout Problems",doi:"10.5772/53195",slug:"monte-carlo-based-robust-procedure-for-dynamic-line-layout-problems",totalDownloads:1988,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Wai Kin (Victor) Chan and Charles J. Malmborg",downloadPdfUrl:"/chapter/pdf-download/43536",previewPdfUrl:"/chapter/pdf-preview/43536",authors:[{id:"157011",title:"Prof.",name:"Wai Kin (Victor)",surname:"Chan",slug:"wai-kin-(victor)-chan",fullName:"Wai Kin (Victor) Chan"},{id:"157013",title:"Prof.",name:"Charles",surname:"Malmborg",slug:"charles-malmborg",fullName:"Charles Malmborg"}],corrections:null},{id:"43516",title:"Comparative Study of Various Self-Consistent Event Biasing Schemes for Monte Carlo Simulations of Nanoscale MOSFETs",doi:"10.5772/53113",slug:"comparative-study-of-various-self-consistent-event-biasing-schemes-for-monte-carlo-simulations-of-na",totalDownloads:1782,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Shaikh Ahmed, Mihail Nedjalkov and Dragica Vasileska",downloadPdfUrl:"/chapter/pdf-download/43516",previewPdfUrl:"/chapter/pdf-preview/43516",authors:[{id:"3809",title:"Prof.",name:"Dragica",surname:"Vasileska",slug:"dragica-vasileska",fullName:"Dragica Vasileska"},{id:"154817",title:"Prof.",name:"Shaikh",surname:"Ahmed",slug:"shaikh-ahmed",fullName:"Shaikh Ahmed"},{id:"154818",title:"Dr.",name:"Mihail",surname:"Nedjalkov",slug:"mihail-nedjalkov",fullName:"Mihail Nedjalkov"}],corrections:null},{id:"42348",title:"Atomistic Monte Carlo Simulations on the Formation of Carbonaceous Mesophase in Large Ensembles of Polyaromatic Hydrocarbons",doi:"10.5772/53370",slug:"atomistic-monte-carlo-simulations-on-the-formation-of-carbonaceous-mesophase-in-large-ensembles-of-p",totalDownloads:1834,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"R. Khanna, A. M. Waters and V. Sahajwalla",downloadPdfUrl:"/chapter/pdf-download/42348",previewPdfUrl:"/chapter/pdf-preview/42348",authors:[{id:"19010",title:"Associate Prof.",name:"Rita",surname:"Khanna",slug:"rita-khanna",fullName:"Rita Khanna"}],corrections:null},{id:"43523",title:"Variance Reduction of Monte Carlo Simulation in Nuclear Engineering Field",doi:"10.5772/53384",slug:"variance-reduction-of-monte-carlo-simulation-in-nuclear-engineering-field",totalDownloads:3109,totalCrossrefCites:6,totalDimensionsCites:10,signatures:"Pooneh Saidi, Mahdi Sadeghi and Claudio Tenreiro",downloadPdfUrl:"/chapter/pdf-download/43523",previewPdfUrl:"/chapter/pdf-preview/43523",authors:[{id:"19676",title:"Prof.",name:"Mahdi",surname:"Sadeghi",slug:"mahdi-sadeghi",fullName:"Mahdi Sadeghi"},{id:"22336",title:"Dr.",name:"Pooneh",surname:"Saidi",slug:"pooneh-saidi",fullName:"Pooneh Saidi"},{id:"22337",title:"Prof.",name:"Claudio",surname:"Tenreiro",slug:"claudio-tenreiro",fullName:"Claudio Tenreiro"}],corrections:null},{id:"43521",title:"Stochastic Models of Physicochemical Processes in Catalytic Reactions - Self-Oscillations and Chemical Waves in CO Oxidation Reaction",doi:"10.5772/53792",slug:"stochastic-models-of-physicochemical-processes-in-catalytic-reactions-self-oscillations-and-chemical",totalDownloads:1834,totalCrossrefCites:0,totalDimensionsCites:0,signatures:"Vladimir I. Elokhin",downloadPdfUrl:"/chapter/pdf-download/43521",previewPdfUrl:"/chapter/pdf-preview/43521",authors:[{id:"22766",title:"Dr.",name:"Vladimir",surname:"Elokhin",slug:"vladimir-elokhin",fullName:"Vladimir Elokhin"}],corrections:null},{id:"42376",title:"Monte-Carlo Simulation of Particle Diffusion in Various Geometries and Application to Chemistry and Biology",doi:"10.5772/53203",slug:"monte-carlo-simulation-of-particle-diffusion-in-various-geometries-and-application-to-chemistry-and-",totalDownloads:2887,totalCrossrefCites:7,totalDimensionsCites:11,signatures:"Ianik Plante and Francis A. Cucinotta",downloadPdfUrl:"/chapter/pdf-download/42376",previewPdfUrl:"/chapter/pdf-preview/42376",authors:[{id:"21574",title:"Dr.",name:"Ianik",surname:"Plante",slug:"ianik-plante",fullName:"Ianik Plante"}],corrections:null},{id:"43532",title:"Kinetic Monte Carlo Simulation in Biophysics and Systems Biology",doi:"10.5772/53709",slug:"kinetic-monte-carlo-simulation-in-biophysics-and-systems-biology",totalDownloads:2825,totalCrossrefCites:1,totalDimensionsCites:5,signatures:"Subhadip Raychaudhuri",downloadPdfUrl:"/chapter/pdf-download/43532",previewPdfUrl:"/chapter/pdf-preview/43532",authors:[{id:"156414",title:"Dr.",name:"Subhadip",surname:"Raychaudhuri",slug:"subhadip-raychaudhuri",fullName:"Subhadip Raychaudhuri"}],corrections:null},{id:"43537",title:"Detection of Breast Cancer Lumps Using Scattered X-Ray Profiles: A Monte Carlo Simulation Study",doi:"10.5772/52787",slug:"detection-of-breast-cancer-lumps-using-scattered-x-ray-profiles-a-monte-carlo-simulation-study",totalDownloads:1846,totalCrossrefCites:0,totalDimensionsCites:1,signatures:"Wael M. Elshemey",downloadPdfUrl:"/chapter/pdf-download/43537",previewPdfUrl:"/chapter/pdf-preview/43537",authors:[{id:"155733",title:"Dr",name:null,surname:"Elshemey",slug:"elshemey",fullName:"Elshemey"}],corrections:null}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},relatedBooks:[{type:"book",id:"8754",title:"Scheduling Problems",subtitle:"New Applications and Trends",isOpenForSubmission:!1,hash:"c700a7e3dbf7482d7d82a1e6639b7f32",slug:"scheduling-problems-new-applications-and-trends",bookSignature:"Rodrigo da Rosa Righi",coverURL:"https://cdn.intechopen.com/books/images_new/8754.jpg",editedByType:"Edited by",editors:[{id:"69889",title:"Prof.",name:"Rodrigo",surname:"Righi",slug:"rodrigo-righi",fullName:"Rodrigo Righi"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"5095",title:"Montecarlo Simulation of Two Component Aerosol Processes",subtitle:null,isOpenForSubmission:!1,hash:"b3ae34b8425f0bd16af093dc899fa698",slug:"montecarlo-simulation-of-two-component-aerosol-processes",bookSignature:"Jose Ignacio Huertas",coverURL:"https://cdn.intechopen.com/books/images_new/5095.jpg",editedByType:"Authored by",editors:[{id:"37220",title:"Dr.",name:"Jose Ignacio",surname:"Huertas",slug:"jose-ignacio-huertas",fullName:"Jose Ignacio Huertas"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"3",chapterContentType:"chapter",authoredCaption:"Authored by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"314",title:"Regenerative Medicine and Tissue Engineering",subtitle:"Cells and Biomaterials",isOpenForSubmission:!1,hash:"bb67e80e480c86bb8315458012d65686",slug:"regenerative-medicine-and-tissue-engineering-cells-and-biomaterials",bookSignature:"Daniel Eberli",coverURL:"https://cdn.intechopen.com/books/images_new/314.jpg",editedByType:"Edited by",editors:[{id:"6495",title:"Dr.",name:"Daniel",surname:"Eberli",slug:"daniel-eberli",fullName:"Daniel Eberli"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1373",title:"Ionic Liquids",subtitle:"Applications and Perspectives",isOpenForSubmission:!1,hash:"5e9ae5ae9167cde4b344e499a792c41c",slug:"ionic-liquids-applications-and-perspectives",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/1373.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}],ofsBooks:[]},correction:{item:{id:"67322",slug:"corrigendum-to-sexual-dysfunction-in-patients-with-systemic-sclerosis",title:"Corrigendum to: Sexual Dysfunction in Patients with Systemic Sclerosis",doi:null,correctionPDFUrl:"https://cdn.intechopen.com/pdfs/67322.pdf",downloadPdfUrl:"/chapter/pdf-download/67322",previewPdfUrl:"/chapter/pdf-preview/67322",totalDownloads:null,totalCrossrefCites:null,bibtexUrl:"/chapter/bibtex/67322",risUrl:"/chapter/ris/67322",chapter:{id:"66966",slug:"sexual-dysfunction-in-patients-with-systemic-sclerosis",signatures:"Barbora Heřmánková",dateSubmitted:"July 16th 2018",dateReviewed:"April 5th 2019",datePrePublished:"May 3rd 2019",datePublished:"September 18th 2019",book:{id:"8269",title:"New Insights into Systemic Sclerosis",subtitle:null,fullTitle:"New Insights into Systemic Sclerosis",slug:"new-insights-into-systemic-sclerosis",publishedDate:"September 18th 2019",bookSignature:"Michal Tomcik",coverURL:"https://cdn.intechopen.com/books/images_new/8269.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"193284",title:"Dr.",name:"Michal",middleName:null,surname:"Tomcik",slug:"michal-tomcik",fullName:"Michal Tomcik"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:null}},chapter:{id:"66966",slug:"sexual-dysfunction-in-patients-with-systemic-sclerosis",signatures:"Barbora Heřmánková",dateSubmitted:"July 16th 2018",dateReviewed:"April 5th 2019",datePrePublished:"May 3rd 2019",datePublished:"September 18th 2019",book:{id:"8269",title:"New Insights into Systemic Sclerosis",subtitle:null,fullTitle:"New Insights into Systemic Sclerosis",slug:"new-insights-into-systemic-sclerosis",publishedDate:"September 18th 2019",bookSignature:"Michal Tomcik",coverURL:"https://cdn.intechopen.com/books/images_new/8269.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"193284",title:"Dr.",name:"Michal",middleName:null,surname:"Tomcik",slug:"michal-tomcik",fullName:"Michal Tomcik"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}},authors:null},book:{id:"8269",title:"New Insights into Systemic Sclerosis",subtitle:null,fullTitle:"New Insights into Systemic Sclerosis",slug:"new-insights-into-systemic-sclerosis",publishedDate:"September 18th 2019",bookSignature:"Michal Tomcik",coverURL:"https://cdn.intechopen.com/books/images_new/8269.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"193284",title:"Dr.",name:"Michal",middleName:null,surname:"Tomcik",slug:"michal-tomcik",fullName:"Michal Tomcik"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"}}},ofsBook:{item:{type:"book",id:"7012",leadTitle:null,title:"Biochemical Testing",subtitle:"Clinical Correlation and Diagnosis",reviewType:"peer-reviewed",abstract:"Clinical Correlation and Diagnosis highlights the improvements in methodological approaches for the purposes of disease diagnosis and health research. Chapters cover such topics as serum protein electrophoresis, urinary iodine measurement, blood collection tubes, semi-solid phase assay and advancement in analytical and bioanalytical techniques, and serological diagnostic tools for Zika virus, among other subjects. All these will not be possible without a proper laboratory management where this book also includes the Tissue Bank ATMP Production as a model. The chapters are expected to provide a new perspective in health science which may trigger a further exploration into the diagnostic and research field.",isbn:"978-1-78985-086-4",printIsbn:"978-1-78985-085-7",pdfIsbn:"978-1-78985-371-1",doi:"10.5772/intechopen.73769",price:119,priceEur:129,priceUsd:155,slug:"biochemical-testing-clinical-correlation-and-diagnosis",numberOfPages:172,isOpenForSubmission:!1,hash:"1aa28a784b136633d827933ad91fe621",bookSignature:"Varaprasad Bobbarala, Gaffar Sarwar Zaman, Mohd Nasir Mohd Desa and Abdah Md Akim",publishedDate:"April 29th 2020",coverURL:"https://cdn.intechopen.com/books/images_new/7012.jpg",keywords:null,numberOfDownloads:6620,numberOfWosCitations:1,numberOfCrossrefCitations:3,numberOfDimensionsCitations:8,numberOfTotalCitations:12,isAvailableForWebshopOrdering:!0,dateEndFirstStepPublish:"April 16th 2018",dateEndSecondStepPublish:"July 31st 2018",dateEndThirdStepPublish:"September 29th 2018",dateEndFourthStepPublish:"December 18th 2018",dateEndFifthStepPublish:"February 16th 2019",remainingDaysToSecondStep:"3 years",secondStepPassed:!0,currentStepOfPublishingProcess:5,editedByType:"Edited by",kuFlag:!1,biosketch:null,coeditorOneBiosketch:null,coeditorTwoBiosketch:null,coeditorThreeBiosketch:null,coeditorFourBiosketch:null,coeditorFiveBiosketch:null,editors:[{id:"207119",title:"Dr.",name:"Varaprasad",middleName:null,surname:"Bobbarala PhD",slug:"varaprasad-bobbarala-phd",fullName:"Varaprasad Bobbarala PhD",profilePictureURL:"https://mts.intechopen.com/storage/users/207119/images/system/207119.jpg",biography:"Varaprasad Bobbarala has a doctorate from Andhra University\nwith a specialization in Biochemistry, Medicinal Chemistry,\nand Microbiology. He is currently editor-in-chief, associate\neditor, editorial board member as well as reviewer of dozens of\nhigh-impact international periodicals. He has authored/co-authored research and review articles in numerous peer-reviewed\nnational and international journals in various subjects related\nto biomedicine, pharmacy, and microbiology. Dr. Varaprasad previously served as\nthe Chief Scientist of Research and Development at Krisani Innovations Pvt. Ltd.,\nbefore his current role as the Chief Scientist and Director of Adhya Biosciences Pvt.\nLtd., India. He is currently working in the area of clinical diagnostics, antimicrobial\nresistance, drug discovery, production of commercially important chemicals by\nbiotechnology routes, isolation of bio-active metabolites, and bio-efficacy studies.",institutionString:"Adhya Biosciences",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"0",totalChapterViews:"0",totalEditedBooks:"2",institution:null}],coeditorOne:{id:"203015",title:"Dr.",name:"Gaffar Sarwar",middleName:"Sarwar",surname:"Zaman",slug:"gaffar-sarwar-zaman",fullName:"Gaffar Sarwar Zaman",profilePictureURL:"https://mts.intechopen.com/storage/users/203015/images/system/203015.jpeg",biography:'Dr. Zaman is a Doctor of Medicine in Biochemistry (M.D.) from Assam Medical College & Hospital, Dibrugarh University, India, Fellowship in Diabetes (FID) from Royal Liverpool Academy, United Kingdom, Fellowship in Applied Nutrition (FIAN) from Medvarsity, Apollo Hospitals, India and PGDCR (Post Graduate Diploma in Clinical Research) from Symbiosis University, India.\nHe has almost 12 years of experience as an Assistant Professor in King Khalid Government University and Rajiv Gandhi University of Health Sciences. \nHe is well accustomed in Quality development and can help any college in the improvement in its quality. He is also well accustomed in Curriculum designing and is trained in e-learning methods. \nHe has more than 40 Research publications (most of them Original articles) to his credit, in both national and International journals. \nHe has edited two books entitled \'Ultimate Guide to Insulin”, along with "Quality Control in Laboratory". In addition he has written many book chapters. He is also a reviewer for many journals.',institutionString:"King Khalid University",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"4",totalChapterViews:"0",totalEditedBooks:"2",institution:{name:"King Khalid University",institutionURL:null,country:{name:"Saudi Arabia"}}},coeditorTwo:{id:"189666",title:"Associate Prof.",name:"Mohd Nasir",middleName:null,surname:"Mohd Desa",slug:"mohd-nasir-mohd-desa",fullName:"Mohd Nasir Mohd Desa",profilePictureURL:"https://mts.intechopen.com/storage/users/189666/images/system/189666.png",biography:"Dr. Mohd Nasir Mohd Desa currently serves as an Associate Professor at the Department of Biomedical Sciences, Faculty of Medicine and Health Sciences, Universiti Putra Malaysia. He was a former head for Laboratory of Halal Science Research at Halal Products Research Institute, Universiti Putra Malaysia. He holds a BSc in Microbiology from the University of Arizona, USA, Master of Medical Science and Ph.D. in Medical Microbiology from the University of Malaya, Malaysia. He has authored/co-authored research articles in numerous peer-reviewed journals locally and internationally in various subjects related to biomedical science and food authentication. In addition, He has also been an active reviewer for papers from various journals. Apart from administrative, postgraduate supervision and research work, he teaches undergraduate courses in medical microbiology and laboratory management to health science students.",institutionString:"Universiti Putra Malaysia",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"2",totalChapterViews:"0",totalEditedBooks:"0",institution:{name:"Universiti Putra Malaysia",institutionURL:null,country:{name:"Malaysia"}}},coeditorThree:{id:"290714",title:"Dr.",name:"Abdah",middleName:null,surname:"Akim",slug:"abdah-akim",fullName:"Abdah Akim",profilePictureURL:"https://mts.intechopen.com/storage/users/290714/images/system/290714.png",biography:"Abdah Md Akim is an Associate Professor in Biochemistry, Department of Biomedical Sciences, Faculty of Medicine and Health Sciences, Universiti Putra Malaysia. She obtained her bachelor’s degree in Biochemistry in the University of Cardiff, master’s degree and Ph.D. in Biochemistry in Universiti Putra Malaysia. Her International Atomic Energy Agency fellowship training was in the School of Pharmacy, University of London. She is a Chief Editor for Malaysian Journal of Microscopy. She reviewed papers from various local and international journals. She is an examiner for undergraduate and postgraduate research project in various universities in Malaysia. She teaches Clinical Biochemistry, Research Methodology and Laboratory Management.",institutionString:"Universiti Putra Malaysia",position:null,outsideEditionCount:0,totalCites:0,totalAuthoredChapters:"0",totalChapterViews:"0",totalEditedBooks:"0",institution:null},coeditorFour:null,coeditorFive:null,topics:[{id:"914",title:"Biotechnology",slug:"materials-science-biochemistry-biotechnology"}],chapters:[{id:"69537",title:"Serum Protein Electrophoresis and Its Clinical Applications",slug:"serum-protein-electrophoresis-and-its-clinical-applications",totalDownloads:1046,totalCrossrefCites:0,authors:[{id:"229011",title:"Dr.",name:"Satish",surname:"Ramanathan",slug:"satish-ramanathan",fullName:"Satish Ramanathan"}]},{id:"66237",title:"Urinary Iodine: Biomarker for Population Iodine Nutrition",slug:"urinary-iodine-biomarker-for-population-iodine-nutrition",totalDownloads:661,totalCrossrefCites:2,authors:[{id:"219402",title:"Dr.",name:"Husniza",surname:"Hussain",slug:"husniza-hussain",fullName:"Husniza Hussain"},{id:"239718",title:"MSc.",name:"Rusidah",surname:"Selamat",slug:"rusidah-selamat",fullName:"Rusidah Selamat"},{id:"289785",title:"Dr.",name:"Fuziah",surname:"Md Zain",slug:"fuziah-md-zain",fullName:"Fuziah Md Zain"},{id:"289787",title:"Dr.",name:"Muhammad Yazid",surname:"Jalaludin",slug:"muhammad-yazid-jalaludin",fullName:"Muhammad Yazid Jalaludin"},{id:"295170",title:"Dr.",name:"Lim Kuang",surname:"Kuay",slug:"lim-kuang-kuay",fullName:"Lim Kuang Kuay"}]},{id:"67668",title:"Advancement in Analytical and Bioanalytical Techniques as a Boon to Medical Sciences",slug:"advancement-in-analytical-and-bioanalytical-techniques-as-a-boon-to-medical-sciences",totalDownloads:469,totalCrossrefCites:0,authors:[{id:"256521",title:"Dr.",name:"Dr. Khushaboo",surname:"Pandey",slug:"dr.-khushaboo-pandey",fullName:"Dr. Khushaboo Pandey"},{id:"265530",title:"Prof.",name:"Om Prakash",surname:"Mishra",slug:"om-prakash-mishra",fullName:"Om Prakash Mishra"}]},{id:"63692",title:"Pre-Analytical Within-Laboratory Evacuated Blood-Collection Tube Quality Evaluation",slug:"pre-analytical-within-laboratory-evacuated-blood-collection-tube-quality-evaluation",totalDownloads:614,totalCrossrefCites:0,authors:[{id:"171229",title:"Dr.",name:"Nataša",surname:"Gros",slug:"natasa-gros",fullName:"Nataša Gros"}]},{id:"71434",title:"In Silico Proteomics EVOO Therapy for Lipid Lowering in the Patients of Diabetes Mellitus",slug:"in-silico-proteomics-evoo-therapy-for-lipid-lowering-in-the-patients-of-diabetes-mellitus",totalDownloads:217,totalCrossrefCites:0,authors:[{id:"172958",title:"Dr.",name:"Samreen",surname:"Riaz",slug:"samreen-riaz",fullName:"Samreen Riaz"},{id:"259652",title:"Mr.",name:"Muhamamd",surname:"Sohail",slug:"muhamamd-sohail",fullName:"Muhamamd Sohail"}]},{id:"64585",title:"ZIKV Diagnostics: Current Scenario and Future Directions",slug:"zikv-diagnostics-current-scenario-and-future-directions",totalDownloads:469,totalCrossrefCites:0,authors:[{id:"268210",title:"Ph.D.",name:"Zilton",surname:"Vasconcelos",slug:"zilton-vasconcelos",fullName:"Zilton Vasconcelos"},{id:"269903",title:"MSc.",name:"Daniela Prado",surname:"Cunha",slug:"daniela-prado-cunha",fullName:"Daniela Prado Cunha"},{id:"269904",title:"Dr.",name:"Andrea",surname:"Zin",slug:"andrea-zin",fullName:"Andrea Zin"},{id:"269905",title:"MSc.",name:"Luiza",surname:"Neves",slug:"luiza-neves",fullName:"Luiza Neves"},{id:"269907",title:"Dr.",name:"Renata Campos",surname:"Azevedo",slug:"renata-campos-azevedo",fullName:"Renata Campos Azevedo"}]},{id:"64152",title:"Semi-Solid Phase Assay for the Alternative Complement Pathway Activity Assessment (AP100)",slug:"semi-solid-phase-assay-for-the-alternative-complement-pathway-activity-assessment-ap-sub-100-sub-",totalDownloads:245,totalCrossrefCites:0,authors:[{id:"217341",title:"Dr.",name:"Kheir Eddine",surname:"Kerboua",slug:"kheir-eddine-kerboua",fullName:"Kheir Eddine Kerboua"}]},{id:"66048",title:"Amino Acids Profiling for the Diagnosis of Metabolic Disorders",slug:"amino-acids-profiling-for-the-diagnosis-of-metabolic-disorders",totalDownloads:2365,totalCrossrefCites:1,authors:[{id:"285558",title:"Dr.",name:"Yana",surname:"Sandlers",slug:"yana-sandlers",fullName:"Yana Sandlers"}]},{id:"67429",title:"Resource-Based View of Laboratory Management: Tissue Bank ATMP Production as a Model",slug:"resource-based-view-of-laboratory-management-tissue-bank-atmp-production-as-a-model",totalDownloads:539,totalCrossrefCites:0,authors:[{id:"203598",title:"Ph.D.",name:"Diana",surname:"Kitala",slug:"diana-kitala",fullName:"Diana Kitala"},{id:"204300",title:"Dr.",name:"Agnieszka",surname:"Klama-Baryła",slug:"agnieszka-klama-baryla",fullName:"Agnieszka Klama-Baryła"},{id:"204303",title:"Dr.",name:"Mariusz",surname:"Nowak",slug:"mariusz-nowak",fullName:"Mariusz Nowak"},{id:"271428",title:"Dr.",name:"Wojciech",surname:"Łabuś",slug:"wojciech-labus",fullName:"Wojciech Łabuś"},{id:"294857",title:"M.Sc.",name:"Wojciech",surname:"Smętek",slug:"wojciech-smetek",fullName:"Wojciech Smętek"},{id:"294860",title:"Ms.",name:"Małgorzata",surname:"Kraut",slug:"malgorzata-kraut",fullName:"Małgorzata Kraut"},{id:"294861",title:"Mr.",name:"Michał",surname:"Szapski",slug:"michal-szapski",fullName:"Michał Szapski"},{id:"294862",title:"Mr.",name:"Jacek",surname:"Węgrzyk",slug:"jacek-wegrzyk",fullName:"Jacek Węgrzyk"}]}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},personalPublishingAssistant:{id:"278926",firstName:"Ivana",lastName:"Barac",middleName:null,title:"Ms.",imageUrl:"https://mts.intechopen.com/storage/users/278926/images/8058_n.jpg",email:"ivana.b@intechopen.com",biography:"As an Author Service Manager my responsibilities include monitoring and facilitating all publishing activities for authors and editors. From chapter submission and review, to approval and revision, copyediting and design, until final publication, I work closely with authors and editors to ensure a simple and easy publishing process. I maintain constant and effective communication with authors, editors and reviewers, which allows for a level of personal support that enables contributors to fully commit and concentrate on the chapters they are writing, editing, or reviewing. I assist authors in the preparation of their full chapter submissions and track important deadlines and ensure they are met. I help to coordinate internal processes such as linguistic review, and monitor the technical aspects of the process. As an ASM I am also involved in the acquisition of editors. Whether that be identifying an exceptional author and proposing an editorship collaboration, or contacting researchers who would like the opportunity to work with IntechOpen, I establish and help manage author and editor acquisition and contact."}},relatedBooks:[{type:"book",id:"6410",title:"Drug Discovery",subtitle:"Concepts to Market",isOpenForSubmission:!1,hash:"7c11a8742cce40078f11cacb0d5a5fee",slug:"drug-discovery-concepts-to-market",bookSignature:"Varaprasad Bobbarala",coverURL:"https://cdn.intechopen.com/books/images_new/6410.jpg",editedByType:"Edited by",editors:[{id:"207119",title:"Dr.",name:"Varaprasad",surname:"Bobbarala PhD",slug:"varaprasad-bobbarala-phd",fullName:"Varaprasad Bobbarala PhD"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"8244",title:"New Advances on Fermentation Processes",subtitle:null,isOpenForSubmission:!1,hash:"d14302686630dee0aa70e9dda9540c27",slug:"new-advances-on-fermentation-processes",bookSignature:"Rosa María Martínez-Espinosa",coverURL:"https://cdn.intechopen.com/books/images_new/8244.jpg",editedByType:"Edited by",editors:[{id:"165627",title:"Dr.",name:"Rosa María",surname:"Martínez-Espinosa",slug:"rosa-maria-martinez-espinosa",fullName:"Rosa María Martínez-Espinosa"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"7434",title:"Molecular Biotechnology",subtitle:null,isOpenForSubmission:!1,hash:"eceede809920e1ec7ecadd4691ede2ec",slug:"molecular-biotechnology",bookSignature:"Sergey Sedykh",coverURL:"https://cdn.intechopen.com/books/images_new/7434.jpg",editedByType:"Edited by",editors:[{id:"178316",title:"Ph.D.",name:"Sergey",surname:"Sedykh",slug:"sergey-sedykh",fullName:"Sergey Sedykh"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"1591",title:"Infrared Spectroscopy",subtitle:"Materials Science, Engineering and Technology",isOpenForSubmission:!1,hash:"99b4b7b71a8caeb693ed762b40b017f4",slug:"infrared-spectroscopy-materials-science-engineering-and-technology",bookSignature:"Theophile Theophanides",coverURL:"https://cdn.intechopen.com/books/images_new/1591.jpg",editedByType:"Edited by",editors:[{id:"37194",title:"Dr.",name:"Theophanides",surname:"Theophile",slug:"theophanides-theophile",fullName:"Theophanides Theophile"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3161",title:"Frontiers in Guided Wave Optics and Optoelectronics",subtitle:null,isOpenForSubmission:!1,hash:"deb44e9c99f82bbce1083abea743146c",slug:"frontiers-in-guided-wave-optics-and-optoelectronics",bookSignature:"Bishnu Pal",coverURL:"https://cdn.intechopen.com/books/images_new/3161.jpg",editedByType:"Edited by",editors:[{id:"4782",title:"Prof.",name:"Bishnu",surname:"Pal",slug:"bishnu-pal",fullName:"Bishnu Pal"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"3092",title:"Anopheles mosquitoes",subtitle:"New insights into malaria vectors",isOpenForSubmission:!1,hash:"c9e622485316d5e296288bf24d2b0d64",slug:"anopheles-mosquitoes-new-insights-into-malaria-vectors",bookSignature:"Sylvie Manguin",coverURL:"https://cdn.intechopen.com/books/images_new/3092.jpg",editedByType:"Edited by",editors:[{id:"50017",title:"Prof.",name:"Sylvie",surname:"Manguin",slug:"sylvie-manguin",fullName:"Sylvie Manguin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"371",title:"Abiotic Stress in Plants",subtitle:"Mechanisms and Adaptations",isOpenForSubmission:!1,hash:"588466f487e307619849d72389178a74",slug:"abiotic-stress-in-plants-mechanisms-and-adaptations",bookSignature:"Arun Shanker and B. Venkateswarlu",coverURL:"https://cdn.intechopen.com/books/images_new/371.jpg",editedByType:"Edited by",editors:[{id:"58592",title:"Dr.",name:"Arun",surname:"Shanker",slug:"arun-shanker",fullName:"Arun Shanker"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"72",title:"Ionic Liquids",subtitle:"Theory, Properties, New Approaches",isOpenForSubmission:!1,hash:"d94ffa3cfa10505e3b1d676d46fcd3f5",slug:"ionic-liquids-theory-properties-new-approaches",bookSignature:"Alexander Kokorin",coverURL:"https://cdn.intechopen.com/books/images_new/72.jpg",editedByType:"Edited by",editors:[{id:"19816",title:"Prof.",name:"Alexander",surname:"Kokorin",slug:"alexander-kokorin",fullName:"Alexander Kokorin"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"314",title:"Regenerative Medicine and Tissue Engineering",subtitle:"Cells and Biomaterials",isOpenForSubmission:!1,hash:"bb67e80e480c86bb8315458012d65686",slug:"regenerative-medicine-and-tissue-engineering-cells-and-biomaterials",bookSignature:"Daniel Eberli",coverURL:"https://cdn.intechopen.com/books/images_new/314.jpg",editedByType:"Edited by",editors:[{id:"6495",title:"Dr.",name:"Daniel",surname:"Eberli",slug:"daniel-eberli",fullName:"Daniel Eberli"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}},{type:"book",id:"57",title:"Physics and Applications of Graphene",subtitle:"Experiments",isOpenForSubmission:!1,hash:"0e6622a71cf4f02f45bfdd5691e1189a",slug:"physics-and-applications-of-graphene-experiments",bookSignature:"Sergey Mikhailov",coverURL:"https://cdn.intechopen.com/books/images_new/57.jpg",editedByType:"Edited by",editors:[{id:"16042",title:"Dr.",name:"Sergey",surname:"Mikhailov",slug:"sergey-mikhailov",fullName:"Sergey Mikhailov"}],productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"}}]},chapter:{item:{type:"chapter",id:"22259",title:"Analysis of Mixed Convection in a Lid Driven Trapezoidal Cavity",doi:"10.5772/21108",slug:"analysis-of-mixed-convection-in-a-lid-driven-trapezoidal-cavity",body:null,keywords:null,chapterPDFUrl:"https://cdn.intechopen.com/pdfs/22259.pdf",chapterXML:null,downloadPdfUrl:"/chapter/pdf-download/22259",previewPdfUrl:"/chapter/pdf-preview/22259",totalDownloads:3637,totalViews:136,totalCrossrefCites:3,totalDimensionsCites:5,hasAltmetrics:0,dateSubmitted:"November 11th 2010",dateReviewed:"May 18th 2011",datePrePublished:null,datePublished:"October 21st 2011",dateFinished:null,readingETA:"0",abstract:null,reviewType:"peer-reviewed",bibtexUrl:"/chapter/bibtex/22259",risUrl:"/chapter/ris/22259",book:{slug:"convection-and-conduction-heat-transfer"},signatures:"M. A. H. Mamun, T. R. Tanim, M. M. Rahman, R. Saidur and Shuichi Nagata",authors:[{id:"41789",title:"Dr.",name:"Mohammad",middleName:"Arif HAsan",surname:"Mamun",fullName:"Mohammad Mamun",slug:"mohammad-mamun",email:"mahmamun1@gmail.com",position:null,institution:{name:"Bangladesh University of Engineering and Technology",institutionURL:null,country:{name:"Bangladesh"}}},{id:"57658",title:"Dr.",name:"Mustafizur",middleName:null,surname:"Rahman",fullName:"Mustafizur Rahman",slug:"mustafizur-rahman",email:"m71ramath@gmail.com",position:null,institution:null},{id:"57659",title:"Dr.",name:"Saidur",middleName:null,surname:"Rahman",fullName:"Saidur Rahman",slug:"saidur-rahman",email:"saidur@um.edu.my",position:null,institution:null},{id:"57663",title:"Mr",name:"Tanvir",middleName:null,surname:"Tanim",fullName:"Tanvir Tanim",slug:"tanvir-tanim",email:"tanvirreza@me.buet.ac.bd",position:null,institution:null},{id:"57664",title:"Dr.",name:"Shuichi",middleName:null,surname:"Nagata",fullName:"Shuichi Nagata",slug:"shuichi-nagata",email:"nagata@ioes.saga-u.ac.jp",position:null,institution:null}],sections:null,chapterReferences:null,footnotes:null,contributors:null,corrections:null},book:{id:"530",title:"Convection and Conduction Heat Transfer",subtitle:null,fullTitle:"Convection and Conduction Heat Transfer",slug:"convection-and-conduction-heat-transfer",publishedDate:"October 21st 2011",bookSignature:"Amimul Ahsan",coverURL:"https://cdn.intechopen.com/books/images_new/530.jpg",licenceType:"CC BY 3.0",editedByType:"Edited by",editors:[{id:"36782",title:"Associate Prof.",name:"Amimul",middleName:null,surname:"Ahsan",slug:"amimul-ahsan",fullName:"Amimul Ahsan"}],productType:{id:"1",title:"Edited Volume",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"22257",title:"A Mixed Convection Study in Inclined Channels with Discrete Heat Sources",slug:"a-mixed-convection-study-in-inclined-channels-with-discrete-heat-sources",totalDownloads:2747,totalCrossrefCites:0,signatures:"Paulo M. Guimarães and Genésio J. Menon",authors:[{id:"36842",title:"Prof.",name:"Paulo",middleName:"Mohallem",surname:"Guimarães",fullName:"Paulo Guimarães",slug:"paulo-guimaraes"},{id:"57210",title:"Mr.",name:"Genésio",middleName:null,surname:"Menon",fullName:"Genésio Menon",slug:"genesio-menon"}]},{id:"22258",title:"Periodically Forced Natural Convection Through the Roof of an Attic-Shaped Building",slug:"periodically-forced-natural-convection-through-the-roof-of-an-attic-shaped-building",totalDownloads:2492,totalCrossrefCites:0,signatures:"Suvash Chandra Saha",authors:[{id:"38302",title:"Dr.",name:"Suvash",middleName:"Chandra",surname:"Saha",fullName:"Suvash Saha",slug:"suvash-saha"}]},{id:"22259",title:"Analysis of Mixed Convection in a Lid Driven Trapezoidal Cavity",slug:"analysis-of-mixed-convection-in-a-lid-driven-trapezoidal-cavity",totalDownloads:3637,totalCrossrefCites:3,signatures:"M. A. H. Mamun, T. R. Tanim, M. M. Rahman, R. Saidur and Shuichi Nagata",authors:[{id:"41789",title:"Dr.",name:"Mohammad",middleName:"Arif HAsan",surname:"Mamun",fullName:"Mohammad Mamun",slug:"mohammad-mamun"},{id:"57658",title:"Dr.",name:"Mustafizur",middleName:null,surname:"Rahman",fullName:"Mustafizur Rahman",slug:"mustafizur-rahman"},{id:"57659",title:"Dr.",name:"Saidur",middleName:null,surname:"Rahman",fullName:"Saidur Rahman",slug:"saidur-rahman"},{id:"57663",title:"Mr",name:"Tanvir",middleName:null,surname:"Tanim",fullName:"Tanvir Tanim",slug:"tanvir-tanim"},{id:"57664",title:"Dr.",name:"Shuichi",middleName:null,surname:"Nagata",fullName:"Shuichi Nagata",slug:"shuichi-nagata"}]},{id:"22248",title:"Convective Heat Transfer of Unsteady Pulsed Flow in Sinusoidal Constricted Tube",slug:"convective-heat-transfer-of-unsteady-pulsed-flow-in-sinusoidal-constricted-tube",totalDownloads:1902,totalCrossrefCites:0,signatures:"J. Batina, S. Blancher, C. Amrouche, M. Batchi and R. Creff",authors:[{id:"49366",title:"Dr.",name:"Jean",middleName:null,surname:"Batina",fullName:"Jean Batina",slug:"jean-batina"},{id:"137725",title:"Prof.",name:"Serge",middleName:null,surname:"Blancher",fullName:"Serge Blancher",slug:"serge-blancher"},{id:"137726",title:"Prof.",name:"Cherif",middleName:null,surname:"Amrouche",fullName:"Cherif Amrouche",slug:"cherif-amrouche"},{id:"137727",title:"Prof.",name:"M",middleName:null,surname:"Batchi",fullName:"M Batchi",slug:"m-batchi"},{id:"137728",title:"Prof.",name:"René",middleName:null,surname:"Creff",fullName:"René Creff",slug:"rene-creff"}]},{id:"22249",title:"Numerical Solution of Natural Convection Problems by a Meshless Method",slug:"numerical-solution-of-natural-convection-problems-by-a-meshless-method",totalDownloads:4885,totalCrossrefCites:3,signatures:"Gregor Kosec and Božidar Šarler",authors:[{id:"53866",title:"Dr.",name:"Gregor",middleName:null,surname:"Kosec",fullName:"Gregor Kosec",slug:"gregor-kosec"},{id:"54781",title:"Prof.",name:"Božidar",middleName:null,surname:"Šarler",fullName:"Božidar Šarler",slug:"bozidar-sarler"}]},{id:"22250",title:"Hydromagnetic Flow with Thermal Radiation",slug:"hydromagnetic-flow-with-thermal-radiation",totalDownloads:2417,totalCrossrefCites:0,signatures:"Cho Young Han and Se-Myong Chang",authors:[{id:"44661",title:"Dr.",name:"Cho Young",middleName:null,surname:"Han",fullName:"Cho Young Han",slug:"cho-young-han"},{id:"44700",title:"Prof.",name:"Se-Myong",middleName:null,surname:"Chang",fullName:"Se-Myong Chang",slug:"se-myong-chang"}]},{id:"22251",title:"Transient Heat Conduction in Capillary Porous Bodies",slug:"transient-heat-conduction-in-capillary-porous-bodies",totalDownloads:1821,totalCrossrefCites:8,signatures:"Nencho Deliiski",authors:[{id:"43040",title:"Prof.",name:"Nencho",middleName:"Stanev",surname:"Deliiski",fullName:"Nencho Deliiski",slug:"nencho-deliiski"}]},{id:"22252",title:"Non-Linear Radiative-Conductive Heat Transfer in a Heterogeneous Gray Plane-Parallel Participating Medium",slug:"non-linear-radiative-conductive-heat-transfer-in-a-heterogeneous-gray-plane-parallel-participating-m",totalDownloads:2196,totalCrossrefCites:4,signatures:"Marco T.M.B. de Vilhena, Bardo E.J. Bodmann and Cynthia F. Segatto",authors:[{id:"10869",title:"Prof.",name:"Marco Tullio",middleName:null,surname:"Vilhena",fullName:"Marco Tullio Vilhena",slug:"marco-tullio-vilhena"},{id:"49001",title:"Prof.",name:"Bardo",middleName:null,surname:"Bodmann",fullName:"Bardo Bodmann",slug:"bardo-bodmann"},{id:"49009",title:"Prof.",name:"Cynthia",middleName:"Feijo",surname:"Segatto",fullName:"Cynthia Segatto",slug:"cynthia-segatto"}]},{id:"22253",title:"Optimization of the Effective Thermal Conductivity of a Composite",slug:"optimization-of-the-effective-thermal-conductivity-of-a-composite",totalDownloads:3608,totalCrossrefCites:1,signatures:"Hubert Jopek and Tomasz Strek",authors:[{id:"10141",title:"Dr.",name:"Tomasz",middleName:null,surname:"Strek",fullName:"Tomasz Strek",slug:"tomasz-strek"},{id:"57982",title:"Dr.",name:"Hubert",middleName:null,surname:"Jopek",fullName:"Hubert Jopek",slug:"hubert-jopek"}]},{id:"22254",title:"Computation of Thermal Conductivity of Gas Diffusion Layers of PEM Fuel Cells",slug:"computation-of-thermal-conductivity-of-gas-diffusion-layers-of-pem-fuel-cells",totalDownloads:3080,totalCrossrefCites:1,signatures:"Andreas Pfrang, Damien Veyret and Georgios Tsotridis",authors:[{id:"53039",title:"Dr.",name:"Andreas",middleName:null,surname:"Pfrang",fullName:"Andreas Pfrang",slug:"andreas-pfrang"},{id:"53053",title:"Dr.",name:"Damien",middleName:null,surname:"Veyret",fullName:"Damien Veyret",slug:"damien-veyret"},{id:"53054",title:"Dr.",name:"Georgios",middleName:null,surname:"Tsotridis",fullName:"Georgios Tsotridis",slug:"georgios-tsotridis"}]},{id:"22255",title:"Analytical Methods for Estimating Thermal Conductivity of Multi-Component Natural Systems in Permafrost Areas",slug:"analytical-methods-for-estimating-thermal-conductivity-of-multi-component-natural-systems-in-permafr",totalDownloads:2288,totalCrossrefCites:0,signatures:"Rev I. Gavriliev",authors:[{id:"48694",title:"Dr.",name:"Rev",middleName:null,surname:"Gavriliev",fullName:"Rev Gavriliev",slug:"rev-gavriliev"}]},{id:"22256",title:"Heating in Biothermal Systems",slug:"heating-in-biothermal-systems",totalDownloads:2555,totalCrossrefCites:1,signatures:"Huang-Wen Huang and Chihng-Tsung Liauh",authors:[{id:"35387",title:"Prof.",name:"Huang-Wen",middleName:null,surname:"Huang",fullName:"Huang-Wen Huang",slug:"huang-wen-huang"},{id:"53685",title:"Prof.",name:"Chihng-Tsung",middleName:null,surname:"Liauh",fullName:"Chihng-Tsung Liauh",slug:"chihng-tsung-liauh"}]},{id:"22260",title:"A Generalised RBF Finite Difference Approach to Solve Nonlinear Heat Conduction Problems on Unstructured Datasets",slug:"a-generalised-rbf-finite-difference-approach-to-solve-nonlinear-heat-conduction-problems-on-unstruct",totalDownloads:2724,totalCrossrefCites:0,signatures:"D. Stevens, A. LaRocca, H. Power and V. LaRocca",authors:[{id:"41533",title:"Prof.",name:"Henry",middleName:null,surname:"Power",fullName:"Henry Power",slug:"henry-power"},{id:"55058",title:"Dr.",name:"David",middleName:null,surname:"Stevens",fullName:"David Stevens",slug:"david-stevens"}]},{id:"22261",title:"Heat Transfer Analysis of Reinforced Concrete Beams Reinforced with GFRP Bars",slug:"heat-transfer-analysis-of-reinforced-concrete-beams-reinforced-with-gfrp-bars",totalDownloads:5765,totalCrossrefCites:1,signatures:"Rami A. Hawileh",authors:[{id:"46905",title:"Dr.",name:"Rami",middleName:null,surname:"Hawileh",fullName:"Rami Hawileh",slug:"rami-hawileh"}]},{id:"22262",title:"Modelling of Heat Transfer and Phase Transformations in the Rapid Manufacturing of Titanium Components",slug:"modelling-of-heat-transfer-and-phase-transformations-in-the-rapid-manufacturing-of-titanium-componen",totalDownloads:2789,totalCrossrefCites:5,signatures:"António Crespo",authors:[{id:"36414",title:"Dr.",name:"Antonio",middleName:null,surname:"Crespo",fullName:"Antonio Crespo",slug:"antonio-crespo"}]},{id:"22263",title:"Measurement of Boundary Conditions - Surface Heat Flux and Surface Temperature",slug:"measurement-of-boundary-conditions-surface-heat-flux-and-surface-temperature",totalDownloads:2738,totalCrossrefCites:0,signatures:"Wei Liu",authors:[{id:"35376",title:"Dr.",name:"Wei",middleName:null,surname:"Liu",fullName:"Wei Liu",slug:"wei-liu"}]},{id:"22264",title:"Properties and Numerical Modeling-Simulation of Phase Changes Material",slug:"properties-and-numerical-modeling-simulation-of-phase-changes-material",totalDownloads:3902,totalCrossrefCites:1,signatures:"Pavel Fiala, Ivo Behunek and Petr Drexler",authors:[{id:"37776",title:"Dr.",name:"Pavel",middleName:null,surname:"Fiala",fullName:"Pavel Fiala",slug:"pavel-fiala"},{id:"40879",title:"Dr.",name:"Ivo",middleName:null,surname:"Behunek",fullName:"Ivo Behunek",slug:"ivo-behunek"},{id:"40880",title:"Dr.",name:"Petr",middleName:null,surname:"Drexler",fullName:"Petr Drexler",slug:"petr-drexler"}]},{id:"22265",title:"Finite Element Methods to Optimize by Factorial Design the Solidification of Cu-5wt%Zn Alloy in a Sand Mold",slug:"finite-element-methods-to-optimize-by-factorial-design-the-solidification-of-cu-5wt-zn-alloy-in-a-sa",totalDownloads:2235,totalCrossrefCites:0,signatures:"Moisés Meza Pariona and Viviane Teleginski",authors:[{id:"38666",title:"Ph.D.",name:"Moises",middleName:"Meza",surname:"Pariona",fullName:"Moises Pariona",slug:"moises-pariona"},{id:"94046",title:"MSc.",name:"Viviane",middleName:null,surname:"Teleginski",fullName:"Viviane Teleginski",slug:"viviane-teleginski"}]}]},relatedBooks:[{type:"book",id:"532",title:"Two Phase Flow, Phase Change and Numerical Modeling",subtitle:null,isOpenForSubmission:!1,hash:"331fe87b8edf0e8adf7e6086e4eea81c",slug:"two-phase-flow-phase-change-and-numerical-modeling",bookSignature:"Amimul Ahsan",coverURL:"https://cdn.intechopen.com/books/images_new/532.jpg",editedByType:"Edited by",editors:[{id:"36782",title:"Associate Prof.",name:"Amimul",surname:"Ahsan",slug:"amimul-ahsan",fullName:"Amimul Ahsan"}],equalEditorOne:null,equalEditorTwo:null,equalEditorThree:null,productType:{id:"1",chapterContentType:"chapter",authoredCaption:"Edited by"},chapters:[{id:"20810",title:"Modeling the Physical Phenomena Involved by Laser Beam – Substance Interaction",slug:"modeling-the-physical-phenomena-involved-by-laser-beam-substance-interaction",signatures:"Marian Pearsica, Stefan Nedelcu, Cristian-George Constantinescu, Constantin Strimbu, Marius Benta and Catalin Mihai",authors:[{id:"30024",title:"Mr",name:"Catalin",middleName:null,surname:"Mihai",fullName:"Catalin Mihai",slug:"catalin-mihai"},{id:"43300",title:"Prof.",name:"Marian",middleName:null,surname:"Pearsica",fullName:"Marian Pearsica",slug:"marian-pearsica"},{id:"53178",title:"Mr.",name:"Stefan",middleName:null,surname:"Nedelcu",fullName:"Stefan Nedelcu",slug:"stefan-nedelcu"},{id:"53179",title:"Mr.",name:"Cristian-George",middleName:null,surname:"Constantinescu",fullName:"Cristian-George Constantinescu",slug:"cristian-george-constantinescu"},{id:"53180",title:"Prof.",name:"Constantin",middleName:null,surname:"Strimbu",fullName:"Constantin Strimbu",slug:"constantin-strimbu"},{id:"53181",title:"Mr.",name:"Marius",middleName:null,surname:"Benta",fullName:"Marius Benta",slug:"marius-benta"}]},{id:"20811",title:"Numerical Modeling and Experimentation on Evaporator Coils for Refrigeration in Dry and Frosting Operational Conditions",slug:"numerical-modeling-and-experimentation-on-evaporator-coils-for-refrigeration-in-dry-and-frosting-ope",signatures:"Zine Aidoun, Mohamed Ouzzane and Adlane Bendaoud",authors:[{id:"35103",title:"Dr",name:"Zine",middleName:null,surname:"Aidoun",fullName:"Zine Aidoun",slug:"zine-aidoun"},{id:"53398",title:"Dr.",name:"Adlane Larbi",middleName:"Larbi",surname:"Bendaoud",fullName:"Adlane Larbi Bendaoud",slug:"adlane-larbi-bendaoud"},{id:"53399",title:"Dr.",name:"Mohamed",middleName:null,surname:"Ouzzane",fullName:"Mohamed Ouzzane",slug:"mohamed-ouzzane"}]},{id:"20812",title:"Modeling and Simulation of the Heat Transfer Behaviour of a Shell-and-Tube Condenser for a Moderately High-Temperature Heat Pump",slug:"modeling-and-simulation-of-the-heat-transfer-behaviour-of-a-shell-and-tube-condenser-for-a-moderatel",signatures:"Tzong-Shing Lee and Jhen-Wei Mai",authors:[{id:"35518",title:"Prof.",name:"Tzong-Shing",middleName:null,surname:"Lee",fullName:"Tzong-Shing Lee",slug:"tzong-shing-lee"},{id:"136621",title:"Dr.",name:"Jhen-Wei",middleName:null,surname:"Mai",fullName:"Jhen-Wei Mai",slug:"jhen-wei-mai"}]},{id:"20813",title:"Simulation of Rarefied Gas Between Coaxial Circular Cylinders by DSMC Method",slug:"simulation-of-rarefied-gas-between-coaxial-circular-cylinders-by-dsmc-method",signatures:"H. Ghezel Sofloo",authors:[{id:"35689",title:"MSc",name:"Hadi",middleName:null,surname:"Ghezel Sofloo",fullName:"Hadi Ghezel Sofloo",slug:"hadi-ghezel-sofloo"}]},{id:"20814",title:"Theoretical and Experimental Analysis of Flows and Heat Transfer Within Flat Mini Heat Pipe Including Grooved Capillary Structures",slug:"theoretical-and-experimental-analysis-of-flows-and-heat-transfer-within-flat-mini-heat-pipe-includin",signatures:"Zaghdoudi Mohamed Chaker, Maalej Samah and Mansouri Jed",authors:[{id:"35256",title:"Prof.",name:"Mohamed Chaker",middleName:null,surname:"Zaghdoudi",fullName:"Mohamed Chaker Zaghdoudi",slug:"mohamed-chaker-zaghdoudi"},{id:"53843",title:"Prof.",name:"Samah",middleName:null,surname:"Maalej",fullName:"Samah Maalej",slug:"samah-maalej"},{id:"53844",title:"Prof.",name:"Jed",middleName:null,surname:"Mansouri",fullName:"Jed Mansouri",slug:"jed-mansouri"}]},{id:"20815",title:"Modeling Solidification Phenomena in the Continuous Casting of Carbon Steels",slug:"modeling-solidification-phenomena-in-the-continuous-casting-of-carbon-steels",signatures:"Panagiotis Sismanis",authors:[{id:"35901",title:"Dr.",name:"Panagiotis",middleName:null,surname:"Sismanis",fullName:"Panagiotis Sismanis",slug:"panagiotis-sismanis"}]},{id:"20816",title:"Modelling of Profile Evolution by Transport Transitions in Fusion Plasmas",slug:"modelling-of-profile-evolution-by-transport-transitions-in-fusion-plasmas",signatures:"Mikhail Tokar",authors:[{id:"35764",title:"Prof.",name:"Mikhail",middleName:null,surname:"Tokar",fullName:"Mikhail Tokar",slug:"mikhail-tokar"}]},{id:"20817",title:"Numerical Simulation of the Heat Transfer from a Heated Solid Wall to an Impinging Swirling Jet",slug:"numerical-simulation-of-the-heat-transfer-from-a-heated-solid-wall-to-an-impinging-swirling-jet",signatures:"Joaquín Ortega-Casanova",authors:[{id:"35763",title:"Dr.",name:"Joaquin",middleName:null,surname:"Ortega-Casanova",fullName:"Joaquin Ortega-Casanova",slug:"joaquin-ortega-casanova"}]},{id:"20818",title:"Recent Advances in Modeling Axisymmetric Swirl and Applications for Enhanced Heat Transfer and Flow Mixing",slug:"recent-advances-in-modeling-axisymmetric-swirl-and-applications-for-enhanced-heat-transfer-and-flow-",signatures:"Sal B. Rodriguez and Mohamed S. El-Genk",authors:[{id:"47349",title:"Dr.",name:"Sal",middleName:null,surname:"Rodriguez",fullName:"Sal Rodriguez",slug:"sal-rodriguez"},{id:"56460",title:"Dr.",name:"Mohamed",middleName:null,surname:"El-Genk",fullName:"Mohamed El-Genk",slug:"mohamed-el-genk"}]},{id:"20819",title:"Thermal Approaches to Interpret Laser Damage Experiments",slug:"thermal-approaches-to-interpret-laser-damage-experiments",signatures:"S. Reyné, L. Lamaignère, J-Y. Natoli and G. Duchateau",authors:[{id:"48256",title:"Dr.",name:"Stéphane",middleName:null,surname:"Reyné",fullName:"Stéphane Reyné",slug:"stephane-reyne"},{id:"55184",title:"Dr.",name:"Laurent",middleName:null,surname:"Lamaignère",fullName:"Laurent Lamaignère",slug:"laurent-lamaignere"},{id:"55185",title:"Prof.",name:"Jean-Yves",middleName:null,surname:"Natoli",fullName:"Jean-Yves Natoli",slug:"jean-yves-natoli"},{id:"55186",title:"Dr.",name:"Guillaume",middleName:null,surname:"Duchateau",fullName:"Guillaume Duchateau",slug:"guillaume-duchateau"}]},{id:"20820",title:"Ultrafast Heating Characteristics in Multi-Layer Metal Film Assembly Under Femtosecond Laser Pulses Irradiation",slug:"ultrafast-heating-characteristics-in-multi-layer-metal-film-assembly-under-femtosecond-laser-pulses-",signatures:"Feng Chen, Guangqing Du, Qing Yang, Jinhai Si and Hun Hou",authors:[{id:"41503",title:"Prof.",name:"Feng",middleName:null,surname:"Chen",fullName:"Feng Chen",slug:"feng-chen"},{id:"49747",title:"Dr.",name:"Guangqing",middleName:null,surname:"Du",fullName:"Guangqing Du",slug:"guangqing-du"},{id:"49748",title:"Dr.",name:"Qing",middleName:null,surname:"Yang",fullName:"Qing Yang",slug:"qing-yang"},{id:"49749",title:"Prof.",name:"Jinhai",middleName:null,surname:"Si",fullName:"Jinhai Si",slug:"jinhai-si"},{id:"49750",title:"Prof.",name:"Xun",middleName:null,surname:"Hou",fullName:"Xun Hou",slug:"xun-hou"}]},{id:"20821",title:"On Density Wave Instability Phenomena – Modelling and Experimental Investigation",slug:"on-density-wave-instability-phenomena-modelling-and-experimental-investigation",signatures:"Davide Papini, Antonio Cammi, Marco Colombo and Marco E. Ricotti",authors:[{id:"39676",title:"Dr.",name:"Antonio",middleName:null,surname:"Cammi",fullName:"Antonio Cammi",slug:"antonio-cammi"},{id:"47185",title:"Dr.",name:"Davide",middleName:null,surname:"Papini",fullName:"Davide Papini",slug:"davide-papini"},{id:"58341",title:"MSc.",name:"Marco",middleName:null,surname:"Colombo",fullName:"Marco Colombo",slug:"marco-colombo"},{id:"58342",title:"Prof.",name:"Marco",middleName:"Enrico",surname:"Ricotti",fullName:"Marco Ricotti",slug:"marco-ricotti"}]},{id:"20822",title:"Spray Cooling",slug:"spray-cooling",signatures:"Zhibin Yan, Rui Zhao, Fei Duan, Teck Neng Wong, Kok Chuan Toh, Kok Fah Choo, Poh Keong Chan and Yong Sheng Chua",authors:[{id:"41701",title:"Prof.",name:"Teck Neng",middleName:null,surname:"Wong",fullName:"Teck Neng Wong",slug:"teck-neng-wong"},{id:"53713",title:"Mr.",name:"Zhibin",middleName:null,surname:"Yan",fullName:"Zhibin Yan",slug:"zhibin-yan"},{id:"53720",title:"Dr.",name:"Rui",middleName:null,surname:"Zhao",fullName:"Rui Zhao",slug:"rui-zhao"},{id:"53721",title:"Prof.",name:"Fei",middleName:null,surname:"Duan",fullName:"Fei Duan",slug:"fei-duan"},{id:"53722",title:"Mr",name:"Kok Chuan",middleName:null,surname:"Toh",fullName:"Kok Chuan Toh",slug:"kok-chuan-toh"},{id:"53723",title:"Mr.",name:"Kok Fah",middleName:null,surname:"Choo",fullName:"Kok Fah Choo",slug:"kok-fah-choo"},{id:"53724",title:"Mr",name:"Poh Keong",middleName:null,surname:"Chan",fullName:"Poh Keong Chan",slug:"poh-keong-chan"},{id:"53725",title:"Mr",name:"Yong Sheng",middleName:null,surname:"Chua",fullName:"Yong Sheng Chua",slug:"yong-sheng-chua"}]},{id:"20823",title:"Wettability Effects on Heat Transfer",slug:"wettability-effects-on-heat-transfer",signatures:"Chiwoong Choi and Moohwan Kim",authors:[{id:"35188",title:"Dr.",name:"Chiwoong",middleName:null,surname:"Choi",fullName:"Chiwoong Choi",slug:"chiwoong-choi"},{id:"52868",title:"Prof.",name:"Moo Hwan",middleName:null,surname:"Kim",fullName:"Moo Hwan Kim",slug:"moo-hwan-kim"}]},{id:"20824",title:"Liquid Film Thickness in Micro-Scale Two-Phase Flow",slug:"liquid-film-thickness-in-micro-scale-two-phase-flow",signatures:"Naoki Shikazono and Youngbae Han",authors:[{id:"47595",title:"Prof.",name:"Naoki",middleName:null,surname:"Shikazono",fullName:"Naoki Shikazono",slug:"naoki-shikazono"},{id:"47596",title:"Dr.",name:"Youngbae",middleName:null,surname:"Han",fullName:"Youngbae Han",slug:"youngbae-han"}]},{id:"20825",title:"New Variants to Theoretical Investigations of Thermosyphon Loop",slug:"new-variants-to-theoretical-investigations-of-thermosyphon-loop",signatures:"Henryk Bieliński",authors:[{id:"15853",title:"Dr.",name:"Henryk",middleName:null,surname:"Bieliński",fullName:"Henryk Bieliński",slug:"henryk-bielinski"}]},{id:"20826",title:"Nanofluids for Heat Transfer",slug:"nanofluids-for-heat-transfer",signatures:"Rodolphe Heyd",authors:[{id:"43196",title:"Dr.",name:"Rodolphe",middleName:null,surname:"Heyd",fullName:"Rodolphe Heyd",slug:"rodolphe-heyd"}]},{id:"20827",title:"Forced Convective Heat Transfer of Nanofluids in Minichannels",slug:"forced-convective-heat-transfer-of-nanofluids-in-minichannels",signatures:"S. M. Sohel Murshed and C. A. Nieto de Castro",authors:[{id:"16297",title:"Prof.",name:"Carlos Nieto",middleName:null,surname:"De Castro",fullName:"Carlos Nieto De Castro",slug:"carlos-nieto-de-castro"},{id:"24904",title:"Prof.",name:"S. M. Sohel",middleName:null,surname:"Murshed",fullName:"S. M. Sohel Murshed",slug:"s.-m.-sohel-murshed"}]},{id:"20828",title:"Nanofluids for Heat Transfer – Potential and Engineering Strategies",slug:"nanofluids-for-heat-transfer-potential-and-engineering-strategies",signatures:"Elena V. Timofeeva",authors:[{id:"46547",title:"Dr.",name:"Elena",middleName:null,surname:"Timofeeva",fullName:"Elena Timofeeva",slug:"elena-timofeeva"}]},{id:"20829",title:"Heat Transfer in Nanostructures Using the Fractal Approximation of Motion",slug:"heat-transfer-in-nanostructures-using-the-fractal-approximation-of-motion",signatures:"Maricel Agop, Irinel Casian Botez, Luciu Razvan Silviu and Manuela Girtu",authors:[{id:"24020",title:"Dr.",name:"Maricel",middleName:null,surname:"Agop",fullName:"Maricel Agop",slug:"maricel-agop"},{id:"136032",title:"Dr.",name:"Irinel Casian",middleName:null,surname:"Botez",fullName:"Irinel Casian Botez",slug:"irinel-casian-botez"},{id:"136033",title:"Dr.",name:"Luciu Razvan",middleName:null,surname:"Silviu",fullName:"Luciu Razvan Silviu",slug:"luciu-razvan-silviu"},{id:"136034",title:"Dr.",name:"Manuela",middleName:null,surname:"Girtu",fullName:"Manuela Girtu",slug:"manuela-girtu"}]},{id:"20830",title:"Heat Transfer in Micro Direct Methanol Fuel Cell",slug:"heat-transfer-in-micro-direct-methanol-fuel-cell",signatures:"Ghayour Reza",authors:[{id:"43732",title:"Dr.",name:"Reza",middleName:null,surname:"Ghayor",fullName:"Reza Ghayor",slug:"reza-ghayor"}]},{id:"20831",title:"Heat Transfer in Complex Fluids",slug:"heat-transfer-in-complex-fluids",signatures:"Mehrdad Massoudi",authors:[{id:"42814",title:"Dr.",name:"Mehrdad",middleName:null,surname:"Massoudi",fullName:"Mehrdad Massoudi",slug:"mehrdad-massoudi"}]},{id:"20832",title:"A Numerical Study on Time-Dependent Melting and Deformation Processes of Phase Change Material (PCM) Induced by Localized Thermal Input",slug:"a-numerical-study-on-time-dependent-melting-and-deformation-processes-of-phase-change-material-pcm-i",signatures:"Yangkyun Kim, Akter Hossain, Sungcho Kim and Yuji Nakamura",authors:[{id:"53969",title:"Dr.",name:"Yuji",middleName:null,surname:"Nakamura",fullName:"Yuji Nakamura",slug:"yuji-nakamura"},{id:"59192",title:"Mr.",name:"Yangkyun",middleName:null,surname:"Kim",fullName:"Yangkyun Kim",slug:"yangkyun-kim"},{id:"59193",title:"Dr.",name:"Akter",middleName:null,surname:"Hossain",fullName:"Akter Hossain",slug:"akter-hossain"},{id:"59194",title:"Prof.",name:"Sungcho",middleName:null,surname:"Kim",fullName:"Sungcho Kim",slug:"sungcho-kim"}]},{id:"20833",title:"Thermal Energy Storage Tanks Using Phase Change Material (PCM) in HVAC Systems",slug:"thermal-energy-storage-tanks-using-phase-change-material-pcm-in-hvac-systems",signatures:"Motoi Yamaha and Nobuo Nakahara",authors:[{id:"44754",title:"Prof.",name:"Motoi",middleName:null,surname:"Yamaha",fullName:"Motoi Yamaha",slug:"motoi-yamaha"},{id:"136035",title:"Dr.",name:"Nobuo",middleName:null,surname:"Nakahara",fullName:"Nobuo Nakahara",slug:"nobuo-nakahara"}]},{id:"20834",title:"Heat Transfer and Phase Change in Deep CO2 Injector for CO2 Geological Storage",slug:"heat-transfer-and-phase-change-in-deep-co2-injector-for-co2-geological-storage",signatures:"Kyuro Sasaki and Yuichi Sugai",authors:[{id:"38340",title:"Prof.",name:"Kyuro",middleName:null,surname:"Sasaki",fullName:"Kyuro Sasaki",slug:"kyuro-sasaki"},{id:"38366",title:"Prof.",name:"Yuichi",middleName:null,surname:"Sugai",fullName:"Yuichi Sugai",slug:"yuichi-sugai"},{id:"39564",title:"Prof.",name:"Kyuro",middleName:null,surname:"Sasaki",fullName:"Kyuro Sasaki",slug:"kyuro-sasaki"}]}]}]},onlineFirst:{chapter:{type:"chapter",id:"70973",title:"Social Media, Ethics and the Privacy Paradox",doi:"10.5772/intechopen.90906",slug:"social-media-ethics-and-the-privacy-paradox",body:'\nThe use of social media is growing at a rapid pace and the twenty-first century could be described as the “boom” period for social networking. According to reports provided by Smart Insights, as at February 2019 there were over 3.484 billion social media users. The Smart Insight report indicates that the number of social media users is growing by 9% annually and this trend is estimated to continue. Presently the number of social media users represents 45% of the global population [1]. The heaviest users of social media are “digital natives”; the group of persons who were born or who have grown up in the digital era and are intimate with the various technologies and systems, and the “Millennial Generation”; those who became adults at the turn of the twenty-first century. These groups of users utilize social media platforms for just about anything ranging from marketing, news acquisition, teaching, health care, civic engagement, and politicking to social engagement.
\nThe unethical use of social media has resulted in the breach of individual privacy and impacts both physical and information security. Reports in 2019 [1], reveal that persons between the ages 8 and 11 years spend an average 13.5 hours weekly online and 18% of this age group are actively engaged on social media. Those between ages 12 and 15 spend on average 20.5 hours online and 69% of this group are active social media users. While children and teenagers represent the largest Internet user groups, for the most part they do not know how to protect their personal information on the Web and are the most vulnerable to cyber-crimes related to breaches of information privacy [2, 3].
\nIn today’s IT-configured society data is one of, if not the most, valuable asset for most businesses/organizations. Organizations and governments collect information via several means including invisible data gathering, marketing platforms and search engines such as Google [4]. Information can be attained from several sources, which can be fused using technology to develop complete profiles of individuals. The information on social media is very accessible and can be of great value to individuals and organizations for reasons such as marketing, etc.; hence, data is retained by most companies for future use.
\nPrivacy or the right to enjoy freedom from unauthorized intrusion is the negative right of all human beings. Privacy is defined as the right to be left alone, to be free from secret surveillance, or unwanted disclosure of personal data or information by government, corporation, or individual (dictionary.com). In this chapter we will define privacy loosely, as the right to control access to personal information. Supporters of privacy posit that it is a necessity for human dignity and individuality and a key element in the quest for happiness. According to Baase [5] in the book titled “A Gift of Fire: Social, Legal and Ethical Issues for Computing and the Internet,” privacy is the ability to control information about one’ s self as well as the freedom from surveillance from being followed, tracked, watched, and being eavesdropped on. In this regard, ignoring privacy rights often leads to encroachment on natural rights.
\nPrivacy, or even the thought that one has this right, leads to peace of mind and can provide an environment of solitude. This solitude can allow people to breathe freely in a space that is free from interference and intrusion. According to Richards and Solove [6], Legal scholar William Prosser argued that privacy cases can be classified into four related “torts,” namely:
Intrusion—this can be viewed as encroachment (physical or otherwise) on ones liberties/solitude in a highly offensive way.
Privacy facts—making public, private information about someone that is of no “legitimate concern” to anyone.
False light—making public false and “highly offensive” information about others.
Appropriation—stealing someone’s identity (name, likeness) to gain advantage without the permission of the individual.
Technology, the digital age, the Internet and social media have redefined privacy however as surveillance is no longer limited to a certain pre-defined space and location. An understanding of the problems and dangers of privacy in the digital space is therefore the first step to privacy control. While there can be clear distinctions between informational privacy and physical privacy, as pointed out earlier, intrusion can be both physical and otherwise.
\nThis chapter will focus on informational privacy which is the ability to control access to personal information. We examine privacy issues in the social media context focusing primarily on personal information and the ability to control external influences. We suggest that breach of informational privacy can impact: solitude (the right to be left alone), intimacy (the right not to be monitored), and anonymity (the right to have no public personal identity and by extension physical privacy impacted). The right to control access to facts or personal information in our view is a natural, inalienable right and everyone should have control over who see their personal information and how it is disseminated.
\nIn May 2019 the General Data Protection Regulation (GDPR) clearly outlined that it is unlawful to process personal data without the consent of the individual (subject). It is a legal requirement under the GDPR that privacy notices be given to individuals that outline how their personal data will be processed and the conditions that must be met that make the consent valid. These are:
“Freely given—an individual must be given a genuine choice when providing consent and it should generally be unbundled from other terms and conditions (e.g., access to a service should not be conditional upon consent being given).”
“Specific and informed—this means that data subjects should be provided with information as to the identity of the controller(s), the specific purposes, types of processing, as well as being informed of their right to withdraw consent at any time.”
“Explicit and unambiguous—the data subject must clearly express their consent (e.g., by actively ticking a box which confirms they are giving consent—pre-ticked boxes are insufficient).”
“Under 13s—children under the age of 13 cannot provide consent and it is therefore necessary to obtain consent from their parents.”
Arguments can be made that privacy is a cultural, universal necessity for harmonious relationships among human beings and creates the boundaries for engagement and disengagement. Privacy can also be viewed as instrumental good because it is a requirement for the development of certain kinds of human relationships, intimacy and trust [7]. However, achieving privacy is much more difficult in light of constant surveillance and the inability to determine the levels of interaction with various publics [7]. Some critics argue that privacy provides protection against anti-social behaviors such as trickery, disinformation and fraud, and is thought to be a universal right [5]. However, privacy can also be viewed as relative as privacy rules may differ based on several factors such as “climate, religion, technological advancement and political arrangements” [8, 9]. The need for privacy is an objective reality though it can be viewed as “culturally rational” where the need for personal privacy is viewed as relative based on culture. One example is the push by the government, businesses and Singaporeans to make Singapore a smart nation. According to GovTech 2018 reports there is a push by the government in Singapore to harness the data “new gold” to develop systems that can make life easier for its people. The [10] report points out that Singapore is using sensors robots Smart Water Assessment Network (SWAN) to monitor water quality in its reservoirs, seeking to build smart health system and to build a smart transportation system to name a few. In this example privacy can be describe as “culturally rational” and the rules in general could differ based on technological advancement and political arrangements.
\nIn today’s networked society it is naïve and ill-conceived to think that privacy is over-rated and there is no need to be concerned about privacy if you have done nothing wrong [5]. The effects of information flow can be complex and may not be simply about protection for people who have something to hide. Inaccurate information flow can have adverse long-term implications for individuals and companies. Consider a scenario where someone’s computer or tablet is stolen. The perpetrator uses identification information stored on the device to access their social media page which could lead to access to their contacts, friends and friends of their “friends” then participate in illegal activities and engage in anti-social activities such as hacking, spreading viruses, fraud and identity theft. The victim is now in danger of being accused of criminal intentions, or worse. These kinds of situations are possible because of technology and networked systems. Users of social media need to be aware of the risks that are associated with participation.
\nThe concept of social networking pre-dates the Internet and mass communication as people are said to be social creatures who when working in groups can achieve results in a value greater than the sun of its parts [11]. The explosive growth in the use of social media over the past decade has made it one of the most popular Internet services in the world, providing new avenues to “see and be seen” [12, 13]. The use of social media has changed the communication landscape resulting in changes in ethical norms and behavior. The unprecedented level of growth in usage has resulted in the reduction in the use of other media and changes in areas including civic and political engagement, privacy and safety [14]. Alexa, a company that keeps track of traffic on the Web, indicates that as of August, 2019 YouTube, Facebook and Twitter are among the top four (4) most visited sites with only Google, being the most popular search engine, surpassing these social media sites.
\nSocial media sites can be described as online services that allow users to create profiles which are “public, semi-public” or both. Users may create individual profiles and/or become a part of a group of people with whom they may be acquainted offline [15]. They also provide avenues to create virtual friendships. Through these virtual friendships, people may access details about their contacts ranging from personal background information and interests to location. Social networking sites provide various tools to facilitate communication. These include chat rooms, blogs, private messages, public comments, ways of uploading content external to the site and sharing videos and photographs. Social media is therefore drastically changing the way people communicate and form relationships.
\nToday social media has proven to be one of the most, if not the most effective medium for the dissemination of information to various audiences. The power of this medium is phenomenal and ranges from its ability to overturn governments (e.g., Moldova), to mobilize protests, assist with getting support for humanitarian aid, organize political campaigns, organize groups to delay the passing of legislation (as in the case with the copyright bill in Canada) to making social media billionaires and millionaires [16, 17]. The enabling nature and the structure of the media that social networking offers provide a wide range of opportunities that were nonexistent before technology. Facebook and YouTube marketers and trainers provide two examples. Today people can interact with and learn from people millions of miles away. The global reach of this medium has removed all former pre-defined boundaries including geographical, social and any other that existed previously. Technological advancements such as Web 2.0 and Web 4.0 which provide the framework for collaboration, have given new meaning to life from various perspectives: political, institutional and social.
\nSocial medial and the information/digital era have “redefined” privacy. In today’s Information Technology—configured societies, where there is continuous monitoring, privacy has taken on a new meaning. Technologies such as closed-circuit cameras (CCTV) are prevalent in public spaces or in some private spaces including our work and home [7, 18]. Personal computers and devices such as our smart phones enabled with Global Positioning System (GPS), Geo locations and Geo maps connected to these devices make privacy as we know it, a thing of the past. Recent reports indicate that some of the largest companies such as Amazon, Microsoft and Facebook as well as various government agencies are collecting information without consent and storing it in databases for future use. It is almost impossible to say privacy exists in this digital world (@nowthisnews).
\nThe open nature of the social networking sites and the avenues they provide for sharing information in a “public or semi-public” space create privacy concerns by their very construct. Information that is inappropriate for some audiences are many times inadvertently made visible to groups other than those intended and can sometimes result in future negative outcomes. One such example is a well-known case recorded in an article entitled “The Web Means the End of Forgetting” that involved a young woman who was denied her college license because of backlash from photographs posted on social media in her private engagement.
\nTechnology has reduced the gap between professional and personal spaces and often results in information exposure to the wrong audience [19]. The reduction in the separation of professional and personal spaces can affect image management especially in a professional setting resulting in the erosion of traditional professional image and impression management. Determining the secondary use of personal information and those who have access to this information should be the prerogative of the individual or group to whom the information belongs. However, engaging in social media activities has removed this control.
\nPrivacy on social networking sites (SNSs) is heavily dependent on the users of these networks because sharing information is the primary way of participating in social communities. Privacy in SNSs is “multifaceted.” Users of these platforms are responsible for protecting their information from third-party data collection and managing their personal profiles. However, participants are usually more willing to give personal and more private information in SNSs than anywhere else on the Internet. This can be attributed to the feeling of community, comfort and family that these media provide for the most part. Privacy controls are not the priority of social networking site designers and only a small number of the young adolescent users change the default privacy settings of their accounts [20, 21]. This opens the door for breaches especially among the most vulnerable user groups, namely young children, teenagers and the elderly. The nature of social networking sites such as Facebook and Twitter and other social media platforms cause users to re-evaluate and often change their personal privacy standards in order to participate in these social networked communities [13].
\nWhile there are tremendous benefits that can be derived from the effective use of social media there are some unavoidable risks that are involved in its use. Much attention should therefore be given to what is shared in these forums. Social platforms such as Facebook, Twitter and YouTube are said to be the most effective media to communicate to Generation Y’s (Gen Y’s), as teens and young adults are the largest user groups on these platforms [22]. However, according to Bolton et al. [22] Gen Y’s use of social media, if left unabated and unmonitored will have long-term implications for privacy and engagement in civic activities as this continuous use is resulting in changes in behavior and social norms as well as increased levels of cyber-crime.
\nToday social networks are becoming the platform of choice for hackers and other perpetrators of antisocial behavior. These media offer large volumes of data/information ranging from an individual’s date of birth, place of residence, place of work/business, to information about family and other personal activities. In many cases users unintentionally disclose information that can be both dangerous and inappropriate. Information regarding activities on social media can have far reaching negative implications for one’s future. A few examples of situations which can, and have been affected are employment, visa acquisition, and college acceptance. Indiscriminate participation has also resulted in situations such identity theft and bank fraud just to list a few. Protecting privacy in today’s networked society can be a great challenge. The digital revolution has indeed distorted our views of privacy, however, there should be clear distinctions between what should be seen by the general public and what should be limited to a selected group. One school of thought is that the only way to have privacy today is not to share information in these networked communities. However, achieving privacy and control over information flows and disclosure in networked communities is an ongoing process in an environment where contexts change quickly and are sometimes blurred. This requires intentional construction of systems that are designed to mitigate privacy issues [13].
\nEthics can be loosely defined as “the right thing to do” or it can be described as the moral philosophy of an individual or group and usually reflects what the individual or group views as good or bad. It is how they classify particular situations by categorizing them as right or wrong. Ethics can also be used to refer to any classification or philosophy of moral values or principles that guides the actions of an individual or group [23]. Ethical values are intended to be guiding principles that if followed, could yield harmonious results and relationships. They seek to give answers to questions such as “How should I be living? How do I achieve the things that are deemed important such as knowledge and happiness or the acquisition of attractive things?” If one chooses happiness, the next question that needs to be answered is “Whose happiness should it be; my own happiness or the happiness of others?” In the domain of social media, some of the ethical questions that must be contemplated and ultimately answered are [24]:
Can this post be regarded as oversharing?
Has the information in this post been distorted in anyway?
What impact will this post have on others?
As previously mentioned, users within the ages 8–15 represent one of the largest social media user groups. These young persons within the 8–15 age range are still learning how to interact with the people around them and are deciding on the moral values that they will embrace. These moral values will help to dictate how they will interact with the world around them. The ethical values that guide our interactions are usually formulated from some moral principle taught to us by someone or a group of individuals including parents, guardians, religious groups, and teachers just to name a few. Many of the Gen Y’s/“Digital Babies” are “newbies” yet are required to determine for themselves the level of responsibility they will display when using the varying social media platforms. This includes considering the impact a post will have on their lives and/or the lives of other persons. They must also understand that when they join a social media network, they are joining a community in which certain behavior must be exhibited. Such responsibility requires a much greater level of maturity than can be expected from them at that age.
\nIt is not uncommon for individuals to post even the smallest details of their lives from the moment they wake up to when they go to bed. They will openly share their location, what they eat at every meal or details about activities typically considered private and personal. They will also share likes and dislikes, thoughts and emotional states and for the most part this has become an accepted norm. Often times however, these shares do not only contain information about the person sharing but information about others as well. Many times, these details are shared on several social media platforms as individuals attempt to ensure that all persons within their social circle are kept updated on their activities. With this openness of sharing risks and challenges arise that are often not considered but can have serious impacts. The speed and scale with which social media creates information and makes it available—almost instantaneously—on a global scale, added to the fact that once something is posted there is really no way of truly removing it, should prompt individuals to think of the possible impact a post can have. Unfortunately, more often than not, posts are made without any thought of the far-reaching impact they can have on the lives of the person posting or others that may be implicated by the post.
\nAccording to Berger and Milkman [25] there are five (5) main reasons why users are compelled to share content online, whether it is every detail or what they deem as highlights of their lives. These are:
cause related
personal connection to content
to feel more involved in the world
to define who they are
to inform and entertain
People generally share because they believe that what they are sharing is important. It is hoped that the shared content will be deemed important to others which will ultimately result in more shares, likes and followers.
\n\nFigure 1 below sums up the findings of Berger and Milkman [25] which shows that the main reason people feel the need to share content on the varying social media platform is that the content relates to what is deemed as worthy cause. 84% of respondents highlighted this as the primary motivation for sharing. Seventy-eight percent said that they share because they feel a personal connection to the content while 69 and 68%, respectively said the content either made them feel more involved with the world or helped them to define who they were. Forty-nine percent share because of the entertainment or information value of the content. A more in depth look at each reason for sharing follows.
\nWhy people share source: Global Social Media Research.
Social media has provided a platform for people to share their thoughts and express concerns with others for what they regard as a worthy cause. Cause related posts are dependent on the interest of the individual. Some persons might share posts related to causes and issues happening in society. In one example, the parents of a baby with an aggressive form of leukemia, who having been told that their child had only 3 months to live unless a suitable donor for a blood stem cell transplant could be found, made an appeal on social media. The appeal was quickly shared and a suitable donor was soon found. While that was for a good cause, many view social media merely as platforms for freedom of speech because anyone can post any content one creates. People think the expression of their thoughts on social media regarding any topic is permissible. The problem with this is that the content may not be accepted by law or it could violate the rights of someone thus giving rise to ethical questions.
\nWhen social media users feel a personal connection to their content, they are more inclined to share the content within their social circles. This is true of information regarding family and personal activities. Content created by users also invokes a deep feeling of connection as it allows the users to tell their stories and it is natural to want the world or at least friends to know of the achievement. This natural need to share content is not new as humans have been doing this in some form or the other, starting with oral history to the media of the day; social media. Sharing the self-created content gives the user the opportunity of satisfying some fundamental needs of humans to be heard, to matter, to be understood and emancipated. The problem with this however is that in an effort to gratify the fundamental needs, borders are crossed because the content may not be sharable (can this content be shared within the share network?), it may not be share-worthy (who is the audience that would appreciate this content?) or it may be out of context (does the content fit the situation?).
\nOne of the driving factors that pushes users to share content is the need to feel more in tune with the world around them. This desire is many times fueled by jealousy. Many social media users are jealous when their friends’ content gets more attention than their own and so there is a lot of pressure to maintain one’s persona in social circles, even when the information is unrealistic, as long as it gets as much attention as possible. Everything has to be perfect. In the case of a photo, for example, there is lighting, camera angle and background to consider. This need for perfection puts a tremendous amount of pressure on individuals to ensure that posted content is “liked” by friends. They often give very little thought to the amount of their friend’s work that may have gone on behind the scenes to achieve that perfect social post.
\nSocial media platforms have provided everyone with a forum to express views, but, as a whole, conversations are more polarized, tribal and hostile. With Facebook for instance, there has been a huge uptick in fake news, altered images, dangerous health claims and cures, and the proliferation of anti-science information. This is very distressing and disturbing because people are too willing to share and to believe without doing their due diligence and fact-checking first.
\nEstablishing one’s individuality in society can be challenging for some persons because not everyone wants to fit in. Some individuals will do all they can to stand out and be noticed. Social media provides the avenue for exposure and many individuals will seek to leverage the media to stand out of the crowd and not just be a fish in the school. Today many young people are currently being brought up in a culture that defines people by their presence on social media where in previous generations, persons were taught to define themselves by their career choices. These lessons would start from childhood by asking children what they wanted to be when they grew up and then rewarding them based on the answers they give [27]. In today’s digital era, however, social media postings and the number of “likes” or “dislikes” they attract, signal what is appealing to others. Therefore, post that are similar to those that receive a large number of likes but which are largely unrealistic are usually made for self-gratification.
\nThe acquisition of knowledge and skills is a vital part of human survival and social media has made this process much easier. It is not uncommon to hear persons realizing that they need a particular knowledge set that they do not possess say “I need to lean to do this. I’ll just YouTube it.” Learning and adapting to change in as short as possible time is vital in today’s society and social media coupled with the Internet put it all at the finger tips. Entertainment has the ability to bring people together and is a good way for people to bond. It provides a diversion from the demands of life and fills leisure time with amusement. Social media is an outlet for fun, pleasurable and enjoyable activities that are so vital to human survival [28]. It is now common place to see persons watching a video, viewing images and reading text that is amusing on any of the available social media platforms. Quite often these videos, images and texts can be both informative and entertaining, but there can be problems however as at times they can cross ethical lines that can lead to conflict.
\nThe use of modern-day technology has brought several benefits. Social media is no different and chief amongst its benefit is the ability to stay connected easily and quickly as well as build relationships with people with similar interests. As with all technology, there are several challenges that can make the use of social media off putting and unpleasant. Some of these challenges appear to be minor but they can have far reaching effects into the lives of the users of social media and it is therefore advised that care be taken to minimize the challenges associated with the use of social media [29].
\nA major challenge with the use of social media is oversharing because when persons share on social media, they tend to share as much as is possible which is often times too much [24]. When persons are out and about doing exciting things, it is natural to want to share this with the world as many users will post a few times a day when they head to lunch, visit a museum, go out to dinner or other places of interest [30]. While this all seems relatively harmless, by using location-based services which pinpoint users with surprising accuracy and in real time, users place themselves in danger of laying out a pattern of movement that can be easily traced. While this seems more like a security or privacy issue it stems from an ethical dilemma—“Am I sharing too much?” Oversharing can also lead to damage of user’s reputation especially if the intent is to leverage the platform for business [24]. Photos of drunken behavior, drug use, partying or other inappropriate content can change how you are viewed by others.
\nAnother ethical challenge users of social media often encounter is that they have no way of authenticating content before sharing, which becomes problematic when the content paints people or establishments negatively. Often times content is shared with them by friends, family and colleagues. The unauthenticated content is then reshared without any thought but sometimes this content may have been maliciously altered so the user unknowingly participates in maligning others. Even if the content is not altered the fact that the content paints someone or something in a bad light should send off warning bells as to whether or not it is right to share the content which is the underlying principle of ethical behavior.
\nSome of the challenges experienced by social media posts are a result of a lack of understanding and sometimes a lack of respect for the varying ethical and moral standpoints of the people involved. We have established that it is typical for persons to post to social media sites without any thought as to how it can affect other persons, but many times these posts are a cause of conflict because of a difference of opinion that may exist and the effect the post may have. Each individual will have his or her own ethical values and if they differ then this can result in conflict [31]. When an executive of a British company made an Instagram post with some racial connotations before boarding a plane to South Africa it started a frenzy that resulted in the executive’s immediate dismissal. Although the executive said it was a joke and there was no prejudice intended, this difference in views as to the implications of the post, resulted in an out of work executive and a company scrambling to maintain its public image.
\nIn this age of sharing, many young persons spend a vast amount of time on social media checking the activities of their “friends” as well as posting on their own activities so their “friends” are aware of what they are up to. Apart from interfering with their academic progress, time spent on these posts at can have long term repercussions. An example is provided by a student of a prominent university who posted pictures of herself having a good time at parties while in school. She was denied employment because of some of her social media posts. While the ethical challenge here is the question of the employee’s right to privacy and whether the individual’s social media profile should affect their ability to fulfill their responsibilities as an employee, the impact on the individual’s long term personal growth is clear.
\nIn today’s information age, one’s digital footprint can make or break someone; it can be the deciding factor on whether or not one achieves one’s life-long ambitions. Unethical behavior and interactions on social media can have far reaching implications both professionally and socially. Posting on the Internet means the “end of forgetting,” therefore, responsible use of this medium is critical. The unethical use of social media has implications for privacy and can result in security breaches both physically and virtually. The use of social media can also result in the loss of privacy as many users are required to provide information that they would not divulge otherwise. Social media use can reveal information that can result in privacy breaches if not managed properly by users. Therefore, educating users of the risks and dangers of the exposure of sensitive information in this space, and encouraging vigilance in the protection of individual privacy on these platforms is paramount. This could result in the reduction of unethical and irresponsible use of these media and facilitate a more secure social environment. The use of social media should be governed by moral and ethical principles that can be applied universally and result in harmonious relationships regardless of race, culture, religious persuasion and social status.
\nAnalysis of the literature and the findings of this research suggest achieving acceptable levels of privacy is very difficult in a networked system and will require much effort on the part of individuals. The largest user groups of social media are unaware of the processes that are required to reduce the level of vulnerability of their personal data. Therefore, educating users of the risk of participating in social media is the social responsibility of these social network platforms. Adapting universally ethical behaviors can mitigate the rise in the number of privacy breaches in the social networking space. This recommendation coincides with philosopher Immanuel Kant’s assertion that, the Biblical principle which states “Do unto others as you have them do unto you” can be applied universally and should guide human interactions [5]. This principle, if adhered to by users of social media and owners of these platforms could raise the awareness of unsuspecting users, reduce unethical interactions and undesirable incidents that could negatively affect privacy, and by extension security in this domain.
\nIntechOpen has always supported new and evolving ideas in scholarly publishing. We understand the community we serve, but to provide an even better service for our IntechOpen Authors and Academic Editors, we have partnered with leading companies and associations in the scientific field and beyond.
",metaTitle:"Partnerships",metaDescription:"IntechOpen was built by scientists, for scientists. We understand the community we serve, but to bring an even better service to the table for IntechOpen Authors and Academic Editors, we partnered with the leading companies and associations in the industry and beyond.",metaKeywords:null,canonicalURL:"/page/partnerships",contentRaw:'[{"type":"htmlEditorComponent","content":"