Search results for: personal information
12222 Exploring the Motivations That Drive Paper Use in Clinical Practice Post-Electronic Health Record Adoption: A Nursing Perspective
Authors: Sinead Impey, Gaye Stephens, Lucy Hederman, Declan O'Sullivan
Abstract:
Continued paper use in the clinical area post-Electronic Health Record (EHR) adoption is regularly linked to hardware and software usability challenges. Although paper is used as a workaround to circumvent challenges, including limited availability of a computer, this perspective does not consider the important role paper, such as the nurses’ handover sheet, play in practice. The purpose of this study is to confirm the hypothesis that paper use post-EHR adoption continues as paper provides both a cognitive tool (that assists with workflow) and a compensation tool (to circumvent usability challenges). Distinguishing the different motivations for continued paper-use could assist future evaluations of electronic record systems. Methods: Qualitative data were collected from three clinical care environments (ICU, general ward and specialist day-care) who used an electronic record for at least 12 months. Data were collected through semi-structured interviews with 22 nurses. Data were transcribed, themes extracted using an inductive bottom-up coding approach and a thematic index constructed. Findings: All nurses interviewed continued to use paper post-EHR adoption. While two distinct motivations for paper use post-EHR adoption were confirmed by the data - paper as a cognitive tool and paper as a compensation tool - further finding was that there was an overlap between the two uses. That is, paper used as a compensation tool could also be adapted to function as a cognitive aid due to its nature (easy to access and annotate) or vice versa. Rather than present paper persistence as having two distinctive motivations, it is more useful to describe it as presenting on a continuum with compensation tool and cognitive tool at either pole. Paper as a cognitive tool referred to pages such as nurses’ handover sheet. These did not form part of the patient’s record, although information could be transcribed from one to the other. Findings suggest that although the patient record was digitised, handover sheets did not fall within this remit. These personal pages continued to be useful post-EHR adoption for capturing personal notes or patient information and so continued to be incorporated into the nurses’ work. Comparatively, the paper used as a compensation tool, such as pre-printed care plans which were stored in the patient's record, appears to have been instigated in reaction to usability challenges. In these instances, it is expected that paper use could reduce or cease when the underlying problem is addressed. There is a danger that as paper affords nurses a temporary information platform that is mobile, easy to access and annotate, its use could become embedded in clinical practice. Conclusion: Paper presents a utility to nursing, either as a cognitive or compensation tool or combination of both. By fully understanding its utility and nuances, organisations can avoid evaluating all incidences of paper use (post-EHR adoption) as arising from usability challenges. Instead, suitable remedies for paper-persistence can be targeted at the root cause.Keywords: cognitive tool, compensation tool, electronic record, handover sheet, nurse, paper persistence
Procedia PDF Downloads 43812221 Dogmatic Analysis of Legal Risks of Using Artificial Intelligence: The European Union and Polish Perspective
Authors: Marianna Iaroslavska
Abstract:
ChatGPT is becoming commonplace. However, only a few people think about the legal risks of using Large Language Model in their daily work. The main dilemmas concern the following areas: who owns the copyright to what somebody creates through ChatGPT; what can OpenAI do with the prompt you enter; can you accidentally infringe on another creator's rights through ChatGPT; what about the protection of the data somebody enters into the chat. This paper will present these and other legal risks of using large language models at work using dogmatic methods and case studies. The paper will present a legal analysis of AI risks against the background of European Union law and Polish law. This analysis will answer questions about how to protect data, how to make sure you do not violate copyright, and what is at stake with the AI Act, which recently came into force in the EU. If your work is related to the EU area, and you use AI in your work, this paper will be a real goldmine for you. The copyright law in force in Poland does not protect your rights to a work that is created with the help of AI. So if you start selling such a work, you may face two main problems. First, someone may steal your work, and you will not be entitled to any protection because work created with AI does not have any legal protection. Second, the AI may have created the work by infringing on another person's copyright, so they will be able to claim damages from you. In addition, the EU's current AI Act imposes a number of additional obligations related to the use of large language models. The AI Act divides artificial intelligence into four risk levels and imposes different requirements depending on the level of risk. The EU regulation is aimed primarily at those developing and marketing artificial intelligence systems in the EU market. In addition to the above obstacles, personal data protection comes into play, which is very strictly regulated in the EU. If you violate personal data by entering information into ChatGPT, you will be liable for violations. When using AI within the EU or in cooperation with entities located in the EU, you have to take into account a lot of risks. This paper will highlight such risks and explain how they can be avoided.Keywords: EU, AI act, copyright, polish law, LLM
Procedia PDF Downloads 1912220 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014
Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini
Abstract:
Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-value12219 Other-Generated Disclosure: A Challenge to Privacy on Social Network Sites
Authors: Tharntip Tawnie Chutikulrungsee, Oliver Kisalay Burmeister, Maumita Bhattacharya, Dragana Calic
Abstract:
Sharing on social network sites (SNSs) has rapidly emerged as a new social norm and has become a global phenomenon. Billions of users reveal not only their own information (self disclosure) but also information about others (other-generated disclosure), resulting in a risk and a serious threat to either personal or informational privacy. Self-disclosure (SD) has been extensively researched in the literature, particularly regarding control of individual and existing privacy management. However, far too little attention has been paid to other-generated disclosure (OGD), especially by insiders. OGD has a strong influence on self-presentation, self-image, and electronic word of mouth (eWOM). Moreover, OGD is more credible and less likely manipulated than SD, but lacks privacy control and legal protection to some extent. This article examines OGD in depth, ranging from motivation to both online and offline impacts, based upon lived experiences from both ‘the disclosed’ and ‘the discloser’. Using purposive sampling, this phenomenological study involves an online survey and in-depth interviews. The findings report the influence of peer disclosure as well as users’ strategies to mitigate privacy issues. This article also calls attention to the challenge of OGD privacy and inadequacies in the law related to privacy protection in the digital domain.Keywords: facebook, online privacy, other-generated disclosure, social networks sites (SNSs)
Procedia PDF Downloads 25012218 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia
Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana
Abstract:
Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization
Procedia PDF Downloads 23512217 A Secure System for Handling Information from Heterogeous Sources
Authors: Shoohira Aftab, Hammad Afzal
Abstract:
Information integration is a well known procedure to provide consolidated view on sets of heterogeneous information sources. It not only provides better statistical analysis of information but also facilitates users to query without any knowledge on the underlying heterogeneous information sources The problem of providing a consolidated view of information can be handled using Semantic data (information stored in such a way that is understandable by machines and integrate-able without manual human intervention). However, integrating information using semantic web technology without any access management enforced, will results in increase of privacy and confidentiality concerns. In this research we have designed and developed a framework that would allow information from heterogeneous formats to be consolidated, thus resolving the issue of interoperability. We have also devised an access control system for defining explicit privacy constraints. We designed and applied our framework on both semantic and non-semantic data from heterogeneous resources. Our approach is validated using scenario based testing.Keywords: information integration, semantic data, interoperability, security, access control system
Procedia PDF Downloads 35412216 Qualitative Profiling in Practice: The Italian Public Employment Services Experience
Authors: L. Agneni, F. Carta, C. Micheletta, V. Tersigni
Abstract:
The development of a qualitative method to profile jobseekers is needed to improve the quality of the Public Employment Services (PES) in Italy. This is why the National Agency for Active Labour Market Policies (ANPAL) decided to introduce a Qualitative Profiling Service in the context of the activities carried out by local employment offices’ operators. The qualitative profiling service provides information and data regarding the jobseeker’s personal transition status, through a semi-structured questionnaire administered to PES clients during the guidance interview. The questionnaire responses allow PES staff to identify, for each client, proper activities and policy measures to support jobseekers in their reintegration into the labour market. Data and information gathered by the qualitative profiling tool are the following: frequency, modalities and motivations for clients to apply to local employment offices; clients’ expectations and skills; difficulties that they have faced during the previous working experiences; strategies, actions undertaken and activated channels for job search. These data are used to assess jobseekers’ personal and career characteristics and to measure their employability level (qualitative profiling index), in order to develop and deliver tailor-made action programmes for each client. This paper illustrates the use of the above-mentioned qualitative profiling service on the national territory and provides an overview of the main findings of the survey: concerning the difficulties that unemployed people face in finding a job and their perception of different aspects related to the transition in the labour market. The survey involved over 10.000 jobseekers registered with the PES. Most of them are beneficiaries of the “citizens' income”, a specific active labour policy and social inclusion measure. Furthermore, data analysis allows classifying jobseekers into a specific group of clients with similar features and behaviours, on the basis of socio-demographic variables, customers' expectations, needs and required skills for the profession for which they seek employment. Finally, the survey collects PES staff opinions and comments concerning clients’ difficulties in finding a new job and also their strengths. This is a starting point for PESs’ operators to define adequate strategies to facilitate jobseekers’ access or reintegration into the labour market.Keywords: labour market transition, public employment services, qualitative profiling, vocational guidance
Procedia PDF Downloads 13912215 Assessing a Potential Conceive Design Implement Operate Curricular Change in an Engineering Degree
Authors: L. Miranda
Abstract:
The requirements of the engineering education are nowadays very broad and demand a set of skills which demands not only technical knowledge but also the ability to lead and innovate and personal and interpersonal skills. A framework for the assessment of a potential curricular change is necessary to guide the analysis of the program with respect to the stakeholders and the legislation of the country, in order to develop appropriate learning outcomes. A Conceive-Design-Implement-Operate (CDIO) approach was chosen for an evaluation conducted in a mechanical engineering degree in Brazil. The work consisted in the application of a survey with students and professors and a literature review of the legislation and studies that raised the required competences and skills for the modern engineer. The results show a great potential for a CDIO set of skills in engineering degrees in Brazil and reveal the frequent demands of stakeholders before a curricular change.Keywords: curriculum change, conceive design implement operate, accreditation, personal and interpersonal skills
Procedia PDF Downloads 36012214 Intuitional Insight in Islamic Mysticism
Authors: Maryam Bakhtyar, Pegah Akrami
Abstract:
Intuitional insight or mystical cognition is a different insight from common, concrete and intellectual insights. This kind of insight is not achieved by visionary contemplation but by the recitation of God, self-purification, and mystical life. In this insight, there is no distance or medium between the subject of cognition and its object, and they have a sort of unification, unison, and incorporation. As a result, knowledgeable consider this insight as direct, immediate, and personal. The goal of this insight is God, cosmos’ creatures, and the general inner and hidden aspect of the world that is nothing except God’s manifestations in the view of mystics. AS our common cognitions have diversity and stages, intuitional insight also has diversity and levels. As our senses are divided into concrete and rational, mystical discovery is divided into superficial discovery and spiritual one. Based on Islamic mystics, the preferable way to know God and believe in him is intuitional insight. There are two important criteria for evaluating mystical intuition, especially for beginner mystics of intellect and revelation. Indeed, the conclusion and a brief evaluation of Islamic mystics’ viewpoint is the main subject of this paper.Keywords: intuition, discovery, mystical insight, personal knowledge, superficial discovery, spiritual discovery
Procedia PDF Downloads 9312213 CSRFDtool: Automated Detection and Prevention of a Reflected Cross-Site Request Forgery
Authors: Alaa A. Almarzuki, Nora A. Farraj, Aisha M. Alshiky, Omar A. Batarfi
Abstract:
The number of internet users is dramatically increased every year. Most of these users are exposed to the dangers of attackers in one way or another. The reason for this lies in the presence of many weaknesses that are not known for native users. In addition, the lack of user awareness is considered as the main reason for falling into the attackers’ snares. Cross Site Request Forgery (CSRF) has placed in the list of the most dangerous threats to security in OWASP Top Ten for 2013. CSRF is an attack that forces the user’s browser to send or perform unwanted request or action without user awareness by exploiting a valid session between the browser and the server. When CSRF attack successes, it leads to many bad consequences. An attacker may reach private and personal information and modify it. This paper aims to detect and prevent a specific type of CSRF, called reflected CSRF. In a reflected CSRF, a malicious code could be injected by the attackers. This paper explores how CSRF Detection Extension prevents the reflected CSRF by checking browser specific information. Our evaluation shows that the proposed solution succeeds in preventing this type of attack.Keywords: CSRF, CSRF detection extension, attackers, attacks
Procedia PDF Downloads 41212212 Interface between Personal Values and Social Entrepreneurship in Social Projects That Develop Sports Practice
Authors: Leticia Lengler, Jefferson Oliveira, Vania Estivalete, Jordana Marques Kneipp
Abstract:
The context of social, economic and environmental transformations has driven innumerable changes in the organizational environment, influencing the social interactions that occur in this scenario. In this sense, social entrepreneurship emerges as a unique opportunity to challenge, question, rethink certain concepts and traditional theories widely discussed in relation to entrepreneurship. Therefore, the interest in studying personal values has been based on the idea that they might be predictors of the behavior of individuals. As an attempt to relate personal values with the characteristics of social entrepreneurs, this study aims to investigate the salient values and the social entrepreneurship perceptions that occur in two social projects responsible for developing sports skills among the students. For purposes of analysis, it is intended to consider: (i) a description of both Social Projects and their respective institutions, considering their history and relevance in the context; (ii) analysis of the personal values of the idealizers and teachers responsible for the projects, (iii) identification of the characteristics of social entrepreneurship manifested in the two projects, and (iv) discussion of similarities and disparities of the categories identified among the participants of the projects. Therefore, this study will carry a qualitative analysis from the interviews with 10 participants of each social project (named Projeto Remar/ASENA and Projeto Mãos Dadas/JUDÔ SANTA MARIA): 2 projects coordinators, 2 students, 2 parents of students, 2 physical education internships and 2 businessmen who stablished a partnership with each project. The data collection will be done through semi-structured interviews that are going to last around 30 minutes each, being recorded, transcribed and later analyzed, through the categorical analysis. The option for categorical analysis is supported by the fact that it is the best alternative when one wants to study values, opinions, attitudes and beliefs, through qualitative ones. In the present research, the pre-analysis phase consisted of an organization of the material collected during the research with Remar and Mãos Dadas Project, and a dynamic reading of this material, seeking to identify the characteristics of social entrepreneurship and values addressed in the study. In the analytical description phase, a more in-depth analysis of the material collected in the research will be carried out. The third phase, referred to as referential interpretation or treatment of results obtained will allow to verify the homogeneity and the heterogeneity among the participants' perceptions of the projects. Some preliminary results coming from the first interviews revealed the projects are guided by values such as cooperation, respect, well-being and nature preservation. These values are linked to the social entrepreneurship perception of the projects managers, who established their activities in behalf of the local community.Keywords: personal values, social entrepreneurship, social projects, sports participants
Procedia PDF Downloads 36212211 The Role of Online Videos in Undergraduate Casual-Leisure Information Behaviors
Authors: Nei-Ching Yeh
Abstract:
This study describes undergraduate casual-leisure information behaviors relevant to online videos. Diaries and in-depth interviews were used to collect data. Twenty-four undergraduates participated in this study (9 men, 15 women; all were aged 18–22 years). This study presents a model of casual-leisure information behaviors and contributes new insights into user experience in casual-leisure settings, such as online video programs, with implications for other information domains.Keywords: casual-leisure information behaviors, information behavior, online videos, role
Procedia PDF Downloads 30812210 Influence of Social Media on Perceived Learning Outcome of Agricultural Students in Tertiary Institutions in Oyo State, Nigeria
Authors: Adedoyin Opeyemi Osokoya
Abstract:
The study assesses the influence of social media on perceived learning outcome of agricultural science students in tertiary institutions in Oyo state, Nigeria. The four-stage sampling procedure was used to select participants. All students in the seven tertiary institutions that offer agriculture science as a course of study in Oyo State was the population. A university, a college of agriculture and a college of education were sampled, and a department from each was randomly selected. Twenty percent of the students’ population in the respective selected department gave a sample size of 165. Questionnaire was used to collect information on respondents’ personal characteristics and information related to access to social media. Data were analysed using descriptive statistics, chi-square, correlation, and multiple regression at the 0.05 confidence level. Age and household size were 21.13 ± 2.64 years and 6 ± 2.1 persons respectively. All respondents had access to social media, majority (86.1%) owned Android phone, 57.6% and 52.7% use social media for course work and entertainment respectively, while the commonly visited sites were WhatsApp, Facebook, Google, Opera mini. Over half (53.9%) had an unfavourable attitude towards the use of social media for learning; benefits of the use of social media for learning was high (56.4%). Removal of information barrier created by distance (x̄=1.58) was the most derived benefit, while inadequate power supply (x̄=2.36), was the most severe constraints. Age (β=0.23), sex (β=0.37), ownership of Android phone (β=-1.29), attitude (β=0.37), constraints (β =-0.26) and use of social media (β=0.23) were significant predictors of influence on perceived learning outcomes.Keywords: use of social media, agricultural science students, undergraduates of tertiary institutions, Oyo State of Nigeria
Procedia PDF Downloads 13812209 Analysis of Expert Possibilities While Identifying Human Teeth
Authors: Saule Mussabekova
Abstract:
Forensic investigation of human teeth plays an important role in detection of crime, particularly in cases of personal identification of dead bodies changed by putrefactive processes or skeletonized bodies as well as when finding bodies of unknown persons. 152 teeth have been investigated; 85 of them belonged to men and 67 belonged to women taken from alive people of different age. Teeth have been investigated after extraction. Two types of teeth have been investigated: teeth without integrity violation of dental crown and teeth with different degrees of its violation. Additionally, 517 teeth have been investigated that were collected from dead bodies, 252 of which belonged to women and 265 belonged to men, whatever the cause of death with death limitation from 1 month to 20 years. Isohemagglutinating serums and Coliclons of different series have been used for the research of tooth-group specificity by serological methods according to the AB0 system. Standard protocols of different techniques have been used for DNA purification from teeth (by reagent Chelex 100 produced by Bio-Rad using reagent kit 'DNA IQTM System' produced by Promega company (USA) and using columns 'QIAamp DNA Investigator Kit' produced by Qiagen company). Results of comparative forensic investigation of human teeth using serological and molecular genetic methods have shown that use of serological methods for forensic identification is sensible only in cases of preselection prior to the next molecular genetic investigation as well as in cases of impossibility of corresponding genetic investigation for different objective reasons. A number of advantages of methods of molecular genetics in the dental investigation have been marked, particularly in putrefactive changes, in personal identification. Key moments of modern condition of personal identification have been reflected according to dental state. Prospective directions of advance preparation of material have been emphasized for identification of teeth in forensic practice.Keywords: dental state, forensic identification, molecular genetic analysis, teeth
Procedia PDF Downloads 14012208 Open Minds but Closed Access: Why Are There so Few Gold Open Access LIS Journals And Why Are so Many Librarians Unwilling to Unlock Their Scholarship?
Authors: Sarah Baker, Jayati Chaudhuri
Abstract:
Librarians have embraced the open access movement in all disciplines but their own. They are strong advocates on college campuses and curate institutional repositories, yet there are surprisingly few open access LIS journals. Presenters evaluated the open access availability of library and information science literature. After analyzing the top 100 library science journals (the top 50 journals from Scimago and JCR) and finding very few gold open access journals, they then investigated the availability of open access articles from the top 10 closed access journals. Presenters would like to generate a conversation on what type of proactive approach librarians can take to increase open access to literature within our discipline. Librarians like their colleagues in other disciplines are not motivated to submit their articles to their institutional repositories. Presenters have found a similar reluctance from their fellow colleagues regarding open access initiatives on campus. Presenters will describe Open Access Week activities as part of a campus-wide initiative and share some faculty comments, concerns, and misconceptions that came up as a part of this dialog. Presenters will discuss their personal experiences providing access to faculty publications through the California State University Los Angeles institutional repository.Keywords: faculty scholarship, institutional repositories, library and information science journals, open access
Procedia PDF Downloads 32912207 Interoperable Design Coordination Method for Sharing Communication Information Using Building Information Model Collaboration Format
Authors: Jin Gang Lee, Hyun-Soo Lee, Moonseo Park
Abstract:
The utilization of BIM and IFC allows project participants to collaborate across different areas by consistently sharing interoperable product information represented in a model. Comments or markups generated during the coordination process can be categorized as communication information, which can be shared in less standardized manner. It can be difficult to manage and reuse such information compared to the product information in a model. The present study proposes an interoperable coordination method using BCF (the BIM Collaboration Format) for managing and sharing the communication information during BIM based coordination process. A management function for coordination in the BIM collaboration system is developed to assess its ability to share the communication information in BIM collaboration projects. This approach systematically links communication information during the coordination process to the building model and serves as a type of storage system for retrieving knowledge created during BIM collaboration projects.Keywords: design coordination, building information model, BIM collaboration format, industry foundation classes
Procedia PDF Downloads 43212206 Human Computer Interaction Using Computer Vision and Speech Processing
Authors: Shreyansh Jain Jeetmal, Shobith P. Chadaga, Shreyas H. Srinivas
Abstract:
Internet of Things (IoT) is seen as the next major step in the ongoing revolution in the Information Age. It is predicted that in the near future billions of embedded devices will be communicating with each other to perform a plethora of tasks with or without human intervention. One of the major ongoing hotbed of research activity in IoT is Human Computer Interaction (HCI). HCI is used to facilitate communication between an intelligent system and a user. An intelligent system typically comprises of a system consisting of various sensors, actuators and embedded controllers which communicate with each other to monitor data collected from the environment. Communication by the user to the system is typically done using voice. One of the major ongoing applications of HCI is in home automation as a personal assistant. The prime objective of our project is to implement a use case of HCI for home automation. Our system is designed to detect and recognize the users and personalize the appliances in the house according to their individual preferences. Our HCI system is also capable of speaking with the user when certain commands are spoken such as searching on the web for information and controlling appliances. Our system can also monitor the environment in the house such as air quality and gas leakages for added safety.Keywords: human computer interaction, internet of things, computer vision, sensor networks, speech to text, text to speech, android
Procedia PDF Downloads 36112205 The Effect of Information Technologies on Business Performance: An Application on Small Hotels
Authors: Abdullah Karaman, Kursad Sayin
Abstract:
In this research, which information technologies are used in small hotel businesses, and the information technologies-performance perception of the managers are pointed out. During the research, the questionnaire was prepared and the small scale hotel managers were interviewed face to face and they filled out the questionnaire and the answers acquired were evaluated. As the result of the research, it was obtained that the managers do not care much about the information technologies usage in practice even though they accepted that the information technologies are important in terms of performance.Keywords: information technologies, managers, performance, small hotels
Procedia PDF Downloads 48812204 Competencies of a Commercial Grain Farmer: A Classic Grounded Theory Approach
Authors: Thapelo Jacob Moloi
Abstract:
This paper purports to present the findings in relation to the competencies of commercial grain farmers using a classic grounded theory method. A total of about eighteen semi-structured interviews with farmers, former farmers, farm workers, and agriculture experts were conducted. Findings explored competencies in the form of skills, knowledge and personal attributes that commercial grain farmers possess. Skills range from production skills, financial management skill, time management skill, human resource management skill, planning skill to mechanical skill. Knowledge ranges from soil preparation, locality, and technology to weather knowledge. The personal attributes that contribute to shaping a commercial grain farmer are so many, but for this study, seven stood out as a passion, work dedication, self-efficacy, humbleness, intelligence, emotional stability, and patience.Keywords: grain farming, farming competencies, classic grounded theory, competency model
Procedia PDF Downloads 7712203 A Study on Occupational Injuries among Building Construction Workers in Bhubaneswar City Odisha
Authors: Rahul Pal
Abstract:
In India, construction industry plays a vital role in the development of infrastructures. It is one of the most hazardous industries. Construction workers are a group that is particularly vulnerable to health risks because they have few legal protection. India has the world’s highest accident rate among construction workers. This study aimed to investigate the prevalence of occupation injury among construction workers and to find out the factors responsible for such injuries. Methodology: A cross-sectional study using a semi-structured questionnaire among 305 construction workers in Bhubaneswar city. In this study, it was found that the overall prevalence of injury was 43.28% in the previous one year period. Majority of the construction workers were less experience in the construction work. Factors responsible for injuries are fall of the object followed by striking, and majority of the workers reported their injuries to have occurred in the summer season. And most of the construction workers are not using personal protective equipment (PPE). Conclusion: Given the occupational injuries, the majority of the construction workers are injured in this study; there is a need to address this issue to ensure necessary step for the safety and well-being of construction workers.Keywords: construction, construction workers, occupational injuries, personal protective equipment
Procedia PDF Downloads 19412202 Exploiting JPEG2000 into Reversible Information
Authors: Te-Jen Chang, I-Hui Pan, Kuang-Hsiung Tan, Shan-Jen Cheng, Chien-Wu Lan, Chih-Chan Hu
Abstract:
With the event of multimedia age in order to protect data not to be tampered, damaged, and faked, information hiding technologies are proposed. Information hiding means important secret information is hidden into cover multimedia and then camouflaged media is produced. This camouflaged media has the characteristic of natural protection. Under the undoubted situation, important secret information is transmitted out.Reversible information hiding technologies for high capacity is proposed in this paper. The gray images are as cover media in this technology. We compress gray images and compare with the original image to produce the estimated differences. By using the estimated differences, expression information hiding is used, and higher information capacity can be achieved. According to experimental results, the proposed technology can be approved. For these experiments, the whole capacity of information payload and image quality can be satisfied.Keywords: cover media, camouflaged media, reversible information hiding, gray image
Procedia PDF Downloads 32612201 Transforming Personal Healthcare through Patient Engagement: An In-Depth Analysis of Tools and Methods for the Digital Age
Authors: Emily Hickmann, Peggy Richter, Maren Kaehlig, Hannes Schlieter
Abstract:
Patient engagement is a cornerstone of high-quality care and essential for patients with chronic diseases to achieve improved health outcomes. Through digital transformation, possibilities to engage patients in their personal healthcare have multiplied. However, the exploitation of this potential is still lagging. To support the transmission of patient engagement theory into practice, this paper’s objective is to give a state-of-the-art overview of patient engagement tools and methods. A systematic literature review was conducted. Overall, 56 tools and methods were extracted and synthesized according to the four attributes of patient engagement, i.e., personalization, access, commitment, and therapeutic alliance. The results are discussed in terms of their potential to be implemented in digital health solutions under consideration of the “computers are social actors” (CASA) paradigm. It is concluded that digital health can catalyze patient engagement in practice, and a broad future research agenda is formulated.Keywords: chronic diseases, digitalization, patient-centeredness, patient empowerment, patient engagement
Procedia PDF Downloads 11612200 Freedom of Information and Freedom of Expression
Authors: Amin Pashaye Amiri
Abstract:
Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.Keywords: freedom of information, freedom of expression, human rights, government information
Procedia PDF Downloads 54712199 Privacy Paradox and the Internet of Medical Things
Authors: Isabell Koinig, Sandra Diehl
Abstract:
In recent years, the health-care context has not been left unaffected by technological developments. In recent years, the Internet of Medical Things (IoMT)has not only led to a collaboration between disease management and advanced care coordination but also to more personalized health care and patient empowerment. With more than 40 % of all health technology being IoMT-related by 2020, questions regarding privacy become more prevalent, even more so during COVID-19when apps allowing for an intensive tracking of people’s whereabouts and their personal contacts cause privacy advocates to protest and revolt. There is a widespread tendency that even though users may express concerns and fears about their privacy, they behave in a manner that appears to contradict their statements by disclosing personal data. In literature, this phenomenon is discussed as a privacy paradox. While there are some studies investigating the privacy paradox in general, there is only scarce research related to the privacy paradox in the health sector and, to the authors’ knowledge, no empirical study investigating young people’s attitudes toward data security when using wearables and health apps. The empirical study presented in this paper tries to reduce this research gap by focusing on the area of digital and mobile health. It sets out to investigate the degree of importance individuals attribute to protecting their privacy and individual privacy protection strategies. Moreover, the question to which degree individuals between the ages of 20 and 30 years are willing to grant commercial parties access to their private data to use digital health services and apps are put to the test. To answer this research question, results from 6 focus groups with 40 participants will be presented. The focus was put on this age segment that has grown up in a digitally immersed environment. Moreover, it is particularly the young generation who is not only interested in health and fitness but also already uses health-supporting apps or gadgets. Approximately one-third of the study participants were students. Subjects were recruited in August and September 2019 by two trained researchers via email and were offered an incentive for their participation. Overall, results indicate that the young generation is well informed about the growing data collection and is quite critical of it; moreover, they possess knowledge of the potential side effects associated with this data collection. Most respondents indicated to cautiously handle their data and consider privacy as highly relevant, utilizing a number of protective strategies to ensure the confidentiality of their information. Their willingness to share information in exchange for services was only moderately pronounced, particularly in the health context, since health data was seen as valuable and sensitive. The majority of respondents indicated to rather miss out on using digital and mobile health offerings in order to maintain their privacy. While this behavior might be an unintended consequence, it is an important piece of information for app developers and medical providers, who have to find a way to find a user base for their products against the background of rising user privacy concerns.Keywords: digital health, privacy, privacy paradox, IoMT
Procedia PDF Downloads 13512198 The Quality of Accounting Information of Private Companies in the Czech Republic
Authors: Kateřina Struhařová
Abstract:
The paper gives the evidence of quality of accounting information of Czech private companies. In general the private companies in the Czech Republic do not see the benefits of providing accounting information of high quality. Based on the research of financial statements of entrepreneurs and companies in Zlin region it was confirmed that the quality of accounting information differs among the private entities and that the major impact on the accounting information quality has the fact if the financial statements are audited as well as the size of the entity. Also the foreign shareholders and lenders have some impact on the accounting information quality.Keywords: accounting information quality, financial statements, Czech Republic, private companies
Procedia PDF Downloads 30212197 Intellectual Women: The Continuing Struggle between Marriage and Personal Dreams in Margaret Drabble's a Summer Bird-Cage and The Millstone
Authors: Ashwag Abdul-Hakeem Al-Thubaiti
Abstract:
This study aims at analysing women's hesitant attitudes towards marriage in Margaret Drabble's novels, A Summer-Bird-Cage (1964) and The Millstone (1965), to prove that these ambivalent feelings are due to their search for autonomy. The heroines' radical outlook on independence is only meant to hide their conflict regarding sex-experience and fear of intimacy, a fear that has been enhanced by their rejection of the expression of faith that considers marriage a sacred bond and instead focus on their own identity and dissolve any bond that may affect their independence. To achieve their autonomy, they have to depend on themselves financially and focus on their aspirational goals. This sharp division between the two worlds, the family life and the personal success attributes negatively to their lives and leads to a self-identity crisis. Drabble tends to solve this struggle by awakening their maternal instinct. Once they respect their physical needs and appreciate their role as it is assigned to them by nature and society, they reach a balanced identity.Keywords: autonomy, marriage, maternity, women
Procedia PDF Downloads 56012196 A Double Differential Chaos Shift Keying Scheme for Ultra-Wideband Chaotic Communication Technology Applied in Low-Rate Wireless Personal Area Network
Authors: Ghobad Gorji, Hasan Golabi
Abstract:
The goal of this paper is to describe the design of an ultra-wideband (UWB) system that is optimized for the low-rate wireless personal area network application. To this aim, we propose a system based on direct chaotic communication (DCC) technology. Based on this system, a 2-GHz wide chaotic signal is directly generated into the lower band of the UWB spectrum, i.e., 3.1–5.1 GHz. For this system, two simple modulation schemes, namely chaotic on-off keying (COOK) and differential chaos shift keying (DCSK), were studied before, and their performance was evaluated. We propose a modulation scheme, namely Double DCSK, to improve the performance of UWB DCC. Different characteristics of these systems, with Monte Carlo simulations based on the Additive White Gaussian Noise (AWGN) and the IEEE 802.15.4a standard channel models, are compared.Keywords: UWB, DCC, IEEE 802.15.4a, COOK, DCSK
Procedia PDF Downloads 7212195 Nurse Participation for the Economical Effectiveness in Medical Organizations
Authors: Alua Masalimova, Dameli Sulubecova, Talgat Isaev, Raushan Magzumova
Abstract:
The usual relation to nurses of heads of medical organizations in Kazakhstan is to use them only for per performing medical manipulations, but new economic conditions require the introduction of nursing innovations. There is an increasing need for managers of hospital departments and regions of ambulatory clinics to ensure comfortable conditions for doctors, nurses, aides, as well as monitoring marketing technology (the needs and satisfaction of staff work, the patient satisfaction of the department). It is going to the past the nursing activities as physician assistant performing his prescriptions passively. We are suggesting a model for the developing the head nurse as the manager on the example of Blood Service. We have studied in the scientific-production center of blood transfusion head nurses by the standard method of interviewing for involvement in coordinating the flow of information, promoting the competitiveness of the department. Results: the average age of the respondents 43,1 ± 9,8, female - 100%; manager in the Organization – 9,3 ± 10,3 years. Received positive responses to the knowledge of the nearest offices in providing similar medical service - 14,2%. The cost of similar medical services in other competitive organizations did not know 100%, did a study of employee satisfaction Division labour-85,7% answered negatively, the satisfaction donors work staff studied in 50.0% of cases involved in attracting paid Services Division showed a 28.5% of the respondent. Participation in management decisions medical organization: strategic planning - 14,2%, forming analysis report for the year – 14,2%, recruitment-30.0%, equipment-14.2%. Participation in the social and technical designing workplaces Division staff showed 85,0% of senior nurses. Participate in the cohesion of the staff of the Division method of the team used the 10.0% of respondents. Further, we have studied the behavioral competencies for senior sisters: customer focus – 20,0% of respondents have attended, the ability to work in a team – 40,0%. Personal qualities senior nurses were apparent: sociability – 80,0%, the ability to manage information – 40,0%, to make their own decisions - 14,2%, 28,5% creativity, the desire to improve their professionalism – 50,0%. Thus, the modern market conditions dictate this organization, which works for the rights of economic management; include the competence of the post of the senior nurse knowledge and skills of Marketing Management Department. Skills to analyses the information collected and use of management offers superior medical leadership organization. The medical organization in the recruitment of the senior nurse offices take into account personal qualities: flexibility, fluency of thinking, communication skills and ability to work in a team. As well as leadership qualities, ambition, high emotional and social intelligence, that will bring out the medical unit on competitiveness within the country and abroad.Keywords: blood service, head nurse, manager, skills
Procedia PDF Downloads 24112194 The Impact of Information and Communication Technology on the Performance of Office Technology Managers
Authors: Sunusi Tijjani
Abstract:
Information and communication technology is an indispensable tool in the performance of office technology managers. Today's offices are automated and equipped with modern office machines that enhances and improve the work of office managers. However, today's office technology managers can process, evaluate, manage and communicate all forms of information using technological devices. Information and Communication Technology is viewed as the process of processing, storing ad dissemination information while office technology managers are trained professional who can effectively operate modern office machines, perform administrative duties and attend meetings to take dawn minute of meetings. This paper examines the importance of information and communication technology toward enhancing the work of office managers. It also stresses the importance of information and communication technology toward proper and accurate record management.Keywords: communication, information, technology, managers
Procedia PDF Downloads 48312193 Encounters with the Other Sisters of the Past: the Role of Colonial History and Memory in the Adjustment of the Postcolonial Female Identity
Authors: Fatiha Kaïd Berrahal, Nassima Kaïd, Djihad Affaf Selt
Abstract:
The present paper is a comparative analysis of the Algerian writer Assia Djebar’s women of Algiers in Their Apartment (1982) and the Anglo-Egyptian Ahdaf Soueif’s The Map of Love (1999) foregrounded on the female protagonists’ painfully common colonial and patriarchal experiences, though in different geographical regions of North Africa. This study raises questions pertaining, first, to the emerging contemporary genre “Historiographic meta-fiction” in which the novels examined could be inscribed, then, the interplay of colonial history and personal memory that impinges on the development of the identity of the post-colonial female subject. As the novels alternate between the historical and the autobiographical, we currently seek to understand how it is pertinent and pressing for women to excavate the lost and occluded stories of the past for the adjustment of their present personal identities, which are undoubtedly an important part of the identity of a nation.Keywords: postcolonial feminism, islamic feminism, memory, histoirographic metafiction
Procedia PDF Downloads 642