Search results for: privacy harms
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 506

Search results for: privacy harms

176 System for the Detecting of Fake Profiles on Online Social Networks Using Machine Learning and the Bio-Inspired Algorithms

Authors: Sekkal Nawel, Mahammed Nadir

Abstract:

The proliferation of online activities on Online Social Networks (OSNs) has captured significant user attention. However, this growth has been hindered by the emergence of fraudulent accounts that do not represent real individuals and violate privacy regulations within social network communities. Consequently, it is imperative to identify and remove these profiles to enhance the security of OSN users. In recent years, researchers have turned to machine learning (ML) to develop strategies and methods to tackle this issue. Numerous studies have been conducted in this field to compare various ML-based techniques. However, the existing literature still lacks a comprehensive examination, especially considering different OSN platforms. Additionally, the utilization of bio-inspired algorithms has been largely overlooked. Our study conducts an extensive comparison analysis of various fake profile detection techniques in online social networks. The results of our study indicate that supervised models, along with other machine learning techniques, as well as unsupervised models, are effective for detecting false profiles in social media. To achieve optimal results, we have incorporated six bio-inspired algorithms to enhance the performance of fake profile identification results.

Keywords: machine learning, bio-inspired algorithm, detection, fake profile, system, social network

Procedia PDF Downloads 62
175 Technology for Enhancing the Learning and Teaching Experience in Higher Education

Authors: Sara M. Ismael, Ali H. Al-Badi

Abstract:

The rapid development and growth of technology has changed the method of obtaining information for educators and learners. Technology has created a new world of collaboration and communication among people. Incorporating new technology into the teaching process can enhance learning outcomes. Billions of individuals across the world are now connected together, and are cooperating and contributing their knowledge and intelligence. Time is no longer wasted in waiting until the teacher is ready to share information as learners can go online and get it immediately. The objectives of this paper are to understand the reasons why changes in teaching and learning methods are necessary, to find ways of improving them, and to investigate the challenges that present themselves in the adoption of new ICT tools in higher education institutes. To achieve these objectives two primary research methods were used: questionnaires, which were distributed among students at higher educational institutes and multiple interviews with faculty members (teachers) from different colleges and universities, which were conducted to find out why teaching and learning methodology should change. The findings show that both learners and educators agree that educational technology plays a significant role in enhancing instructors’ teaching style and students’ overall learning experience; however, time constraints, privacy issues, and not being provided with enough up-to-date technology do create some challenges.

Keywords: e-books, educational technology, educators, e-learning, learners, social media, Web 2.0, LMS

Procedia PDF Downloads 269
174 Environmental Impact of Autoclaved Aerated Concrete in Modern Construction: A Case Study from the New Egyptian Administrative Capital

Authors: Esraa A. Khalil, Mohamed N. AbouZeid

Abstract:

Building materials selection is critical for the sustainability of any project. The choice of building materials has a huge impact on the built environment and cost of projects. Building materials emit huge amount of carbon dioxide (CO2) due to the use of cement as a basic component in the manufacturing process and as a binder, which harms our environment. Energy consumption from buildings has increased in the last few years; a huge amount of energy is being wasted from using unsustainable building and finishing materials, as well as from the process of heating and cooling of buildings. In addition, the construction sector in Egypt is taking a good portion of the economy; however, there is a lack of awareness of buildings environmental impacts on the built environment. Using advanced building materials and different wall systems can help in reducing heat consumption, the project’s initial and long-term costs, and minimizing the environmental impacts. Red Bricks is one of the materials that are being used widely in Egypt. There are many other types of bricks such as Autoclaved Aerated Concrete (AAC); however, the use of Red Bricks is dominating the construction industry due to its affordability and availability. This research focuses on the New Egyptian Administrative Capital as a case study to investigate the potential of the influence of using different wall systems such as AAC on the project’s cost and the environment. The aim of this research is to conduct a comparative analysis between the traditional and most commonly used bricks in Egypt, which is Red Bricks, and AAC wall systems. Through an economic and environmental study, the difference between the two wall systems will be justified to encourage the utilization of uncommon techniques in the construction industry to build more affordable, energy efficient and sustainable buildings. The significance of this research is to show the potential of using AAC in the construction industry and its positive influences. The study analyzes the factors associated with choosing suitable building materials for different projects according to the need and criteria of each project and its nature without harming the environment and wasting materials that could be saved or recycled. The New Egyptian Administrative Capital is considered as the country’s new heart, where ideas regarding energy savings and environmental benefits are taken into consideration. Meaning that, Egypt is taking good steps to move towards more sustainable construction. According to the analysis and site visits, there is a potential in reducing the initial costs of buildings by 12.1% and saving energy by using different techniques up to 25%. Interviews with the mega structures project engineers and managers reveal that they are more open to introducing sustainable building materials that will help in saving the environment and moving towards green construction as well as to studying more effective techniques for energy conservation.

Keywords: AAC blocks, building material, environmental impact, modern construction, new Egyptian administrative capital

Procedia PDF Downloads 115
173 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report

Authors: Elizabeta Krstić Vukelja

Abstract:

Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.

Keywords: regulation, healthcare system, personal dana protection, quality data assurance

Procedia PDF Downloads 34
172 Blockchain for Transport: Performance Simulations of Blockchain Network for Emission Monitoring Scenario

Authors: Dermot O'Brien, Vasileios Christaras, Georgios Fontaras, Igor Nai Fovino, Ioannis Kounelis

Abstract:

With the rise of the Internet of Things (IoT), 5G, and blockchain (BC) technologies, vehicles are becoming ever increasingly connected and are already transmitting substantial amounts of data to the original equipment manufacturers (OEMs) servers. This data could be used to help detect mileage fraud and enable more accurate vehicle emissions monitoring. This would not only help regulators but could enable applications such as permitting efficient drivers to pay less tax, geofencing for air quality improvement, as well as pollution tolling and trading platforms for transport-related businesses and EU citizens. Other applications could include traffic management and shared mobility systems. BC enables the transmission of data with additional security and removes single points of failure while maintaining data provenance, identity ownership, and the possibility to retain varying levels of privacy depending on the requirements of the applied use case. This research performs simulations of vehicles interacting with European member state authorities and European Commission BC nodes that are running hyperleger fabric and explores whether the technology is currently feasible for transport applications such as the emission monitoring use-case.

Keywords: future transportation systems, technological innovations, policy approaches for transportation future, economic and regulatory trends, blockchain

Procedia PDF Downloads 169
171 Development of International Entry-Level Nursing Competencies to Address the Continuum of Substance Use

Authors: Cheyenne Johnson, Samantha Robinson, Christina Chant, Ann M. Mitchell, Carol Price, Carmel Clancy, Adam Searby, Deborah S. Finnell

Abstract:

Introduction: Substance use along the continuum from at-risk use to a substance use disorder (SUD) contributes substantially to the burden of disease and related harms worldwide. There is a growing body of literature that highlights the lack of substance use related content in nursing curricula. Furthermore, there is also a lack of consensus on key competencies necessary for entry-level nurses. Globally, there is a lack of established nursing competencies related to prevention, health promotion, harm reduction and treatment of at-risk substance use and SUDs. At a critical time in public health, this gap in nursing curricula contributes to a lack of preparation for entry-level nurses to support people along the continuum of substance use. Thus, in practice, early opportunities for screening, support, and interventions may be missed. To address this gap, an international committee was convened to develop international entry-level nursing competencies specifying the knowledge, skills, and abilities that all nurses should possess in order to address the continuum of substance use. Methodology: An international steering committee, including representation from Canada, United States, United Kingdom, and Australia was established to lead this work over a one-year time period. The steering committee conducted a scoping review, undertaken to examine nursing competency frameworks, and to inform a competency structure that would guide this work. The next steps were to outline key competency areas and establish leaders for working groups to develop the competencies. In addition, a larger international committee was gathered to contribute to competency working groups, review the collective work and concur on the final document. Findings: A comprehensive framework was developed with competencies covering a wide spectrum of substance use across the lifespan and in the context of prevention, health promotion, harm reduction and treatment, including special populations. The development of this competency-based framework meets an identified need to provide guidance for universities, health authorities, policy makers, nursing regulators and other organizations that provide and support nursing education which focuses on care for patients and families with at-risk substance use and SUDs. Conclusion: Utilizing these global competencies as expected outcomes of an educational and skill building curricula for entry-level nurses holds great promise for incorporating evidence-informed training in the care and management of people across the continuum of substance use.

Keywords: addiction nursing, addiction nursing curriculum, competencies, substance use

Procedia PDF Downloads 171
170 Blockchain-Based Approach on Security Enhancement of Distributed System in Healthcare Sector

Authors: Loong Qing Zhe, Foo Jing Heng

Abstract:

A variety of data files are now available on the internet due to the advancement of technology across the globe today. As more and more data are being uploaded on the internet, people are becoming more concerned that their private data, particularly medical health records, are being compromised and sold to others for money. Hence, the accessibility and confidentiality of patients' medical records have to be protected through electronic means. Blockchain technology is introduced to offer patients security against adversaries or unauthorised parties. In the blockchain network, only authorised personnel or organisations that have been validated as nodes may share information and data. For any change within the network, including adding a new block or modifying existing information about the block, a majority of two-thirds of the vote is required to confirm its legitimacy. Additionally, a consortium permission blockchain will connect all the entities within the same community. Consequently, all medical data in the network can be safely shared with all authorised entities. Also, synchronization can be performed within the cloud since the data is real-time. This paper discusses an efficient method for storing and sharing electronic health records (EHRs). It also examines the framework of roles within the blockchain and proposes a new approach to maintain EHRs with keyword indexes to search for patients' medical records while ensuring data privacy.

Keywords: healthcare sectors, distributed system, blockchain, electronic health records (EHR)

Procedia PDF Downloads 183
169 An Analysis of Innovative Cloud Model as Bridging the Gap between Physical and Virtualized Business Environments: The Customer Perspective

Authors: Asim Majeed, Rehan Bhana, Mak Sharma, Rebecca Goode, Nizam Bolia, Mike Lloyd-Williams

Abstract:

This study aims to investigate and explore the underlying causes of security concerns of customers emerged when WHSmith transformed its physical system to virtualized business model through NetSuite. NetSuite is essentially fully integrated software which helps transforming the physical system to virtualized business model. Modern organisations are moving away from traditional business models to cloud based models and consequently it is expected to have a better, secure and innovative environment for customers. The vital issue of the modern age race is the security when transforming virtualized through cloud based models and designers of interactive systems often misunderstand privacy and even often ignore it, thus causing concerns for users. The content analysis approach is being used to collect the qualitative data from 120 online bloggers including TRUSTPILOT. The results and finding provide useful new insights into the nature and form of security concerns of online users after they have used the WHSmith services offered online through their website. Findings have theoretical as well as practical implications for the successful adoption of cloud computing Business-to-Business model and similar systems.

Keywords: innovation, virtualization, cloud computing, organizational flexibility

Procedia PDF Downloads 380
168 Employee Well-being in the Age of AI: Perceptions, Concerns, Behaviors, and Outcomes

Authors: Soheila Sadeghi

Abstract:

— The growing integration of Artificial Intelligence (AI) into Human Resources (HR) processes has transformed the way organizations manage recruitment, performance evaluation, and employee engagement. While AI offers numerous advantages—such as improved efficiency, reduced bias, and hyper-personalization—it raises significant concerns about employee well-being, job security, fairness, and transparency. The study examines how AI shapes employee perceptions, job satisfaction, mental health, and retention. Key findings reveal that: (a) while AI can enhance efficiency and reduce bias, it also raises concerns about job security, fairness, and privacy; (b) transparency in AI systems emerges as a critical factor in fostering trust and positive employee attitudes; and (c) AI systems can both support and undermine employee well-being, depending on how they are implemented and perceived. The research introduces an AI-employee well-being Interaction Framework, illustrating how AI influences employee perceptions, behaviors, and outcomes. Organizational strategies, such as (a) clear communication, (b) upskilling programs, and (c) employee involvement in AI implementation, are identified as crucial for mitigating negative impacts and enhancing positive outcomes. The study concludes that the successful integration of AI in HR requires a balanced approach that (a) prioritizes employee well-being, (b) facilitates human-AI collaboration, and (c) ensures ethical and transparent AI practices alongside technological advancement.

Keywords: artificial intelligence, human resources, employee well-being, job satisfaction, organizational support, transparency in AI

Procedia PDF Downloads 17
167 A Study of Social Media Users’ Switching Behavior

Authors: Chiao-Chen Chang, Yang-Chieh Chin

Abstract:

Social media has created a change in the way the network community is clustered, especially from the location of the community, from the original virtual space to the intertwined network, and thus the communication between people will change from face to face communication to social media-based communication model. However, social media users who have had a fixed engagement may have an intention to switch to another service provider because of the emergence of new forms of social media. For example, some of Facebook or Twitter users switched to Instagram in 2014 because of social media messages or image overloads, and users may seek simpler and instant social media to become their main social networking tool. This study explores the impact of system features overload, information overload, social monitoring concerns, problematic use and privacy concerns as the antecedents on social media fatigue, dissatisfaction, and alternative attractiveness; further influence social media switching. This study also uses the online questionnaire survey method to recover the sample data, and then confirm the factor analysis, path analysis, model fit analysis and mediating analysis with the structural equation model (SEM). Research findings demonstrated that there were significant effects on multiple paths. Based on the research findings, this study puts forward the implications of theory and practice.

Keywords: social media, switching, social media fatigue, alternative attractiveness

Procedia PDF Downloads 136
166 Canadian Business Leaders’ Phenomenological Online Education Expansion

Authors: Amna Khaliq

Abstract:

This research project centers on Canadian business leaders’ phenomenological online education expansion by navigating the challenges faced by strategic leaders concerning the expansion of online education in the Canadian higher education sector from a business perspective. The study identifies the problems and opportunities of faculty members’ transition from traditional face-to-face to online instruction, particularly in the context of technology-enhanced learning (TEL), and their influence on the growth strategies of Canadian educational institutions. It explores strategic leaders’ approaches and the impact of emerging technologies to assist with developing and executing business strategies to expand online education in Canada. As online education has gained prominence in the country, this research addresses a relevant business problem for educational institutions. The research employs a phenomenological approach in the qualitative research design to conduct this investigation. The study interviews eighteen faculty members engaged in online education in Canada. The interview data is analyzed to answer the three research questions for strategic leaders to expand online education with higher education institutions in Canada. The recommendations include 1) data privacy, infrastructure, security, and technology, 2) support and training for student engagement, 3) accessibility and inclusion, and 4) collaboration among institutions associated with expanding online education.

Keywords: strategic leadership, Canada, education, technology

Procedia PDF Downloads 58
165 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 151
164 Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: A. Alssbaiheen, S. Love

Abstract:

Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services.

Keywords: awareness, barriers, challenges, government services, mobile government, m-government, opportunities

Procedia PDF Downloads 461
163 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 92
162 Contribution of Supply Chain Management Practices for Enhancing Healthcare Service Quality: A Quantitative Analysis in Delhi’s Healthcare Sector

Authors: Chitrangi Gupta, Arvind Bhardwaj

Abstract:

This study seeks to investigate and quantify the influence of various dimensions of supply chain management (namely, supplier relationships, compatibility, specifications and standards, delivery processes, and after-sales service) on distinct dimensions of healthcare service quality (specifically, responsiveness, trustworthiness, and security) within the operational framework of XYZ Superspeciality Hospital, situated in Delhi. The name of the Hospital is not being mentioned here because of the privacy policy of the hospital. The primary objective of this research is to elucidate the impact of supply chain management practices on the overall quality of healthcare services offered within hospital settings. Employing a quantitative research design, this study utilizes a hypothesis-testing approach to systematically discern the relationship between supply chain management dimensions and the quality of health services. The findings of this study underscore the significant influence exerted by supply chain management dimensions, specifically supplier relationships, specifications and standards, delivery processes, and after-sales service, on the enhancement of healthcare service quality. Moreover, the study's results reveal that demographic factors such as gender, qualifications, age, and experience do not yield discernible disparities in the relationship between supply chain management and healthcare service quality.

Keywords: supply chain management, healthcare, hospital operations, service delivery

Procedia PDF Downloads 63
161 COVID-19 Laws and Policy: The Use of Policy Surveillance For Better Legal Preparedness

Authors: Francesca Nardi, Kashish Aneja, Katherine Ginsbach

Abstract:

The COVID-19 pandemic has demonstrated both a need for evidence-based and rights-based public health policy and how challenging it can be to make effective decisions with limited information, evidence, and data. The O’Neill Institute, in conjunction with several partners, has been working since the beginning of the pandemic to collect, analyze, and distribute critical data on public health policies enacted in response to COVID-19 around the world in the COVID-19 Law Lab. Well-designed laws and policies can help build strong health systems, implement necessary measures to combat viral transmission, enforce actions that promote public health and safety for everyone, and on the individual level have a direct impact on health outcomes. Poorly designed laws and policies, on the other hand, can fail to achieve the intended results and/or obstruct the realization of fundamental human rights, further disease spread, or cause unintended collateral harms. When done properly, laws can provide the foundation that brings clarity to complexity, embrace nuance, and identifies gaps of uncertainty. However, laws can also shape the societal factors that make disease possible. Law is inseparable from the rest of society, and COVID-19 has exposed just how much laws and policies intersects all facets of society. In the COVID-19 context, evidence-based and well-informed law and policy decisions—made at the right time and in the right place—can and have meant the difference between life or death for many. Having a solid evidentiary base of legal information can promote the understanding of what works well and where, and it can drive resources and action to where they are needed most. We know that legal mechanisms can enable nations to reduce inequities and prepare for emerging threats, like novel pathogens that result in deadly disease outbreaks or antibiotic resistance. The collection and analysis of data on these legal mechanisms is a critical step towards ensuring that legal interventions and legal landscapes are effectively incorporated into more traditional kinds of health science data analyses. The COVID-19 Law Labs see a unique opportunity to collect and analyze this kind of non-traditional data to inform policy using laws and policies from across the globe and across diseases. This global view is critical to assessing the efficacy of policies in a wide range of cultural, economic, and demographic circumstances. The COVID-19 Law Lab is not just a collection of legal texts relating to COVID-19; it is a dataset of concise and actionable legal information that can be used by health researchers, social scientists, academics, human rights advocates, law and policymakers, government decision-makers, and others for cross-disciplinary quantitative and qualitative analysis to identify best practices from this outbreak, and previous ones, to be better prepared for potential future public health events.

Keywords: public health law, surveillance, policy, legal, data

Procedia PDF Downloads 139
160 Development of in vitro Fertilization and Emerging Legal Issues

Authors: Malik Imtiaz Ahmad

Abstract:

The development of In Vitro Fertilization (IVF) has revolutionized the field of reproductive medicine, offering hope to myriad individuals and couples facing infertility issues. IVF, a process involving the fertilization of eggs with sperm outside the body, has evolved over decades from an experimental procedure to a mainstream medical practice. The study sought to understand the evolution of IVF from its early stages to its present status as a groundbreaking fertility treatment. It also aimed to analyze the legal complexities surrounding IVF, including issues like embryo ownership, surrogacy agreements, and custody disputes. This research focused on the multidisciplinary approach involving both medical and legal fields. It aimed to explore the historical evolution of IVF, its techniques, and legal challenges concerning family law, health law, and privacy policies it has given rise to in modern times. This research aimed to provide insights into the intersection of medical technology and the law, offering valuable knowledge for policymakers, legal experts, and individuals involved in IVF. The study utilized various methods, including a thorough literature review, a historical analysis of IVF’s evolution, an examination of legal cases, and a review of emerging regulations. These approaches aimed to provide a comprehensive understanding of IVF and its modern legal issues, facilitating a holistic exploration of the subject matter.

Keywords: in vitro fertilization development, IVF techniques evolution, legal issues in IVF, IVF legal frameworks, ethical dilemmas in IVF

Procedia PDF Downloads 23
159 Mobile Health Apps Can Cause More Harm Due to Health Anxiety Than Good

Authors: Malik Takreem Ahmad, Pablo Lamata, Rasi Mizori

Abstract:

Background: In recent years, mobile health apps have grown in popularity as a means for people to track and manage their health. While there is increasing worry that these applications may potentially contribute to the emergence of health anxiety, they can also help to encourage healthy behaviours and provide access to health information. Objective: The objective of this literature review is to look at available mhealth apps and critically evaluate the compromise between reassurance and anxiety. Methodology: A literature review was carried out to analyse the effects of mhealth apps on the creation of health anxiety within the general population. PubMed and SCOPUS were used to search for relevant articles, and abstracts were screened using inclusion criteria of the terms: mhealth apps; e-Health; healthcare apps; cyberchondria; Health anxiety; illness anxiety disorder. A total of 27 studies were included in the review. Results and discussion: The findings suggest a direct relationship between mobile health app use and health anxiety. The impact of mobile health apps on health anxiety may depend on how they are used - individuals receiving a constant stream of health-related information may trigger unnecessary concern about one's health. The need for more regulation and oversight is identified, which can lead to app quality and safety consistency. There are also concerns about data security and privacy and the resulting "digital gap" for individuals without mobiles or internet access. Conclusion: While health apps can be valuable tools for managing and tracking health, individuals need to use them in a balanced and informed way to avoid increased anxiety.

Keywords: mobile health, mhealth apps, cyberchondria, health anxiety

Procedia PDF Downloads 81
158 The International Prohibition of Religiously-Motivated 'Incitement' to Violence

Authors: J. D. Temperman

Abstract:

Introduction: In particular, in relation to religion, the meaning and scope of freedom of expression have been tested in recent times. This paper investigates the legal justifications for restrictions that have been suggested in this area and asks whether they are sustainable from an international human rights perspective. The universal human rights instruments, particularly the UN International Covenant on Civil and Political Rights (ICCPR), are increasingly geared towards eradicating ‘incitement’ to contingent harms like violence or discrimination, whilst forms of extreme speech that fall short of such incitement are to be protected rather than countered by states. Human Rights Committee’s draft-General Comment on freedom of expression, adopted in 2011, provides another strong indication that this is the envisaged way forward: repealing anti-blasphemy and anti-religious defamation laws, whilst simultaneously increasing efforts to combat ‘incitement’. Within regional human rights frameworks, notably the European Convention system, judgments have in fact supported legal restrictions on both hate speech, holocaust denial, and blasphemy or religious defamation. Major contributions to scholarship: This paper proposes an actus reus for the offense of ‘advocacy of religious hatred that constitutes incitement to discrimination or violence’, as enshrined in Article 20(2) of the UN ICCPR. In underscoring the high threshold of ‘incitement’, the author distinguishes this offense from such notions as ‘blasphemy’ or ‘defamation of religions’. In addition to treating the said provision as a sui generis prohibition, the question is addresses whether a ‘right to be protected against incitement’ may be distilled from the ICCPR. Furthermore, the author will discuss the question of how to judge incitement; notably, is mens rea required to convict someone of incitement, and if so, what degree of mens rea? This analysis also includes the question how to balance content and context factors when addressing alleged instances of incitement, notably what factors make provide for a likelihood that imminent acts of violence or discrimination will ensue from an inciteful speech act? Methodology: This paper takes a double comparative approach: (i) it endeavours to compare and contrast monitoring bodies’ approach to incitement (notably, the UN Human Rights Committee, but also the UN Committee on the Elimination of Racial Discrimination which monitors states’ compliance with Article 4 of ICERD on incitement); and (ii) it endeavours to chart and compare and analyse from an international human rights perspective recent forms of state practice in the field of dealing with incitement (i.e. a comparative legal analysis and vertical human rights analysis of newly emerging incitement legislation in the light of the said international standards). Conclusion: This paper conceptualizes a legal notion – ‘incitement’ – encapsulated in international human rights law that may have a profound bearing on contemporary challenges of radicalization and religious strife.

Keywords: incitement, international human rights law, religious hatred, violence

Procedia PDF Downloads 305
157 Criminalizing the Transmission of HIV-Lessons for South Africa

Authors: Desiree David

Abstract:

South Africa has one of the highest rates of HIV infection in the world, with a sizable percentage of the population living with HIV. A substantial number of new infections occur as a result of sexual activity. South African courts have awarded civil claims for damages as a result of the transmission of HIV as a result of non-disclosure by the HIV-positive sexual partner, and more recently, the criminal courts have also convicted and sentenced individuals accused of infecting others as a result of sexual activity. This paper will analyse some case law from South African court cases that have dealt with criminal convictions for the transmission of HIV, and the potential for more widespread prosecutions of these cases. It will also address the desirability of this trend in light of the social public health system, as well as human rights concerns surrounding this highly contentious issue. This will be done by considering some applicable provisions of the Bill of Rights such as the right to privacy and equality, as espoused in the Constitution of the Republic of South Africa. The paper further addresses the experience of other jurisdictions such as Canada, Singapore, Lesotho and Uganda, by analyzing case law, and consider the pitfalls of criminalizing a wide spectrum of sexual conduct that could result in the transmission of HIV. The paper concludes with a proposal that the issue of criminalizing the transmission of HIV cannot be addressed by the criminal justice system alone, as to do so could result in harsh consequences for those living with HIV. As such individuals may be burdened with additional responsibilities that could potentially impact on the rights of the individual. This may ultimately result in injustice for those living with HIV.

Keywords: criminalization, HIV, human rights, South Africa

Procedia PDF Downloads 335
156 Mental Health and Technology: Evidence Review

Authors: Kylie Henderson

Abstract:

Adapting mental health interventions is important when providing support to those experiencing difficulties. This analysis aimed to explore and evaluate the effectiveness of various forms of mental health interventions. Literature that has analysed face-to-face (F2F), phone (Telehealth), mobile (mHealth) and online (e-interventions) interferences found all interventions were effective in reducing and treating symptoms of mental health disorders. F2F and Telehealth interventions facilitated greater engagement and client satisfaction. Due to accessibility and privacy, mHealth and e-interventions were the preferred methods of engagement with health services for youth and young adults. Regardless, these interventions still identified several barriers of high dropout, low adherence, and lack of awareness. Additionally, a large proportion of interventions lacked evidence-based foundations. Exploration of interventions that utilise a variety of interfaces, as well as incorporated evidence-based literature and clinician experience, show that they benefit those experiencing mental health difficulties. Applications like YourHealth+ provide a combination of interventions (F2F, mHealth, and e-interventions) to improve the wellbeing of job seekers and employment consults. Individuals that have used the application in conjunction with therapy have reported feeling more empowered and demonstrated improved wellbeing. Practitioners have also described improved confidence in their ability to provide support to clients. Therefore, it can be proposed that utilising a variety of interventions as well as incorporating literature and experience is beneficial to those experiencing mental health difficulties and to health practitioners.

Keywords: face-to-face, e-interventions, mHealth, YourHealth+

Procedia PDF Downloads 135
155 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 328
154 The Effect of Clover Honey Supplementation on the Anthropometric Measurements and Lipid Profile of Malnourished Infants and Children

Authors: Bassma A. Abdelhaleem, Mamdouh A. Abdulrhman, Nagwa I. Mohamed

Abstract:

Malnutrition in children is an increasing problem worldwide which may result in both short and long-term irreversible negative health outcomes. Severe Acute Malnutrition (SAM) affects more than 18 million children each year, mostly living in low-income settings. SAM contributes to 45% of all deaths in children less than five years of age. Honey is a natural sweetener, containing mainly monosaccharides (up to 80%), disaccharides (3–5%), water (17–20%), and a wide range of minor constituents such as vitamins, minerals, proteins, amino acids, enzymes, and phytochemicals, mainly phenolic acids, and flavonoids. Honey has been used in many cultures around the world due to its known nutritional and medicinal benefits including the treatment of hypercholesterolemia. Despite its use since ancient times yet little is known about its potential benefits for malnourished children. Honey has the potential to be an affordable solution for malnourished low-income children as it is nutrient-dense and calorie dense food, easily absorbed, highly palatable, enhances appetite, and boosts immunity. This study assessed the effect of clover honey supplementation on the anthropometric measurements and lipid profile of malnourished infants and children. A prospective interventional clinical trial was conducted between November 2019 to November 2020, on 40 malnourished infants and children divided into two groups: Group A (20 children; 11 males and 9 females) received honey in a dose of 1.75ml/kg/dose, twice weekly for 12 weeks and Group B (20 children; 6 males and 14 females) received placebo. Written informed consent was obtained for parents/guardians. Patients were recruited from the Pediatric Nutrition Clinic at Ain Shams University. Anthropometric measurements (weight, height, body mass index, head circumference, and mid-arm circumference) and fasting serum cholesterol levels were measured at baseline and after 3 months. The 3-month honey consumption had a statistically highly significant effect on increasing weight, height, and body mass index and lowering fasting serum cholesterol levels in primary malnourished infants and children. Weight, height, body mass index, and fasting serum cholesterol level before honey consumption were (9.49 ± 2.03, 81.45 ± 8.31, 14.24 ± 2.15, 178.00 ± 20.91) and after 3 months of honey consumption were (10.91 ± 2.11, 84.80 ± 8.23, 15.07 ± 2.05, 162.45 ± 19.73) respectively with P-value < 0.01. Our results showed a significant desirable effect of honey consumption on changes in nutritional status based on weight, height, and body mass index, and has a favourable effect on lowering fasting serum cholesterol levels. These results propose the use of honey as an affordable solution to improve malnutrition, particularly in low-income countries. However, further research needs to weigh benefits against potential harms including the risk of botulinum toxin that is historically associated with honey consumption in early childhood.

Keywords: clinical trial, dyslipidemia, honey, malnutrition

Procedia PDF Downloads 100
153 Context-Aware Alert Method in Hajj Pilgrim Location-Based Tracking System

Authors: Syarif Hidayat

Abstract:

As millions of people with different backgrounds perform hajj every year in Saudi Arabia, it brings out several problems. Missing people is among many crucial problems need to be encountered. Some people might have had insufficient knowledge of using tracking system equipment. Other might become a victim of an accident, lose consciousness, or even died, prohibiting them to perform certain activity. For those reasons, people could not send proper SOS message. The major contribution of this paper is the application of the diverse alert method in pilgrims tracking system. It offers a simple yet robust solution to send SOS message by pilgrims during Hajj. Knowledge of context aware computing is assumed herein. This study presents four methods that could be utilized by pilgrims to send SOS. The first method is simple mobile application contains only a button. The second method is based on behavior analysis based off GPS location movement anomaly. The third method is by introducing pressing pattern to smartwatch physical button as a panic button. The fourth method is by identifying certain accelerometer pattern recognition as a sign of emergency situations. Presented method in this paper would be an important part of pilgrims tracking system. The discussion provided here includes easy to use design whilst maintaining tracking accuracy, privacy, and security of its users.

Keywords: context aware computing, emergency alert system, GPS, hajj pilgrim tracking, location-based services

Procedia PDF Downloads 211
152 Digital Innovation and Business Transformation

Authors: Bisola Stella Sonde

Abstract:

Digital innovation has emerged as a pivotal driver of business transformation in the contemporary landscape. This case study research explores the dynamic interplay between digital innovation and the profound metamorphosis of businesses across industries. It delves into the multifaceted dimensions of digital innovation, elucidating its impact on organizational structures, customer experiences, and operational paradigms. The study investigates real-world instances of businesses harnessing digital technologies to enhance their competitiveness, agility, and sustainability. It scrutinizes the strategic adoption of digital platforms, data analytics, artificial intelligence, and emerging technologies as catalysts for transformative change. The cases encompass a diverse spectrum of industries, spanning from traditional enterprises to disruptive startups, offering insights into the universal relevance of digital innovation. Moreover, the research scrutinizes the challenges and opportunities posed by the digital era, shedding light on the intricacies of managing cultural shifts, data privacy, and cybersecurity concerns in the pursuit of innovation. It unveils the strategies that organizations employ to adapt, thrive, and lead in the era of digital disruption. In summary, this case study research underscores the imperative of embracing digital innovation as a cornerstone of business transformation. It offers a comprehensive exploration of the contemporary digital landscape, offering valuable lessons for organizations striving to navigate the ever-evolving terrain of the digital age.

Keywords: business transformation, digital innovation, emerging technologies, organizational structures

Procedia PDF Downloads 53
151 Psychological Perspectives on Modern Restaurant Interior Design Based on Traditional Elements (Case Study: Interior Design of the Mesineh Restaurant, Tehran, Iran)

Authors: Raheleh Saifiabolhassan

Abstract:

After the post-industrial era, when a wide variety of foods and drinks are readily available everywhere, the motive has shifted from meeting basic nutritional needs to enjoy the eating experience. Today, behavioral environmental studies are an essential branch of science when it comes to understanding, analyzing, and evaluating how humans react to the environment. Similarly, these studies explore customer-influencing factors and the effectiveness of restaurant designs. To facilitate a pleasant dining experience, the authors focused on acoustics, flexibility, and lighting. In this study, 2700 square feet of surface area was used to plan a restaurant (called Mesineh) based on behavioral science, considering many factors related to the interaction between the building and the users, such as flexibility and privacy, acoustics, and light. Environment psychology considerations in architectural design have been lacking for several decades. To fill this gap, the author evaluated environmental psychology standards and applied them to Mesineh's design. A sense of nostalgia will be felt by customers of the Mesineh restaurant thanks to its interior design, which combines historical elements with contemporary elements. Additionally, vernacular Persian architectural elements were incorporated into a modern context to fulfill the behavioral science component of interior design.

Keywords: Mesineh restaurant, interior design, behavioral sciences, environment psychology, traditional persian architecture

Procedia PDF Downloads 205
150 Artificial Intelligence in Vietnamese Higher Education: Benefits, Challenges and Ethics

Authors: Duong Van Thanh

Abstract:

Artificial Intelligence (AI) has been recently a new trend in Higher Education systems globally as well as in the Vietnamese Higher Education. This study explores the benefits and challenges in applications of AI in 02 selected universities, ie. Vietnam National Universities in Hanoi Capital and the University of Economics in Ho Chi Minh City. Particularly, this paper focuses on how the ethics of Artificial Intelligence have been addressed among faculty members at these two universities. The AI ethical issues include the access and inclusion, privacy and security, transparency and accountability. AI-powered educational technology has the potential to improve access and inclusion for students with disabilities or other learning needs. However, there is a risk that AI-based systems may not be accessible to all students and may even exacerbate existing inequalities. AI applications can be opaque and difficult to understand, making it challenging to hold them accountable for their decisions and actions. It is important to consider the benefits that adopting AI-systems bring to the institutions, teaching, and learning. And it is equally important to recognize the drawbacks of using AI in education and to take the necessary steps to mitigate any negative impact. The results of this study present a critical concern in higher education in Vietnam, where AI systems may be used to make important decisions about students’ learning and academic progress. The authors of this study attempt to make some recommendation that the AI-system in higher education system is frequently checked by a human in charge to verify that everything is working as it should or if the system needs some retraining or adjustments.

Keywords: artificial intelligence, ethics, challenges, vietnam

Procedia PDF Downloads 114
149 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 88
148 Pregnancy Rhinitis Prevalence among Saudi Women

Authors: Mohammed G. Alotaibi, Sameer Albahkaly, Salwa M. Bahkali, Abdullah M. Alghamdi, Raseel S. Alswidan, Maha Bin Shafi, Sarah Almaiman

Abstract:

Introduction: Rhinitis is common in Saudi Arabia. Therefore, our study was designed to evaluate the prevalence, triggering factors, severity and progression of rhinitis during pregnancy. Methods: Prospective cross-sectional study was conducted in eight governmental and private medical centers in Riyadh, Saudi Arabia, during June and July 2014. Validated Arabic language self-administered questionnaire was used. Sample size of 260 Saudi pregnant women was calculated by Raosoft sample size calculator. Random sampling was achieved by choosing one and skipping every five patients in the clinic list. Data were coded and entered manually into spreadsheets then transferred to SPSS statistical package version 16.0 for Windows. Consent, Privacy and confidentiality of information were assured. Results: Pregnancy rhinitis was reported 31.2% (CI 25.6 - 37.2%). Symptoms arising in first trimester appeared in 79.2% of PR cases and mostly worsen. The most prevalent symptoms were nasal pruritis (67.5%), followed by sneezing (57.1%), congestion (50.6%), and post nasal drip (46.7%). The major triggering factor was dust (71.4%), followed by Tobacco/Shisha smoke (57.6%) and perfume(47%). Preexisting allergic diseases were markedly associated with developing pregnancy rhinitis. Conclusion: Rhinitis during pregnancy manifested in one third of Saudi pregnant ladies. Nasal pruritus was the most common symptom and dust was the widespread triggering factor.

Keywords: allergy, pregnancy, Rhinitis, sneezing

Procedia PDF Downloads 246
147 Barriers to Social Entrepreneurship by Refugees: An Explorative Study How Prior Experience Influences Social Orientation

Authors: D. M. Koers, A. J. Groen, P. D. Englis, R. Harms

Abstract:

We are witnessing the largest level of displacement of people since World War II. Refugees want to become independent as quickly as possible and build a new, safe future; however, access to the labor market is difficult and they face many problems that are not easily solved. This makes self-employment including social entrepreneurship a valuable alternative. Our research studied refugee-based entrepreneurship and examined whether prior knowledge, unmet personal needs and contextual factors influence how refugees recognize opportunities and if this influences their social orientation. In addition, we examine the barriers refugees face when starting up a company in the Netherlands. We use a case study design with a mixed-method approach, combining in-depth interviews and survey data. Data was collected from two Dutch entrepreneurial training programs in the Netherlands. We have a sample size of 27 latent refugee entrepreneurs. Our results show that refugees score high on the social entrepreneurial measures. They perceive themselves as having a strong social vision and are determined to defend a social need. They also score high on sustainability and state that their business ideas improve the quality of life on the long run. Based on these findings, we did not expect that only 5 participants had business ideas with a social orientation. In this group, 37,5% started a company before and 77.8% used their personal experience to come up with this business idea. Another 70,3% had the higher professional education or academic education. In the interviews, we found that they often copy and paste their gained experience from a previous profession on their new context and expect that it would work well. The social aspect lies in their cultural values and personal beliefs but is not reflected in their business models. One of the reasons could be that the context in which the refugee operates as a moderator suppressing the social mission and social value creation opportunities. Refugees are first and foremost focused on their survival. They do not want to be on social welfare and feel a strong need to be independent. Since they cannot access the labor market easily and face labor market discrimination they want to start a company. Another factor that explains lack of the social orientation in their business ideas is that social entrepreneurship is not a known concept in their home countries. Their idea of entrepreneurship differs substantially. We found that a huge barrier for refugees is their expectations about setting up a business, which are often not realistic because they have little knowledge about the system, institutions and corresponding red tape. In those instances, can the institutional configuration of a country, cultural differences, and perspective on entrepreneurship hinders social entrepreneurship. In conclusion, there might be latent potential for social entrepreneurship in refugees but there are many barriers to overcome. Overcoming these barriers can enhance local communities and enhance integration. In addition it has a positive financial impact on the host country because it reduces the pressure on the social system and stimulate the economy.

Keywords: immigrant entrepreneurship, refugee entrepreneurship, social entrepreneurship, prior experience, opportunity recognition

Procedia PDF Downloads 161