Search results for: home users
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3818

Search results for: home users

3458 An Investigation of the Operation and Performance of London Cycle Hire Scheme

Authors: Amer Ali, Jessica Cecchinelli, Antonis Charalambous

Abstract:

Cycling is one of the most environmentally friendly, economic and healthy modes of transport but it needs more efficient cycle infrastructure and more effective safety measures. This paper represents an investigation into the performance and operation of the London Cycle Hire Scheme which started to operate in July 2010 using 5,000 cycles and 315 docking stations and currently has more than 10,000 cycles and over 700 docking stations across London which are available 24/7, 365 days a year. The study, which was conducted during the second half of 2014, consists of two parts; namely, the longitudinal review of the hire scheme between its introduction in 2010 and November 2014, and a field survey in November 2014 in the form of face-face interviews of the users of the cycle scheme to ascertain the existing limitations and difficulties experienced by those users and how it could be improved in terms of capability and safety. The study also includes a correlation between the usage of the cycle scheme and the corresponding weather conditions. The main findings are that on average the number of users (hiring frequency) had increased from just over two millions hires in 2010 to just less than ten millions in 2014. The field survey showed that 80% of the users are satisfied with the performance of the scheme whilst 50% of the users raised concern about the safety level of using the available cycle routes and infrastructure. The study also revealed that a high percentage of the cycle trips were relatively short (less than 30 minutes). Although the weather condition had some effect on cycling, the cost of using the cycle scheme and the main events in London had more effect on the number of cycle hires. The key conclusions are that despite the safety concern and the lack of infrastructure for continuous routes there was an encouraging number of people who opted for cycling as a clean, affordable, and healthy mode of transport. There is a need to expand the scheme by providing more cycles and docking stations and to support that by more well-designed and maintained cycle routes. More details about the development of London Cycle Hire Scheme during the last five years, its performance and the key issues revealed by the surveyed users will be reported in the full version of the paper.

Keywords: cycling mode of transport, london cycle hire scheme, safety, environmental and health benefits, user satisfaction

Procedia PDF Downloads 378
3457 Quantifying Mobility of Urban Inhabitant Based on Social Media Data

Authors: Yuyun, Fritz Akhmad Nuzir, Bart Julien Dewancker

Abstract:

Check-in locations on social media provide information about an individual’s location. The millions of units of data generated from these sites provide knowledge for human activity. In this research, we used a geolocation service and users’ texts posted on Twitter social media to analyze human mobility. Our research will answer the questions; what are the movement patterns of a citizen? And, how far do people travel in the city? We explore the people trajectory of 201,118 check-ins and 22,318 users over a period of one month in Makassar city, Indonesia. To accommodate individual mobility, the authors only analyze the users with check-in activity greater than 30 times. We used sampling method with a systematic sampling approach to assign the research sample. The study found that the individual movement shows a high degree of regularity and intensity in certain places. The other finding found that the average distance an urban inhabitant can travel per day is as far as 9.6 km.

Keywords: mobility, check-in, distance, Twitter

Procedia PDF Downloads 153
3456 The Concerns and Recommendations of Informal and Professional Caregivers for COVID-19 Policy for Homecare and Long-Term Care For People with Dementia: A Qualitative Study

Authors: Hanneke J. A. Smaling, Mandy Visser

Abstract:

One way to reduce the risk of COVID-19 infection is by preventing close interpersonal contact with distancing measures. These social distancing measures presented challenges to the health and wellbeing of people with dementia and their informal and professional caregivers. This study describes the concerns and recommendations of informal and professional caregivers for COVID-19 policy for home care and long-term care for people with dementia during the first and second COVID-19 wave in the Netherlands. In this qualitative interview study, 20 informal caregivers and 20 professional caregivers from home care services and long-term care participated. Interviews were analyzed using an inductive thematic analysis approach. Both informal and professional caregivers worried about getting infected or infecting others with COVID-19, the consequences of the distancing measures, and quality of care. There was a general agreement that policy in the second wave was better informed compared to the first wave. At an organizational level, the policy was remarkably flexible. Recommendations were given for dementia care (need to offer meaningful activities, improve the organization of care, more support for informal caregivers), policy (national vs. locally organization, social isolation measures, visitor policy), and communication. Our study contributes to the foundation of future care decisions by (inter)national policymakers, politicians, and healthcare organizations during the course of the COVID-19 pandemic, underlining the need for balance between safety and autonomy for people with dementia.

Keywords: covid-19, dementia, home care, long-term care, policy

Procedia PDF Downloads 123
3455 Juvenile Delinquency of Senior High School Students in Surabaya, Indonesia

Authors: Herdina Indrijati

Abstract:

This research aims to describe teenager delinquency behavior (Juvenile Delinquency) of senior high school students in Surabaya, Indonesia. Juvenile Delinquency is a broad range of behaviors start from socially unacceptable behavior (overreact in school), violation (escape from home) to crimes (like stealing). This research uses quantitative descriptive method using 498 students who come from 8 different schools in Surabaya as subjects. Juvenile Delinquency behavior form questionnaire has been completed by subjects and was used to measure and describe the behavior. The result of this research is presented in statistic descriptive forms. Result shows that 169 subjects skip school, 55 subjects get out of home without parent’s permission, 110 subjects engage in smoking behavior, 74 subjects damage other people properties, 32 subjects steal, 16 subjects exploit others and 7 subjects engage in drug abuse. Frequency of the top five mentioned behavior are 1-10 times. It is also found that subject’s peers are most likely to be the victim of Juvenile Delinquency. The reasons teenagers engage in Juvenile Delinquency include (1) feeling tired, bored or lazy – that contributes to their skip school behavior (2) Having a lot of problem with parents - contrives them to run away from home, (3) accidentally damage other people’s properties, (4) financial problems – force them to steal and exploit, (5) feeling like having a lot of life problems – that makes them do drugs (6) trying smoking for experience.

Keywords: juvenile delinquency, senior high school, student

Procedia PDF Downloads 207
3454 The Iraqi Fibre-to-the-Home Networks, Problems, Challenges, and Solutions along with Less Expense

Authors: Hasanein Hasan, Mohammed Al-Taie, Basil Shanshool, Khalaf Abd-Ali

Abstract:

This approach aims to deal with establishing and operating Iraqi Fibre-To-The-Home (FTTH) projects. The problems they suffer from are organized sabotage, vandalism, accidental damage and poor planning. It provides practical solutions that deal with the aforementioned problems. These solutions consist of both technical and financial clarifications that ensure the achievement of the FTTH network’s stability for the purpose of equipping citizens, private sector companies, and governmental institutions with services, data transmission, the Internet, and other services. They aim to solve problems and obstacles accompanying the operation and maintenance of FTTH projects implemented by the Informatics and Telecommunications Public Company (ITPC)/ Iraqi Ministry of Communications (MoC). This approach takes the FTTH network of AlMaalif-AlMuaslat districts/ Baghdad-Iraq as a case study.

Keywords: CCTV, FTTH, ITPC, MoC, NVR, PTZ

Procedia PDF Downloads 62
3453 Background Check System for Turkish IT Companies

Authors: Arzu Baloglu, Ugur Kaplancali

Abstract:

This paper focuses on Background Check Systems and Pre-Employment Screening. In our study, we attempted to make an online background checking site that will help employers when hiring employees. Our site has two types of users which are free and powered user. Free users are the employees and powered users are the employers which will hire employers. The database of the site will contain all the information about the employees and employers which are registered in the system so the employers can make a search based on their searching criteria to find the suitable employee for the job. The web site also has a comments and points system. The current employer can make comments to his/her employees and can also give them points. The comments will be shown on employee’s profile, so; when an employer searches for an employee he/she can check the points and comments of the employee to see whether he or she is capable of the job or not. The employers can also follow some employees if they desire. This paper has been designed and implemented with using ASP.NET, C# and JavaScript. The outputs have a user friendly interface. The interface also aimed to provide the useful information for Turkish Technology Companies.

Keywords: background, checking, verification, human resources, online

Procedia PDF Downloads 188
3452 Home Environment and Peer Pressure as Predictors of Disruptive Behaviour and Risky Sexual Behaviour of Secondary School Class Two Adolescents in Enugu State, Nigeria

Authors: Dorothy Ebere Adimora

Abstract:

The study investigated the predictive power of home environment and peer pressure on disruptive behaviour and risky sexual behaviour of Secondary School Class Two Adolescents in Enugu State, Nigeria. The design of the study is a cross sectional survey of correlational study. The study was carried out in the six Education zones in Enugu state, Nigeria. Enugu State is divided into six education zones, namely Agbani, Awgu, Enugu, Nsukka, Obollo-Afor and Udi. The population for the study was all the 31,680 senior secondary class two adolescents in 285 secondary schools in Enugu State, Nigeria in 2014/2015 academic session. The target population was students in SSS.2 senior secondary class two. They constitute one-sixth of the entire student population in the state. The sample of the study was 528, a multi stage sampling technique was employed to draw the sample. Four research questions and four null hypotheses guided the study. The instruments for data collection were an interview session and a structured questionnaire of four clusters, they are; home environment, peer pressure, risky sexual behaviour and disruptive behaviour disorder questionnaires. The instruments were validated by 3 experts, two in psychology and one in measurement and Evaluation in Faculty of Education, University of Nigeria, Nsukka. The reliability coefficient of the instruments was ascertained by subjection to field trial. The adolescents were asked to complete the questionnaire on their home environment, peer pressure, disruptive behaviour disorder and risky sexual behaviours. The risky sexual behaviours were ascertained based on interview conducted on their actual sexual practice within the past 12 months. The research questions were analyzed using Pearson r and R-square, while the hypotheses were tested using ANOVA and multiple regression analysis at 0.05 level of significance. The results of this survey revealed that the adolescents are sexually active in very young ages. The mean age at sexual debut for the adolescents covered in this survey is a pointer to the fact that some of them started engaging in sexual activities long ago. It was also found that the adolescents engage in disruptive behaviour as a result of their poor home environment factors and association with negative peers. Based on the findings, it was recommended that the adolescents should be exposed to enhanced home environment such as parents’ responsiveness, organization of the environment, availability of appropriate learning materials, opportunities for daily stimulation and to offer a proper guidance to these adolescents to avoid negative peer influence which could result in risky sexual behaviour and disruptive behaviour disorder.

Keywords: parenting, peer group, adolescents, sexuality, conduct disorder

Procedia PDF Downloads 465
3451 Travellers’ Innovation Segmentation for Shared Accommodation: Comparing Travellers’ Segmentation Pre- and Post-adoption in Shanghai, China

Authors: Lei Qin

Abstract:

As shared accommodation has become one of the most important market developments in the tourism industry, numerous contributions have emerged on travelers’ motivations to choose shared accommodation. A debated question, however, resides in the heterogeneity of travelers based on motivations. This paper aims to reconcile opposing perspectives by comparing motivation segmentation at two distinct phases of innovation adoption of this new hospitality option: (i) before the first travel – potential users showing interest (n=420) and (ii) after the first travel – users (n=420). Interestingly, we find that travelers (including pre-and-post adopters) have a stronger agreement in experiential motivations than practical motivations. However, the heterogeneity of motivations among travelers is significantly higher in users, increasing from two to six clusters, which means travelers cluster into more and distinct motivation groups after adoption. Rather than invalidating specific assumptions used in the literature in terms of motivation heterogeneity, this paper reconciles opposing findings by putting them along with one another in the process of innovation adoption. A subsequent tourists’ segmentation based on motivations were conducted according to their innovation adoption stages.

Keywords: motivation, pre-and-post adoption, shared accommodation, segmentation

Procedia PDF Downloads 130
3450 Financial Liberalization and Allocation of Bank Credit in Malaysia

Authors: Chow Fah Yee, Eu Chye Tan

Abstract:

The main purpose of developing a modern and sophisticated financial system is to mobilize and allocate the country’s resources for productive uses and in the process contribute to economic growth. Financial liberalization introduced in Malaysia in 1978 was said to be a step towards this goal. According to Mc-Kinnon and Shaw, the deregulation of a country’s financial system will create a more efficient and competitive market driven financial sector; with savings being channelled to the most productive users. This paper aims to assess whether financial liberalization resulted in bank credit being allocated to the more productive users, for the case of Malaysia by: firstly, using Chi-square test to if there exists a relationship between financial liberalization and bank lending in Malaysia. Secondly, to analyze on a comparative basis, the share of loans secured by 9 major economic sectors, using data on bank loans from 1975 to 2003. Lastly, present value analysis and rank correlation was used to determine if the recipients of bigger loans are the more efficient users. Chi-square test confirmed the generally observed trend of an increase in bank credit with the adoption of financial liberalization. While the comparative analysis of loans showed that the bulk of credit were allocated to service sectors, consumer loans and property related sectors, at the expense of industry. Results for rank correlation analysis showed that there is no relationship between the more productive users and amount of loans obtained. This implies that the recipients (sectors) that received more loans were not the more efficient sectors.

Keywords: allocation of resources, bank credit, financial liberalization, economics

Procedia PDF Downloads 432
3449 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 289
3448 Enhancing Cloud Computing with Security Trust Model

Authors: John Ayoade

Abstract:

Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.

Keywords: cloud computing, trust, security, certificate authority, PKI

Procedia PDF Downloads 469
3447 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies

Authors: Alec Wells, Aminu Bello Usman, Justin McKeown

Abstract:

The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.

Keywords: direct voice input, risk, security, technology, trust

Procedia PDF Downloads 175
3446 Keyloggers Prevention with Time-Sensitive Obfuscation

Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee

Abstract:

Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.

Keywords: authentication, computer security, keylogger, privacy, information leakage

Procedia PDF Downloads 106
3445 Women’s Perceptions of DMPA-SC Self-Injection in Malawi

Authors: Mandayachepa C. Nyando, Lauren Suchman, Innocencia Mtalimanja, Address Malata, Tamanda Jumbe, Martha Kamanga, Peter Waiswa

Abstract:

Background: Subcutaneous depot medroxyprogesterone acetate (DMPA-SC) is a new innovation in contraceptive methods that allow users to inject themselves with a hormonal contraceptive in their own homes. Self-injection (SI) of DMPA-SC has the potential to improve the accessibility of family planning to women who want it and who are capable of injecting themselves. Malawi started implementing this new innovation in 2018. SI was incorporated into the DMPA-SC delivery strategy from its outset. Methodology: This study involved two districts in Malawi where DMPA-SC SI was rolled out: Mulanje and Ntchisi. We used a qualitative cross-sectional study design where 60 in-depth interviews were conducted with women of reproductive age group stratified as 15-45 age band. These included women who were SI users, non-users, and any woman who was on any contraceptive methods. The women participants were tape-recorded, and data were transcribed and then analysed using Dedoose software, where themes were categorised into mother and child themes. Results: Women perceived DMPA SC SI as uniquely private, convenient, and less painful when self-injected. In terms of privacy, women in Mulanje and Ntchisi especially appreciated that self-injecting allowed them to use covertly from partners. Some men do not allow their spouses to use modern contraceptive methods; hence women prefer to use them covertly. “… but I first reach out to men because the strongest power is answered by men (MJ015).” In addition, women reported that SI offers privacy from family/community and less contact with healthcare providers. These aspects of privacy were especially valued in areas where there is a high degree of mistrust around family planning and among those who feel judged or antagonized purchasing contraception, such as young unmarried women. Women also valued the convenience SI provided in terms of their ability to save time by injecting themselves at home rather than visiting a healthcare provider and having more reliable access to contraception, particularly in the face of stockouts. SI allows for stocking up on doses to accommodate shifting work schedules in case of future stockouts or hard times, such as the period of COVID-19, where there was a limitation in the movement of the people. Conclusion: Our findings suggest that SI may meet the needs of many women in Malawi as long as the barriers are eliminated. The barriers women mentioned include fear of self-inject and proper storage of the DMPA SC SI, and these barriers can be eliminated by proper training. The findings also set the scene for policy revision and direction at a national level and integrate the approach with national family planning strategies in Malawi. Findings provide insights that may guide future implementation strategies, strengthen non-clinic family planning access programs and stimulate continued research.

Keywords: family planning, Malawi, Sayana press, self-injection

Procedia PDF Downloads 56
3444 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 333
3443 Canadian French as an Additional Language Teacher Candidates' Proficiency and Confidence Pre- and Post-Francophone Home-Stay: Practicum Experience as Revealed through Questionnaire and Interviews

Authors: Callie Mady

Abstract:

This study investigated the Canadian French as an additional language teacher candidates’ confidence and language maintenance strategies by means of questionnaires and interviews pre- and post- a Francophone home-stay practicum experience. Teacher French language proficiency is one of the components of teacher knowledge that can influence students’ French as an additional language acquisition. Although advantageous, seeking opportunities to use French in a French milieu comes with challenges. Teachers, for example, have been found to be hesitant to speak French with native speakers for fear of judgment. Another identified challenge to spending time in a French milieu is finances; while teachers have recognized the value of such an experience, cost is prohibitive. In recognition of the potential barriers and the need to maintain/improve the French proficiency of 'French as an additional language' teachers, this study provided a two-week home stay in a Francophone environment for teacher candidates of French as an additional language with financial subsidies for their participation. Through the post-experience interviews, the French as an additional language teacher candidates revealed an improvement in French proficiency. Similarly, the teacher candidates cited an increase in confidence in the interviews and through the questionnaire. They linked this increase in proficiency and confidence to their experiences with their host families and other Francophone members of the community. This study highlights the provision of immersion experiences as means to support teachers’ language confidence and proficiency.

Keywords: French as an additional language education, teacher language confidence, teacher language maintenance, teacher language proficiency

Procedia PDF Downloads 370
3442 Impact of Task Technology Fit on User Effectiveness, Efficiency and Creativity in Iranian Pharmaceutical Oraganizations

Authors: Milad Keshvardoost, Amir Khanlari, Nader Khalesi

Abstract:

Background: Any firm in the pharmaceutical industry requires efficient and effective management information systems (MIS) to support managerial functions. Purpose: The aim of this study is to investigate the impact of Task-Technology Fit on user effectiveness, efficiency, and creativity in Iranian pharmaceutical companies. Methodology: 345 reliable and validate questionnaires were distributed among selected samples, through the cluster method, to Information system users of eight leading Iranian pharmaceutical companies, based on the likert scale. The proposed model of the article is based on a model with Task technology fit, on user performance with the definition of efficiency, effectiveness, and creativity through mediation effects of perceived usefulness and ease of use. Results: This study confirmed that TTF with definitions of adequacy and compatibility has positive impacts on user performance Conclusion: We concluded that pharmaceutical users of IS, utilizing a system with a precise and intense observation of users' demands, may make facilitation for them to design an exclusive IS framework.

Keywords: information systems, user performance, pharmaceuticals, task technology fit

Procedia PDF Downloads 158
3441 Spectrum Allocation in Cognitive Radio Using Monarch Butterfly Optimization

Authors: Avantika Vats, Kushal Thakur

Abstract:

This paper displays the point at issue, improvement, and utilization of a Monarch Butterfly Optimization (MBO) rather than a Genetic Algorithm (GA) in cognitive radio for the channel portion. This approach offers a satisfactory approach to get the accessible range of both the users, i.e., primary users (PUs) and secondary users (SUs). The proposed enhancement procedure depends on a nature-inspired metaheuristic algorithm. In MBO, all the monarch butterfly individuals are located in two distinct lands, viz. Southern Canada and the northern USA (land 1), and Mexico (Land 2). The positions of the monarch butterflies are modernizing in two ways. At first, the offsprings are generated (position updating) by the migration operator and can be adjusted by the migration ratio. It is trailed by tuning the positions for different butterflies by the methods for the butterfly adjusting operator. To keep the population unaltered and minimize fitness evaluations, the aggregate of the recently produced butterflies in these two ways stays equivalent to the first population. The outcomes obviously display the capacity of the MBO technique towards finding the upgraded work values on issues regarding the genetic algorithm.

Keywords: cognitive radio, channel allocation, monarch butterfly optimization, evolutionary, computation

Procedia PDF Downloads 49
3440 Reintegrating Forensic Mental Health Service Users into Communities in the Western Cape, South Africa

Authors: Zolani Metu

Abstract:

The death of more than 140 psychiatric patients who were unethically deinstitutionalized from the Life Esidimeni hospital Johannesburg, in 2016, shined a light on South Africa’s failing public mental healthcare system. Compounded by insufficient research evidence on African deinstitutionalization, this necessitates inquiries into deinstitutionalized mental healthcare, reintegration and community-based mental healthcare within the South African context. This study employed a quantitative research approach which utilized a cross-sectional research design, to investigate experiences with the reintegration of institutionalized forensic mental health service users into communities in the Western Cape, South Africa. A convenience sample of 100 mental health care workers from different occupational and organizational backgrounds in the Western Cape was purposively selected using the Western Cape Health Directorate as a sampling frame. A self-administered questionnaire (SAQ) was used as the data collection instrument. The results of the study indicate that criminogenic factors such as substance use, history of violent behaviour, criminal history and disruptive social behaviour complicate the reintegration of forensic mental health service users into communities. The current extent of reintegration of forensic mental health service users was found to be 'poor' (46%; n= 46); and financial difficulties, criminogenic factors and limited Community-Based Care (CBC) facilities were identified as key barriers to the reintegration process. 56% of all job applications for forensic mental health service users were unsuccessful, and 53% of all applications for their admission into CBC facilities were declined. Although social support (informal) was found to be essential for successful reintegration, institutional support (formal) through assertive community treatment (35%; n= 35) and CBC facilities (21%) and the disability grant (DG=50%) was found to be more important for family coping and reintegration. Moreover, 72% of respondents had positive perceptions about the process of reintegration; no statistically significant relationship was found between years of experience and perceptions about reintegration (P-value = 0.062); and perceptions were not found to be a barrier to reintegration. No statistically significant relationship was found between years of working experience and understanding the legislative framework of deinstitutionalization (P-Value =.0.061). However, using a Chi-square test, a significant relationship (P-value = 0.021) was found between sex and understanding the legal framework involved in the process of reintegration. The study recommends a post-2020 deinstitutionalization agenda that factors-in criminogenic realities associated with forensic mental health service users, and affirms the strengthening of PHC and community based care systems as precedents of successful deinstitutionalization and reintegration of mental health service users.

Keywords: forensic mental health, deinstitutionalization, reintegration, mental health service users

Procedia PDF Downloads 150
3439 Exploring Health-Related Inequalities between Private, Public and Active Transport Users, Using Relative Importance Index: Case Study on Santiago de Chile

Authors: Beatriz Mella Lira, Karla Yohannessen, Robin Hickman

Abstract:

The aim of the paper is recognising inequalities through the self-assessment of health-related factors, in the context of daily mobilities in Santiago de Chile. Human capabilities will be used as the theoretical basis for the recognition and assessment of these factors regarding the functioning (what people are currently able to do) and capabilities (what people want to achieve and what is valuable for them), reflecting differences across social groups and among types of transport users. The self-assessment of health-related factors considers perceptions of stress, physical effort, proximity to other transport users, pollution, safety, and comfort. The types of transport users are classified as: private (cars, taxis, colectivos, motos), public (buses and metro) and active (bicycles and walking). The methodology follows a capability-based questionnaire, which was applied in different areas of Santiago de Chile, considering concepts extracted from the human capabilities list. The self-assessment of these health-related factors examines the context of peoples’ mobilities for performing their daily activities, considering socioeconomic differences as income, age, gender, disabilities, residence location and primary mode choice. The paper uses Relative Importance Index (RII) for weighting the relative influence or valuation of the factors. The respondents were asked to rate the importance of each factor on a scale from 1 to 5, in an ascending order of importance. The results suggest that these health-related factors impact not just the perceptions of users, but their well-being and their propensity for achieving their capabilities and the things they value in life. The paper is focused on the development of an applicable approach, measuring factors that should be included in transport project appraisal, as a more comprehensive and complementary method.

Keywords: active transport, health, human capabilities, Santiago de Chile, transport inequalities, transportation planning, urban planning

Procedia PDF Downloads 178
3438 Open Source Cloud Managed Enterprise WiFi

Authors: James Skon, Irina Beshentseva, Michelle Polak

Abstract:

Wifi solutions come in two major classes. Small Office/Home Office (SOHO) WiFi, characterized by inexpensive WiFi routers, with one or two service set identifiers (SSIDs), and a single shared passphrase. These access points provide no significant user management or monitoring, and no aggregation of monitoring and control for multiple routers. The other solution class is managed enterprise WiFi solutions, which involve expensive Access Points (APs), along with (also costly) local or cloud based management components. These solutions typically provide portal based login, per user virtual local area networks (VLANs), and sophisticated monitoring and control across a large group of APs. The cost for deploying and managing such managed enterprise solutions is typically about 10 fold that of inexpensive consumer APs. Low revenue organizations, such as schools, non-profits, non-government organizations (NGO's), small businesses, and even homes cannot easily afford quality enterprise WiFi solutions, though they may need to provide quality WiFi access to their population. Using available lower cost Wifi solutions can significantly reduce their ability to provide reliable, secure network access. This project explored and created a new approach for providing secured managed enterprise WiFi based on low cost hardware combined with both new and existing (but modified) open source software. The solution provides a cloud based management interface which allows organizations to aggregate the configuration and management of small, medium and large WiFi solutions. It utilizes a novel approach for user management, giving each user a unique passphrase. It provides unlimited SSID's across an unlimited number of WiFI zones, and the ability to place each user (and all their devices) on their own VLAN. With proper configuration it can even provide user local services. It also allows for users' usage and quality of service to be monitored, and for users to be added, enabled, and disabled at will. As inferred above, the ultimate goal is to free organizations with limited resources from the expense of a commercial enterprise WiFi, while providing them with most of the qualities of such a more expensive managed solution at a fraction of the cost.

Keywords: wifi, enterprise, cloud, managed

Procedia PDF Downloads 82
3437 Breaking through Barricades to Enhance the University Library Infrastructure to Aid the Visually Challenged - Contemplated Based within the Sri Lankan Context

Authors: Wilfred Jeyatheese Jeyaraj

Abstract:

The Sri Lankan legislative acts dictate several recommendations to improve accessibility of services for the visually challenged. But the main consideration here is the feasibility and extent to which these endorsements have been implemented in actuality within Sri Lankan academic libraries. This paper tends to assess the existent issues that impediment the implementation of accessibility features for the visually challenged in Sri Lankan academic libraries. Visually challenged students continually walk through immense challenges to step forth into their university life. Reaching their undergrad stage of their academic phase, they should be entitled to access information resources with ease and with equality in comparison to the sighted users of a university library. The current university libraries in Sri Lanka, have well improved services that they render to their users. But, what lacks in this scenario is the consideration as to whether these features offered by libraries are user-friendly and easily accessible by the visually challenged users as well. Hence, this paper tends to analyze the inhibitions in delivering services oriented towards the visually challenged and the sighted, and propose feasible alternatives to create a neutral high-end university library environment.

Keywords: accessibility, university library, Sri Lanka, visually-challenged

Procedia PDF Downloads 279
3436 Effects of Using Alternative Energy Sources and Technologies to Reduce Energy Consumption and Expenditure of a Single Detached House

Authors: Gul Nihal Gugul, Merih Aydinalp-Koksal

Abstract:

In this study, hourly energy consumption model of a single detached house in Ankara, Turkey is developed using ESP-r building energy simulation software. Natural gas is used for space heating, cooking, and domestic water heating in this two story 4500 square feet four-bedroom home. Hourly electricity consumption of the home is monitored by an automated meter reading system, and daily natural gas consumption is recorded by the owners during 2013. Climate data of the region and building envelope data are used to develop the model. The heating energy consumption of the house that is estimated by the ESP-r model is then compared with the actual heating demand to determine the performance of the model. Scenarios are applied to the model to determine the amount of reduction in the total energy consumption of the house. The scenarios are using photovoltaic panels to generate electricity, ground source heat pumps for space heating and solar panels for domestic hot water generation. Alternative scenarios such as improving wall and roof insulations and window glazing are also applied. These scenarios are evaluated based on annual energy, associated CO2 emissions, and fuel expenditure savings. The pay-back periods for each scenario are also calculated to determine best alternative energy source or technology option for this home to reduce annual energy use and CO2 emission.

Keywords: ESP-r, building energy simulation, residential energy saving, CO2 reduction

Procedia PDF Downloads 185
3435 Alive Cemeteries with Augmented Reality and Semantic Web Technologies

Authors: Tamás Matuszka, Attila Kiss

Abstract:

Due the proliferation of smartphones in everyday use, several different outdoor navigation systems have become available. Since these smartphones are able to connect to the Internet, the users can obtain location-based information during the navigation as well. The users could interactively get to know the specifics of a particular area (for instance, ancient cultural area, Statue Park, cemetery) with the help of thus obtained information. In this paper, we present an Augmented Reality system which uses Semantic Web technologies and is based on the interaction between the user and the smartphone. The system allows navigating through a specific area and provides information and details about the sight an interactive manner.

Keywords: augmented reality, semantic web, human computer interaction, mobile application

Procedia PDF Downloads 331
3434 Improving System Performance through User's Resource Access Patterns

Authors: K. C. Wong

Abstract:

This paper demonstrates a number of examples in the hope to shed some light on the possibility of designing future operating systems in a more adaptation-based manner. A modern operating system, we conceive, should possess the capability of 'learning' in such a way that it can dynamically adjust its services and behavior according to the current status of the environment in which it operates. In other words, a modern operating system should play a more proactive role during the session of providing system services to users. As such, a modern operating system is expected to create a computing environment, in which its users are provided with system services more matching their dynamically changing needs. The examples demonstrated in this paper show that user's resource access patterns 'learned' and determined during a session can be utilized to improve system performance and hence to provide users with a better and more effective computing environment. The paper also discusses how to use the frequency, the continuity, and the duration of resource accesses in a session to quantitatively measure and determine user's resource access patterns for the examples shown in the paper.

Keywords: adaptation-based systems, operating systems, resource access patterns, system performance

Procedia PDF Downloads 128
3433 Effectiveness of an Unorthodox Intervention for Work-Family Interaction: A Field Experiment

Authors: Hassan Rasool

Abstract:

There is limited research in the intervention domain of work family interaction. We identified that meditation could be effective in coping work family conflict and nurturing work family facilitation across domains. We conducted pretest posttest control group field experiment on a sample of sixty employees to test the effectiveness of meditation in a financial sector organization. Empirical evidence confirms that the intervention was effective in coping work family conflict & nurturing facilitation across work & home domains. The intervention, also positively affected a known outcome (i.e. satisfaction at work and home) of work family interaction. Future research perspectives on the use of unorthodox interventions in the domain of work family interaction are also discussed.

Keywords: work family interaction, meditation, satisfaction, experiment

Procedia PDF Downloads 445
3432 A Comparative Study about the Use of SMS in Formal Writing of the Students in Universities

Authors: Sajjad Hussain

Abstract:

Technology has revolutionized the way of communication around the globe. Its use and users are multiplying with every passing minute. The current study reveals the effect of SMS on the formal writing of the students. Students are the regular users of this service and have become addict to short language. This short language is understandable to a particular community and not to the whole as it does not adhere to the Standard English writing practices. Data has been collected from quiz, assignments text and through questionaries’ which supports this postulate that students are frequently practicing it in their formal writing. Certain corrosive measures needs to be taken to address the issue. Second language learners have been found it practicing to greater extent.

Keywords: information technology, SMS, messaging, communication, social media, internet, language

Procedia PDF Downloads 524
3431 An Investigation of the Association between Pathological Personality Dimensions and Emotion Dysregulation among Virtual Network Users: The Mediating Role of Cyberchondria Behaviors

Authors: Mehdi Destani, Asghar Heydari

Abstract:

Objective: The present study aimed to investigate the association between pathological personality dimensions and emotion dysregulation through the mediating role of Cyberchondria behaviors among users of virtual networks. Materials and methods: A descriptive–correlational research method was used in this study, and the statistical population consisted of all people active on social network sites in 2020. The sample size was 300 people who were selected through Convenience Sampling. Data collection was carried out in a survey method using online questionnaires, including the "Difficulties in Emotion Regulation Scale" (DERS), Personality Inventory for DSM-5 Brief Form (PID-5-BF), and Cyberchondria Severity Scale Brief Form (CSS-12). Data analysis was conducted using Pearson's Correlation Coefficient and Structural Equation Modeling (SEM). Findings: Findings suggested that pathological personality dimensions and Cyberchondria behaviors have a positive and significant association with emotion dysregulation (p<0.001). The presented model had a good fit with the data. The variable “pathological personality dimensions” with an overall effect (p<0.001, β=0.658), a direct effect (p<0.001, β=0.528), and an indirect mediating effect through Cyberchondria Behaviors (p<.001), β=0.130), accounted for emotion dysregulation among virtual network users. Conclusion: The research findings showed a necessity to pay attention to the pathological personality dimensions as a determining variable and Cyberchondria behaviors as a mediator in the vulnerability of users of social network sites to emotion dysregulation.

Keywords: cyberchondria, emotion dysregulation, pathological personality dimensions, social networks

Procedia PDF Downloads 85
3430 The Role of Trust in Intention to Use Prescribed and Non-prescribed Connected Devices

Authors: Jean-michel Sahut, Lubica Hikkerova, Wissal Ben Arfi

Abstract:

The Internet of Things (IoT) emerged over the last few decades in many fields. Healthcare can significantly benefit from IoT. This study aims to examine factors influencing the adoption of IoT in eHealth. To do so, an innovative framework has been developed which applies both the Technology Acceptance Model (TAM) and the United Theory of Acceptance and Use of Technology (UTAUT) model and builds on them by analyzing trust and perceived-risk dimensions to predict intention to use IoT in eHealth. In terms of methodology, a Partial Least Approach Structural Equation Modelling was carried out on a sample of 267 French users. The findings of this research support the significant positive effect of constructs set out in the TAM (perceived ease of use) on predicting behavioral intention by adding the effects identified for UTAUT variables. This research also demonstrates how perceived risk and trust are significant factors for models examining behavioral intentions to use IoT. Perceived risk enhanced by the trust has a significant effect on patients’ behavioral intentions. Moreover, the results highlight the key role of prescription as a moderator of IoT adoption in eHealth. Depending on whether an individual has a prescription to use connected devices or not, ease of use has a stronger impact on adoption, while trust has a negative impact on adoption for users without a prescription. In accordance with the empirical results, several practical implications can be proposed. All connected devices applied in a medical context should be divided into groups according to their functionality: whether they are essential for the patient’s health and whether they require a prescription or not. Devices used with a prescription are easily accepted because the intention to use them is moderated by the medical trust (discussed above). For users without a prescription, ease of use is a more significant factor than for users who have a prescription. This suggests that currently, connected e-Health devices and online healthcare systems have to take this factor into account to better meet the needs and expectations of end-users.

Keywords: internet of things, Healthcare, trust, consumer acceptance

Procedia PDF Downloads 131
3429 Slovenia Rider/Driver Gaze Behavior Comparative Analysis

Authors: Tomaž Tollazzi, Matjaž Šraml, Chiara Gruden, Marko Renčelj

Abstract:

Motorcycle riders are an increasing group of road users. The intrinsic characteristics of powered two-wheelers (PTW) allow them to be particularly flexible, both in urban and extra-urban environments. Nevertheless, crash statistics indicate that riders involved in road accidents are highly likely to suffer severe injuries, underlining the vulnerability of this group of road users. An element that can greatly affect the safety of PTW users is road design, as roads are usually designed for two-track vehicles (cars, buses, and lorries) and usually do not consider the needs of PTWs. Additionally, handling a motorcycle is quite different from driving a car; thus, the behavior of riders is different from that of drivers. The aim of this research was to compare how different road designs are perceived by riders and drivers and to preliminarily assess if riders’ behavior and attention allocation are related. For this research, an eye-tracking experiment was developed outdoors. Both drivers and riders travelled along a route comprising four different road designs and various road layouts, and the output was analyzed both qualitatively and quantitatively. Although it was not possible to carry out a statistical analysis due to the limited number of participants, the results demonstrate that there is a difference in the gaze behavior of drivers and riders, with the latter being far more focused on the left-hand side of the road and concentrating on defined elements of road design. Furthermore, the experiment demonstrated that a higher number of fixations is related to lower speeds. Finally, it was noted that both kinds of road users focus well on the carriageway, leading to the conclusion that the indications given through road markings may be much more effective than vertical signalization, which has rarely been observed.

Keywords: road safety, powered two-wheelers, eye-tracking, gaze behavior

Procedia PDF Downloads 68