Search results for: privacy safeguards
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 515

Search results for: privacy safeguards

155 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 329
154 Context-Aware Alert Method in Hajj Pilgrim Location-Based Tracking System

Authors: Syarif Hidayat

Abstract:

As millions of people with different backgrounds perform hajj every year in Saudi Arabia, it brings out several problems. Missing people is among many crucial problems need to be encountered. Some people might have had insufficient knowledge of using tracking system equipment. Other might become a victim of an accident, lose consciousness, or even died, prohibiting them to perform certain activity. For those reasons, people could not send proper SOS message. The major contribution of this paper is the application of the diverse alert method in pilgrims tracking system. It offers a simple yet robust solution to send SOS message by pilgrims during Hajj. Knowledge of context aware computing is assumed herein. This study presents four methods that could be utilized by pilgrims to send SOS. The first method is simple mobile application contains only a button. The second method is based on behavior analysis based off GPS location movement anomaly. The third method is by introducing pressing pattern to smartwatch physical button as a panic button. The fourth method is by identifying certain accelerometer pattern recognition as a sign of emergency situations. Presented method in this paper would be an important part of pilgrims tracking system. The discussion provided here includes easy to use design whilst maintaining tracking accuracy, privacy, and security of its users.

Keywords: context aware computing, emergency alert system, GPS, hajj pilgrim tracking, location-based services

Procedia PDF Downloads 212
153 Digital Innovation and Business Transformation

Authors: Bisola Stella Sonde

Abstract:

Digital innovation has emerged as a pivotal driver of business transformation in the contemporary landscape. This case study research explores the dynamic interplay between digital innovation and the profound metamorphosis of businesses across industries. It delves into the multifaceted dimensions of digital innovation, elucidating its impact on organizational structures, customer experiences, and operational paradigms. The study investigates real-world instances of businesses harnessing digital technologies to enhance their competitiveness, agility, and sustainability. It scrutinizes the strategic adoption of digital platforms, data analytics, artificial intelligence, and emerging technologies as catalysts for transformative change. The cases encompass a diverse spectrum of industries, spanning from traditional enterprises to disruptive startups, offering insights into the universal relevance of digital innovation. Moreover, the research scrutinizes the challenges and opportunities posed by the digital era, shedding light on the intricacies of managing cultural shifts, data privacy, and cybersecurity concerns in the pursuit of innovation. It unveils the strategies that organizations employ to adapt, thrive, and lead in the era of digital disruption. In summary, this case study research underscores the imperative of embracing digital innovation as a cornerstone of business transformation. It offers a comprehensive exploration of the contemporary digital landscape, offering valuable lessons for organizations striving to navigate the ever-evolving terrain of the digital age.

Keywords: business transformation, digital innovation, emerging technologies, organizational structures

Procedia PDF Downloads 54
152 Psychological Perspectives on Modern Restaurant Interior Design Based on Traditional Elements (Case Study: Interior Design of the Mesineh Restaurant, Tehran, Iran)

Authors: Raheleh Saifiabolhassan

Abstract:

After the post-industrial era, when a wide variety of foods and drinks are readily available everywhere, the motive has shifted from meeting basic nutritional needs to enjoy the eating experience. Today, behavioral environmental studies are an essential branch of science when it comes to understanding, analyzing, and evaluating how humans react to the environment. Similarly, these studies explore customer-influencing factors and the effectiveness of restaurant designs. To facilitate a pleasant dining experience, the authors focused on acoustics, flexibility, and lighting. In this study, 2700 square feet of surface area was used to plan a restaurant (called Mesineh) based on behavioral science, considering many factors related to the interaction between the building and the users, such as flexibility and privacy, acoustics, and light. Environment psychology considerations in architectural design have been lacking for several decades. To fill this gap, the author evaluated environmental psychology standards and applied them to Mesineh's design. A sense of nostalgia will be felt by customers of the Mesineh restaurant thanks to its interior design, which combines historical elements with contemporary elements. Additionally, vernacular Persian architectural elements were incorporated into a modern context to fulfill the behavioral science component of interior design.

Keywords: Mesineh restaurant, interior design, behavioral sciences, environment psychology, traditional persian architecture

Procedia PDF Downloads 206
151 Artificial Intelligence in Vietnamese Higher Education: Benefits, Challenges and Ethics

Authors: Duong Van Thanh

Abstract:

Artificial Intelligence (AI) has been recently a new trend in Higher Education systems globally as well as in the Vietnamese Higher Education. This study explores the benefits and challenges in applications of AI in 02 selected universities, ie. Vietnam National Universities in Hanoi Capital and the University of Economics in Ho Chi Minh City. Particularly, this paper focuses on how the ethics of Artificial Intelligence have been addressed among faculty members at these two universities. The AI ethical issues include the access and inclusion, privacy and security, transparency and accountability. AI-powered educational technology has the potential to improve access and inclusion for students with disabilities or other learning needs. However, there is a risk that AI-based systems may not be accessible to all students and may even exacerbate existing inequalities. AI applications can be opaque and difficult to understand, making it challenging to hold them accountable for their decisions and actions. It is important to consider the benefits that adopting AI-systems bring to the institutions, teaching, and learning. And it is equally important to recognize the drawbacks of using AI in education and to take the necessary steps to mitigate any negative impact. The results of this study present a critical concern in higher education in Vietnam, where AI systems may be used to make important decisions about students’ learning and academic progress. The authors of this study attempt to make some recommendation that the AI-system in higher education system is frequently checked by a human in charge to verify that everything is working as it should or if the system needs some retraining or adjustments.

Keywords: artificial intelligence, ethics, challenges, vietnam

Procedia PDF Downloads 118
150 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 89
149 Pregnancy Rhinitis Prevalence among Saudi Women

Authors: Mohammed G. Alotaibi, Sameer Albahkaly, Salwa M. Bahkali, Abdullah M. Alghamdi, Raseel S. Alswidan, Maha Bin Shafi, Sarah Almaiman

Abstract:

Introduction: Rhinitis is common in Saudi Arabia. Therefore, our study was designed to evaluate the prevalence, triggering factors, severity and progression of rhinitis during pregnancy. Methods: Prospective cross-sectional study was conducted in eight governmental and private medical centers in Riyadh, Saudi Arabia, during June and July 2014. Validated Arabic language self-administered questionnaire was used. Sample size of 260 Saudi pregnant women was calculated by Raosoft sample size calculator. Random sampling was achieved by choosing one and skipping every five patients in the clinic list. Data were coded and entered manually into spreadsheets then transferred to SPSS statistical package version 16.0 for Windows. Consent, Privacy and confidentiality of information were assured. Results: Pregnancy rhinitis was reported 31.2% (CI 25.6 - 37.2%). Symptoms arising in first trimester appeared in 79.2% of PR cases and mostly worsen. The most prevalent symptoms were nasal pruritis (67.5%), followed by sneezing (57.1%), congestion (50.6%), and post nasal drip (46.7%). The major triggering factor was dust (71.4%), followed by Tobacco/Shisha smoke (57.6%) and perfume(47%). Preexisting allergic diseases were markedly associated with developing pregnancy rhinitis. Conclusion: Rhinitis during pregnancy manifested in one third of Saudi pregnant ladies. Nasal pruritus was the most common symptom and dust was the widespread triggering factor.

Keywords: allergy, pregnancy, Rhinitis, sneezing

Procedia PDF Downloads 247
148 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 546
147 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 296
146 An Efficient Traceability Mechanism in the Audited Cloud Data Storage

Authors: Ramya P, Lino Abraham Varghese, S. Bose

Abstract:

By cloud storage services, the data can be stored in the cloud, and can be shared across multiple users. Due to the unexpected hardware/software failures and human errors, which make the data stored in the cloud be lost or corrupted easily it affected the integrity of data in cloud. Some mechanisms have been designed to allow both data owners and public verifiers to efficiently audit cloud data integrity without retrieving the entire data from the cloud server. But public auditing on the integrity of shared data with the existing mechanisms will unavoidably reveal confidential information such as identity of the person, to public verifiers. Here a privacy-preserving mechanism is proposed to support public auditing on shared data stored in the cloud. It uses group signatures to compute verification metadata needed to audit the correctness of shared data. The identity of the signer on each block in shared data is kept confidential from public verifiers, who are easily verifying shared data integrity without retrieving the entire file. But on demand, the signer of the each block is reveal to the owner alone. Group private key is generated once by the owner in the static group, where as in the dynamic group, the group private key is change when the users revoke from the group. When the users leave from the group the already signed blocks are resigned by cloud service provider instead of owner is efficiently handled by efficient proxy re-signature scheme.

Keywords: data integrity, dynamic group, group signature, public auditing

Procedia PDF Downloads 387
145 The Experience of Community-based Tourism in Yunguilla, Ecuador and Its Social-Cultural Impact

Authors: York Neudel

Abstract:

The phenomenon of tourism has been considered as tool to overcome cultural frontiers, to comprehend the other and to cope with mutual mistrust and suspicion. Well, that has been a myth, at least when it comes to mass-tourism. Other approaches, like community-based tourism, still are based on the idea of embracing the other in order to help or to understand the cultural difference. In 1997, two American NGOs incentivized a tourism-project in a community in the highlands of Ecuador, in order to protect the cloud forest from destructive exploitation of its own inhabitants. Nineteen years after that, I analyze in this investigation the interactions between the Ecuadorian hosts in the mestizo-community of Yunguilla and the foreign tourist in the quest for “authentic life” in the Ecuadorian cloud forest. As a sort of “contemporary pilgrim” the traveller tries to find authenticity in other times and places far away from their everyday life in Europe or North America. Therefore, tourists are guided by stereotypes and expectations that are produced by the touristic industry. The host, on the other hand, has to negotiate this pre-established imaginary. That generates a kind of theatre-play with front- and backstage in organic gardens, little fabrics and even private housing, since this alternative project offers to share the private space of the host with the tourist in the setting the community-based tourism. In order to protect their privacy, the community creates new hybrid spaces that oscillate between front- and backstages that culminates in a game of hide and seek – a phenomenon that promises interesting frictions for an anthropological case-study.

Keywords: Tourism, Authenticity, Community-based tourism, Ecuador, Yunguilla

Procedia PDF Downloads 280
144 Configuration as a Service in Multi-Tenant Enterprise Resource Planning System

Authors: Mona Misfer Alshardan, Djamal Ziani

Abstract:

Enterprise resource planning (ERP) systems are the organizations tickets to the global market. With the implementation of ERP, organizations can manage and coordinate all functions, processes, resources and data from different departments by a single software. However, many organizations consider the cost of traditional ERP to be expensive and look for alternative affordable solutions within their budget. One of these alternative solutions is providing ERP over a software as a service (SaaS) model. This alternative could be considered as a cost effective solution compared to the traditional ERP system. A key feature of any SaaS system is the multi-tenancy architecture where multiple customers (tenants) share the system software. However, different organizations have different requirements. Thus, the SaaS developers accommodate each tenant’s unique requirements by allowing tenant-level customization or configuration. While customization requires source code changes and in most cases a programming experience, the configuration process allows users to change many features within a predefined scope in an easy and controlled manner. The literature provides many techniques to accomplish the configuration process in different SaaS systems. However, the nature and complexity of SaaS ERP needs more attention to the details regarding the configuration process which is merely described in previous researches. Thus, this research is built on strong knowledge regarding the configuration in SaaS to define specifically the configuration borders in SaaS ERP and to design a configuration service with the consideration of the different configuration aspects. The proposed architecture will ensure the easiness of the configuration process by using wizard technology. Also, the privacy and performance are guaranteed by adopting the databases isolation technique.

Keywords: configuration, software as a service, multi-tenancy, ERP

Procedia PDF Downloads 392
143 Female Frontline Health Workers in High-Risk Workplaces: Legal Protection in Bangladesh amid the Covid-19 Pandemic

Authors: Nabila Farhin, Israt Jahan

Abstract:

Despite the feminisation of the global health force, women mostly engage in nursing, midwifery and community health workers (HWs), and the posts like surgeons, doctors, and specialists are generally male-dominated. It is also prominent in Bangladesh, where female HWs witness systematic workplace inequalities, discrimination, and underpayment. The Covid-19 pandemic put unsurmountable pressure on HWs as they had to serve in high-risk workplaces as frontliners. The already disadvantaged female HWs shouldered the same burden, were overworked without adequate occupational health and safety measures (OSH) and risked their lives. Acknowledging their vulnerable workplace conditions, the World Health Organization (WHO) and International Labour Organization (ILO) circulated a few specialised guidelines amid the peril. Bangladesh tried to adhere to international guidelines while formulating pandemic management strategies. In reality, the already weak and understaffed health sector collapsed with the patient influx and many HWs got infected and died in the line of duty, exposing the high-risk nature of the work. Unfortunately, the gender-segregated data of infected HWs are absent. This qualitative research investigates whether the existing laws of Bangladesh are adequate in protecting female HWs as frontliners in high-risk workplaces during the Covid-19 pandemic. The paper first examines international labour laws safeguarding female frontline HWs. It also analyses the specialised Covid-19 pandemic guidelines protecting their interests. Finally, the research investigates the compliance of Bangladesh as per international legal guidance during the pandemic. In doing so, it explores the domestic laws, professional guidelines for HWs and pandemic response strategies. The paper critically examines the primary sources like international and national statutes, rules, regulations and guidelines. Secondary sources like authoritative journal articles, books and newspaper reports are contextually analysed in line with the objective of the paper. The definition of HW is ambiguous in the labour laws of Bangladesh. It leads to confusion regarding the extent of legal protection rendered to female HWs at private hospitals in high-risk situations. The labour laws are not applicable in Public hospitals, as the employees follow the public service rules. Unfortunately, the country has no specialised law to protect HWs in high-risk workplaces, and the professional guidelines for HWs also remain inadequate in this regard. Even though the pandemic management strategies highlight some protective measures in high-risk situations, they only deal with HWs who are pregnant or have underlying health issues. No specialised protective guidelines can be found for female HWs as frontliners. Therefore, the laws are insufficient and failed to render adequate legal protection to female frontline HWs during the pandemic. The country also lacks comprehensive health legislation and uniform institutional and professional guidelines, preventing them from accessing grievance mechanisms. Hence, the female HWs felt victimised while duty-bound to serve in high-risk workplaces without adequate safeguards. Bangladesh should clarify the definition of HWs and standardise the service rules for providing medical care in high-risk workplaces. The research also recommends adequate health legislation and specialised legal protection to safeguard female HWs in future emergencies.

Keywords: female health workers (HWs), high-risk workplaces, Covid-19 pandemic, Bangladesh

Procedia PDF Downloads 76
142 Factors Influencing the Uptake of Family Planning Services among Young People (18-24 Years) at Community Level in Rural Budaka District, Uganda

Authors: Mathew Nyashanu, George K. Kiggundu, Mandu S. Ekpenyong

Abstract:

There is an increased number of young people engaging in early sexual relationships worldwide. Furthermore, statistics for early pregnancy among young people have also increased, especially in low and middle-income countries. This has health implications for both the parents and the baby. High uptake in family planning contraception among young people can reduce early pregnancy and subsequent negative health outcomes on the young parents and the baby. This study was set to explore the factors influencing the uptake of family planning contraceptive services among young people (18-24 years) at a community level in rural Budaka district, Uganda. The study utilised an explorative qualitative approach. The study found out that religion, partner resistance; perceived loss of libido, perceived barren, long waiting time and distance from the health facility, lack of privacy/confidentiality, excessive menstrual bleeding, cancer, and fear of having disabled babies, limited the utilisation of family planning contraceptive services while contraception as HIV prevention and child spacing encouraged young people to use family planning contraceptive services. There is a need for a culturally orientated community-based contraceptive health promotion approach to increase the uptake of family planning contraception services among young people.

Keywords: Young people, Family Planning, Contraceptives, Black sub-Sahara African

Procedia PDF Downloads 132
141 The Application of AI in Developing Assistive Technologies for Non-Verbal Individuals with Autism

Authors: Ferah Tesfaye Admasu

Abstract:

Autism Spectrum Disorder (ASD) often presents significant communication challenges, particularly for non-verbal individuals who struggle to express their needs and emotions effectively. Assistive technologies (AT) have emerged as vital tools in enhancing communication abilities for this population. Recent advancements in artificial intelligence (AI) hold the potential to revolutionize the design and functionality of these technologies. This study explores the application of AI in developing intelligent, adaptive, and user-centered assistive technologies for non-verbal individuals with autism. Through a review of current AI-driven tools, including speech-generating devices, predictive text systems, and emotion-recognition software, this research investigates how AI can bridge communication gaps, improve engagement, and support independence. Machine learning algorithms, natural language processing (NLP), and facial recognition technologies are examined as core components in creating more personalized and responsive communication aids. The study also discusses the challenges and ethical considerations involved in deploying AI-based AT, such as data privacy and the risk of over-reliance on technology. Findings suggest that integrating AI into assistive technologies can significantly enhance the quality of life for non-verbal individuals with autism, providing them with greater opportunities for social interaction and participation in daily activities. However, continued research and development are needed to ensure these technologies are accessible, affordable, and culturally sensitive.

Keywords: artificial intelligence, autism spectrum disorder, non-verbal communication, assistive technology, machine learning

Procedia PDF Downloads 4
140 Improving Cheon-Kim-Kim-Song (CKKS) Performance with Vector Computation and GPU Acceleration

Authors: Smaran Manchala

Abstract:

Homomorphic Encryption (HE) enables computations on encrypted data without requiring decryption, mitigating data vulnerability during processing. Usable Fully Homomorphic Encryption (FHE) could revolutionize secure data operations across cloud computing, AI training, and healthcare, providing both privacy and functionality, however, the computational inefficiency of schemes like Cheon-Kim-Kim-Song (CKKS) hinders their widespread practical use. This study focuses on optimizing CKKS for faster matrix operations through the implementation of vector computation parallelization and GPU acceleration. The variable effects of vector parallelization on GPUs were explored, recognizing that while parallelization typically accelerates operations, it could introduce overhead that results in slower runtimes, especially in smaller, less computationally demanding operations. To assess performance, two neural network models, MLPN and CNN—were tested on the MNIST dataset using both ARM and x86-64 architectures, with CNN chosen for its higher computational demands. Each test was repeated 1,000 times, and outliers were removed via Z-score analysis to measure the effect of vector parallelization on CKKS performance. Model accuracy was also evaluated under CKKS encryption to ensure optimizations did not compromise results. According to the results of the trail runs, applying vector parallelization had a 2.63X efficiency increase overall with a 1.83X performance increase for x86-64 over ARM architecture. Overall, these results suggest that the application of vector parallelization in tandem with GPU acceleration significantly improves the efficiency of CKKS even while accounting for vector parallelization overhead, providing impact in future zero trust operations.

Keywords: CKKS scheme, runtime efficiency, fully homomorphic encryption (FHE), GPU acceleration, vector parallelization

Procedia PDF Downloads 0
139 Dishonesty and Achievement: An Experiment of Self-Revealing Individual Cheating

Authors: Gideon Yaniv, Erez Siniver, Yossef Tobol

Abstract:

The extensive body of economic and psychological research correlating between students' cheating and their grade point average (GPA) consistently finds a significant negative relationship between cheating and the GPA. However, this literature is entirely based on students' responses to direct question surveys that inquire whether they have ever cheated on their academic assignments. The present paper reports the results of a two-round experiment designed to expose student cheating at the individual level and correlate it with their GPAs. The experiment involved two classes of third-year economics students incentivized by a competitive reward to answer a multiple-choice trivia quiz without consulting their electronic devices. While this forbiddance was deliberately overlooked in the first round, providing an opportunity to cheat, it was strictly enforced in the second, conducted two months later in the same classes with the same quiz. A comparison of subjects' performance in the two rounds, self-revealed a considerable extent of cheating in the first one. Regressing the individual cheating levels on subjects' gender and GPA exhibited no significant differences in cheating between males and females. However, cheating of both genders was found to significantly increase with their GPA, implying, in sharp contrast with the direct question surveys, that higher achievers are bigger cheaters. A second experiment, which allowed subjects to answer the quiz in the privacy of their own cars, reveals that when really feeling safe to cheat, many subjects would cheat maximally, challenging the literature's claim that people generally cheat modestly.

Keywords: academic achievement, cheating behavior, experimental data, grade-point average

Procedia PDF Downloads 203
138 How Students Use WhatsApp to Access News

Authors: Emmanuel Habiyakare

Abstract:

The COVID-19 pandemic has highlighted the significance of educational technologies in teaching and learning. The global pandemic led to the closure of educational institutions worldwide, prompting the widespread implementation of online learning as a substitute method for delivering curricula. The communication platform is known as WhatsApp has gained widespread adoption and extensive utilisation within the realm of education. The primary aims of this literature review are to examine the utilisation patterns and obstacles linked to the implementation of WhatsApp in the realm of education, assess the advantages and possibilities that students and facilitators can derive from utilising this platform for educational purposes, and comprehend the hindrances and restrictions that arise when employing WhatsApp in an academic environment. The literature was acquired through the utilisation of keywords that are linked to both WhatsApp and education from diverse databases. Having a thorough comprehension of current trends, potential advantages, obstacles, and gains linked to the use of WhatsApp is imperative for lecturers and administrators. Scholarly investigations have revealed a noticeable trend of lecturers and students increasingly utilising WhatsApp as a means of communication and collaboration. The objective of this literature review is to make a noteworthy contribution to the domain of education and technology through an investigation of the potential of WhatsApp as a learning tool. Additionally, this review seeks to offer valuable insights on how to effectively incorporate WhatsApp into pedagogical practices. The article underscores the significance of taking into account privacy and security concerns while utilising WhatsApp for educational objectives and puts forth recommendations for additional investigation.

Keywords: tool, COVID-19, opportunities, challenges, learning, WhatsApp

Procedia PDF Downloads 14
137 A Next-Generation Blockchain-Based Data Platform: Leveraging Decentralized Storage and Layer 2 Scaling for Secure Data Management

Authors: Kenneth Harper

Abstract:

The rapid growth of data-driven decision-making across various industries necessitates advanced solutions to ensure data integrity, scalability, and security. This study introduces a decentralized data platform built on blockchain technology to improve data management processes in high-volume environments such as healthcare and financial services. The platform integrates blockchain networks using Cosmos SDK and Polkadot Substrate alongside decentralized storage solutions like IPFS and Filecoin, and coupled with decentralized computing infrastructure built on top of Avalanche. By leveraging advanced consensus mechanisms, we create a scalable, tamper-proof architecture that supports both structured and unstructured data. Key features include secure data ingestion, cryptographic hashing for robust data lineage, and Zero-Knowledge Proof mechanisms that enhance privacy while ensuring compliance with regulatory standards. Additionally, we implement performance optimizations through Layer 2 scaling solutions, including ZK-Rollups, which provide low-latency data access and trustless data verification across a distributed ledger. The findings from this exercise demonstrate significant improvements in data accessibility, reduced operational costs, and enhanced data integrity when tested in real-world scenarios. This platform reference architecture offers a decentralized alternative to traditional centralized data storage models, providing scalability, security, and operational efficiency.

Keywords: blockchain, cosmos SDK, decentralized data platform, IPFS, ZK-Rollups

Procedia PDF Downloads 12
136 The Posthuman Condition and a Translational Ethics of Entanglement

Authors: Shabnam Naderi

Abstract:

Traditional understandings of ethics considered translators, translations, technologies and other agents as separate and prioritized human agents. In fact, ethics was equated with morality. This disengaged understanding of ethics is superseded by an ethics of relation/entanglement in the posthuman philosophy. According to this ethics of entanglement, human and nonhuman agents are in constant ‘intra-action’. The human is not separate from nature, from technology and from other nonhuman entities, and an ethics of translation in this regard cannot be separated from technology and ecology and get defined merely within the realm of human-human encounter. As such, a posthuman ethics offers opportunities for change and responds to the changing nature of reality, it is negotiable and reveals itself as a moment-by-moment practice (i.e. as temporally emergent and beyond determinacy and permanence). Far from the linguistic or cultural, or individual concerns, posthuman translational ethics discusses how the former rigid norms and laws are challenged in a process ontology which puts emphasis on activity and activation and considers ethics as surfacing in activity, not as a predefined set of rules and values. In this sense, traditional ethical principles like faithfulness, accuracy and representation are superseded by principles of privacy, sustainability, multiplicity and decentralization. The present conceptual study, drawing on Ferrando’s philosophical posthumanism (as a post-humanism, as a post-dualism and as a post-anthropocentrism), Deleuze-Guattarian philosophy of immanence and Barad’s physics-philosophy strives to destabilize traditional understandings of translation ethics and bring an ethics that has loose ends and revolves around multiplicity and decentralization into the picture.

Keywords: ethics of entanglement, post-anthropocentrism, post-dualism, post-humanism, translation

Procedia PDF Downloads 68
135 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps

Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li

Abstract:

With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.

Keywords: mobile computing, deep learning apps, sensitive information, static analysis

Procedia PDF Downloads 167
134 Local Ordinances with Sharia Nuances in Pluralism Society of Indonesia: Convergence or Divergence

Authors: Farida Prihatini

Abstract:

As a largest Muslim country in the world with around 215 Muslim inhabitants, Indonesia interestingly is not an Islamic country. Yet, Indonesia is not a secular country as well. The country has committed to be a unity in diversity country where people from various socio-political background may be coexistent live in this archipelago country. However, many provinces and Muslim groups are disposed of special regulation for Muslim people, namely local ordinances with sharia nuances, applied specifically in provinces, cities or regions where Muslim inhabitants are the majority. For the last two decades, particularly since Indonesia reform movement of 1998, a lot of local ordinances (Peraturan Daerah) with Sharia nuance have been enacted and applied in several provinces, cities and regions in Indonesia. The local ordinances are mostly deal with restriction of alcohol, prohibition of prostitution, Al Qur'an literacy, obligation to wear Muslim attire and zakat or alms management. Some of local ordinances have been warmly welcomed by society, while other ordinances have created tension. Those who oppose the ordinances believe that such things regulated by the ordinances are in violation of human rights and democracy, part of privacy rights of the people and must not be regulated by the State or local government. This paper describes the dynamic of local Ordinances with sharia nuances in Indonesia, in this research is limited to three ordinances: on the restriction of alcohol, prohibition of prostitution and obligation to wear Muslim attire. The researcher employs a normative method by studying secondary data and local ordinances in selected areas in Indonesia. The findings of the paper are that local ordinances with sharia nuances are indeed part of the needs of society, yet, in their implementation must take the pluralism of Indonesia and the state basic foundation, which is Pancasila (five pillars) into account.

Keywords: local, ordinances, sharia, rights

Procedia PDF Downloads 274
133 Official Secrecy and Confidentiality in Tax Administration and Its Impact on Right to Access Information: Nigerian Perspectives

Authors: Kareem Adedokun

Abstract:

Official secrecy is one of the colonial vestiges which upholds non – disclosure of essential information for public consumption. Information, though an indispensable tool in tax administration, is not to be divulged by any person in an official duty of the revenue agency. As a matter o fact, the Federal Inland Revenue Service (Establishment) Act, 2007 emphasizes secrecy and confidentiality in dealing with tax payer’s document, information, returns and assessment in a manner reminiscent of protecting tax payer’s privacy in all situations. It is so serious that any violation attracts criminal sanction. However, Nigeria, being a democratic and egalitarian state recently enacted Freedom of Information Act which heralded in openness in governance and takes away the confidentialities associated with official secrets Laws. Official secrecy no doubts contradicts the philosophy of freedom of information but maintaining a proper balance between protected rights of tax payers and public interest which revenue agency upholds is an uphill task. Adopting the Doctrinal method, therefore, the author of this paper probes into the real nature of the relationship between taxpayers and Revenue Agencies. It also interfaces official secrecy with the doctrine of Freedom of Information and consequently queries the retention of non – disclosure clause under Federal Inland Revenue Service (Establishment) Act (FIRSEA) 2007. The paper finds among others that non – disclosure provision in tax statutes particularly as provided for in FIRSEA is not absolute; so also is the constitutional rights and freedom of information and unless the non – disclosure clause finds justification under any recognized exemption provided under the Freedom of Information Act, its retention is antithesis to democratic ethos and beliefs as it may hinder public interest and public order.

Keywords: confidentiality, information, official secrecy, tax administration

Procedia PDF Downloads 337
132 Participatory Action Research for Sustainability with Special Focus on Student Initiatives

Authors: Soni T. L.

Abstract:

Sustainable environmental stress is a major concern which needs immediate attention. This paper is an attempt to present participatory action research for sustainable agriculture. Being first and best culture, agriculture protects and improves the natural environment, the social and economic conditions of people, and safeguards the health and welfare of all groups. During course of time agriculture turned to agribusiness, then the values are not safeguarded. Moreover, in today’s busy life many are not taking efforts to take part in agriculture production. Then children are not getting the opportunity to understand agriculture and farming practices. So student initiatives are vital to make them aware. Here the programmes structured by the researcher come under the auspicious of National Service Scheme, a student-centered educational programme, organized by Ministry of Youth Affairs, Government of India. The twin objectives of the study are to examine the role of student initiatives for sustainable agriculture and the role of participatory action research in student initiatives. SWOT analysis is made to study strengths, weaknesses, threats and opportunities. The Methodology adopted is Participatory Action Research. The method is participatory in a sense there is collaboration through participation. The method is action, there is lab land experiences which is real. The method is research that there is documented lessons and creation of new knowledge. Plan of action cover measures adopted and strategies taken i.e., bhavana – kalpana – yojana – sadhana. Through the team effort, the team was successful in converting more than 10 hectares of barren land into cultivable land within and outside the campus. Team efforts of students saved a huge amount of labour cost and produced a huge quantity of organic output and the team was also successful in creating 1000 rain pits in the premises of College for rainwater harvesting. The findings include conveyance of the Message: Food Production is superior to Food donation. Moreover, the study fostered good work ethic and social responsibility among students. Students undertake innovative programmes underlying social and environmental issues and participants got increased opportunities to interact with local and less privileged and acquired increased awareness about real-life experiences which make them confident to interact with people and it resulted in the strengthening of social capital- cooperation, team spirit, social commitment among students. Participants promoted sustainable domestic efforts and ultimately environmental protection is ensured. Finally, there is recognition to the team, institution and the researcher at the university level, state level and at the national level. The learned lessons are, if the approach is good, the response is good and success generates success. Participatory action research is empowering experience for practitioners, focusing the combined time, energy and creativity of a committed group we should lead so many programmes which makes the institution centre of excellence. Authorities should take necessary steps for the Inclusion of community development activities in the curriculum. Action research is problem, client and action centered. So, we must adapt and adopt, coordinates and correlates measures which preserve and conserve the environment.

Keywords: participatory action research, student initiatives, sustainable development, sustainability

Procedia PDF Downloads 154
131 Dynamics of Parent to Adolescent Communication on Sexual and Reproductive Health in Sub-Saharan Africa: A Focus on Barriers and Policy Implications

Authors: Douglas Nyathi, Mxolisi Sibanda, Joram Ndlovuu, Thulani Dube, Innocent T. Mahiya

Abstract:

Communication of sexual matters between the parents and adolescents has been seen as one of the strategies that could play a cardinal role in encouraging adolescents to be responsible and delay sexual debut or avoid unprotected sexual intercourse. The increasing rate of teenage pregnancies and new HIV/AIDS infections among adolescents in Sub-Saharan Africa makes the phenomenon worth analysis. The purpose of this paper is to interrogate the dynamics of parent-adolescent communication on sexual and reproductive health in Sub-Sahara. Specifically the paper focuses on barriers to communication between parents and adolescents on sexual and reproductive health and its policy implications. It emanates from the paper that communication on sexual and reproductive health at household level is triggered by death of a relative from a sexual related illness, suspicion on sexual activity, radio programmes and in some instances fliers. Literature engagement reveals that communication between parents and adolescents on sexual and reproductive health is made difficult by economic factors (poverty, lack of privacy and low self-esteem), household demographics (age, sex, class, death), socio-cultural factors (beliefs and religious values) as well as social media. We argue that there is need to use broadcast mediato come up with radio and television programmes that create family environments in which sexual and reproductive health issues are discussed. We also recommend that government departments and Non-Governmental Organisations concerned with sexuality issues need to undertake studies that can help dismantle taboos, prejudices and stereotypes that impede sexual and reproductive health communication between parents and adolescents.

Keywords: parent, adolecsent, communication, sexual and reproductive health

Procedia PDF Downloads 456
130 Intrusion Detection in Cloud Computing Using Machine Learning

Authors: Faiza Babur Khan, Sohail Asghar

Abstract:

With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.

Keywords: cloud security, threats, machine learning, random forest, classification

Procedia PDF Downloads 317
129 Exploiting Identity Grievances: Al-Shabaab Propaganda Targeting Individuals Abroad

Authors: Mustafa Mabruk

Abstract:

Groups such as Al-Shabaab have managed to radicalize many individuals abroad, including the first American citizen to ever be radicalized. Yet the pathways of radicalization for these foreign individuals are understudied. Moreover, current measures to prevent foreign radicalization are ineffective, with privacy, screening and profiling implications that render current counter-radicalization efforts counterproductive. Such measures exhibit strictness, political bias, and harshness. As confirmed by recent studies, such counter-radicalization issues exacerbate existing grievances and channel fresh recruits to Al-Shabaab. Addressing these challenges is paramount, requiring alternative strategies to effectively reduce radicalization without triggering further harm. The development of counter-narratives emerges as a potential measure with minimal risk of exacerbating grievances, yet the development of such counter-narratives necessitates a thorough understanding of the radicalization pathways of foreign individuals that are understudied. This study investigates the success of Al-Shabaab in recruiting individuals abroad by analyzing their propaganda in conjunction with analyzing identity-focused theories of radicalization, including Framing Theory and Social Identity Theory. Qualitative content analysis is used to analyze various propaganda material, including tweets, speeches, and webpages. The analysis reveals that issues of identity are of major significance in the radicalization patterns identified and that grievances of Muslims worldwide are used to exploit identity-related grievances. Based on these findings, the paper argues that such evidence enhances our understanding of potential deradicalization pathways and present counter-narratives based on Islamic scripture.

Keywords: counter-narratives, foreign radicalization, identity grievances, propaganda analysis

Procedia PDF Downloads 39
128 Healthcare Workers’ Knowledge and Attitude Toward Telemedicine During the COVID-19 Pandemic: A Global Survey

Authors: Saman Naqvi

Abstract:

Introduction: Telemedicine is the practise of providing remote healthcare to patients via the utilisation of communication technologies. Its application has become increasingly important since the Coronavirus Disease 2019 (COVID-19) pandemic. It is essential to determine the knowledge and attitudes of healthcare professionals concerning its use in order to maximise its application. Purpose: We aim to examine and evaluate the current understanding and perceptions of medical staff toward the use of telemedicine. Methods: In this cross-sectional study, we surveyed 1091 healthcare professionals worldwide. Following an extensive review of the literature, data were gathered using a questionnaire. To depict the participant profile, frequency, percentages, and cumulative percentages were determined. Results: The majority of respondents had either heard of (90.9%), seen (65.3%), or were familiar with (74.6%) how telemedicine is implemented in practice. 72.2% of people were familiar with the tools that could be applied to this technology. Those with a medical degree and experience of under five years were found to be more familiar with telemedicine. Additionally, opinions on providing healthcare remotely were largely favorable, with 80% of respondents stating that it reduced staff burden and 80.6% thinking that it eliminated unnecessary transportation costs. Furthermore, 83% expressed that it saves clinicians' time. However, 20% of participants believed telemedicine adds to staff workload and 40% of healthcare professionals felt it compromises patient privacy and information confidentiality. Conclusion: Despite being a new and developing practice in many countries, telemedicine appears to have a bright future. This is crucial during a pandemic as it provides effective healthcare while maintaining social isolation measures. Moreover, the majority of the participants in this study demonstrated a good understanding and a favorable attitude toward telemedicine.

Keywords: healthcare system, global survey, knowledge, attitude, covid 19, telemedicine

Procedia PDF Downloads 87
127 Factors Affecting the Adoption of Cloud Business Intelligence among Healthcare Sector: A Case Study of Saudi Arabia

Authors: Raed Alsufyani, Hissam Tawfik, Victor Chang, Muthu Ramachandran

Abstract:

This study investigates the factors that influence the decision by players in the healthcare sector to embrace Cloud Business Intelligence Technology with a focus on healthcare organizations in Saudi Arabia. To bring this matter into perspective, this study primarily considers the Technology-Organization-Environment (TOE) framework and the Human Organization-Technology (HOT) fit model. A survey was hypothetically designed based on literature review and was carried out online. Quantitative data obtained was processed from descriptive and one-way frequency statistics to inferential and regression analysis. Data were analysed to establish factors that influence the decision to adopt Cloud Business intelligence technology in the healthcare sector. The implication of the identified factors was measured, and all assumptions were tested. 66.70% of participants in healthcare organization backed the intention to adopt cloud business intelligence system. 99.4% of these participants considered security concerns and privacy risk have been the most significant factors in the adoption of cloud Business Intelligence (CBI) system. Through regression analysis hypothesis testing point that usefulness, service quality, relative advantage, IT infrastructure preparedness, organization structure; vendor support, perceived technical competence, government support, and top management support positively and significantly influence the adoption of (CBI) system. The paper presents quantitative phase that is a part of an on-going project. The project will be based on the consequences learned from this study.

Keywords: cloud computing, business intelligence, HOT-fit model, TOE, healthcare and innovation adoption

Procedia PDF Downloads 166
126 The International Constitutional Order and Elements of Human Rights

Authors: Girma Y. Iyassu Menelik

Abstract:

“The world is now like a global village!” so goes the saying that shows that due to development and technology the countries of the world are now closely linked. In the field of Human rights there is a close relationship in the way that rights are recognised and enforced. This paper will show that human rights have evolved from ancient times through important landmarks such as the Magna Carta, the French Declaration of Rights of Man and of the Citizen and the American Bill of Rights. The formation of the United Nations after the Second World War resulted in the need to codify and protect human rights. There are some rights which are so fundamental that they are found in international and continental instruments, national constitutions and domestic legislation. In the civil and political sphere they include the right to vote, to freedom of association, speech and assembly, right to life, privacy and fair trial. In the economic and social sphere you have the right to work, protection of the family, social security and rights to education, health and shelter. In some instance some rights can be suspended in times of public emergency but such derogations shall be circumscribed by the law and in most constitutions such limitations are subject to judicial review. However, some rights are so crucial that they cannot be derogated from under any circumstances and these include the right to life, recognition before the law, freedom from torture and slavery and of thought, conscience and religion. International jurisprudence has been developed to protect fundamental rights and avoid discrimination on the grounds of race, colour, sex, language or social origin. The elaborate protection system go to show that these rights have become part of the international order and they have universal application. We have now got to a stage where UDHR, ICCPR and ICESCR and have come to be regarded as part of an international bill of rights with horizontal and vertical enforcement mechanisms involving state parties, NGO’s , international bodies and other organs.

Keywords: rights, international, constitutional, state, judiciary

Procedia PDF Downloads 448