Search results for: the 1st personal pronouns
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2302

Search results for: the 1st personal pronouns

1942 Assessment of Cytogenetic Damage as a Function of Radiofrequency Electromagnetic Radiations Exposure Measured by Electric Field Strength: A Gender Based Study

Authors: Ramanpreet, Gursatej Gandhi

Abstract:

Background: Dependence on electromagnetic radiations involved in communication and information technologies has incredibly increased in the personal and professional world. Among the numerous radiations, sources are fixed site transmitters, mobile phone base stations, and power lines beside indoor devices like cordless phones, WiFi, Bluetooth, TV, radio, microwave ovens, etc. Rather there is the continuous emittance of radiofrequency radiations (RFR) even to those not using the devices from mobile phone base stations. The consistent and widespread usage of wireless devices has build-up electromagnetic fields everywhere. In fact, the radiofrequency electromagnetic field (RF-EMF) has insidiously become a part of the environment and like any contaminant may pose to be health-hazardous requiring assessment. Materials and Methods: In the present study, cytogenetic damage was assessed using the Buccal Micronucleus Cytome (BMCyt) assay as a function of radiation exposure after Institutional Ethics Committee clearance of the study and written voluntary informed consent from the participants. On a pre-designed questionnaire, general information lifestyle patterns (diet, physical activity, smoking, drinking, use of mobile phones, internet, Wi-Fi usage, etc.) genetic, reproductive (pedigrees) and medical histories were recorded. For this, 24 hour-personal exposimeter measurements (PEM) were recorded for unrelated 60 healthy adults (40 cases residing in the vicinity of mobile phone base stations since their installation and 20 controls residing in areas with no base stations). The personal exposimeter collects information from all the sources generating EMF (TETRA, GSM, UMTS, DECT, and WLAN) as total RF-EMF uplink and downlink. Findings: The cases (n=40; 23-90 years) and the controls (n=20; 19-65 years) matched for alcohol drinking, smoking habits, and mobile and cordless phone usage. The PEM in cases (149.28 ± 8.98 mV/m) revealed significantly higher (p=0.000) electric field strength compared to the recorded value (80.40 ± 0.30 mV/m) in controls. The GSM 900 uplink (p=0.000), GSM 1800 downlink (p=0.000),UMTS (both uplink; p=0.013 and downlink; p=0.001) and DECT (p=0.000) electric field strength were significantly elevated in the cases as compared to controls. The electric field strength in the cases was significantly from GSM1800 (52.26 ± 4.49mV/m) followed by GSM900 (45.69 ± 4.98mV/m), UMTS (25.03 ± 3.33mV/m), DECT (18.02 ± 2.14mV/m) and was least from WLAN (8.26 ± 2.35mV/m). The higher significantly (p=0.000) increased exposure to the cases was from GSM (97.96 ± 6.97mV/m) in comparison to UMTS, DECT, and WLAN. The frequencies of micronuclei (1.86X, p=0.007), nuclear buds (2.95X, p=0.002) and cell death parameter (condensed chromatin cells) were significantly (1.75X, p=0.007) elevated in cases compared to that in controls probably as a function of radiofrequency radiation exposure. Conclusion: In the absence of other exposure(s), any cytogenetic damage if unrepaired is a cause of concern as it can cause malignancy. Larger sample size with the clinical assessment will prove more insightful of such an effect.

Keywords: Buccal micronucleus cytome assay, cytogenetic damage, electric field strength, personal exposimeter

Procedia PDF Downloads 158
1941 Filtration Efficacy of Reusable Full-Face Snorkel Masks for Personal Protective Equipment

Authors: Adrian Kong, William Chang, Rolando Valdes, Alec Rodriguez, Roberto Miki

Abstract:

The Pneumask consists of a custom snorkel-specific adapter that attaches a snorkel-port of the mask to a 3D-printed filter. This full-face snorkel mask was designed for use as personal protective equipment (PPE) during the COVID-19 pandemic when there was a widespread shortage of PPE for medical personnel. Various clinical validation tests have been conducted, including the sealing capability of the mask, filter performance, CO2 buildup, and clinical usability. However, data regarding the filter efficiencies of Pneumask and multiple filter types have not been determined. Using an experimental system, we evaluated the filtration efficiency across various masks and filters during inhalation. Eighteen combinations of respirator models (5 P100 FFRs, 4 Dolfino Masks) and filters (2091, 7093, 7093CN, BB50T) were evaluated for their exposure to airborne particles sized 0.3 - 10.0 microns using an electronic airborne particle counter. All respirator model combinations provided similar performance levels for 1.0-micron, 3.0-micron, 5.0-micron, 10.0-microns, with the greatest differences in the 0.3-micron and 0.5-micron range. All models provided expected performances against all particle sizes, with Class P100 respirators providing the highest performance levels across all particle size ranges. In conclusion, the modified snorkel mask has the potential to protect providers who care for patients with COVID-19 from increased airborne particle exposure.

Keywords: COVID-19, PPE, mask, filtration, efficiency

Procedia PDF Downloads 167
1940 Cardiopulmonary Resuscitation Performance Efficacy While Wearing a Powered Air-Purifying Respirator

Authors: Jun Young Chong, Seung Whan Kim

Abstract:

Introduction: The use of personal protective equipment for respiratory infection control in cardiopulmonary resuscitation (CPR) is a physical burden to healthcare providers. It matters how long CPR quality according to recommended guidelines can be maintained under these circumstances. It was investigated whether chest compression time was appropriate for a 2-minute shift and how long it was maintained in accordance with the guidelines under such conditions. Methods: This prospective crossover simulation study was performed at a single center from September 2020 to October 2020. Five indicators of CPR quality were measured during the first and second sessions of the study period. All participants wore a Level D powered air-purifying respirator (PAPR), and the experiment was conducted using a Resusci Anne manikin, which can measure the quality of chest compressions. Each participant conducted two sessions. In session one, 2-minutes of chest compressions followed by a 2-minute rest was repeated twice; in session two, 1-minute of chest compressions followed by a 1-minute rest was repeated four times. Results: All 34 participants completed the study. The deep and sufficient compression rate was 65.9 ± 13.1 mm in the 1-minute shift group and 61.5 ± 30.5 mm in the 2-minute shift group. The mean depth was 52.8 ±4.3 mm in the 1-minute shift group and 51.0 ± 6.1 mm in the 2-minute shift group. In these two values, there was a statistically significant difference between the two sessions. There was no statistically significant difference in the other CPR quality values. Conclusions: It was suggested that the different standard of current 2-minute to 1-minute cycles due to a significant reduction in the quality of chest compression in cases of CPR with PAPR.

Keywords: cardiopulmonary resuscitation, chest compression, personal protective equipment, powered air-purifying respirator

Procedia PDF Downloads 114
1939 Structure of the Working Time of Nurses in Emergency Departments in Polish Hospitals

Authors: Jadwiga Klukow, Anna Ksykiewicz-Dorota

Abstract:

An analysis of the distribution of nurses’ working time constitutes vital information for the management in planning employment. The objective of the study was to analyze the distribution of nurses’ working time in an emergency department. The study was conducted in an emergency department of a teaching hospital in Lublin, in Southeast Poland. The catalogue of activities performed by nurses was compiled by means of continuous observation. Identified activities were classified into four groups: Direct care, indirect care, coordination of work in the department and personal activities. Distribution of nurses’ working time was determined by work sampling observation (Tippett) at random intervals. The research project was approved by the Research Ethics Committee by the Medical University of Lublin (Protocol 0254/113/2010). On average, nurses spent 31% of their working time on direct care, 47% on indirect care, 12% on coordinating work in the department and 10% on personal activities. The most frequently performed direct care tasks were diagnostic activities – 29.23% and treatment-related activities – 27.69%. The study has provided information on the complexity of performed activities and utilization of nurses’ working time. Enhancing the effectiveness of nursing actions requires working out a strategy for improved management of the time nurses spent at work. Increasing the involvement of auxiliary staff and optimizing communication processes within the team may lead to reduction of the time devoted to indirect care for the benefit of direct care.

Keywords: emergency nurses, nursing care, workload, work sampling

Procedia PDF Downloads 334
1938 Train Cross-Cultural Leaders in Higher Education

Authors: Sarah Abi Raad

Abstract:

Nowadays, one of the challenges faced by many institutions is the continuous changing psychosocial environment. This alteration affects the resources, the organizations and defies the leadership and management of people in charge. As a fact, institutions of higher education differ from many organizations, requiring leadership to be a more shared phenomenon than in most profit-centered enterprises. In these colleges, the leadership must be oriented in a way to empower activities. This said, it is important to train students to take on leadership roles in their personal and professional lives. Thus, leadership training in higher education have to manage a cross-cultural environment in order to get the best out of the whole community that works and studies there. The main directions to follow are the building of a professional identity that manages the cross-cultural public while feeling a personal fulfillment in the workplace. In order to do that, this communication proposal has three objectives: - Explain the aspects of the cross-cultural leadership training logic offered to managers and chairs by allowing them to develop a technical leader style of passionate type with a managerial leadership style of compassionate type. - Define the multiple factors on which depends the leadership, which includes the department’s stage of development, the specific management function, the academic discipline and the chair’s own style of leadership. - Emphasize on the complex nature of leadership and the different facets that results from its role in the higher education. However, different situations require a leader with particular characteristics that can be gathered into three categories: “the innovator”, “the implementer” and the “pacifier”. Each category is linked to a problem organizations normally encounter. This leads to conclude with the following question: are the gender, age and culture taken into consideration during a training?

Keywords: benevolent leadership, cross-cultural training, management, unprecedented existential crisis

Procedia PDF Downloads 124
1937 Influence of the Seat Arrangement in Public Reading Spaces on Individual Subjective Perceptions

Authors: Jo-Han Chang, Chung-Jung Wu

Abstract:

This study involves a design proposal. The objective of is to create a seat arrangement model for public reading spaces that enable free arrangement without disturbing the users. Through a subjective perception scale, this study explored whether distance between seats and direction of seats influence individual subjective perceptions in a public reading space. This study also involves analysis of user subjective perceptions when reading in the settings on 3 seats at different directions and with 5 distances between seats. The results may be applied to public chair design. This study investigated that (a) whether different directions of seats and distances between seats influence individual subjective perceptions and (b) the acceptable personal space between 2 strangers in a public reading space. The results are shown as follows: (a) the directions of seats and distances between seats influenced individual subjective perceptions. (b) subjective evaluation scores were higher for back-to-back seat directions with Distances A (10 cm) and B (62 cm) compared with face-to-face and side-by-side seat directions; however, when the seat distance exceeded 114 cm (Distance C), no difference existed among the directions of seats. (c) regarding reading in public spaces, when the distance between seats is 10 cm only, we recommend arranging the seats in a back-to-back fashion to increase user comfort and arrangement of face-to-face and side- by-side seat directions should be avoided. When the seat arrangement is limited to face-to-face design, the distance between seats should be increased to at least 62 cm. Moreover, the distance between seats should be increased to at least 114 cm for side- by-side seats to elevate user comfort.

Keywords: individual subjective perceptions, personal space, seat arrangement, direction, distances

Procedia PDF Downloads 427
1936 Coping Strategies of Female English Teachers and Housewives to Face the Challenges Associated to the COVID-19 Pandemic Lockdown

Authors: Lisseth Rojas Barreto, Carlos Muñoz Hernández

Abstract:

The COVID-19 pandemic led to many abrupt changes, including a prolonged lockdown, which brought about work and personal challenges to the population worldwide. Among the most affected populations are women who are workers and housewives at the same time, and especially those who are also parenting. These women were faced with the challenge to perform their usual varied roles during the lockdown from the same physical space, which inevitably had strong repercussions for each of them. This paper will present some results of a research study whose main objective was to examine the possible effects that the COVID-19 pandemic lockdown may have caused in the work, social, family, and personal environments of female English teachers who are also housewives and, by extension in the teaching and learning processes that they lead. Participants included five female English language teachers of a public foreign language school, they are all married, and two of them have children. Similarly, we examined some of the coping strategies these teachers used to tackle the pandemic-related challenges in their different roles, especially those used for their language teaching role; coping strategies are understood as a repertoire of behaviors in response to incidents that can be stressful for the subject, possible challenging events or situations that involve emotions with behaviors and decision-making of people which are used in order to find a meaning or positive result (Lazarus &Folkman, 1986) Following a qualitative-case study design, we gathered the data through a survey and a focus group interview with the participant teachers who work at a public language school in southern Colombia. Preliminary findings indicate that the circumstances that emerged as a result of the pandemic lockdown affected the participants in different ways, including financial, personal, family, health, and work-related issues. Among the strategies that participants found valuable to deal with the novel circumstances, we can highlight the reorganization of the household and work tasks and the increased awareness of time management for the household, work, and leisure. Additionally, we were able to evidence that the participants faced the circumstances with a positive view. Finally, in order to cope with their teaching duties, some participants acknowledged their lack of computer or technology literacy in order to deliver their classes online, which made them find support from their students or more knowledgeable peers to cope with it. Others indicated that they used strategies such as self-learning in order to get acquainted and be able to use the different technological tools and web-based platforms available.

Keywords: coping strategies, language teaching, female teachers, pandemic lockdown

Procedia PDF Downloads 106
1935 Evaluation of Food Safety and Security Practices in Midday Meal Programmes in Rural Areas of Beed District

Authors: Nuzhat Sultana M. B.

Abstract:

Children are high-risk population in terms of food born illnesses. Food safety and security are the most important aspect of the success of midday meal programmes. Improper holding temperatures, cross-contamination and poor personal hygiene of food handlers are the main causes for the prevalence of pathogenic microbes in the food servicing areas. Two hundred and fifty preschool children in the age of 3 to 6 years from urban and rural anganwadies (pre school center) of Beed district were selected. Nutritional status of preschool children were assessed by anthropometrical and clinical measurement. The study assessed the food safety and security with the help of personal hygiene and other safety measures maintained by the food personnel working for midday meal programme, supplying mid meals to children in govt. anganwadies (pre school center). The hygiene level, sanitary condition and microbial quality of food and water, pathological health examination of food handlers were assessed with the help of checklist. A questionnaire was designed to evaluate knowledge, attitude, and practices of food handlers. Results of the study show that the nutritional and health status of rural and urban preschool children was very poor. Many of the food handlers were not aware of general knowledge and hygiene practices to be followed during food preparation areas. An intervention programme of education and importing training at workplaces has shown a positive impact on the outcome of safety and security practices and safe, hygienic practices of food handlers at workplace.

Keywords: food, health, preschool children, safety, security

Procedia PDF Downloads 203
1934 Evolving Jurisprudence of Rape Laws in India: A Study of Last One Decade

Authors: Drutika Upadhyay

Abstract:

Rape is one of the most heinous crimes committed against the body of a woman violating her privacy and dignity. The Right to Privacy and the Right to Live with Dignity constitute the very essence of the Right to Life and Personal Liberty, a Fundamental Right guaranteed under Article 21 of the Indian Constitution. The study is conducted with the primary objective of analyzing the efficacy of rape laws in India. The study begins by explaining the origin, meaning, and kinds of rape recognised under Indian jurisprudence. Further, it explains various statutory and penal provisions relating to rape and the loopholes in such provisions. It focuses on the procedure followed during investigation and trial and also aims at developing an understanding of the rights of the victim and the sentence in cases of rape. The study also throws some light upon the amendments made to the criminal law and the recommendations of the Law Commission of India to meet the demands of the changing criminal justice delivery system. The outcome of the study suggests that the laws relating to rape have proved to be a major failure owing to the lack of proper implementation. Also, the lack of education among the masses leads to gender biasness, which is the ultimate cause for the commission of such crime. At last, the author concludes that the present criminal law system of the country contains various lacunae that need to be filled in so as to make the criminal justice system more stringent. Further, the scope of the definition of ‘rape’ needs to be widened in order to include such other acts of non-consensual and sexual nature that are currently not included in the definition. The author has adopted a non-doctrinal and analytical approach and relied upon the secondary sources of data for the purpose of the study. The scope of the study is limited to the crime committed against women.

Keywords: amendment, criminal law, fundamental right, personal liberty, privacy, rape

Procedia PDF Downloads 130
1933 Barnard Feature Point Detector for Low-Contractperiapical Radiography Image

Authors: Chih-Yi Ho, Tzu-Fang Chang, Chih-Chia Huang, Chia-Yen Lee

Abstract:

In dental clinics, the dentists use the periapical radiography image to assess the effectiveness of endodontic treatment of teeth with chronic apical periodontitis. Periapical radiography images are taken at different times to assess alveolar bone variation before and after the root canal treatment, and furthermore to judge whether the treatment was successful. Current clinical assessment of apical tissue recovery relies only on dentist personal experience. It is difficult to have the same standard and objective interpretations due to the dentist or radiologist personal background and knowledge. If periapical radiography images at the different time could be registered well, the endodontic treatment could be evaluated. In the image registration area, it is necessary to assign representative control points to the transformation model for good performances of registration results. However, detection of representative control points (feature points) on periapical radiography images is generally very difficult. Regardless of which traditional detection methods are practiced, sufficient feature points may not be detected due to the low-contrast characteristics of the x-ray image. Barnard detector is an algorithm for feature point detection based on grayscale value gradients, which can obtain sufficient feature points in the case of gray-scale contrast is not obvious. However, the Barnard detector would detect too many feature points, and they would be too clustered. This study uses the local extrema of clustering feature points and the suppression radius to overcome the problem, and compared different feature point detection methods. In the preliminary result, the feature points could be detected as representative control points by the proposed method.

Keywords: feature detection, Barnard detector, registration, periapical radiography image, endodontic treatment

Procedia PDF Downloads 442
1932 Online vs. in vivo Workshops in a Masters’ Degree Course in Mental Health Nursing: Students’ Views and Opinions

Authors: Evmorfia Koukia, Polyxeni Mangoulia

Abstract:

Workshops tend to be a vivid and productive way as an in vivo teaching method. Due to the pandemic, COVID-19 university courses were conducted through the internet. Method It was tried for the first time to integrate online art therapy workshops in a core course named “Special Themes of Mental Health Nursing” in a MSc Program in Mental Health. The duration of the course is 3-hours per week for 11 weeks in a single semester. The course has a main instructor, a professor of psychiatric nursing experienced in arts therapies workshops and visiting art therapists. All art therapists were given a certain topic to cover. Students were encouraged to keep a logbook that was evaluated at the end of the semester and was submitted as a part of the examination process of the course. An interview of 10 minutes was conducted with each student at the end of the course from an independent investigator (an assistant professor) Participants The students (sample) of the program were: nurses, psychologists, and social workers Results: All students who participated in the courses found that the learning process was vivid, encouraging participation and self-motivation, and there were no main differences from in vivo learning. The students identified their personal needs, and they felt a personal connection with the learning experience. The result of the personalized learning was that students discovered their strengths and weaknesses and developed skills like critical thinking. All students admitted that the workshops were the optimal way for them to comprehend the courses’ content, their capability to become therapists, as well as their obstacles and weaknesses while working with patients in mental health. Conclusion: There were no important differences between the views of students in online and in vivo teaching method of the workshops. The result has shown that workshops in mental health can contribute equally in the learning experience.

Keywords: mental health, workshops, students, nursing

Procedia PDF Downloads 209
1931 E-Pharmacy: An e-Commerce Approach for Buying Medicine Online in Saudi Arabia

Authors: Syed Asif Hassan, Tabrej Khan, Ibrahim Manssor Al Najar, Mohammed Nasser

Abstract:

The incredible accomplishment achieved by e-commerce in consumer durable area encouraged us to implement the online e-commerce model to tap the business benefits of electronic pharmacy in Saudi Arabia. The Kingdom of Saudi Arabia is famous for traditional herbal medicine. The rich heritage of traditional medicine has helped the mushrooming of regional pharmaceutical industries manufacturing drugs and other therapeutic against various diseases. However, the implementation of e-commerce in pharmacy has not been employed in the Kingdom of Saudi Arabia. The electronic pharmacy (E-Pharm) is an important sector that is flourishing across the globe and providing benefits of E-Pharm to the customers and suppliers all around the world. In this context, our web-based application of electronic pharmacy is the one of its kind in the Kingdom of Saudi Arabia. Surveys and personal interviews were used to identify key objectives of the proposed web-based portal. As per the findings of the surveys and personal interviews, following key objectives were identified: (a) The online platform will be used for ordering of prescription based medications for consumers. (b) The e-portal will provide space for pharmaceutical retailers who do not have an electronic platform to upload and sell their therapeutic products in an organized way. (c) The web portal will provide a tracking system to track the customer’s behavior like choice, offer, order, shipment, payment, etc. The web-based e-pharmacy portal will be developed using MySQL and PHP. The development of e-pharmacy web portal and e-prescription practices will not only improve the growth of electronic pharmacy but would also decrease the possibility of prescription alteration thus providing safety and improving the quality of service provided to the patient or consumers.

Keywords: e-commerce, E-Pharm, MySQL, PHP

Procedia PDF Downloads 398
1930 Virtual Life: Fashion, Expression, and Identity in the Digital World

Authors: Elizabeth Bourgeois

Abstract:

During social distancing, fashion and self-expression have been pushed further into virtual environments. In VR spaces, identities can be curated easily, untethered from the necessities of life and work. Personal styles reach a wider audience and follow new rules. Digital platforms leave some, but not all, 'real world' clothing constraints behind. Virtual aesthetics are set by the user and the software. Gen Z is a native user, applying face filters on Instagram and Snapchat and styling outfits and skins in apps like Gacha Life, Roblox, and Fortnite. These games cultivate space for community and personal style. Loosely tied to human forms, each app has physical aesthetics, with clear vernacular dress defining it. There are ecosystems of makers, consumers, and critics. Designer-modelers create original assets, brands, and luxury items. Fashion and beauty are ephemeral but always reflect the idealization of form and self. Online communities have already established new beauty ideals that impact live fashion trends. Fashion houses develop AR filters, gaming hairstyles challenge real-world colorists, and musicians perform virtual concerts in their avatar forms. In these times, social media and gaming communities promote the expression of public identity. The online dress is no longer tied to 'real' bodies or cloth. In virtual worlds, there are still tribes, status symbols, gender identities, and roles, but free of fabric, form, and static social structure, there is room for fantastic invention.

Keywords: virtual reality, fashion, Gen Z, social media, gaming

Procedia PDF Downloads 135
1929 Sharing Tacit Knowledge: The Essence of Knowledge Management

Authors: Ayesha Khatun

Abstract:

In 21st century where markets are unstable, technologies rapidly proliferate, competitors multiply, products and services become obsolete almost overnight and customers demand low cost high value product, leveraging and harnessing knowledge is not just a potential source of competitive advantage rather a necessity in technology based and information intensive industries. Knowledge management focuses on leveraging the available knowledge and sharing the same among the individuals in the organization so that the employees can make best use of it towards achieving the organizational goals. Knowledge is not a discrete object. It is embedded in people and so difficult to transfer outside the immediate context that it becomes a major competitive advantage. However, internal transfer of knowledge among the employees is essential to maximize the use of knowledge available in the organization in an unstructured manner. But as knowledge is the source of competitive advantage for the organization it is also the source of competitive advantage for the individuals. People think that knowledge is power and sharing the same may lead to lose the competitive position. Moreover, the very nature of tacit knowledge poses many difficulties in sharing the same. But sharing tacit knowledge is the vital part of knowledge management process because it is the tacit knowledge which is inimitable. Knowledge management has been made synonymous with the use of software and technology leading to the management of explicit knowledge only ignoring personal interaction and forming of informal networks which are considered as the most successful means of sharing tacit knowledge. Factors responsible for effective sharing of tacit knowledge are grouped into –individual, organizational and technological factors. Different factors under each category have been identified. Creating a positive organizational culture, encouraging personal interaction, practicing reward system are some of the strategies that can help to overcome many of the barriers to effective sharing of tacit knowledge. Methodology applied here is completely secondary. Extensive review of relevant literature has been undertaken for the purpose.

Keywords: knowledge, tacit knowledge, knowledge management, sustainable competitive advantage, organization, knowledge sharing

Procedia PDF Downloads 398
1928 A Learning Package on Medical Cannabis for Nurses

Authors: Kulveer Sandhu

Abstract:

Background: In 1999, the Government of Canada legalized the use of cannabis for the therapeutic purpose (CTP); however, its users remain highly vulnerable to stigma and are judged by care providers and nonusers of cannabis. Findings from a literature review suggest health care providers (HCPs), including nurses in palliative care settings, lack knowledge about medical cannabis. For this reason, it is important to enhance HCPs’awarenessand knowledge of medical cannabis. Significance of the Project: Nurses are the first point of contact and spend more time with patients than other care providers; it is, therefore, important for them to be informed about CTPto provide quality and equitable care for medical cannabis users. Although nurses and other HCPs want information on CTP, the topic is rarely included in their educational curriculum. The purpose of this project is to create an evidence informed Package designed to increase knowledge among palliative care nurses about CTP. The information package will empower palliative nurses to help palliative patients make informed decisions about their treatment plan. Method: The information package will include a basic overview of the endocannabinoid system, common cannabis plants and products, and methods of consumption, as well as information to help nurses better understand consumption and harm reduction. The package will also include a set of cannabis fact sheets for nurses. Each fact sheet will comprise a high-level overview with graphics followed by a description of medical cannabis with links and references. At the end of the learning package, there are five self-reflection questions that allow nurses to examine their personal values, attitudes, and practices regarding medical cannabis. These questions will help each nurse understand their personal approach towards CTP and its users.

Keywords: medical cannabis, improve knowledge, cannabis for therapeutic purpose (CTP), patient experience, palliative care

Procedia PDF Downloads 220
1927 A Hill Cipher Based on the Kish-Sethuraman Protocol

Authors: Kondwani Magamba

Abstract:

In the idealized Kish-Sethuraman (KS) protocol,messages are sent between Alice and Bob each using a secret personal key. This protocol is said to be perfectly secure because both Bob and Alice keep their keys undisclosed so that at all times the message is encrypted by at least one key, thus no information is leaked or shared. In this paper, we propose a realization of the KS protocol through the use of the Hill Cipher.

Keywords: Kish-Sethuraman Protocol, Hill Cipher, MDS Matrices, encryption

Procedia PDF Downloads 357
1926 Motivating Factors and Prospects for Rural Community Involvement in Entrepreneurship: Evidence from Mantanani Island, Sabah, Malaysia

Authors: F. Fabeil Noor, Roslinah Mahmud, Janice L. H. Nga, Rasid Mail

Abstract:

In Malaysia, particularly in Sabah, the government has been promoting entrepreneurship among rural people to encourage them to earn their living by making good use of the diverse natural resources and local cultures of Sabah. Nevertheless, despite the government’s aim to encourage more local community in rural area to involve in entrepreneurship, the involvement of community in entrepreneurial activity is still low. It is crucial to identify the factors stimulate (or prevent) the involvement of rural community in Sabah in entrepreneurial activity. Therefore, this study tries to investigate the personal and contextual factors that may have impact on decision to start a business among the local community in Mantanani Island. In addition, this study also aims to identify the perceived benefits they receive from entrepreneurial activity. A structured face-to-face interview was conducted with 61 local communities in Mantanani Island. Data analysis revealed that passion, personal skills and self-confidence are the significant internal factors to entrepreneurial activity, whereas access to finance, labour and infrastructure are the significant external factors that are found to influence entrepreneurship. In terms of perceived rewards they received from taking up small business, it was found that respondents are predominantly agreed that entrepreneurship offers financial benefit than non-financial. In addition, this study also offers several suggestions for entrepreneurship development in Mantanani Island and it is hoped that this study may help the related agency to develop effective support policies in order to encourage more people in rural area to involve in entrepreneurship.

Keywords: entrepreneurship, motivation, perceived rewards, rural community

Procedia PDF Downloads 261
1925 Exploring Perceptions of Non-Energy Benefits and Energy Efficiency Investment in the Malaysian Industrial Sector

Authors: Siti Noor Baiti Binti Mustafa

Abstract:

Energy management studies regarding energy efficiency investments in Malaysia has yet to address the lack of empirical research that examines pro- sustainability behavior of managers in the industrial sector and how it influences energy efficiency investment decision-making. This study adopts the Theory of Planned Behavior (TPB) to examine the relationship between personal attitude, subjective norms, and perceived behavioral control (PBC), the intention of energy efficiency investments, and how perceptions of Non-Energy Benefits (NEB) influence these intentions among managers in the industrial sector in Malaysia. Managers from various sub-sectors in the industrial sector were selected from a sample of companies that are participants of the Government-led program named the Energy Audit Conditional Grant (EACG) that aimed to promote energy efficiency. Data collection was conducted through an online semi-structured, open-ended questionnaire and then later interviewed. The results of this explorative sequential qualitative study showed that perceived behavioral control was a significant predictor of energy efficiency investment intentions as compared to factors such as attitude and subjective norms. The level of awareness and perceptions towards NEB further played a significant factor in influencing energy efficiency investment decision-making as well. Various measures and policy recommendations are provided together with insights on factors that influence decision-makers intention to invest in energy efficiency, whilst new knowledge on NEB perceptions will be useful to enhance the attractiveness of energy-efficient investments.

Keywords: energy efficiency investments, non-energy benefits, theory of planned behavior, personal attitude, subjective norms, perceived behavioral control, Malaysia industrial sector

Procedia PDF Downloads 125
1924 Teachers Engagement to Teaching: Exploring Australian Teachers’ Attribute Constructs of Resilience, Adaptability, Commitment, Self/Collective Efficacy Beliefs

Authors: Lynn Sheridan, Dennis Alonzo, Hoa Nguyen, Andy Gao, Tracy Durksen

Abstract:

Disruptions to teaching (e.g., COVID-related) have increased work demands for teachers. There is an opportunity for research to explore evidence-informed steps to support teachers. Collective evidence informs data on teachers’ personal attributes (e.g., self-efficacy beliefs) in the workplace are seen to promote success in teaching and support teacher engagement. Teacher engagement plays a role in students’ learning and teachers’ effectiveness. Engaged teachers are better at overcoming work-related stress, burnout and are more likely to take on active roles. Teachers’ commitment is influenced by a host of personal (e.g., teacher well-being) and environmental factors (e.g., job stresses). The job demands-resources model provided a conceptual basis for examining how teachers’ well-being, and is influenced by job demands and job resources. Job demands potentially evoke strain and exceed the employee’s capability to adapt. Job resources entail what the job offers to individual teachers (e.g., organisational support), helping to reduce job demands. The application of the job demands-resources model involves gathering an evidence-base of and connection to personal attributes (job resources). The study explored the association between constructs (resilience, adaptability, commitment, self/collective efficacy) and a teacher’s engagement with the job. The paper sought to elaborate on the model and determine the associations between key constructs of well-being (resilience, adaptability), commitment, and motivation (self and collective-efficacy beliefs) to teachers’ engagement in teaching. Data collection involved online a multi-dimensional instrument using validated items distributed from 2020-2022. The instrument was designed to identify construct relationships. The participant number was 170. Data Analysis: The reliability coefficients, means, standard deviations, skewness, and kurtosis statistics for the six variables were completed. All scales have good reliability coefficients (.72-.96). A confirmatory factor analysis (CFA) and structural equation model (SEM) were performed to provide measurement support and to obtain latent correlations among factors. The final analysis was performed using structural equation modelling. Several fit indices were used to evaluate the model fit, including chi-square statistics and root mean square error of approximation. The CFA and SEM analysis was performed. The correlations of constructs indicated positive correlations exist, with the highest found between teacher engagement and resilience (r=.80) and the lowest between teacher adaptability and collective teacher efficacy (r=.22). Given the associations; we proceeded with CFA. The CFA yielded adequate fit: CFA fit: X (270, 1019) = 1836.79, p < .001, RMSEA = .04, and CFI = .94, TLI = .93 and SRMR = .04. All values were within the threshold values, indicating a good model fit. Results indicate that increasing teacher self-efficacy beliefs will increase a teacher’s level of engagement; that teacher ‘adaptability and resilience are positively associated with self-efficacy beliefs, as are collective teacher efficacy beliefs. Implications for school leaders and school systems: 1. investing in increasing teachers’ sense of efficacy beliefs to manage work demands; 2. leadership approaches can enhance teachers' adaptability and resilience; and 3. a culture of collective efficacy support. Preparing teachers for now and in the future offers an important reminder to policymakers and school leaders on the importance of supporting teachers’ personal attributes when faced with the challenging demands of the job.

Keywords: collective teacher efficacy, teacher self-efficacy, job demands, teacher engagement

Procedia PDF Downloads 124
1923 Analysis on South Korean Early Childhood Education Teachers’ Stage of Concerns about Software Education According to the Concern-Based Adoption Model

Authors: Sun-Mi Park, Ji-Hyun Jung, Min-Jung Kang

Abstract:

Software (SW) education is scheduled to be included in the National curriculum in South Korea by 2018. However, Korean national kindergarten curriculum has been excepted from the revision of the entire Korean national school curriculum including software education. Even though the SW education has not been considered a part of current national kindergarten curriculum, there is a growing interest of adopting software education into the ECE practice. Teachers might be a key element in introducing and implementing new educational change such as SW education. In preparation for the adoption of SW education in ECE, it might be necessary to figure out ECE teachers’ perception and attitudes toward early childhood software education. For this study, 219 ECE teachers’ concern level in SW education was surveyed by using the Stages of Concern Questionnaire (SoCQ). As a result, the teachers' concern level in SW education is the highest at stage 0-Unconcerned and is high level in stage 1-informational, stage 2-personal, and stage 3-management concern. Thus, a non-user pattern was mostly indicated. However, compared to a typical non-user pattern, the personal and informative concern level is slightly high. The 'tailing up' phenomenon toward stage 6-refocusing was shown. Therefore, the pattern aspect close to critical non-user ever appeared to some extent. In addition, a significant difference in concern level was shown at all stages depending on the awareness of necessity. Teachers with SW training experience showed higher intensity only at stage 0. There was statistically significant difference in stage 0 and 6 depending on the future implementation decision. These results will be utilized as a resource in building ECE teachers’ support system according to his or her concern level of SW education.

Keywords: concerns-based adoption model (CBAM), early childhood education teachers, software education, Stages of Concern (SoC)

Procedia PDF Downloads 207
1922 Reduction in Hospital Acquire Infections after Intervention of Hand Hygiene and Personal Protective Equipment at COVID Unit Indus Hospital Karachi

Authors: Aisha Maroof

Abstract:

Introduction: Coronavirus Disease 2019 (COVID-19) is spreading rapidly around the world with devastating consequences on patients, health care workers and health systems. Severe 2019 novel coronavirus infectious disease (COVID-19) with pneumonia is associated with high rates of admission to the intensive care unit (ICU) and they are at high risk to obtain the hospital acquire bloodstream infection (HAIs) such as central line associated bloodstream infection (CLABSI), catheter associated urinary tract infections (CAUTI) and laboratory confirm bloodstream infection (LCBSI). The chances of infection transmission increase when healthcare worker’s (HCWs) practice is inappropriate. Risk related to hand hygiene (HH) and personal protective equipment (PPE) as regards multidrug-resistant organism transmission: use of multiple gloving instead of HH and incorrect use of PPE can lead to a significant increase of device-related infections. As it reaches low- and middle-income countries, its effects could be even more, because it will be difficult for them to react aggressively to the pandemic. HAIs are one of the biggest medical concerns, resulting in increased mortality rates. Objective: To assess the effect of intervention on compliance of hand hygiene and PPE among HCWs reduce the rate of HAI in COVID-19 patients. Method: An interventional study was done between July to December, 2020. CLABSI, CAUTI and LCBSI data were collected from the medical record and direct observation. There were total of 50 Nurses, 18 doctors and all patients with laboratory-confirmed severe COVID-19 admitted to the hospital were included in this research study. Respiratory tract specimens were obtained after the first 48 h of ICU admission. Practices were observed after and before intervention. Education was provided based on WHO guidelines. Results: During the six months of study July to December, the rate of CLABSI, CAUTI and LCBSI pre and post intervention was reported. CLABSI rate decreasedd from 22.7 to 0, CAUTI rate was decreased from 1.6 to 0, LCBSI declined from 3.3 to 0 after implementation of intervention. Conclusion: HAIs are an important cause of morbidity and mortality. Most of the device related infections occurs due to lack of correct use of PPE and hand hygiene compliance. Hand hygiene and PPE is the most important measure to protect patients, through education it can be improved the correct use of PPE and hand hygiene compliance and can reduce the bacterial infection in COVID-19 patients.

Keywords: hospital acquire infection, healthcare workers, hand hygiene, personal protective equipment

Procedia PDF Downloads 129
1921 Security in Cyberspace: A Comprehensive Review of COVID-19 Continued Effects on Security Threats and Solutions in 2021 and the Trajectory of Cybersecurity Going into 2022

Authors: Mojtaba Fayaz, Richard Hallal

Abstract:

This study examines the various types of dangers that our virtual environment is vulnerable to, including how it can be attacked and how to avoid/secure our data. The terrain of cyberspace is never completely safe, and Covid- 19 has added to the confusion, necessitating daily periodic checks and evaluations. Cybercriminals have been able to enact with greater skill and undertake more conspicuous and sophisticated attacks while keeping a higher level of finesse by operating from home. Different types of cyberattacks, such as operation-based attacks, authentication-based attacks, and software-based attacks, are constantly evolving, but research suggests that software-based threats, such as Ransomware, are becoming more popular, with attacks expected to increase by 93 percent by 2020. The effectiveness of cyber frameworks has shifted dramatically as the pandemic has forced work and private life to become intertwined, destabilising security overall and creating a new front of cyber protection for security analysis and personal. The high-rise formats in which cybercrimes are carried out, as well as the types of cybercrimes that exist, such as phishing, identity theft, malware, and DDoS attacks, have created a new front of cyber protection for security analysis and personal safety. The overall strategy for 2022 will be the introduction of frameworks that address many of the issues associated with offsite working, as well as education that provides better information about commercialised software that does not provide the highest level of security for home users, allowing businesses to plan better security around their systems.

Keywords: cyber security, authentication, software, hardware, malware, COVID-19, threat actors, awareness, home users, confidentiality, integrity, availability, attacks

Procedia PDF Downloads 116
1920 Coping with Incompatible Identities in Russia: Case of Orthodox Gays

Authors: Siuzan Uorner

Abstract:

The era of late modernity is characterized, on the one hand, by social disintegration, values of personal freedom, tolerance, and self-expression. Boundaries between the accessible and the elitist, normal and abnormal are blurring. On the other hand, traditional social institutions, such as religion (especially Russian Orthodox Church), exist, criticizing lifestyle and worldview other than conventionally structured canons. Despite the declared values and opportunities in late modern society, people's freedom is ambivalent. Personal identity and its aspects are becoming a subject of choice. Hence, combinations of identity aspects can be incompatible. Our theoretical framework is based on P. Ricoeur's concept of narrative identity and hermeneutics, E. Goffman’s theory of social stigma, self-presentation, discrepant roles and W. James lectures about varieties of religious experience. This paper aims to reconstruct ways of coping with incompatible identities of Orthodox gays (an extreme sampling of a combination of sexual orientation and religious identity in a heteronormative society). This study focuses on the discourse of Orthodox gay parishioners and ROC gay priests in Russia (sampling ‘hard to reach’ populations because of the secrecy of gay community in ROC and sensitivity of the topic itself). We conducted a qualitative research design, using in-depth personal semi-structured online-interviews. Recruiting of informants took place in 'Nuntiare et Recreare' (Russian movement of religious LGBT) page in VKontakte through the post with an invitation to participate in the research. In this work, we analyzed interview transcripts using axial coding. We chose the Grounded Theory methodology to construct a theory from empirical data and contribute to the growing body of knowledge in ways of harmonizing incompatible identities in late modern societies. The research has found that there are two types of conflicts Orthodox gays meet with: canonic contradictions (postulates of Scripture and its interpretations) and problems in social interaction, mainly with ROC priests and Orthodox parishioners. We have revealed semantic meanings of most commonly used words that appear in the narratives (words such as ‘love’, ‘sin’, ‘religion’ etc.). Finally, we have reconstructed biographical patterns of LGBT social movements’ involvement. This paper argues that all incompatibilities are harmonizing in the narrative itself. As Ricoeur has suggested, the narrative configuration allows the speaker to gather facts and events together and to compose causal relationships between them. Sexual orientation and religious identity are getting along and harmonizing in the narrative.

Keywords: gay priests, incompatible identities, narrative identity, Orthodox gays, religious identity, ROC, sexual orientation

Procedia PDF Downloads 137
1919 Getting to Know the Enemy: Utilization of Phone Record Analysis Simulations to Uncover a Target’s Personal Life Attributes

Authors: David S. Byrne

Abstract:

The purpose of this paper is to understand how phone record analysis can enable identification of subjects in communication with a target of a terrorist plot. This study also sought to understand the advantages of the implementation of simulations to develop the skills of future intelligence analysts to enhance national security. Through the examination of phone reports which in essence consist of the call traffic of incoming and outgoing numbers (and not by listening to calls or reading the content of text messages), patterns can be uncovered that point toward members of a criminal group and activities planned. Through temporal and frequency analysis, conclusions were drawn to offer insights into the identity of participants and the potential scheme being undertaken. The challenge lies in the accurate identification of the users of the phones in contact with the target. Often investigators rely on proprietary databases and open sources to accomplish this task, however it is difficult to ascertain the accuracy of the information found. Thus, this paper poses two research questions: how effective are freely available web sources of information at determining the actual identification of callers? Secondly, does the identity of the callers enable an understanding of the lifestyle and habits of the target? The methodology for this research consisted of the analysis of the call detail records of the author’s personal phone activity spanning the period of a year combined with a hypothetical theory that the owner of said phone was a leader of terrorist cell. The goal was to reveal the identity of his accomplices and understand how his personal attributes can further paint a picture of the target’s intentions. The results of the study were interesting, nearly 80% of the calls were identified with over a 75% accuracy rating via datamining of open sources. The suspected terrorist’s inner circle was recognized including relatives and potential collaborators as well as financial institutions [money laundering], restaurants [meetings], a sporting goods store [purchase of supplies], and airline and hotels [travel itinerary]. The outcome of this research showed the benefits of cellphone analysis without more intrusive and time-consuming methodologies though it may be instrumental for potential surveillance, interviews, and developing probable cause for wiretaps. Furthermore, this research highlights the importance of building upon the skills of future intelligence analysts through phone record analysis via simulations; that hands-on learning in this case study emphasizes the development of the competencies necessary to improve investigations overall.

Keywords: hands-on learning, intelligence analysis, intelligence education, phone record analysis, simulations

Procedia PDF Downloads 14
1918 Mental Imagery as an Auxiliary Tool to the Performance of Elite Competitive Swimmers of the University of the East Manila

Authors: Hillary Jo Muyalde

Abstract:

Introduction: Elite athletes train regularly to enhance their physical endurance, but sometimes, training sessions are not enough. When competition comes, these athletes struggle to find focus. Mental imagery is a psychological technique that helps condition the mind to focus and eventually help improve performance. This study aims to help elite competitive swimmers of the University of the East improve their performance with Mental Imagery as an auxiliary tool. Methodology: The study design used was quasi-experimental with a purposive sampling technique and a within-subject design. It was conducted with a total of 41 participants. The participants were given a Sport Imagery Ability Questionnaire (SIAQ) to measure imagery ability and the Mental Imagery Program. The study utilized a Paired T-test for data analysis where the participants underwent six weeks of no mental imagery training and were compared to six weeks with the Mental Imagery Program (MIP). The researcher recorded the personal best time of participants in their respective specialty stroke. Results: The results of the study showed a t-value of 17.804 for Butterfly stroke events, 9.922 for Backstroke events, 7.787 for Breaststroke events, and 17.440 in Freestyle. This indicated that MIP had a positive effect on participants’ performance. The SIAQ result also showed a big difference where -10.443 for Butterfly events, -5.363 for Backstroke, -7.244 for Breaststroke events, and -10.727 for Freestyle events, which meant the participants were able to image better than before MIP. Conclusion: In conclusion, the findings of this study showed that there is indeed an improvement in the performance of the participants after the application of the Mental Imagery Program. It is recommended from this study that the participants continue to use mental imagery as an auxiliary tool to their training regimen for continuous positive results.

Keywords: mental Imagery, personal best time, SIAQ, specialty stroke

Procedia PDF Downloads 79
1917 The Use of Manipulative Strategies: Machiavellianism among the University Students

Authors: Karla Hrbackova, Anna Petr Safrankova, Jakub Hladik

Abstract:

Machiavellianism as social phenomenon reveals certain methods of communication that man puts in contact with other people in both personal and working life (and work with clients). Especially at the helping-profession students is honesty, openness or low motivation for personal benefit important part of the profession. The aim of a study is to expose intercultural differences influence of Machiavellianism between Czech and Slovak university students and to determine whether these differences manifest themselves differently among students focusing on management and social profession (by helping degrees). The research involved 1120 university students from the Czech Republic and the Slovak Republic. The measurement of Machiavellianism used a test Mach IV. The test contained 20 statements divided into four central dimensions of Machiavellianism: flattery, deception and falsehood, immorality and cynicism. We found out, that Czech and Slovak's student expressed a similar attitude toward Machiavellianism as a means of manipulation in the interpersonal relationship, but this is not true in all dimensions. Czech and Slovak's students perceive differently flattery, deception and falsehood and cynicism too. In addition to specific features of cultural conditionality, we found out differences depending on the helping profession. Students focusing on managerial occupation (lower level of helping) tend towards greater acceptance of the use flattery as a means of communication than students specializing in the social profession (high-grade assisting). If they are an intercultural and interdisciplinary influences combined and effect on the perception of Machiavellianism together, then their significant importance for the perception of flattery and cynicism. The result will help us to reveal certain specific traits that students apply communication and with whom we can continue to work during their training.

Keywords: use of manipulative strategies, Machiavellianism, helping-profession students, professional training of students

Procedia PDF Downloads 383
1916 Content Analysis of Video Translations: Examining the Linguistic and Thematic Approach by Translator Abdullah Khrief on the X Platform

Authors: Easa Almustanyir

Abstract:

This study investigates the linguistic and thematic approach of translator Abdullah Khrief in the context of video translations on the X platform. The sample comprises 15 videos from Khrief's account, covering diverse content categories like science, religion, social issues, personal experiences, lifestyle, and culture. The analysis focuses on two aspects: language usage and thematic representation. Regarding language, the study examines the prevalence of English while considering the inclusion of French and German content, highlighting Khrief's multilingual versatility and ability to navigate cultural nuances. Thematically, the study explores the diverse range of topics covered, encompassing scientific, religious, social, and personal narratives, underscoring Khrief's broad subject matter expertise and commitment to knowledge dissemination. The study employs a mixed-methods approach, combining quantitative data analysis with qualitative content analysis. Statistical data on video languages, presenter genders, and content categories are analyzed, and a thorough content analysis assesses translation accuracy, cultural appropriateness, and overall quality. Preliminary findings indicate a high level of professionalism and expertise in Khrief's translations. The absence of errors across the diverse range of videos establishes his credibility and trustworthiness. Furthermore, the accurate representation of cultural nuances and sensitive topics highlights Khrief's cultural sensitivity and commitment to preserving intended meanings and emotional resonance.

Keywords: audiovisual translation, linguistic versatility, thematic diversity, cultural sensitivity, content analysis, mixed-methods approach

Procedia PDF Downloads 17
1915 An Analysis of Humanitarian Data Management of Polish Non-Governmental Organizations in Ukraine Since February 2022 and Its Relevance for Ukrainian Humanitarian Data Ecosystem

Authors: Renata Kurpiewska-Korbut

Abstract:

Making an assumption that the use and sharing of data generated in humanitarian action constitute a core function of humanitarian organizations, the paper analyzes the position of the largest Polish humanitarian non-governmental organizations in the humanitarian data ecosystem in Ukraine and their approach to non-personal and personal data management since February of 2022. Both expert interviews and document analysis of non-profit organizations providing a direct response in the Ukrainian crisis context, i.e., the Polish Humanitarian Action, Caritas, Polish Medical Mission, Polish Red Cross, and the Polish Center for International Aid and the applicability of theoretical perspective of contingency theory – with its central point that the context or specific set of conditions determining the way of behavior and the choice of methods of action – help to examine the significance of data complexity and adaptive approach to data management by relief organizations in the humanitarian supply chain network. The purpose of this study is to determine how the existence of well-established and accurate internal procedures and good practices of using and sharing data (including safeguards for sensitive data) by the surveyed organizations with comparable human and technological capabilities are implemented and adjusted to Ukrainian humanitarian settings and data infrastructure. The study also poses a fundamental question of whether this crisis experience will have a determining effect on their future performance. The obtained finding indicate that Polish humanitarian organizations in Ukraine, which have their own unique code of conduct and effective managerial data practices determined by contingencies, have limited influence on improving the situational awareness of other assistance providers in the data ecosystem despite their attempts to undertake interagency work in the area of data sharing.

Keywords: humanitarian data ecosystem, humanitarian data management, polish NGOs, Ukraine

Procedia PDF Downloads 92
1914 A Design Framework for an Open Market Platform of Enriched Card-Based Transactional Data for Big Data Analytics and Open Banking

Authors: Trevor Toy, Josef Langerman

Abstract:

Around a quarter of the world’s data is generated by financial with an estimated 708.5 billion global non-cash transactions reached between 2018 and. And with Open Banking still a rapidly developing concept within the financial industry, there is an opportunity to create a secure mechanism for connecting its stakeholders to openly, legitimately and consensually share the data required to enable it. Integration and data sharing of anonymised transactional data are still operated in silos and centralised between the large corporate entities in the ecosystem that have the resources to do so. Smaller fintechs generating data and businesses looking to consume data are largely excluded from the process. Therefore there is a growing demand for accessible transactional data for analytical purposes and also to support the rapid global adoption of Open Banking. The following research has provided a solution framework that aims to provide a secure decentralised marketplace for 1.) data providers to list their transactional data, 2.) data consumers to find and access that data, and 3.) data subjects (the individuals making the transactions that generate the data) to manage and sell the data that relates to themselves. The platform also provides an integrated system for downstream transactional-related data from merchants, enriching the data product available to build a comprehensive view of a data subject’s spending habits. A robust and sustainable data market can be developed by providing a more accessible mechanism for data producers to monetise their data investments and encouraging data subjects to share their data through the same financial incentives. At the centre of the platform is the market mechanism that connects the data providers and their data subjects to the data consumers. This core component of the platform is developed on a decentralised blockchain contract with a market layer that manages transaction, user, pricing, payment, tagging, contract, control, and lineage features that pertain to the user interactions on the platform. One of the platform’s key features is enabling the participation and management of personal data by the individuals from whom the data is being generated. This framework developed a proof-of-concept on the Etheruem blockchain base where an individual can securely manage access to their own personal data and that individual’s identifiable relationship to the card-based transaction data provided by financial institutions. This gives data consumers access to a complete view of transactional spending behaviour in correlation to key demographic information. This platform solution can ultimately support the growth, prosperity, and development of economies, businesses, communities, and individuals by providing accessible and relevant transactional data for big data analytics and open banking.

Keywords: big data markets, open banking, blockchain, personal data management

Procedia PDF Downloads 73
1913 Exploring the Vocabulary and Grammar Advantage of US American over British English Speakers at Age 2;0

Authors: Janine Just, Kerstin Meints

Abstract:

The research aims to compare vocabulary size and grammatical development between US American English- and British English-speaking children at age 2;0. As there is evidence that precocious children with large vocabularies develop grammar skills earlier than their typically developing peers, it was investigated if this also holds true across varieties of English. Thus, if US American children start to produce words earlier than their British counterparts, this could mean that US children are also at an advantage in the early developmental stages of acquiring grammar. This research employs a British English adaptation of the MacArthur-Bates CDI Words and Sentences (Lincoln Toddler CDI) to compare vocabulary and also grammar scores with the updated US Toddler CDI norms. At first, the Lincoln TCDI was assessed for its concurrent validity with the Preschool Language Scale (PLS-5 UK). This showed high correlations for the vocabulary and grammar subscales between the tests. In addition, the frequency of the Toddler CDI’s words was also compared using American and British English corpora of adult spoken and written language. A paired-samples t-test found a significant difference in word frequency between the British and the American CDI demonstrating that the TCDI’s words were indeed of higher frequency in British English. We then compared language and grammar scores between US (N = 135) and British children (N = 96). A two-way between groups ANOVA examined if the two samples differed in terms of SES (i.e. maternal education) by investigating the impact of SES and country on vocabulary and sentence complexity. The two samples did not differ in terms of maternal education as the interaction effects between SES and country were not significant. In most cases, scores were not significantly different between US and British children, for example, for overall word production and most grammatical subscales (i.e. use of words, over- regularizations, complex sentences, word combinations). However, in-depth analysis showed that US children were significantly better than British children at using some noun categories (i.e. people, objects, places) and several categories marking early grammatical development (i.e. pronouns, prepositions, quantifiers, helping words). However, the effect sizes were small. Significant differences for grammar were found for irregular word forms and progressive tense suffixes. US children were more advanced in their use of these grammatical categories, but the effect sizes were small. In sum, while differences exist in terms of vocabulary and grammar ability, favouring US children, effect sizes were small. It can be concluded that most British children are ‘catching up’ with their US American peers at age 2;0. Implications of this research will be discussed.

Keywords: first language acquisition, grammar, parent report instrument, vocabulary

Procedia PDF Downloads 283