Search results for: internet health check
10755 Online vs. in vivo Workshops in a Masters’ Degree Course in Mental Health Nursing: Students’ Views and Opinions
Authors: Evmorfia Koukia, Polyxeni Mangoulia
Abstract:
Workshops tend to be a vivid and productive way as an in vivo teaching method. Due to the pandemic, COVID-19 university courses were conducted through the internet. Method It was tried for the first time to integrate online art therapy workshops in a core course named “Special Themes of Mental Health Nursing” in a MSc Program in Mental Health. The duration of the course is 3-hours per week for 11 weeks in a single semester. The course has a main instructor, a professor of psychiatric nursing experienced in arts therapies workshops and visiting art therapists. All art therapists were given a certain topic to cover. Students were encouraged to keep a logbook that was evaluated at the end of the semester and was submitted as a part of the examination process of the course. An interview of 10 minutes was conducted with each student at the end of the course from an independent investigator (an assistant professor) Participants The students (sample) of the program were: nurses, psychologists, and social workers Results: All students who participated in the courses found that the learning process was vivid, encouraging participation and self-motivation, and there were no main differences from in vivo learning. The students identified their personal needs, and they felt a personal connection with the learning experience. The result of the personalized learning was that students discovered their strengths and weaknesses and developed skills like critical thinking. All students admitted that the workshops were the optimal way for them to comprehend the courses’ content, their capability to become therapists, as well as their obstacles and weaknesses while working with patients in mental health. Conclusion: There were no important differences between the views of students in online and in vivo teaching method of the workshops. The result has shown that workshops in mental health can contribute equally in the learning experience.Keywords: mental health, workshops, students, nursing
Procedia PDF Downloads 20910754 Classification of Health Information Needs of Hypertensive Patients in the Online Health Community Based on Content Analysis
Authors: Aijing Luo, Zirui Xin, Yifeng Yuan
Abstract:
Background: With the rapid development of the online health community, more and more patients or families are seeking health information on the Internet. Objective: This study aimed to discuss how to fully reveal the health information needs expressed by hypertensive patients in their questions in the online environment. Methods: This study randomly selected 1,000 text records from the question data of hypertensive patients from 2008 to 2018 collected from the website www.haodf.com and constructed a classification system through literature research and content analysis. This paper identified the background characteristics and questioning the intention of each hypertensive patient based on the patient’s question and used co-occurrence network analysis to explore the features of the health information needs of hypertensive patients. Results: The classification system for health information needs of patients with hypertension is composed of 9 parts: 355 kinds of drugs, 395 kinds of symptoms and signs, 545 kinds of tests and examinations , 526 kinds of demographic data, 80 kinds of diseases, 37 kinds of risk factors, 43 kinds of emotions, 6 kinds of lifestyles, 49 kinds of questions. The characteristics of the explored online health information needs of the hypertensive patients include: i)more than 49% of patients describe the features such as drugs, symptoms and signs, tests and examinations, demographic data, diseases, etc. ii) these groups are most concerned about treatment (77.8%), followed by diagnosis (32.3%); iii) 65.8% of hypertensive patients will ask doctors online several questions at the same time. 28.3% of the patients are very concerned about how to adjust the medication, and they will ask other treatment-related questions at the same time, including drug side effects, whether to take drugs, how to treat a disease, etc.; secondly, 17.6% of the patients will consult the doctors online about the causes of the clinical findings, including the relationship between the clinical findings and a disease, the treatment of a disease, medication, and examinations. Conclusion: In the online environment, the health information needs expressed by Chinese hypertensive patients to doctors are personalized; that is, patients with different background features express their questioning intentions to doctors. The classification system constructed in this study can guide health information service providers in the construction of online health resources, to help solve the problem of information asymmetry in communication between doctors and patients.Keywords: online health community, health information needs, hypertensive patients, doctor-patient communication
Procedia PDF Downloads 11910753 Varietal Screening of Watermelon against Powdery Mildew Disease and Its Management
Authors: Asim Abbasi, Amer Habib, Sajid Hussain, Muhammad Sufyan, Iqra, Hasnain Sajjad
Abstract:
Except for few scattered cases, powdery mildew disease was not a big problem for watermelon in the past but with the outbreaks of its pathotypes, races 1W and 2W, this disease becomes a serious issue all around the globe. The severe outbreak of this disease also increased the rate of fungicide application for its proper management. Twelve varieties of watermelon were screened in Research Area of Department of Plant pathology, University of Agriculture, Faisalabad to check the incidence of powdery mildew disease. Disease inoculum was prepared and applied with the help of foliar spray method. Fungicides and plants extracts were also applied after the disease incidence. Percentage leaf surface area diseased was assessed visually with a modified Horsfall-Barratt scale. The results of the experiment revealed that among all varieties, WT2257 and Zcugma F1 were highly resistant showing less than 5% disease incidence while Anar Kali and Sugar baby were highly susceptible with disease incidence of more than 65%. Among botanicals neem extract gave best results with disease incidence of less than 20%. Besides neem, all other botanicals also gave significant control of powdery mildew disease than the untreated check. In case of fungicides, Gemstar showed least disease incidence i.e. < 10%, however besides control maximum disease incidence was observed in Curzate (> 30%).Keywords: botanicals, fungicides, pathotypes, powdery mildew
Procedia PDF Downloads 29810752 Characteristics of Business Models of Industrial-Internet-of-Things Platforms
Authors: Peter Kress, Alexander Pflaum, Ulrich Loewen
Abstract:
The number of Internet-of-Things (IoT) platforms is steadily increasing across various industries, especially for smart factories, smart homes and smart mobility. Also in the manufacturing industry, the number of Industrial-IoT platforms is growing. Both IT players, start-ups and increasingly also established industry players and small-and-medium-enterprises introduce offerings for the connection of industrial equipment on platforms, enabled by advanced information and communication technology. Beside the offered functionalities, the established ecosystem of partners around a platform is one of the key differentiators to generate a competitive advantage. The key question is how platform operators design the business model around their platform to attract a high number of customers and partners to co-create value for the entire ecosystem. The present research tries to answer this question by determining the key characteristics of business models of successful platforms in the manufacturing industry. To achieve that, the authors selected an explorative qualitative research approach and created an inductive comparative case study. The authors generated valuable descriptive insights of the business model elements (e.g., value proposition, pricing model or partnering model) of various established platforms. Furthermore, patterns across the various cases were identified to derive propositions for the successful design of business models of platforms in the manufacturing industry.Keywords: industrial-internet-of-things, business models, platforms, ecosystems, case study
Procedia PDF Downloads 24410751 Asset Pricing Model: A Quality Paradigm
Authors: Urmi Khatri
Abstract:
Capital asset pricing model (CAPM) draws a direct relationship between the risk and the expected rate of return. There was a criticism on the beta and the assumptions of CAPM, as they are not applicable in the real world. Fama French Three Factor Model and Fama French Five Factor Model have given different factors, which have an impact on the return of any asset like size, value, investment and profitability. This study proposes to see Capital Asset pricing Model through the lenses of the quality aspect. In the study, the six factors are studied. The Fama French Five Factor Model and addition of the quality dimension are studied. Here, Graham’s seven quality and quantity criteria are measured to determine the score of the sample firms. Thus, this study tries to check the model fit. The beta coefficient of the quality dimension and the R square value is seen to determine validity of the proposed model. The sample is drawn from the firms listed on Indian Stock Exchange (BSE). For the study, only nonfinancial firms are been selected. The time period of the study is from January 1999 to December 2019. Hence, the primary objective of the study is to check how robust the model becomes after giving the quality dimension to the capital asset pricing model in addition to the size, value, profitability and investment.Keywords: asset pricing model, CAPM, Graham’s score, G-score, multifactor model, quality
Procedia PDF Downloads 16010750 A Survey of Digital Health Companies: Opportunities and Business Model Challenges
Authors: Iris Xiaohong Quan
Abstract:
The global digital health market reached 175 billion U.S. dollars in 2019, and is expected to grow at about 25% CAGR to over 650 billion USD by 2025. Different terms such as digital health, e-health, mHealth, telehealth have been used in the field, which can sometimes cause confusion. The term digital health was originally introduced to refer specifically to the use of interactive media, tools, platforms, applications, and solutions that are connected to the Internet to address health concerns of providers as well as consumers. While mHealth emphasizes the use of mobile phones in healthcare, telehealth means using technology to remotely deliver clinical health services to patients. According to FDA, “the broad scope of digital health includes categories such as mobile health (mHealth), health information technology (IT), wearable devices, telehealth and telemedicine, and personalized medicine.” Some researchers believe that digital health is nothing else but the cultural transformation healthcare has been going through in the 21st century because of digital health technologies that provide data to both patients and medical professionals. As digital health is burgeoning, but research in the area is still inadequate, our paper aims to clear the definition confusion and provide an overall picture of digital health companies. We further investigate how business models are designed and differentiated in the emerging digital health sector. Both quantitative and qualitative methods are adopted in the research. For the quantitative analysis, our research data came from two databases Crunchbase and CBInsights, which are well-recognized information sources for researchers, entrepreneurs, managers, and investors. We searched a few keywords in the Crunchbase database based on companies’ self-description: digital health, e-health, and telehealth. A search of “digital health” returned 941 unique results, “e-health” returned 167 companies, while “telehealth” 427. We also searched the CBInsights database for similar information. After merging and removing duplicate ones and cleaning up the database, we came up with a list of 1464 companies as digital health companies. A qualitative method will be used to complement the quantitative analysis. We will do an in-depth case analysis of three successful unicorn digital health companies to understand how business models evolve and discuss the challenges faced in this sector. Our research returned some interesting findings. For instance, we found that 86% of the digital health startups were founded in the recent decade since 2010. 75% of the digital health companies have less than 50 employees, and almost 50% with less than 10 employees. This shows that digital health companies are relatively young and small in scale. On the business model analysis, while traditional healthcare businesses emphasize the so-called “3P”—patient, physicians, and payer, digital health companies extend to “5p” by adding patents, which is the result of technology requirements (such as the development of artificial intelligence models), and platform, which is an effective value creation approach to bring the stakeholders together. Our case analysis will detail the 5p framework and contribute to the extant knowledge on business models in the healthcare industry.Keywords: digital health, business models, entrepreneurship opportunities, healthcare
Procedia PDF Downloads 18410749 Catastrophic Health Expenditures: Evaluating the Effectiveness of Nepal's National Health Insurance Program Using Propensity Score Matching and Doubly Robust Methodology
Authors: Simrin Kafle, Ulrika Enemark
Abstract:
Catastrophic health expenditure (CHE) is a critical issue in low- and middle-income countries like Nepal, exacerbating financial hardship among vulnerable households. This study assesses the effectiveness of Nepal’s National Health Insurance Program (NHIP), launched in 2015, to reduce out-of-pocket (OOP) healthcare costs and mitigate CHE. Conducted in Pokhara Metropolitan City, the study used an analytical cross-sectional design, sampling 1276 households through a two-stage random sampling method. Data was collected via face-to-face interviews between May and October 2023. The analysis was conducted using SPSS version 29, incorporating propensity score matching to minimize biases and create comparable groups of enrolled and non-enrolled households in the NHIP. PSM helped reduce confounding effects by matching households with similar baseline characteristics. Additionally, a doubly robust methodology was employed, combining propensity score adjustment with regression modeling to enhance the reliability of the results. This comprehensive approach ensured a more accurate estimation of the impact of NHIP enrollment on CHE. Among the 1276 samples, 534 households (41.8%) were enrolled in NHIP. Of them, 84.3% of households renewed their insurance card, though some cited long waiting times, lack of medications, and complex procedures as barriers to renewal. Approximately 57.3% of households reported known diseases before enrollment, with 49.8% attending routine health check-ups in the past year. The primary motivation for enrollment was encouragement from insurance employees (50.2%). The data indicates that 12.5% of enrolled households experienced CHE versus 7.5% among non-enrolled. Enrollment into NHIP does not contribute to lower CHE (AOR: 1.98, 95% CI: 1.21-3.24). Key factors associated with increased CHE risk were presence of non-communicable diseases (NCDs) (AOR: 3.94, 95% CI: 2.10-7.39), acute illnesses/injuries (AOR: 6.70, 95% CI: 3.97-11.30), larger household size (AOR: 3.09, 95% CI: 1.81-5.28), and households below the poverty line (AOR: 5.82, 95% CI: 3.05-11.09). Other factors such as gender, education level, caste/ethnicity, presence of elderly members, and under-five children also showed varying associations with CHE, though not all were statistically significant. The study concludes that enrollment in the NHIP does not significantly reduce the risk of CHE. The reason for this could be inadequate coverage, where high-cost medicines, treatments, and transportation costs are not fully included in the insurance package, leading to significant out-of-pocket expenses. We also considered the long waiting time, lack of medicines, and complex procedures for the utilization of NHIP benefits, which might result in the underuse of covered services. Finally, gaps in enrollment and retention might leave certain households vulnerable to CHE despite the existence of NHIP. Key factors contributing to increased CHE include NCDs, acute illnesses, larger household sizes, and poverty. To improve the program’s effectiveness, it is recommended that NHIP benefits and coverage be expanded to better protect against high healthcare costs. Additionally, simplifying the renewal process, addressing long waiting times, and enhancing the availability of services could improve member satisfaction and retention. Targeted financial protection measures should be implemented for high-risk groups, and efforts should be made to increase awareness and encourage routine health check-ups to prevent severe health issues that contribute to CHE.Keywords: catastrophic health expenditure, effectiveness, national health insurance program, Nepal
Procedia PDF Downloads 2610748 An Empirical Study of Performance Management System: Implementation of Performance Management Cycle to Achieve High-Performance Culture at Pertamina Company, Indonesia
Authors: Arif Budiman
Abstract:
Any organization or company that wishes to achieve vision, mission, and goals of the organization is required to implement a performance management system or known as the Performance Management System (PMS) in every part of the whole organization. PMS is a tool to help visualize the direction and work program of the organization to achieve the goal. The challenge is PMS should not stop merely as a visualization tool to achieve the vision and mission of the organization, but PMS should also be able to create a high-performance culture that is inherent in each individual of the organization. Establishment of a culture within an organization requires the support of top leaders and also requires a system or governance that encourages every individual in the organization to be involved in any work program of the organization. Keywords of creating a high-performance culture are the formation of communication pattern involving the whole individual, either vertically or horizontally, and performed consistently and persistently by all individuals in each line of the organization. PT Pertamina (Persero) as the state-owned national energy company holds a system to internalize the culture of high performance through a system called Performance Management System Cycle (PMS Cycle). This system has 7 stages of the cycle, those are: (1) defining vision, mission and strategic plan of the company, (2) defining key performance indicator of each line and the individual (‘expectation setting conversation’), (3) defining performance target and performance agreement, (4) monitoring performance on a monthly regular basis (‘pulse check’), (5) implementing performance dialogue between leaders and staffs periodically every 3 months (‘performance dialogue’), (6) defining rewards and consequences based on the achievement of the performance of each line and the individual, and (7) calculating the final performance value achieved by each line and individual from one period of the current year. Perform PMS is a continual communication running throughout the year, that is why any three performance discussion that should be performed, include expectation setting conversations, pulse check and performance dialogue. In addition, another significant point and necessary undertaken to complete the assessment of individual performance assessment is soft competencies through 360-degree assessment by leaders, staffs, and peers.Keywords: 360-degree assessment, expectation setting conversation, performance management system cycle, performance dialogue, pulse check
Procedia PDF Downloads 44210747 Evaluation of Health Services after Emergency Decrees in Turkey
Authors: Sengul Celik, Alper Ketenci
Abstract:
In Turkish Constitution about health care in Article 56, it is said that: everyone has the right to live in a healthy and balanced environment. It is the duty of the state and citizens to improve the environment, protect environmental health, and prevent environmental pollution. The state ensures that everyone lives their lives in physical and mental health; it organizes the planning and service of health institutions from a single source in order to realize cooperation by increasing savings and efficiency in human and substance power. The state fulfills this task by utilizing and supervising health and social institutions in the public and private sectors. General health insurance can be established by law for the widespread delivery of health services. To have health care is one of the basic rights of patients. After the coupe attempt in July 2016, the Government of Turkey has announced a state of emergency and issued lots of emergency decrees. By these emergency decrees, lots of people were dismissed from their jobs and lost their some basic social rights. The violations occur in social life. One of the most common observations is the discrimination by government in health care system. This study aims to put forward the violation of human rights in health care system in Turkey due to their discriminated position by an emergency decree. The study is a case study that is based on nine interviews with the people or relatives of people who lost their jobs by an emergency decree in Turkey. In this study, no personally identifiable information was obtained for the safety of individuals. Also no distinctive questions regarding the identity of individuals were asked. The interviews are obtained through internet call applications. The data were analyzed through the requirements of regular health care system in Turkey. The interviews expose that the people or the relatives of people lost their right to have regular health care. They have to pay extra amount both in clinical services and in medication treatment. The patient right to quality medical care without prejudice is violated. It was assessed that the people who are involved in emergency decree and their relatives are discriminated by government and deprived of regular medical care and supervision. Although international legal arrangements and legal responsibilities of the state have been put forward by Article 56, they are violated in practice. To prevent these kinds of violations, some measures should be taken against the deprivation in health care system especially towards the discriminated people by an emergency decree.Keywords: emergency decree in Turkey, health care, discriminated people, patients rights
Procedia PDF Downloads 11110746 A Review on Cyberchondria Based on Bibliometric Analysis
Authors: Xiaoqing Peng, Aijing Luo, Yang Chen
Abstract:
Background: Cyberchondria, as an "emerging risk" accompanied by the information era, is a new abnormal pattern characterized by excessive or repeated online searches for health-related information and escalating health anxiety, which endangers people's physical and mental health and poses a huge threat to public health. Objective: To explore and discuss the research status, hotspots and trends of Cyberchondria. Methods: Based on a total of 77 articles regarding "Cyberchondria" extracted from Web of Science from the beginning till October 2019, the literature trends, countries, institutions, hotspots are analyzed by bibliometric analysis, the concept definition of Cyberchondria, instruments, relevant factors, treatment and intervention are discussed as well. Results: Since "Cyberchondria" was put forward for the first time in 2001, the last two decades witnessed a noticeable increase in the amount of literature, especially during 2014-2019, it quadrupled dramatically at 62 compared with that before 2014 only at 15, which shows that Cyberchondria has become a new theme and hot topic in recent years. The United States was the most active contributor with the largest publication (23), followed by England (11) and Australia (11), while the leading institutions were Baylor University(7) and University of Sydney(7), followed by Florida State University(4) and University of Manchester(4). The WoS categories "Psychiatry/Psychology " and "Computer/ Information Science "were the areas of greatest influence. The concept definition of Cyberchondria is not completely unified in the world, but it is generally considered as an abnormal behavioral pattern and emotional state and has been invoked to refer to the anxiety-amplifying effects of online health-related searches. The first and the most frequently cited scale for measuring the severity of Cyberchondria called “The Cyberchondria Severity Scale (CSS) ”was developed in 2014, which conceptualized Cyberchondria as a multidimensional construct consisting of compulsion, distress, excessiveness, reassurance, and mistrust of medical professionals which was proved to be not necessary for this construct later. Since then, the Brazilian, German, Turkish, Polish and Chinese versions were subsequently developed, improved and culturally adjusted, while CSS was optimized to a simplified version (CSS-12) in 2019, all of which should be worthy of further verification. The hotspots of Cyberchondria mainly focuses on relevant factors as follows: intolerance of uncertainty, anxiety sensitivity, obsessive-compulsive disorder, internet addition, abnormal illness behavior, Whiteley index, problematic internet use, trying to make clear the role played by “associated factors” and “anxiety-amplifying factors” in the development of Cyberchondria, to better understand the aetiological links and pathways in the relationships between hypochondriasis, health anxiety and online health-related searches. Although the treatment and intervention of Cyberchondria are still in the initial stage of exploration, there are kinds of meaningful attempts to seek effective strategies from different aspects such as online psychological treatment, network technology management, health information literacy improvement and public health service. Conclusion: Research on Cyberchondria is in its infancy but should be deserved more attention. A conceptual consensus on Cyberchondria, a refined assessment tool, prospective studies conducted in various populations, targeted treatments for it would be the main research direction in the near future.Keywords: cyberchondria, hypochondriasis, health anxiety, online health-related searches
Procedia PDF Downloads 12410745 A Review of Sustainable Energy-Saving Solutions in Active and Passive Solar Systems of Zero Energy Buildings Based on the Internet of Things
Authors: Hanieh Sadat Jannesari, Hoori Jannesar, Alireza Hajian HosseinAbadi
Abstract:
In general, buildings are responsible for a considerable share of consumed energy and carbon emissions worldwide and play a significant role in formulating sustainable development strategies. Therefore, a lot of effort is put into the design and construction of zero-energy buildings (ZEBs) to help eliminate the problems associated with the reduction of energy resources and environmental degradation. Two strategies are significant in designing ZEBs: minimizing the need for energy utilization in buildings (particularly for cooling and heating) through highly energy-efficient designs and using renewable energies and other technologies to meet the remaining energy needs. This paper reviews the works related to these two strategies concerning sustainable energy-saving solutions using renewable energy technologies and the Internet of Things in ZEBs. Drawing on the theories and recently implemented projects of energy engineers in ZEBs, we have reported the required technologies within the framework of this paper’s objectives. Overall, solutions based on renewable and sustainable technologies such as photovoltaic (PV) modules, thermal collectors, Phase Change Material (PCM) techniques, etc., are used in active and passive systems designed for various applications in such buildings as cooling, heating, lighting, cooking, etc. The results obtained from examining these projects show that it is possible to minimize the amount of energy required to be produced for and consumed by these buildings.Keywords: active and passive renewable energy systems, internet of things, storage, zero energy buildings
Procedia PDF Downloads 3410744 Keyword Advertising: Still Need Construction in European Union; Perspective on Interflora vs. Marks and Spencer
Authors: Mohammadbagher Asghariaghamashhadi
Abstract:
Internet users normally are automatically linked to an advertisement sponsored by a bidder when Internet users enter any trademarked keyword on a search engine. This advertisement appears beside the search results. Through the process of keyword advertising, advertisers can connect with many Internet users and let them know about their goods and services. This concept has generated heated disagreements among legal scholars, trademark proprietors, advertisers, search engine owners, and consumers. Therefore, use of trademarks in keyword advertising has been one of the most debatable issues in trademark law for several years. This entirely new way of using trademarks over the Internet has provoked a discussion concerning the core concepts of trademark law. In respect to legal issues, European Union (EU) trademark law is mostly governed by the Trademark Directive and the Community Trademark Regulation. Article 5 of the directive and Article 9 of the trademark regulation determine the circumstances in which a trademark owner holds the right to prohibit a third party’s use of his/her registered sign. Harmonized EU trademark law proved to be ambiguous on whether using of a trademark is amounted to trademark infringement or not. The case law of the European Court of Justice (ECJ), with reference to this legislation, is mostly unfavorable to trademark owners. This ambivalence was also exhibited by the case law of EU Member States. European keyword advertisers simply could not tell which use of a competitor‘s trademark was lawful. In recent years, ECJ has continuously expanded the scope and reach of trademark protection in the EU. It is notable that Inconsistencies in the Court’s system of infringement criteria clearly come to the fore and this approach has been criticized by analysts who believe that the Court should have adopted a more traditional approach to the analysis of trademark infringement, which was suggested by its Advocate General, in order to arrive at the same conclusion. Regarding case law of keyword advertising within Europe, one of the most disputable cases is Interflora vs. Marks and Spencer, which is still on-going. This study examines and critically analyzes the decisions of the ECJ, the high court of England, and the Court of Appeals of England and address critically keyword advertising issue within European trademark legislation.Keywords: ECJ, Google, Interflora, keyword advertising, Marks and Spencer, trademark infringement
Procedia PDF Downloads 34610743 The Contribution of Sanitation Practices to Marine Pollution and the Prevalence of Water-Borne Diseases in Prampram Coastal Area, Greater Accra-Ghana
Authors: Precious Roselyn Obuobi
Abstract:
Background: In Ghana, water-borne diseases remain a public health concern due to its impact. While marine pollution has been linked to outbreak of diseases especially in communities along the coast, associated risks such as oil spillage, marine debris, erosion, improper waste disposal and management practices persist. Objective: The study seeks to investigate sanitation practices that contribute to marine pollution in Prampram and the prevalence of selected water-borne diseases (diarrhea and typhoid fever). Method: This study used a descriptive cross-sectional design, employing the mix-method (qualitative and quantitative) approach. Twenty-two (22) participants were selected and semistructured questionnaire were administered to them. Additionally, interviews were conducted to collect more information. Further, an observation check-list was used to aid the data collection process. Secondary data comprising information on water-borne diseases in the district was acquired from the district health directorate to determine the prevalence of selected water-borne diseases in the community. Data Analysis: The qualitative data was analyzed using NVIVO® software by adapting the six steps thematic analysis by Braun and Clarke whiles STATA® version 16 was used to analyze the secondary data collected from the district health directorate. A descriptive statistic employed using mean, standard deviation, frequencies and proportions were used to summarize the results. Results: The results showed that open defecation and indiscriminate waste disposal were the main practices contributing to marine pollution in Prampram and its effect on public health. Conclusion: These findings have implications on public health and the environment, thus effort needs to be stepped up in educating the community on best sanitation practices.Keywords: environment, sanitation, marine pollution, water-borne diseases
Procedia PDF Downloads 7710742 Defining a Reference Architecture for Predictive Maintenance Systems: A Case Study Using the Microsoft Azure IoT-Cloud Components
Authors: Walter Bernhofer, Peter Haber, Tobias Mayer, Manfred Mayr, Markus Ziegler
Abstract:
Current preventive maintenance measures are cost intensive and not efficient. With the available sensor data of state of the art internet of things devices new possibilities of automated data processing emerge. Current advances in data science and in machine learning enable new, so called predictive maintenance technologies, which empower data scientists to forecast possible system failures. The goal of this approach is to cut expenses in preventive maintenance by automating the detection of possible failures and to improve efficiency and quality of maintenance measures. Additionally, a centralization of the sensor data monitoring can be achieved by using this approach. This paper describes the approach of three students to define a reference architecture for a predictive maintenance solution in the internet of things domain with a connected smartphone app for service technicians. The reference architecture is validated by a case study. The case study is implemented with current Microsoft Azure cloud technologies. The results of the case study show that the reference architecture is valid and can be used to achieve a system for predictive maintenance execution with the cloud components of Microsoft Azure. The used concepts are technology platform agnostic and can be reused in many different cloud platforms. The reference architecture is valid and can be used in many use cases, like gas station maintenance, elevator maintenance and many more.Keywords: case study, internet of things, predictive maintenance, reference architecture
Procedia PDF Downloads 25210741 Adding a Few Language-Level Constructs to Improve OOP Verifiability of Semantic Correctness
Authors: Lian Yang
Abstract:
Object-oriented programming (OOP) is the dominant programming paradigm in today’s software industry and it has literally enabled average software developers to develop millions of commercial strength software applications in the era of INTERNET revolution over the past three decades. On the other hand, the lack of strict mathematical model and domain constraint features at the language level has long perplexed the computer science academia and OOP engineering community. This situation resulted in inconsistent system qualities and hard-to-understand designs in some OOP projects. The difficulties with regards to fix the current situation are also well known. Although the power of OOP lies in its unbridled flexibility and enormously rich data modeling capability, we argue that the ambiguity and the implicit facade surrounding the conceptual model of a class and an object should be eliminated as much as possible. We listed the five major usage of class and propose to separate them by proposing new language constructs. By using well-established theories of set and FSM, we propose to apply certain simple, generic, and yet effective constraints at OOP language level in an attempt to find a possible solution to the above-mentioned issues regarding OOP. The goal is to make OOP more theoretically sound as well as to aid programmers uncover warning signs of irregularities and domain-specific issues in applications early on the development stage and catch semantic mistakes at runtime, improving correctness verifiability of software programs. On the other hand, the aim of this paper is more practical than theoretical.Keywords: new language constructs, set theory, FSM theory, user defined value type, function groups, membership qualification attribute (MQA), check-constraint (CC)
Procedia PDF Downloads 24110740 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 13510739 Notice and Block?
Authors: Althaf Marsoof
Abstract:
The blocking injunction, giving rise to a ‘notice and block’ regime, has become the new approach to curtail the infringement of Intellectual Property rights on the Internet. As such, the blocking injunction is an addition to the arsenal of copyright owners, and more recently has also benefited trademark owners, in their battle against piracy and counterfeiting. Yet, the blocking injunction, notwithstanding the usefulness of its ‘notice and block’ outcome, is not without limitations. In the circumstances, it is argued that ‘notice and takedown’, the approach that has been adopted by right-holders for some years, is still an important remedy against the proliferation of online content that infringe the rights of copyright and trademark owners, which is both viable and effective. Thus, it is suggested that the battle against online piracy and counterfeiting could be won only if both the blocking injunction and the practice of ‘notice and takedown’ are utilised by right-holders as complementary and simultaneous remedies.Keywords: blocking injunctions, internet intermediaries, notice and takedown, intellectual property
Procedia PDF Downloads 41810738 An Integrated Architecture of E-Learning System to Digitize the Learning Method
Authors: M. Touhidul Islam Sarker, Mohammod Abul Kashem
Abstract:
The purpose of this paper is to improve the e-learning system and digitize the learning method in the educational sector. The learner will login into e-learning platform and easily access the digital content, the content can be downloaded and take an assessment for evaluation. Learner can get access to these digital resources by using tablet, computer, and smart phone also. E-learning system can be defined as teaching and learning with the help of multimedia technologies and the internet by access to digital content. E-learning replacing the traditional education system through information and communication technology-based learning. This paper has designed and implemented integrated e-learning system architecture with University Management System. Moodle (Modular Object-Oriented Dynamic Learning Environment) is the best e-learning system, but the problem of Moodle has no school or university management system. In this research, we have not considered the school’s student because they are out of internet facilities. That’s why we considered the university students because they have the internet access and used technologies. The University Management System has different types of activities such as student registration, account management, teacher information, semester registration, staff information, etc. If we integrated these types of activity or module with Moodle, then we can overcome the problem of Moodle, and it will enhance the e-learning system architecture which makes effective use of technology. This architecture will give the learner to easily access the resources of e-learning platform anytime or anywhere which digitizes the learning method.Keywords: database, e-learning, LMS, Moodle
Procedia PDF Downloads 18810737 Increasing Student Engagement through Culturally-Responsive Classroom Management
Authors: Catherine P. Bradshaw, Elise T. Pas, Katrina J. Debnam, Jessika H. Bottiani, Michael Rosenberg
Abstract:
Worldwide, ethnically and culturally diverse students are at increased risk for school failure, discipline problems, and dropout. Despite decades of concern about this issue of disparities in education and other fields (e.g., 'school to prison pipeline'), there has been limited empirical examination of models that can actually reduce these gaps in schools. Moreover, few studies have examined the effectiveness of in-service teacher interventions and supports specifically designed to reduce discipline disparities and improve student engagement. This session provides an overview of the evidence-based Double Check model which serves as a framework for teachers to use culturally-responsive strategies to engage ethnically and culturally diverse students in the classroom and reduce discipline problems. Specifically, Double Check is a school-based prevention program which includes three core components: (a) enhancements to the school-wide Positive Behavioral Interventions and Supports (PBIS) tier-1 level of support; (b) five one-hour professional development training sessions, each of which addresses five domains of cultural competence (i.e., connection to the curriculum, authentic relationships, reflective thinking, effective communication, and sensitivity to students’ culture); and (c) coaching of classroom teachers using an adapted version of the Classroom Check-Up, which intends to increase teachers’ use of effective classroom management and culturally-responsive strategies using research-based motivational interviewing and data-informed problem-solving approaches. This paper presents findings from a randomized controlled trial (RCT) testing the impact of Double Check, on office discipline referrals (disaggregated by race) and independently observed and self-reported culturally-responsive practices and classroom behavior management. The RCT included 12 elementary and middle schools; 159 classroom teachers were randomized either to receive coaching or serve as comparisons. Specifically, multilevel analyses indicated that teacher self-reported culturally responsive behavior management improved over the course of the school year for teachers who received the coaching and professional development. However, the average annual office discipline referrals issued to black students were reduced among teachers who were randomly assigned to receive coaching relative to comparison teachers. Similarly, observations conducted by trained external raters indicated significantly more teacher proactive behavior management and anticipation of student problems, higher student compliance, less student non-compliance, and less socially disruptive behaviors in classrooms led by coached teachers than classrooms led teachers randomly assigned to the non-coached condition. These findings indicated promising effects of the Double Check model on a range of teacher and student outcomes, including disproportionality in office discipline referrals among Black students. These results also suggest that the Double Check model is one of only a few systematic approaches to promoting culturally-responsive behavior management which has been rigorously tested and shown to be associated with improvements in either student or staff outcomes indicated significant reductions in discipline problems and improvements in behavior management. Implications of these findings are considered within the broader context of globalization and demographic shifts, and their impacts on schools. These issues are particularly timely, given growing concerns about immigration policies in the U.S. and abroad.Keywords: ethnically and culturally diverse students, student engagement, school-based prevention, academic achievement
Procedia PDF Downloads 28410736 A Literature Review on Virtual Interventions for Midlife Women
Authors: Daniel D'Souza, Ping Zou
Abstract:
The period before, during, and after menopause is a sensitive time for women as they experience intense physical and psychological health changes and symptoms. These changes accompany the hormonal changes that mark the end of a woman’s reproductive age. To help mitigate and cope with these changes, prompt and correct treatment is needed. eHealth has emerged as a branch of telemedicine in the past few decades as an alternate avenue for patients to receive care quickly and conveniently, as it relies on the Internet and computers. Within the past few years, eHealth has also given rise to mHealth, which is the use of personal mobile devices to receive treatment and care. However, there is a lack of study on their use for menopause. This review aimed to review and summarize the literature for eHealth or mHealth and menopause. Several databases related to women’s health and digital health were searched for original studies about eHealth or mHealth and menopause. The search yielded 25 results. The results were generally positive, with these interventions being feasible and having positive effects on physical and psychosocial outcomes. However, several issues were raised regarding their design process that may inadvertently prevent these interventions from addressing the needs of all potential users. Therefore, while eHealth and mHealth certainly represent a future model of healthcare delivery for menopausal women, further research and design modifications are needed before this can happen.Keywords: eHealth, menopause, mHealth, midlife women
Procedia PDF Downloads 14010735 Managing Construction Wastes in Nigeria for Sustainable Development
Authors: Ezekiel Ejiofor Nnadi
Abstract:
Nigeria construction industry is known for its active construction activities. This has earmarked the industry to be the key to economic growth of the nation. It has largest employer of labour and gives sustenance to other industries like manufacturing industry. While this is a sign of growth and prosperity; the waste generated by the industry has always been a problem and a serious concern. It results in wastage of economic gain and has resultant health effect on the populace apart from injury being sustained on sites. This work provides a platform to learn more about construction waste, its management strategy and how to reduce waste production in Nigeria construction industry. Construction sites, waste management authority and public health institutions in Lagos as the centre of most construction activities in Nigeria were selected, and a set of questionnaire was administered to using the systematic sampling technique. Descriptive statistics and relative importance index (RII) technique were employed for the analysis of the data gathered. The findings of the analysis show that excessive wastes reduce contractors’ profit margin and also that some construction wastes contain hazardous and toxic elements such as lead, asbestos or radioactive materials which required proper handling and effective disposal. The conclusion was drawn that the check on waste on construction sites starts with the designers to the contractors who execute on site.Keywords: construction cost, construction industry, economic growth, materials wastes
Procedia PDF Downloads 27510734 Low-Cost Fog Edge Computing for Smart Power Management and Home Automation
Authors: Belkacem Benadda, Adil Benabdellah, Boutheyna Souna
Abstract:
The Internet of Things (IoT) is an unprecedented creation. Electronics objects are now able to interact, share, respond and adapt to their environment on a much larger basis. Actual spread of these modern means of connectivity and solutions with high data volume exchange are affecting our ways of life. Accommodation is becoming an intelligent living space, not only suited to the people circumstances and desires, but also to systems constraints to make daily life simpler, cheaper, increase possibilities and achieve a higher level of services and luxury. In this paper we are as Internet access, teleworking, consumption monitoring, information search, etc.). This paper addresses the design and integration of a smart home, it also purposes an IoT solution that allows smart power consumption based on measurements from power-grid and deep learning analysis.Keywords: array sensors, IoT, power grid, FPGA, embedded
Procedia PDF Downloads 11610733 Comparison between Separable and Irreducible Goppa Code in McEliece Cryptosystem
Authors: Newroz Nooralddin Abdulrazaq, Thuraya Mahmood Qaradaghi
Abstract:
The McEliece cryptosystem is an asymmetric type of cryptography based on error correction code. The classical McEliece used irreducible binary Goppa code which considered unbreakable until now especially with parameter [1024, 524, and 101], but it is suffering from large public key matrix which leads to be difficult to be used practically. In this work Irreducible and Separable Goppa codes have been introduced. The Irreducible and Separable Goppa codes used are with flexible parameters and dynamic error vectors. A Comparison between Separable and Irreducible Goppa code in McEliece Cryptosystem has been done. For encryption stage, to get better result for comparison, two types of testing have been chosen; in the first one the random message is constant while the parameters of Goppa code have been changed. But for the second test, the parameters of Goppa code are constant (m=8 and t=10) while the random message have been changed. The results show that the time needed to calculate parity check matrix in separable are higher than the one for irreducible McEliece cryptosystem, which is considered expected results due to calculate extra parity check matrix in decryption process for g2(z) in separable type, and the time needed to execute error locator in decryption stage in separable type is better than the time needed to calculate it in irreducible type. The proposed implementation has been done by Visual studio C#.Keywords: McEliece cryptosystem, Goppa code, separable, irreducible
Procedia PDF Downloads 26710732 Policy Implications of Cashless Banking on Nigeria’s Economy
Authors: Oluwabiyi Adeola Ayodele
Abstract:
This study analysed the Policy and general issues that have arisen over time in Nigeria’ Cashless banking environment as a result of the lack of a Legal framework on Electronic banking in Nigeria. It undertook an in-depth study of the cashless banking system. It discussed the evolution, growth and development of cashless banking in Nigeria; It revealed the expected benefits of the cashless banking system; It appraised regulatory issues and other prevalent problems on cashless banking in Nigeria; and made appropriate recommendations where necessary. The study relied on primary and secondary sources of information. The primary sources included the Constitution of the Federal Republic of Nigeria, Statutes, Conventions and Judicial decisions, while the secondary sources included Books, Journals Articles, Newspapers and Internet Materials. The study revealed that cashless banking has been adopted in Nigeria but still at the developing stage. It revealed that there is no law for the regulation of cashless banking in Nigeria, what Nigeria relies on for regulation is the Central Bank of Nigeria’s Cashless Policy, 2014. The Banks and Other Financial Institutions Act Chapter B3, LFN, 2004 of Nigeria lack provision to accommodate issues on Internet banking. However, under the general principles of legality in criminal law, and by the provisions of the Nigerian Constitution, a person can only be punished for conducts that have been defined to be criminal by written laws with the penalties specifically stated in the law. Although Nigeria has potent laws for the regulation of paper banking, these laws cannot be substituted for paperless transactions. This is because the issues involved in both transactions vary. The study also revealed that the absence of law in the cashless banking environment in Nigeria will subject consumers to endless risks. This study revealed that the creation of banking markets via the Internet relies on both available technologies and appropriate laws and regulations. It revealed however that Law of some of the countries considered on cashless banking has taken care of most of the legal issues and other problems prevalent in the cashless banking environment. The study also revealed some other problems prevalent in the Nigerian cashless banking environment. The study concluded that for Nigeria to find solutions to the legal issues raised in its cashless banking environment and other problems of cashless banking, it should have a viable legal Frame work for internet banking. The study concluded that the Central Bank of Nigeria’s Policy on Cashless banking is not potent enough to tackle the challenges posed to cashless banking in Nigeria because policies only have a persuasive effect and not a binding effect. There is, therefore, a need for appropriate Laws for the regulation of cashless Banking in Nigeria. The study also concluded that there is a need to create more awareness of the system among Nigerians and solve infrastructural problems like prevalent power outage which often have been creating internet network problem.Keywords: cashless-banking, Nigeria, policies, laws
Procedia PDF Downloads 48910731 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing
Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi
Abstract:
This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning
Procedia PDF Downloads 3410730 A Study of Relational Factors Associated with Online Celebrity Business and Consumer Purchase Intention
Authors: Sixing Chen, Shuai Yang
Abstract:
Online celebrity business, also known as Internet celebrity business (or Wanghong business in Chinese), is an emerging relational C2C business model, and an alternative to traditional C2C transactional business models. There are already millions of these consumers, and this number is growing. In this model, consumer purchase decisions are driven by recommendations and endorsements in videos posted online by celebrities. The purpose of this paper is to determine the relational constructs within consumer relationships in the Internet celebrity business model and to investigate relationships between the constructs and consumer purchase intention. A questionnaire-based study was conducted with consumers who had an awareness of, or prior purchase experience with online celebrities. The results of exploratory factor analysis (EFA) and multiple regression analysis revealed three valid relational constructs: product experience sharing, lifestyle association, and real-time interaction. This study indicated that these constructs had the direct effect on consumer preference and purchase intention. The findings of this study provide insight into a business model in which online shopping is driven by celebrities. They suggest that online celebrities should pay more attention to product experience sharing, life style association and real-time interaction for managing their product promotions. These are the most salient factors with respect to the relational constructs identified in this study.Keywords: customer relationship, customer to customer, Internet celebrity, online celebrity, online marketing, purchase intention
Procedia PDF Downloads 31910729 Analytics Model in a Telehealth Center Based on Cloud Computing and Local Storage
Authors: L. Ramirez, E. Guillén, J. Sánchez
Abstract:
Some of the main goals about telecare such as monitoring, treatment, telediagnostic are deployed with the integration of applications with specific appliances. In order to achieve a coherent model to integrate software, hardware, and healthcare systems, different telehealth models with Internet of Things (IoT), cloud computing, artificial intelligence, etc. have been implemented, and their advantages are still under analysis. In this paper, we propose an integrated model based on IoT architecture and cloud computing telehealth center. Analytics module is presented as a solution to control an ideal diagnostic about some diseases. Specific features are then compared with the recently deployed conventional models in telemedicine. The main advantage of this model is the availability of controlling the security and privacy about patient information and the optimization on processing and acquiring clinical parameters according to technical characteristics.Keywords: analytics, telemedicine, internet of things, cloud computing
Procedia PDF Downloads 32510728 Fast Track to the Physical Internet: A Cross-Industry Project from Upper Austria
Authors: Laura Simmer, Maria Kalt, Oliver Schauer
Abstract:
Freight transport is growing fast, but many vehicles are empty or just partially loaded. The vision and concepts of the Physical Internet (PI) proposes to eliminate these inefficiencies. Aiming for a radical sustainability improvement, the PI – inspired by the Digital Internet – is a hyperconnected global logistic system, enabling seamless asset sharing and flow consolidation. The implementation of a PI in its full expression will be a huge challenge: the industry needs innovation and implementation support including change management approaches, awareness creation and good practices diffusion, legislative actions to remove antitrust and international commerce barriers, standardization and public incentives policies. In order to take a step closer to this future the project ‘Atropine - Fast Track to the Physical Internet’ funded under the Strategic Economic and Research Program ‘Innovative Upper Austria 2020’ was set up. The two-year research project unites several research partners in this field, but also industrial partners and logistics service providers. With Atropine, the consortium wants to actively shape the mobility landscape in Upper Austria and make an innovative contribution to an energy-efficient, environmentally sound and sustainable development in the transport area. This paper should, on the one hand, clarify the questions what the project Atropine is about and, on the other hand, how a proof of concept will be reached. Awareness building plays an important role in the project as the PI requires a reorganization of the supply chain and the design of completely new forms of inter-company co-operation. New business models have to be developed and should be verified by simulation. After the simulation process one of these business models will be chosen and tested in real life with the partner companies. The developed results - simulation model and demonstrator - are used to determine how the concept of the PI can be applied in Upper Austria. Atropine shall pave the way for a full-scale development of the PI vision in the next few decades and provide the basis for pushing the industry toward a new level of co-operation with more shared resources and increased standardization.Keywords: Atropine, inter-company co-operation, Physical Internet, shared resources, sustainable logistics
Procedia PDF Downloads 22410727 Quality Control Assessment of X-Ray Equipment in Hospitals of Katsina State, Nigeria
Authors: Aminu Yakubu Umar
Abstract:
X-ray is the major contributor to the effective dose of both the patient and the personnel. Because of the radiological risks involved, it is usually recommended that dose to patient from X-ray be kept as low as reasonably achievable (ALARA) with adequate image quality. The implementation of quality assurance in diagnostic radiology can help greatly in achieving that, as it is a technique designed to reduce X-ray doses to patients undergoing radiological examination. In this study, quality control was carried out in six hospitals, which involved KVp test, evaluation of total filtration, test for constancy of radiation output, and check for mA linearity. Equipment used include KVp meter, Rad-check meter, aluminum sheets (0.1–1.0 mm) etc. The results of this study indicate that, the age of the X-ray machines in the hospitals ranges from 3-13 years, GHI and GH2 being the oldest and FMC being the newest. In the evaluation of total filtration, the HVL of the X-ray machines in the hospitals varied, ranging from 2.3-5.2 mm. The HVL was found to be highest in AHC (5.2 mm), while it was lowest in GH3 (2.3 mm). All HVL measurements were done at 80 KVp. The variation in voltage accuracy in the hospitals ranges from 0.3%-127.5%. It was only in GH1 that the % variation was below the allowed limit. The test for constancy of radiation output showed that, the coefficient of variation ranges from 0.005–0.550. In GH3, FMC and AHC, the coefficient of linearity were less than the allowed limit, while in GH1, GH2 and GH4 the coefficient of linearity had exceeded the allowed limit. As regard to mA linearity, FMC and AHC had their coefficients of linearity as 0.12 and 0.10 respectively, which were within the accepted limit, while GH1, GH3 and GH4 had their coefficients as 0.16, 0.69 and 0.98 respectively, which exceeded the allowed limit.Keywords: radiation, X-ray output, quality control, half-value layer, mA linearity, KVp variation
Procedia PDF Downloads 61010726 Associations between Parental Marital Quality and Sexual Behaviors among 50,000 Chinese University Students
Authors: Jiashu Shen
Abstract:
With the increase in the prevalence of divorce, the impact of divorce on children’s sexual and reproductive health has received wide attention, while few studies have investigated parent marital relationship. This study aims to study the relation of both parent divorce and perceived parental marital relationship with children’s sexual behaviors among Chinese university or vocational college students. The study used data from “National College Student Survey on Sexual and Reproductive Health 2019”, an internet-based survey conducted from November 2019 to February 2020, in 241 universities or vocational colleges in China. Statistical analyses were conducted to assess the relationship of perceived parental marital relationship and parents’ divorce of distinct occurrence time with sexual intercourse, risky sexual behaviors, unintended health outcomes and sexual abuse. Among 51,124 university or vocational college students, those whose parents had divorced accounted for 10.72%. Better perceived parental relationship was associated with a lower likelihood to have sexual intercourse (male: OR: 0.83, 95%CI: 0.80-0.86; female: OR: 0.73, 95%CI: 0.70-0.75), sexual abuse, risky sexual behaviors and unintended health outcomes. Divorce was also found to be associated with higher risk of sexual abuse, risky sexual behaviors and unintended health outcomes. The findings highlight the importance of parental marital relationship and divorce in risky sexual behavior among young adults. The findings may provide implications on intervention programs targeting at children with divorced parents from an early stage.Keywords: college students, divorce, family relationship, sexual behavior
Procedia PDF Downloads 132