Search results for: privacy measures
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3897

Search results for: privacy measures

3447 Impact of Brexit on the Structure of the European Insurance Market: A Solvency and Financial Condition Report Content Analysis of UK Insurance Companies

Authors: Antonia Müller, Svend Reuse

Abstract:

The Brexit referendum in June 2016 led to different publications analysing potential consequences for European and British insurance companies under the European Passport. This study addresses a research gap, regarding the measures taken by insurance companies based in the United Kingdom and thus on structural changes to the European insurance market by an innovative structured Solvency and Financial Condition Report content analysis. In scope are all insurance companies based in the United Kingdom, that fall under the Solvency II supervisory regime. The results show that the majority of British Solvency II insurance companies in scope, conducting cross-border business to the European Union, have applied and reported measures to be able to continue operating this cross-border business after Brexit. In addition, the study shows that 34 new insurance companies based in the European Union were established as a result of Brexit, indicating structural changes to the European insurance market.

Keywords: brexit, europe, insurance market, solvency and financial condition repot, structural changes

Procedia PDF Downloads 172
3446 BIM4Cult Leveraging BIM and IoT for Enhancing Fire Safety in Historical Buildings

Authors: Anastasios Manos, Despina Elisabeth Filippidou

Abstract:

Introduction: Historical buildings are an inte-gral part of the cultural heritage of every place, and beyond the obvious need for protection against risks, they have specific requirements regarding the handling of hazards and disasters such as fire, floods, earthquakes, etc. Ensuring high levels of protection and safety for these buildings is impera-tive for two distinct but interconnected reasons: a) they themselves constitute cultural heritage, and b) they are often used as museums/cultural spaces, necessitating the protection of both human life (vis-itors and workers) and the cultural treasures they house. However, these buildings present serious constraints in implementing the necessary measures to protect them from destruction due to their unique architecture, construction methods, and/or the structural materials used in the past, which have created an existing condition that is sometimes challenging to reshape and operate within the framework of modern regulations and protection measures. One of the most devastating risks that threaten historical buildings is fire. Catastrophic fires demonstrate the need for timely evaluation of fire safety measures in historical buildings. Recog-nizing the criticality of protecting historical build-ings from the risk of fire, the Confederation of Fire Protection Associations in Europe (CFPA E) issued specific guidelines in 2013 (CFPA-E Guideline No 30:2013 F) for the fire protection of historical buildings at the European level. However, until now, few actions have been implemented towards leveraging modern technologies in the field of con-struction and maintenance of buildings, such as Building Information Modeling (BIM) and the Inter-net of Things (IoT), for the protection of historical buildings from risks like fires, floods, etc. The pro-ject BIM4Cult has bee developed in order to fill this gap. It is a tool for timely assessing and monitoring of the fire safety level of historical buildings using BIM and IoT technologies in an integrated manner. The tool serves as a decision support expert system for improving the fire safety of historical buildings by continuously monitoring, controlling and as-sessing critical risk factors for fire.

Keywords: Iot, fire, BIM, expert system

Procedia PDF Downloads 44
3445 Incidence of Dermatophilosis in Cattle in Bauchi State, Nigeria: A Review

Authors: Adamu Garba, Saidu Idi

Abstract:

This study was conducted to determine the prevalence of Dermatophilosis in cattle in Bauchi State and suggest possible control measures. Data were obtained from the State Ministry of Agriculture and Natural Resources, Veterinary Division and monthly reports from Local Government Area Veterinary Offices for a period of three years ranging from 1996-1998. The result revealed that the disease is more prevalent in the rainy season which coincides with preponderance of the predisposing factors. Of the total 17,252 infected cattle in the State, Western zone had the highest cases with 8,298 (50.0%), followed by Central zone with 5,211 (30.0%) and the least was in the Northern zone with 3,753 (20.0%) cases. Rainfall pattern within the zones could be responsible for the variation in the prevalence rate. Analysis of variance revealed that there is no significant difference in the prevalence of Dermatophilosis between the years (P<0.212) while there is significant difference within the zones (P<0.012). Correlation analysis carried out showed that there is positive relationship between rainfall and Dermatophilosis (r<0.909). Since the disease is more prevalent during the rainy season, efforts should be exerted on thorough preventive measures during the period to control the disease in the State, particularly in the Western zone.

Keywords: incidence, dermatophilosis, cattle, Bauchi State

Procedia PDF Downloads 500
3444 Flood Risk Management in Low Income Countries: Balancing Risk and Development

Authors: Gavin Quibell, Martin Kleynhans, Margot Soler

Abstract:

The Sendai Framework notes that disaster risk reduction is essential for sustainable development, and Disaster Risk Reduction is included in 3 of the Sustainable Development Goals (SDGs), and 4 of the SDG targets. However, apart from promoting better governance and resourcing of disaster management agencies, little guidance is given how low-income nations can balance investments across the SDGs to achieve sustainable development in an increasingly climate vulnerable world with increasing prevalence of flood and drought disasters. As one of the world’s poorest nations, Malawi must balance investments across all the SDGs. This paper explores how Malawi’s National Guidelines for Community-based Flood Risk Management integrate sustainable development and flood management objectives at different administrative levels. While Malawi periodically suffers from large, widespread flooding, the greatest impacts are felt through the smaller annual floods and flash floods. The Guidelines address this through principles that recognize that while the protection of human life is the most important priority for flood risk management, addressing the impacts of floods on the rural poor and the economy requires different approaches. The National Guidelines are therefore underpinned by the following; 1. In the short-term investments in flood risk management must focus on breaking the poverty – vulnerability cycle; 2. In the long-term investments in the other SDGs will have the greatest flood risk management benefits; 3. If measures are in place to prevent loss of life and protect strategic infrastructure, it is better to protect more people against small and medium size floods than fewer people against larger floods; 4. Flood prevention measures should focus on small (1:5 return period) floods; 5. Flood protection measures should focus on small and medium floods (1:20 return period) while minimizing the risk of failure in larger floods; 6. The impacts of larger floods ( > 1:50) must be addressed through improved preparedness; 7. The impacts of climate change on flood frequencies are best addressed by focusing on growth not overdesign; and 8. Manage floods and droughts conjunctively. The National Guidelines weave these principles into Malawi’s approach to flood risk management through recommendations for planning and implementing flood prevention, protection and preparedness measures at district, traditional authority and village levels.

Keywords: flood risk management in low-income countries, sustainable development, investments in prevention, protection and preparedness, community-based flood risk management, Malawi

Procedia PDF Downloads 216
3443 Semantic Search Engine Based on Query Expansion with Google Ranking and Similarity Measures

Authors: Ahmad Shahin, Fadi Chakik, Walid Moudani

Abstract:

Our study is about elaborating a potential solution for a search engine that involves semantic technology to retrieve information and display it significantly. Semantic search engines are not used widely over the web as the majorities are still in Beta stage or under construction. Many problems face the current applications in semantic search, the major problem is to analyze and calculate the meaning of query in order to retrieve relevant information. Another problem is the ontology based index and its updates. Ranking results according to concept meaning and its relation with query is another challenge. In this paper, we are offering a light meta-engine (QESM) which uses Google search, and therefore Google’s index, with some adaptations to its returned results by adding multi-query expansion. The mission was to find a reliable ranking algorithm that involves semantics and uses concepts and meanings to rank results. At the beginning, the engine finds synonyms of each query term entered by the user based on a lexical database. Then, query expansion is applied to generate different semantically analogous sentences. These are generated randomly by combining the found synonyms and the original query terms. Our model suggests the use of semantic similarity measures between two sentences. Practically, we used this method to calculate semantic similarity between each query and the description of each page’s content generated by Google. The generated sentences are sent to Google engine one by one, and ranked again all together with the adapted ranking method (QESM). Finally, our system will place Google pages with higher similarities on the top of the results. We have conducted experimentations with 6 different queries. We have observed that most ranked results with QESM were altered with Google’s original generated pages. With our experimented queries, QESM generates frequently better accuracy than Google. In some worst cases, it behaves like Google.

Keywords: semantic search engine, Google indexing, query expansion, similarity measures

Procedia PDF Downloads 403
3442 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 205
3441 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 345
3440 Corruption, Institutional Quality and Economic Growth in Nigeria

Authors: Ogunlana Olarewaju Fatai, Kelani Fatai Adeshina

Abstract:

The interplay of corruption and institutional quality determines how effective and efficient an economy progresses. An efficient institutional quality is a key requirement for economic stability. Institutional quality in most cases has been used interchangeably with Governance and these have given room for proxies that legitimized Governance as measures for institutional quality. A poorly-tailored institutional quality has a penalizing effect on corruption and economic growth, while defective institutional quality breeds corruption. Corruption is a hydra-headed phenomenon as it manifests in different forms. The most celebrated definition of corruption is given as “the use or abuse of public office for private benefits or gains”. It also denotes an arrangement between two mutual parties in the determination and allocation of state resources for pecuniary benefits to circumvent state efficiency. This study employed Barro (1990) type augmented model to analyze the nexus among corruption, institutional quality and economic growth in Nigeria using annual time series data, which spanned the period 1996-2019. Within the analytical framework of Johansen Cointegration technique, Error Correction Mechanism (ECM) and Granger Causality tests, findings revealed a long-run relationship between economic growth, corruption and selected measures of institutional quality. The long run results suggested that all the measures of institutional quality except voice & accountability and regulatory quality are positively disposed to economic growth. Moreover, the short-run estimation indicated a reconciliation of the divergent views on corruption which pointed at “sand the wheel” and “grease the wheel” of growth. In addition, regulatory quality and the rule of law indicated a negative influence on economic growth in Nigeria. Government effectiveness and voice & accountability, however, indicated a positive influence on economic growth. The Granger causality test results suggested a one-way causality between GDP and Corruption and also between corruption and institutional quality. Policy implications from this study pointed at checking corruption and streamlining institutional quality framework for better and sustained economic development.

Keywords: institutional quality, corruption, economic growth, public policy

Procedia PDF Downloads 136
3439 Pre-Experimental Research to Investigate the Retention of Basic and Advanced Life Support Measures Knowledge and Skills by Qualified Nurses Following a Course in Professional Development in a Tertiary Teaching Hospital

Authors: Ram Sharan Mehta, Gayanandra Malla, Anita Gurung, Anu Aryal, Divya Labh, Hricha Neupane

Abstract:

Objectives: Lack of resuscitation skills of nurses and doctors in basic life support (BLS) and advanced life support (ALS) has been identified as a contributing factor to poor outcomes of cardiac arrest victims. The objective of this study was to examine retention of life support measures (BLS/ALS) knowledge and skills of nurses following education intervention programme. Materials and Methods: Pre-experimental research design was used to conduct the study among the nurses working in medical units of B.P Koirala Institute of Health Sciences, where CPR is very commonly performed. Using convenient sampling technique total of 20 nurses agreed to participate and give consent were included in the study. The theoretical, demonstration and re-demonstration were arranged involving the trained doctors and nurses during the three hours educational session. Post-test was carried out after two week of education intervention programme. The 2010 BLS & ALS guidelines were used as guide for the study contents. The collected data were analyzed using SPSS-15 software. Results: It was found that there is significant increase in knowledge after education intervention in the components of life support measures (BLS/ALS) i.e. ratio of chest compression to ventilation in BLS (P=0.001), correct sequence of CPR (p <0.001), rate of chest compression in ALS (P=0.001), the depth of chest compression in adult CPR (p<0.001), and position of chest compression in CPR (P=0.016). Nurses were well appreciated the programme and request to continue in future for all the nurses. Conclusions: At recent BLS/ALS courses (2010), a significant number of nurses remain without any such training. Action is needed to ensure all nurses receive BLS training and practice this skill regularly in order to retain their knowledge.

Keywords: pre-experimental, basic and advance life support, nurses, sampling technique

Procedia PDF Downloads 237
3438 Measures for Limiting Corruption upon Migration Wave in Europe

Authors: Jordan Georgiev Deliversky

Abstract:

Fight against migrant smuggling has been put as a priority issues at the European Union policy agenda for more than a decade. The trafficked person, who has been targeted as the object of criminal exploitation, is specifically unique for human trafficking. Generally, the beginning of human trafficking activities is related to profit from the victim’s exploitation. The objective of this paper is to present measures that could result in the limitation of corruption mainly through analyzing the existing legislation framework against corruption in Europe. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, as corruption could be characterized as one of the most significant reasons for refugees to flee their countries. The main results show that law enforcement must turn the focus on the financing of the organized crime groups that are involved in migrant smuggling activities. Corruption has a significant role in managing smuggling operations and in particular when criminal organizations and networks are involved. Illegal migrants and refugees usually represent significant sources of additional income for officials involved in the process of boarding protection and immigration control within the European Union borders.

Keywords: corruption, influence, human smuggling, legislation, migration

Procedia PDF Downloads 328
3437 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 133
3436 Executive Deficits in Non-Clinical Hoarders

Authors: Thomas Heffernan, Nick Neave, Colin Hamilton, Gill Case

Abstract:

Hoarding is the acquisition of and failure to discard possessions, leading to excessive clutter and significant psychological/emotional distress. From a cognitive-behavioural approach, excessive hoarding arises from information-processing deficits, as well as from problems with emotional attachment to possessions and beliefs about the nature of possessions. In terms of information processing, hoarders have shown deficits in executive functions, including working memory, planning, inhibitory control, and cognitive flexibility. However, this previous research is often confounded by co-morbid factors such as anxiety, depression, or obsessive-compulsive disorder. The current study adopted a cognitive-behavioural approach, specifically assessing executive deficits and working memory in a non-clinical sample of hoarders, compared with non-hoarders. In this study, a non-clinical sample of 40 hoarders and 73 non-hoarders (defined by The Savings Inventory-Revised) completed the Adult Executive Functioning Inventory, which measures working memory and inhibition, Dysexecutive Questionnaire-Revised, which measures general executive function and the Hospital Anxiety and Depression Scale, which measures mood. The participant sample was made up of unpaid young adult volunteers who were undergraduate students and who completed the questionnaires on a university campus. The results revealed that, after observing no differences between hoarders and non-hoarders on age, sex, and mood, hoarders reported significantly more deficits in inhibitory control and general executive function when compared with non-hoarders. There was no between-group difference on general working memory. This suggests that non-clinical hoarders have a specific difficulty with inhibition-control, which enables you to resist repeated, unwanted urges. This might explain the hoarder’s inability to resist urges to buy and keep items that are no longer of any practical use. These deficits may be underpinned by general executive function deficiencies.

Keywords: hoarding, memory, executive, deficits

Procedia PDF Downloads 164
3435 A Proposal for Systematic Mapping Study of Software Security Testing, Verification and Validation

Authors: Adriano Bessa Albuquerque, Francisco Jose Barreto Nunes

Abstract:

Software vulnerabilities are increasing and not only impact services and processes availability as well as information confidentiality, integrity and privacy, but also cause changes that interfere in the development process. Security test could be a solution to reduce vulnerabilities. However, the variety of test techniques with the lack of real case studies of applying tests focusing on software development life cycle compromise its effective use. This paper offers an overview of how a Systematic Mapping Study (MS) about security verification, validation and test (VVT) was performed, besides presenting general results about this study.

Keywords: software test, software security verification validation and test, security test institutionalization, systematic mapping study

Procedia PDF Downloads 369
3434 The Role of Technology in Transforming the Finance, Banking, and Insurance Sectors

Authors: Farid Fahami

Abstract:

This article explores the transformative role of technology in the finance, banking, and insurance sectors. It examines key technological trends such as AI, blockchain, data analytics, and digital platforms and their impact on operations, customer experiences, and business models. The article highlights the benefits of technology adoption, including improved efficiency, cost reduction, enhanced customer experiences, and expanded financial inclusion. It also addresses challenges like cybersecurity, data privacy, and the need for upskilling. Real-world case studies demonstrate successful technology integration, and recommendations for stakeholders emphasize embracing innovation and collaboration. The article concludes by emphasizing the importance of technology in shaping the future of these sectors.

Keywords: banking, finance, insurance, technology

Procedia PDF Downloads 50
3433 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 94
3432 Quantifying Impairments in Whiplash-Associated Disorders and Association with Patient-Reported Outcomes

Authors: Harpa Ragnarsdóttir, Magnús Kjartan Gíslason, Kristín Briem, Guðný Lilja Oddsdóttir

Abstract:

Introduction: Whiplash-Associated Disorder (WAD) is a health problem characterized by motor, neurological and psychosocial symptoms, stressing the need for a multimodal treatment approach. To achieve individualized multimodal approach, prognostic factors need to be identified early using validated patient-reported and objective outcome measures. The aim of this study is to demonstrate the degree of association between patient-reported and clinical outcome measures of WAD patients in the subacute phase. Methods: Individuals (n=41) with subacute (≥1, ≤3 months) WAD (I-II), medium to high-risk symptoms, or neck pain rating ≥ 4/10 on the Visual Analog Scale (VAS) were examined. Outcome measures included measurements for movement control (Butterfly test) and cervical active range of motion (cAROM) using the NeckSmart system, a computer system using an inertial measurement unit (IMU) that connects to a computer. The IMU sensor is placed on the participant’s head, who receives visual feedback about the movement of the head. Patient-reported neck disability, pain intensity, general health, self-perceived handicap, central sensitization, and difficulties due to dizziness were measured using questionnaires. Excel and R statistical software were used for statistical analyses. Results: Forty-one participants, 15 males (37%), 26 females (63%), mean (SD) age 36.8 (±12.7), underwent data collection. Mean amplitude accuracy (AA) (SD) in the Butterfly test for easy, medium, and difficult paths were 2.4mm (0.9), 4.4mm (1.8), and 6.8mm (2.7), respectively. Mean cAROM (SD) for flexion, extension, left-, and right rotation were 46.3° (18.5), 48.8° (17.8), 58.2° (14.3), and 58.9° (15.0), respectively. Mean scores on the Neck Disability Index (NDI), VAS, Dizziness Handicap Inventory (DHI), Central Sensitization Inventory (CSI), and 36-Item Short Form Survey RAND version (RAND) were 43% (17.4), 7 (1.7), 37 (25.4), 51 (17.5), and 39.2 (17.7) respectively. Females showed significantly greater deviation for AA compared to males for easy and medium Butterfly paths (p<0.05). Statistically significant moderate to strong positive correlation was found between the DHI and easy (r=0.6, p=0.05), medium (r=0.5, p=0.05)) and difficult (r=0.5, p<0.05) Butterfly paths, between the total RAND score and all cAROMs (r between 0.4-0.7, p≤0.05) except flexion (r=0.4, p=0.7), and between the NDI score and CSI (r=0.7, p<0.01), VAS (r=0.5, p<0.01), and DHI (r=0.7, p<0.01) scores respectively. Discussion: All patient-reported and objective measures were found to be outside the reference range. Results suggest females have worse movement control in the neck in the subacute WAD phase. However, no statistical difference based on gender was found in patient-reported measures. Suggesting females might have worse movement control than males in general in this phase. The correlation found between DHI and the Butterfly test can be explained because the DHI measures proprioceptive symptoms like dizziness and eye movement disorders that can affect the outcome of movement control tests. A correlation was found between the total RAND score and cAROM, suggesting that a reduced range of motion affects the quality of life. Significance: The NeckSmart system can detect abnormalities in cAROM, fine movement control, and kinesthesia of the neck. Results suggest females have worse movement control than males. Results show a moderate to a high correlation between several patient-reported and objective measurements.

Keywords: whiplash associated disorders, car-collision, neck, trauma, subacute

Procedia PDF Downloads 50
3431 Challenges in Multi-Cloud Storage Systems for Mobile Devices

Authors: Rajeev Kumar Bedi, Jaswinder Singh, Sunil Kumar Gupta

Abstract:

The demand for cloud storage is increasing because users want continuous access their data. Cloud Storage revolutionized the way how users access their data. A lot of cloud storage service providers are available as DropBox, G Drive, and providing limited free storage and for extra storage; users have to pay money, which will act as a burden on users. To avoid the issue of limited free storage, the concept of Multi Cloud Storage introduced. In this paper, we will discuss the limitations of existing Multi Cloud Storage systems for mobile devices.

Keywords: cloud storage, data privacy, data security, multi cloud storage, mobile devices

Procedia PDF Downloads 669
3430 Hedonic Motivations for Online Shopping

Authors: Pui-Lai To, E-Ping Sung

Abstract:

The purpose of this study is to investigate hedonic online shopping motivations. A qualitative analysis was conducted to explore the factors influencing online hedonic shopping motivations. The results of the study indicate that traditional hedonic values, consisting of social, role, self-gratification, learning trends, pleasure of bargaining, stimulation, diversion, status, and adventure, and dimensions of flow theory, consisting of control, curiosity, enjoyment, and telepresence, exist in the online shopping environment. Two hedonic motivations unique to Internet shopping, privacy and online shopping achievement, were found. It appears that the most important hedonic value to online shoppers is having the choice to interact or not interact with others while shopping on the Internet. This study serves as a basis for the future growth of Internet marketing.

Keywords: internet shopping, shopping motivation, hedonic motivation

Procedia PDF Downloads 452
3429 Research on Evaluation of Renewable Energy Technology Innovation Strategy Based on PMC Index Model

Authors: Xue Wang, Liwei Fan

Abstract:

Renewable energy technology innovation is an important way to realize the energy transformation. Our government has issued a series of policies to guide and support the development of renewable energy. The implementation of these policies will affect the further development, utilization and technological innovation of renewable energy. In this context, it is of great significance to systematically sort out and evaluate the renewable energy technology innovation policy for improving the existing policy system. Taking the 190 renewable energy technology innovation policies issued during 2005-2021 as a sample, from the perspectives of policy issuing departments and policy keywords, it uses text mining and content analysis methods to analyze the current situation of the policies and conduct a semantic network analysis to identify the core issuing departments and core policy topic words; A PMC (Policy Modeling Consistency) index model is built to quantitatively evaluate the selected policies, analyze the overall pros and cons of the policy through its PMC index, and reflect the PMC value of the model's secondary index The core departments publish policies and the performance of each dimension of the policies related to the core topic headings. The research results show that Renewable energy technology innovation policies focus on synergy between multiple departments, while the distribution of the issuers is uneven in terms of promulgation time; policies related to different topics have their own emphasis in terms of policy types, fields, functions, and support measures, but It still needs to be improved, such as the lack of policy forecasting and supervision functions, the lack of attention to product promotion, and the relatively single support measures. Finally, this research puts forward policy optimization suggestions in terms of promoting joint policy release, strengthening policy coherence and timeliness, enhancing the comprehensiveness of policy functions, and enriching incentive measures for renewable energy technology innovation.

Keywords: renewable energy technology innovation, content analysis, policy evaluation, PMC index model

Procedia PDF Downloads 41
3428 Evolution of Web Development Progress in Modern Information Technology

Authors: Abdul Basit Kiani

Abstract:

Web development, the art of creating and maintaining websites, has witnessed remarkable advancements. The aim is to provide an overview of some of the cutting-edge developments in the field. Firstly, the rise of responsive web design has revolutionized user experiences across devices. With the increasing prevalence of smartphones and tablets, web developers have adapted to ensure seamless browsing experiences, regardless of screen size. This progress has greatly enhanced accessibility and usability, catering to the diverse needs of users worldwide. Additionally, the evolution of web frameworks and libraries has significantly streamlined the development process. Tools such as React, Angular, and Vue.js have empowered developers to build dynamic and interactive web applications with ease. These frameworks not only enhance efficiency but also bolster scalability, allowing for the creation of complex and feature-rich web solutions. Furthermore, the emergence of progressive web applications (PWAs) has bridged the gap between native mobile apps and web development. PWAs leverage modern web technologies to deliver app-like experiences, including offline functionality, push notifications, and seamless installation. This innovation has transformed the way users interact with websites, blurring the boundaries between traditional web and mobile applications. Moreover, the integration of artificial intelligence (AI) and machine learning (ML) has opened new horizons in web development. Chatbots, intelligent recommendation systems, and personalization algorithms have become integral components of modern websites. These AI-powered features enhance user engagement, provide personalized experiences, and streamline customer support processes, revolutionizing the way businesses interact with their audiences. Lastly, the emphasis on web security and privacy has been a pivotal area of progress. With the increasing incidents of cyber threats, web developers have implemented robust security measures to safeguard user data and ensure secure transactions. Innovations such as HTTPS protocol, two-factor authentication, and advanced encryption techniques have bolstered the overall security of web applications, fostering trust and confidence among users. Hence, recent progress in web development has propelled the industry forward, enabling developers to craft innovative and immersive digital experiences. From responsive design to AI integration and enhanced security, the landscape of web development continues to evolve, promising a future filled with endless possibilities.

Keywords: progressive web applications (PWAs), web security, machine learning (ML), web frameworks, advancement responsive web design

Procedia PDF Downloads 27
3427 The Impact of Artificial Intelligence on Human Rights Priciples and Obligations

Authors: Adel Atta Youssef Rezkalla

Abstract:

Russia's invasion of Ukraine tested the international community and prompted not only states but also non-state actors to take deterrent measures in response. In fact, international sports federations, notably FIFA and UEFA, have managed to shift the power dynamic quite effectively by imposing a blanket ban on Russian national teams and clubs. The purpose of this article is to examine the human rights consequences of such actions by international sports organizations. First, the article moves away from assessing the legal status of FIFA and UEFA under international law and examines the question of how a legal connection can be established with their human rights obligations. Secondly, the human rights aspects of the controversial FIFA and UEFA measures against Russian athletes are examined and these are analyzed in more detail using the proportionality test than the principle of non-discrimination under international human rights law. Finally, the main avenues for redress for possible human rights violations related to the actions taken by these organizations are identified and the challenges of arbitration and litigation in Switzerland are highlighted.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.

Procedia PDF Downloads 33
3426 Economic Characteristics of Bitcoin: "An Analytical Study"

Authors: Abdelhalem Shahen

Abstract:

The world is now experiencing a digital revolution and greatly accelerated technological developments, in addition to the transition from the economy in its traditional form to the digital economy, which has resulted in the emergence of new tools that are appropriate to those developments, and from this, this paper attempts to explore the economic characteristics of the bitcoin currency that circulated recently. Due to the many advantages that distinguish it from money in its traditional forms, which have a range of economic effects. The study found that Bitcoin is among the technological innovations, which contain a set of characteristics that are worth studying, those that make it the focus of attention, such as the digital currency, the peer-to-peer property, Lower and Faster Transaction Costs, transparency, decentralized control, privacy, and Double-Spending, as well as security and Cryptographic, and finally mining.

Keywords: Digital Economics, Digital Currencies, Bitcoin, Features of Bitcoin

Procedia PDF Downloads 114
3425 Reasonable Adjustment for Students with Disabilities - Opportunities and Limits in Social Work Education

Authors: Bartelsen-Raemy Annabelle, Gerber Andrea

Abstract:

Objectives: The adoption of the UN Convention on the Rights of Persons with Disabilities has the effect that higher education institutions in Switzerland are called upon to promote inclusive university education. In this context, our School of Social Work aims to provide fair participation and the removal of barriers in our study programmes at bachelor’s and master’s levels. In 2015 we developed a concept of reasonable adjustments for students with disabilities and chronic illness as an instrument to provide equal opportunities for those students. We reviewed the implementation of this concept as part of our quality management process. Using a qualitative research design, we explored how affected students and lecturers experience the processes and measures taken and which barriers they still perceive. Methods: We captured subjective perspectives and experience of measures by conducting 15 problem-centred interviews with affected students and three experimental focus groups with lecturers. The data was processed using structured qualitative content analysis and summarised as key categories. Results: All respondents evaluated the concept of reasonable adjustment very positively and emphasised its importance for equal opportunities. Our analysis revealed differences in the usage and perception of both groups and showed that the students interviewed were a heterogeneous group with different needs. Overall, the students described the adjustments, in particular in relation to examinations and other assignments, as a great relief. The lecturers expressed high standards for their own teaching and supervision of students and, at the same time, wished for more support from the university. However, despite the positive evaluation by the lecturers, the limits of reasonable adjustment became evident. It is necessary to consider the limits of reasonable adjustments in terms of professional skills. Conclusion: Reasonable adjustments should, therefore, be seen as an element of an inclusive university culture that must be complemented by further measures. Taking this into account, we have planned further research as a basis for the development of a diversity and inclusion policy.

Keywords: opportunities and limits, reasonable adjustment, social work education, students with disabilities

Procedia PDF Downloads 105
3424 Towards a Proof Acceptance by Overcoming Challenges in Collecting Digital Evidence

Authors: Lilian Noronha Nassif

Abstract:

Cybercrime investigation demands an appropriated evidence collection mechanism. If the investigator does not acquire digital proofs in a forensic sound, some important information can be lost, and judges can discard case evidence because the acquisition was inadequate. The correct digital forensic seizing involves preparation of professionals from fields of law, police, and computer science. This paper presents important challenges faced during evidence collection in different perspectives of places. The crime scene can be virtual or real, and technical obstacles and privacy concerns must be considered. All pointed challenges here highlight the precautions to be taken in the digital evidence collection and the suggested procedures contribute to the best practices in the digital forensics field.

Keywords: digital evidence, digital forensics process and procedures, mobile forensics, cloud forensics

Procedia PDF Downloads 381
3423 Analysis of Big Data on Leisure Activities and Depression for the Disabled

Authors: Hee-Jung Seo, Yunjung Lee, Areum Han, Heeyoung Park, Se-Hyuk Park

Abstract:

The purpose of this study was to analyze the relationship between happiness and depression among people with disabilities and to analyze the social phenomenon of leisure activities among them to promote physical and leisure activities for people with disabilities. The research methods included analyzing differences in happiness according to depression classification. A total of 281 people with disabilities were analyzed using SPSS WIN Ver. 29.0. In addition, the SumTrend platform was used to analyze terms related to 'leisure activities for the disabled.' The findings can be summarized into two main points: First, there were significant differences in happiness according to depression classification. Second, there were 20 mentions before COVID-19, 34 mentions after COVID-19, and currently 43 mentions, with high positive rates observed in each period. Based on these results, the following conclusions were drawn: First, measures for people with disabilities include strengthening online resources and services, social distancing response policies, improving accessibility, and providing support and financial assistance. Second, measures for non-disabled individuals emphasize the need for education and information provision, promoting dialogue and interaction, ensuring accessibility, and promoting inclusive cultural awareness and attitude change.

Keywords: leisure activities, individuals with disabilities, COVID-19 pandemic, depression

Procedia PDF Downloads 6
3422 Architecture for Hearing Impaired: A Study on Conducive Learning Environments for Deaf Children with Reference to Sri Lanka

Authors: Champa Gunawardana, Anishka Hettiarachchi

Abstract:

Conducive Architecture for learning environments is an area of interest for many scholars around the world. Loss of sense of hearing leads to the assumption that deaf students are visual learners. Comprehending favorable non-hearing attributes of architecture can lead to effective, rich and friendly learning environments for hearing impaired. The objective of the current qualitative investigation is to explore the nature and parameters of a sense of place of deaf children to support optimal learning. The investigation was conducted with hearing-impaired children (age: between 8-19, Gender: 15 male and 15 female) of Yashodhara deaf and blind school at Balangoda, Sri Lanka. A sensory ethnography study was adopted to identify the nature of perception and the parameters of most preferred and least preferred spaces of the learning environment. The common perceptions behind most preferred places in the learning environment were found as being calm and quiet, sense of freedom, volumes characterized by openness and spaciousness, sense of safety, wide spaces, privacy and belongingness, less crowded, undisturbed, availability of natural light and ventilation, sense of comfort and the view of green colour in the surroundings. On the other hand, the least preferred spaces were found to be perceived as dark, gloomy, warm, crowded, lack of freedom, smells (bad), unsafe and having glare. Perception of space by deaf considering the hierarchy of sensory modalities involved was identified as; light - color perception (34 %), sight - visual perception (32%), touch - haptic perception (26%), smell - olfactory perception (7%) and sound – auditory perception (1%) respectively. Sense of freedom (32%) and sense of comfort (23%) were the predominant psychological parameters leading to an optimal sense of place perceived by hearing impaired. Privacy (16%), rhythm (14%), belonging (9%) and safety (6%) were found as secondary factors. Open and wide flowing spaces without visual barriers, transparent doors and windows or open port holes to ease their communication, comfortable volumes, naturally ventilated spaces, natural lighting or diffused artificial lighting conditions without glare, sloping walkways, wider stairways, walkways and corridors with ample distance for signing were identified as positive characteristics of the learning environment investigated.

Keywords: deaf, visual learning environment, perception, sensory ethnography

Procedia PDF Downloads 210
3421 Environmental Refugees in Africa: A Case Study of Sahel Region

Authors: Ahlem Setrallah

Abstract:

Environment has become a phenomenon directly linked to security in recent decades. This security aspect of environment is justified by the challenges that environment problems can have on human life and thus security especially within the scope of human security that is based mainly on the individual rather than on the state. Because Africa is not safe from the global warming and all its consequences on environment, this continent has witnessed many crises related to environment and that have had direct impact on security in Africa. One of those crises is environmental displacement or immigration which was caused by natural disasters like draught, desertification and food shortage to name but a few. This paper aims at shedding light at some important cases in the Africa focusing mainly on the Sahel region. The main research questions that we are trying to answer are the following: 1-What is the relationship between environment and forced immigration in the Sahel region? 2-What is the impact of environmental immigration on Security in the region? 3-How have the states in this region reacted to this crisis? 4-Is the measures taken by those states adequate or not? 5- How to remedy for the limitations of those measures? The paper is based on case study methodology as a way to better understand the relationship between security and environment using library research for data collection and analysis. This paper aims also at presenting some suggesting regarding possible ways of reducing the negative impact of environmental immigration.

Keywords: environment, refugees, Sahel region, security

Procedia PDF Downloads 438
3420 Agro-Measures Influence Soil Physical Parameters in Alternative Farming

Authors: Laura Masilionyte, Danute Jablonskyte-Rasce, Kestutis Venslauskas, Zita Kriauciuniene

Abstract:

Alternative farming systems are used to cultivate high-quality food products and sustain the viability and fertility of the soil. Plant nutrition in all ecosystems depends not only on fertilization intensity or soil richness in organic matter but also on soil physical parameters –bulk density, structure, pores with the optimum moisture and air ratio available to plants. The field experiments of alternative (sustainable and organic) farming systems were conducted at Joniskelis Experimental Station of the Lithuanian Research Centre for Agriculture and Forestry in 2006–2016. The soil of the experimental site was Endocalcari-Endohypogleyic Cambisol (CMg-n-w-can). In alternative farming systems, farmyard manure, straw and catch crops for green manure were used for fertilization both in the soil with low and moderate humus contents. It had a more significant effect in the 0–20 cm depth layer on soil moisture than on other physical soil properties. In the agricultural systems, where catch crops were grown, soil physical characteristics did not differ significantly before their biomass incorporation, except for the moisture content, which was lower in rainy periods and higher in drier periods than in the soil of farming systems without catch crops. Soil bulk density and porosity in the topsoil layer were more dependent on soil humus content than on agricultural measures used: in the soil with moderate humus content, compared with the soil with low humus content, bulk density was by 1.4% lower, and porosity by 1.8% higher. The research findings allow to make improvements in alternative farming systems by choosing appropriate combinations of organic fertilizers and catch crops that have a sustainable effect on soil and maintain the sustainability of soil productivity parameters. Rational fertilization systems, securing the stability of soil productivity parameters and crop rotation productivity will promote the development of organic agriculture.

Keywords: agro-measures, soil physical parameters, organic farming, sustainable farming

Procedia PDF Downloads 106
3419 Preliminary Study on Chinese Traditional Garden Making Based on Water Storage Projects

Authors: Liu Fangxin, Zhao Jijun

Abstract:

Nowadays, China and the world are facing the same problems of flooding, city waterlogging and other environment issues. Throughout history, China had many excellent experiences dealing with the flood, and can be used as a significant reference for contemporary urban construction. In view of this, the research used the method of literature analysis to find out the main water storage measures in ancient cities, including reservoir storage and pond water storage. And it used the case study method to introduce the historical evolution, engineering measures and landscape design of 4 typical ancient Chinese cities in details. Then we found the pond and the reservoir were the main infrastructures for the ancient Chinese city to avoid the waterlogging and flood. At last this paper summed up the historical experience of Chinese traditional water storage and made conclusions that the establishment of a reasonable green water storage facilities could be used to solve today's rain and flood problems, and hoped to give some enlightenment of stormwater management to our modern city.

Keywords: ancient Chinese cities, water storage project, Chinese classical gardening, stormwater management, green facilities

Procedia PDF Downloads 316
3418 Developing a Performance Measurement System for Arts-Based Initiatives: Action Research on Italian Corporate Museums

Authors: Eleonora Carloni, Michela Arnaboldi

Abstract:

In academia, the investigation of the relationship between cultural heritage and corporations is ubiquitous in several fields of studies. In practice corporations are more and more integrating arts and cultural heritage in their strategies for disparate benefits, such as: to foster customer’s purchase intention with authentic and aesthetic experiences, to improve their reputation towards local communities, and to motivate employees with creative thinking. There are diverse forms under which corporations set these artistic interventions, from sponsorships to arts-based training centers for employees, but scholars agree that the maximum expression of this cultural trend are corporate museums, growing in number and relevance. Corporate museums are museum-like settings, hosting artworks of corporations’ history and interests. In academia they have been ascribed as strategic asset and they have been associated with diverse uses for corporations’ benefits, from place for preservation of cultural heritage, to tools for public relations and cultural flagship stores. Previous studies have thus extensively but fragmentally studied the diverse benefits of corporate museum opening to corporations, with a lack of comprehensive approach and a digression on how to evaluate and report corporate museum’s performances. Stepping forward, the present study aims to investigate: 1) what are the key performance measures corporate museums need to report to the associated corporations; 2) how are the key performance measures reported to the concerned corporations. This direction of study is not only suggested as future direction in academia but it has solid basis in practice, aiming to answer to the need of corporate museums’ directors to account for corporate museum’s activities to the concerned corporation. Coherently, at an empirical level the study relies on action research method, whose distinctive feature is to develop practical knowledge through a participatory process. This paper indeed relies on the experience of a collaborative project between the researchers and a set of corporate museums in Italy, aimed at co-developing a performance measurement system. The project involved two steps: a first step, in which researchers derived the potential performance measures from literature along with exploratory interviews; a second step, in which researchers supported the pool of corporate museums’ directors in co-developing a set of key performance indicators for reporting. Preliminary empirical findings show that while scholars insist on corporate museums’ capability to develop networking relations, directors insist on the role of museums as internal supplier of knowledge for innovation goals. Moreover, directors stress museums’ cultural mission and outcomes as potential benefits for corporation, by remarking to include both cultural and business measures in the final tool. In addition, they give relevant attention to the wording used in humanistic terms while struggling to express all measures in economic terms. The paper aims to contribute to corporate museums’ and more broadly to arts-based initiatives’ literature in two directions. Firstly, it elaborates key performance measures with related indicators to report on cultural initiatives for corporations. Secondly, it provides evidence of challenges and practices to handle reporting on these initiatives, because of tensions arising from the co-existence of diverse perspectives, namely arts and business worlds.

Keywords: arts-based initiative, corporate museum, hybrid organization, performance measurement

Procedia PDF Downloads 148