Search results for: services
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3822

Search results for: services

3312 Hotel Deposit Contract and Coverage of Risks Resulting, through Insurance Contracts, in Tourism within the HoReCa Domain: Alternative Dispute Resolution Methods on These Contracts

Authors: Laura Ramona Nae

Abstract:

The issue of risks faced by companies providing tourist and hotel services in the HoReCa field, related to the goods belonging to consumer tourists left in hotel storage, has acquired a new dimension in the context of the economic and geo-political influences that have recently intervened at the global level. Thus, hoteliers and not only had to create contractual mechanisms regarding the risks and to protect the businesses in this field of activity. This situation has led to a reassessment of the importance of insurance, in particular with regard to hotel liability insurance-premises liability, safety, and security of goods. Interpretation of clauses in contracts concluded between hoteliers and tourists consuming hotel services and products, all the more so in the current pandemic context of Covid 19, stressed the increase in the number of disputes generated by them. This article presents a general picture of the significance of the risks related to the activity carried out in the hospitality industry, tourism, respectively within the HoReCa field. The study mainly marks the specificities of the hotel deposit contract, as well as the related insurance specific to the field, as a way to cover these risks. The article also refers to alternative methods of out-of-court settlement of disputes (ADR) in the HoReCa domain, generally used in both Romania and the European Union.

Keywords: consumer tourist, disputes and ADR methods, deposit contract, hotel warehouse and hotelier insurance, hotel services and tourist products, HoReCa

Procedia PDF Downloads 32
3311 Influence of Vocational Guidance Services in Determining the Career Choice of Secondary School Students in Enugu State, Nigeria

Authors: Egbo Anthonia Chinonyelum

Abstract:

This study was designed to identify the extent of the influence of vocational guidance services on career choice of secondary school students in Enugu State. The study was guided by two research questions and two null hypotheses tested at 0.05 level of significance. A sample of 1,054 respondents made of teachers, students and counsellors drawn from the 34 secondary schools from the six educational zones of Enugu State Nigeria was used for the study. The researcher administered the research instruments generated from the randomly selected senior secondary schools from the six educational zones in Enugu State. The data collected from the respondents were analyzed using mean statistics drawn from the responses of senior secondary school students, counsellor and teacher to the questionnaire item. Four point scale was used to measure the opinion of the respondents, such that after the statistical analysis, those items in the questionnaire that have the mean rate of 2.5 and is of great level of influence on the career choice of students. While questionnaire item with the mean below 2.5 were taken as having little extent of influence on career choice of students. The findings in this work showed that there was little extent on the influence of vocational guidance on career choice, choice of subjects and positive attitude of students towards vocational guidance. Based on the findings the researcher recommended that government and other relevant authorities should help by creating the awareness of vocational guidance programme in Schools.

Keywords: vocation, guidance, counselling, services, career, choice

Procedia PDF Downloads 24
3310 Effective Service Provision and Multi-Agency Working in Service Providers for Children and Young People with Special Educational Needs and Disabilities: A Mixed Methods Systematic Review

Authors: Natalie Tyldesley-Marshall, Janette Parr, Anna Brown, Yen-Fu Chen, Amy Grove

Abstract:

It is widely recognised in policy and research that the provision of services for children and young people (CYP) with Special Educational Needs and Disabilities (SEND) is enhanced when health and social care, and education services collaborate and interact effectively. In the UK, there have been significant changes to policy and provisions which support and improve collaboration. However, professionals responsible for implementing these changes face multiple challenges, including a lack of specific implementation guidance or framework to illustrate how effective multi-agency working could or should work. This systematic review will identify the key components of effective multi-agency working in services for CYP with SEND; and the most effective forms of partnership working in this setting. The review highlights interventions that lead to service improvements; and the conditions in the local area that support and encourage success. A protocol was written and registered with PROSPERO registration: CRD42022352194. Searches were conducted on several health, care, education, and applied social science databases from the year 2012 onwards. Citation chaining has been undertaken, as well as broader grey literature searching to enrich the findings. Qualitative, quantitative, mixed methods studies and systematic reviews were included, assessed independently, and critically appraised or assessed for risk of bias using appropriate tools based on study design. Data were extracted in NVivo software and checked by a more experienced researcher. A convergent segregated approach to synthesis and integration was used in which the quantitative and qualitative data were synthesised independently and then integrated using a joint display integration matrix. Findings demonstrate the key ingredients for effective partnership working for services delivering SEND. Interventions deemed effective are described, and lessons learned across interventions are summarised. Results will be of interest to educators and health and social care professionals that provide services to those with SEND. These will also be used to develop policy recommendations for how UK healthcare, social care, and education services for CYP with SEND aged 0-25 can most effectively collaborate and achieve service improvement. The review will also identify any gaps in the literature to recommend areas for future research. Funding for this review was provided by the Department for Education.

Keywords: collaboration, joint commissioning, service delivery, service improvement

Procedia PDF Downloads 77
3309 Culture Dimensions of Information Systems Security in Saudi Arabia National Health Services

Authors: Saleh Alumaran, Giampaolo Bella, Feng Chen

Abstract:

The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of research on the role and impact of an organisation’s cultural dimensions on information security. This research investigated and analysed the role and impact of cultural dimensions on information security in Saudi Arabia health service. Hypotheses were tested and two surveys were carried out in order to collect data and information from three major hospitals in Saudi Arabia (SA). The first survey identified the main cultural-dimension problems in SA health services and developed an initial information security culture framework model. The second survey evaluated and tested the developed framework model to test its usefulness, reliability and applicability. The model is based on human behaviour theory, where the individual’s attitude is the key element of the individual’s intention to behave as well as of his or her actual behaviour. The research identified six cultural dimensions: Saudi national culture, Saudi health service leadership, employees’ trust, technology, multicultural interactions and employees’ job roles. The research also identified a set of cultural sub-dimensions. These include working values and norms, tribe values and norms, attitudes towards women, power sharing, vision, social interaction, respect and understanding, hospital intra-net, hospital employees’ language(s) used, multi-national culture, communication system, employees’ job satisfaction and job security. The research identified that (a) the human behaviour towards medical information in SA is one of the main threats to information security and one of the main challenges to SA health authority, (b) The current situation of SA hospitals’ IS cultures is falling short in protecting medical information due to the current value and norms towards information security, (c) Saudi national culture and employees’ job role are the main dimensions playing major roles in the employees’ attitude, and technology is the least important dimension playing a role in the employees’ attitudes.

Keywords: cultural dimension, electronic health record, information security, privacy

Procedia PDF Downloads 331
3308 Economic Valuation of Forest Landscape Function Using a Conditional Logit Model

Authors: A. J. Julius, E. Imoagene, O. A. Ganiyu

Abstract:

The purpose of this study is to estimate the economic value of the services and functions rendered by the forest landscape using a conditional logit model. For this study, attributes and levels of forest landscape were chosen; specifically, attributes include topographical forest type, forest type, forest density, recreational factor (side trip, accessibility of valley), and willingness to participate (WTP). Based on these factors, 48 choices sets with balanced and orthogonal form using statistical analysis system (SAS) 9.1 was adopted. The efficiency of the questionnaire was 6.02 (D-Error. 0.1), and choice set and socio-economic variables were analyzed. To reduce the cognitive load of respondents, the 48 choice sets were divided into 4 types in the questionnaire, so that respondents could respond to 12 choice sets, respectively. The study populations were citizens from seven metropolitan cities including Ibadan, Ilorin, Osogbo, etc. and annual WTP per household was asked by using the interview questionnaire, a total of 267 copies were recovered. As a result, Oshogbo had 0.45, and the statistical similarities could not be found except for urban forests, forest density, recreational factor, and level of WTP. Average annual WTP per household for forest landscape was 104,758 Naira (Nigerian currency) based on the outcome from this model, total economic value of the services and functions enjoyed from Nigerian forest landscape has reached approximately 1.6 trillion Naira.

Keywords: economic valuation, urban cities, services, forest landscape, logit model, nigeria

Procedia PDF Downloads 100
3307 Factors Affecting U-Computing Use

Authors: Shui Lien Chen, Chen-Yin Kuo

Abstract:

U-computing use has brings many new services of commerce, which could provide a new experience for customer. Location Based Services (LBS) is one of U-computing service. With increase of the smartphone and mobile internet users, there are many small and medium-sized enterprises (SMEs) take LBS in marketing strategy in Taiwan. For example, they would provide Facebook check-in to get a benefit (e.g. discount, free dessert and coupon) to attract customers purchasing. Therefore, this study is to understand which factors would affect SMEs adoption of u-computing and the performances after adopt U-computing. This study collected 187 useful data that were analyzed by SmartPLS 2.0 software. The results of this study are as follows. First, entrepreneurial orientation and market orientation positively affects innovation. Second, business resources and innovation positively affect u-computing use. Finally, U-computing positively affects both business value and customer value.

Keywords: entrepreneurial orientation, market orientation, innovation, business resources, u-computing use, LBS

Procedia PDF Downloads 554
3306 The Iraqi Fibre-to-the-Home Networks, Problems, Challenges, and Solutions along with Less Expense

Authors: Hasanein Hasan, Mohammed Al-Taie, Basil Shanshool, Khalaf Abd-Ali

Abstract:

This approach aims to deal with establishing and operating Iraqi Fibre-To-The-Home (FTTH) projects. The problems they suffer from are organized sabotage, vandalism, accidental damage and poor planning. It provides practical solutions that deal with the aforementioned problems. These solutions consist of both technical and financial clarifications that ensure the achievement of the FTTH network’s stability for the purpose of equipping citizens, private sector companies, and governmental institutions with services, data transmission, the Internet, and other services. They aim to solve problems and obstacles accompanying the operation and maintenance of FTTH projects implemented by the Informatics and Telecommunications Public Company (ITPC)/ Iraqi Ministry of Communications (MoC). This approach takes the FTTH network of AlMaalif-AlMuaslat districts/ Baghdad-Iraq as a case study.

Keywords: CCTV, FTTH, ITPC, MoC, NVR, PTZ

Procedia PDF Downloads 35
3305 The Application of Internet of Things in Healthcare: Building an Interconnected Health Environment

Authors: Quinn Au, Amedeo Carmine, Tauheed Khan Mohd

Abstract:

The Internet of Things (IoT) is emerging as a new development in information technology in recent years, with the potential to improve convenience and efficiency in life. Following the rise of IoT, the Social Internet of Things (SIoT) is another new development in which the benefits of connectivity and user-friendliness from social network services (SNS) are its main features. With the introduction of IoT, the world will be much more modernized, convenient, and industrialized. This paper will discuss the applications of IoT in different sectors such as healthcare services, education, and lifestyle. The privacy challenges that IoT still poses to user data will also be discussed. Finally, an empirical study to evaluate the number of active installed IoT connections in recent years demonstrates the increase in usage of IoT regardless of the privacy challenges. The study also examines some types of IoT devices that are being preferred in the market and predictions from researchers about IoT in the upcoming years.

Keywords: IoT, health care, robotics, social Internet of Things

Procedia PDF Downloads 123
3304 Study on the Factors that Causes the Malaysian Oil and Gas Equipment (OGSE) Companies being under-Developing

Authors: Low Khee Wai

Abstract:

Lossing of opportunity by Malaysian Oil and Gas Services Equipment (OGSE) companies can be a major issue in developing and sustain Malaysia’s own Oil & Gas Industry. Despite the rapid growth of Oil & Gas industry in Malaysia for the past 40 years, Malaysia still not developing sufficient OGSE companies in order to support its own Oil & Gas Industry. In examining the scenario, this study aims to identify the factors causing the under-developing of OGSE companies in Malaysia. Conceptual Review method were used to analyse the factors that cause the under-development of Malaysia OGSE. The 4 factors identified were Time, Cost, Human Resource and Stakeholder Management. This survey explained the phenomena and the challenge of the industry and translated into the factors that cause the under-developing of OGSE companies in Malaysia. Finally, it should bring awareness to the government, authorities, and stakeholder in order to improve the ecology of Oil & Gas Industry in Malaysia.

Keywords: oil & gas in Malaysia, Malaysia local oil & gas services equipment (OGSE), oil & gas project management, project performance

Procedia PDF Downloads 112
3303 Epidemiology of Private Prehospital Calls over the Last Decade in South Africa

Authors: Rhodine Hickman, Craig Wylie, Michael G. McCaul

Abstract:

Introduction: The World Health Organisation has called on governments around the world to recognise emergency conditions as a global public health problem and respond with appropriate steps for effective preventative strategies. However, to understand the magnitude of the problem, good quality epidemiological data is required. This is especially challenging in low and middle-income countries, where routine data is scarce, specifically within the prehospital setting. Methods: We conducted a retrospective cross-sectional study of a national prehospital private sector EMS database. The database being the property of ER24 (private Emergency Medical Services (EMS) company in South Africa) contains claims submitted by the majority of ambulance services in South Africa during the period between 1 January 2008 to 28 March 2017. We used descriptive statistics and control charts to describe the data using STATA 14. Results: 299,257 calls were included in the analysis. The top clinical conditions requiring ambulance transport were transport accidents (10% of total call volume) and ischaemic heart disease (4.4%). The number of transport accidents consistently increased between 2009 and 2014 and reached beyond the limit for normal variation in 2015. Victims of transport accidents required basic life support services 60% of the time with 80% of injuries being minor to moderate. The frequency of ischaemic heart disease had a steady incline from 2011 to 2016. Advanced life support services were required about 50% of the time, with 60% of patients needing urgent care. Conclusion: Transport accidents, followed by ischaemic heart disease, are the most prevalent conditions in South African private EMS. There is a potential to address these conditions by developing the capacity of low and mid-level providers in trauma and advanced EMS providers in ischaemic heart disease.

Keywords: emergency care, emergency medicine, prehospital providers, South Africa

Procedia PDF Downloads 153
3302 eTransformation Framework for the Cognitive Systems

Authors: Ana Hol

Abstract:

Digital systems are in the cognitive wave of the eTransformations and are now extensively aimed at meeting the individuals’ demands, both those of customers requiring services and those of service providers. It is also apparent that successful future systems will not just simply open doors to the traditional owners/users to offer and receive services such as Uber for example does today, but will in the future require more customized and cognitively enabled infrastructures that will be responsive to the system user’s needs. To be able to identify what is required for such systems, this research reviews the historical and the current effects of the eTransformation process by studying: 1. eTransitions of company websites and mobile applications, 2. Emergence of new sheared economy business models as Uber and, 3. New requirements for demand driven, cognitive systems capable of learning and just in time decision making. Based on the analysis, this study proposes a Cognitive eTransformation Framework capable of guiding implementations of new responsive and user aware systems.

Keywords: system implementations, AI supported systems, cognitive systems, eTransformation

Procedia PDF Downloads 215
3301 Ecosystem Services and Excess Water Management: Analysis of Ecosystem Services in Areas Exposed to Excess Water Inundation

Authors: Dalma Varga, Nora Hubayne H.

Abstract:

Nowadays, among the measures taken to offset the consequences of climate change, water resources management is one of the key tools, which can include excess water management. As a result of climate change’s effects and as a result of the frequent inappropriate landuse, more and more areas are affected by the excess water inundation. Hungary is located in the deepest part of the Pannonian Basin, which is exposed to water damage – especially lowland areas that are endangered by floods or excess waters. The periodical presence of excess water creates specific habitats in a given area, which have ecological, functional, and aesthetic values. Excess water inundation affects approximately 74% of Hungary’s lowland areas, of which about 46% is also under nature protection (such as national parks, protected landscape areas, nature conservation areas, Natura 2000 sites, etc.). These data prove that areas exposed to excess water inundation – which are predominantly characterized by agricultural land uses – have an important ecological role. Other research works have confirmed the presence of numerous rare and endangered plant species in drainage canals, on grasslands exposed to excess water, and on special agricultural fields with mud vegetation. The goal of this research is to define and analyze ecosystem services of areas exposed to excess water inundation. In addition to this, it is also important to determine the quantified indicators of these areas’ natural and landscape values besides the presence of protected species and the naturalness of habitats, so all in all, to analyze the various nature protections related to excess water. As a result, a practice-orientated assessment method has been developed that provides the ecological water demand, assimilates to ecological and habitat aspects, contributes to adaptive excess water management, and last but not least, increases or maintains the share of the green infrastructure network. In this way, it also contributes to reduce and mitigate the negative effects of climate change.

Keywords: ecosystem services, landscape architecture, excess water management, green infrastructure planning

Procedia PDF Downloads 290
3300 Strengthening Service Delivery to Improving Cervical Cancer Screening in Southwestern Nigeria: A Pilot Project

Authors: Afolabi K. Esther, Kuye Tolulope, Babafemi, L. Olayemi, Omikunle Yemisi

Abstract:

Background: Cervical cancer is a potentially preventable disease of public significance. All sexually active women are at risk of cervical cancer; however, the uptake and coverage are low in low-middle resource countries. Hence, the programme explored the feasibility of demonstrating an innovative and low-cost system approach to cervical cancer screening service delivery among reproductive-aged women in low–resource settings in Southwestern Nigeria. This was to promote the uptake and quality improvement of cervical cancer screening services. Methods: This study was an intervention project in three senatorial districts in Osun State that have primary, secondary and tertiary health facilities. The project was in three phases; Pre-intervention, Intervention, and Post-intervention. The study utilised the existing infrastructure, facilities and staff in project settings. The study population was nurse-midwives, community health workers and reproductive-aged women (30-49 years). The intervention phase entailed using innovative, culturally appropriate strategies to create awareness of cervical cancer and preventive health-seeking behaviour among women in the reproductive-aged group (30-49) years. Also, the service providers (community health workers, Nurses, and Midwives) were trained on screening methods and treatment of pre-cancerous lesions, and there was the provision of essential equipment and supplies for cervical cancer screening services at health facilities. Besides, advocacy and engagement were made with relevant stakeholders to integrate the cervical cancer screening services into related reproductive health services and greater allocation of resources. The expected results compared the pre and post-intervention using the baseline and process indicators and the effect of the intervention phase on screening coverage using a plausibility assessment design. The project lasted 12 months; visual Inspection with Acetic acid (VIA) screening for the women for six months and follow-up in 6 months for women receiving treatment. Results: The pre-intervention phase assessed baseline service delivery statistics in the previous 12 months drawn from the retrospective data collected as part of the routine monitoring and reporting systems. The uptake of cervical cancer screening services was low as the number of women screened in the previous 12 months was 156. Service personnel's competency level was fair (54%), and limited availability of essential equipment and supplies for cervical cancer screening services. At the post-intervention phase, the level of uptake had increased as the number of women screened was 1586 within six months in the study settings. This showed about a 100-%increase in the uptake of cervical cancer screening services compared with the baseline assessment. Also, the post-intervention level of competency of service delivery personnel had increased to 86.3%, which indicates quality improvement of the cervical cancer screening service delivery. Conclusion: the findings from the study have shown an effective approach to strengthening and improving cervical cancer screening service delivery in Southwestern Nigeria. Hence, the intervention promoted a positive attitude and health-seeking behaviour among the target population, significantly influencing the uptake of cervical cancer screening services.

Keywords: cervical cancer, screening, nigeria, health system strengthening

Procedia PDF Downloads 76
3299 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: embedded computing, internet of things, mobile computing, wireless technologies

Procedia PDF Downloads 295
3298 On Panel Data Analysis of Factors on Economic Advances in Some African Countries

Authors: Ayoola Femi J., Kayode Balogun

Abstract:

In some African Countries, increase in Gross Domestic Products (GDP) has not translated to real development as expected by common-man in his household. For decades, a lot of contests on economic growth and development has been a nagging issues. The focus of this study is to analysing the effects of economic determinants/factors on economic advances in some African Countries by employing panel data analysis. The yearly (1990-2013) data were obtained from the world economic outlook database of the International Monetary Fund (IMF), for probing the effects of these variables on growth rate in some selected African countries which include: Nigeria, Algeria, Angola, Benin, Botswana, Burundi, Cape-Verde, Cameroun, Central African Republic, Chad, Republic Of Congo, Cote di’ Voire, Egypt, Equatorial-Guinea, Ethiopia, Gabon, Ghana, Guinea Bissau, Kenya, Lesotho, Madagascar, Mali, Mauritius, Morocco, Mozambique, Niger, Rwanda, Senegal, Seychelles, Sierra Leone, South Africa, Sudan, Swaziland, Tanzania, Togo, Tunisia, and Uganda. The effects of 6 macroeconomic variables on GDP were critically examined. We used 37 Countries GDP as our dependent variable and 6 independent variables used in this study include: Total Investment (totinv), Inflation (inf), Population (popl), current account balance (cab), volume of imports of goods and services (vimgs), and volume of exports of goods and services (vexgs). The results of our analysis shows that total investment, population and volume of exports of goods and services strongly affect the economic growth. We noticed that population of these selected countries positively affect the GDP while total investment and volume of exports negatively affect GDP. On the contrary, inflation, current account balance and volume of imports of goods and services’ contribution to the GDP are insignificant. The results of our analysis shows that total investment, population and volume of exports of goods and services strongly affect the economic growth. We noticed that population of these selected countries positively affect the GDP while total investment and volume of exports negatively affect GDP. On the contrary, inflation, current account balance and volume of imports of goods and services’ contribution to the GDP are insignificant. The results of this study would be useful for individual African governments for developing a suitable and appropriate economic policies and strategies. It will also help investors to understand the economic nature and viability of Africa as a continent as well as its individual countries.

Keywords: African countries, economic growth and development, gross domestic products, static panel data models

Procedia PDF Downloads 452
3297 Electronic Transparency in Georgia as a Basis for Development of Electronic Governance

Authors: Lasha Mskhaladze, Guram Burchuladze, Khvicha Datunashvili

Abstract:

Technological changes have an impact not only on economic but also on social elements of society which in turn has created new challenges for states’ political systems and their regimes. As a result of unprecedented growth of information technologies and communications digital democracy and electronic governance have emerged. Nowadays effective state functioning cannot be imagined without electronic governance. In Georgia, special attention is paid to the development of such new systems and establishment of electronic governance. Therefore, in parallel to intensive development of information technologies an important priority for public sector in Georgia is the development of electronic governance. In spite of the fact that today Georgia with its economic indicators satisfies the standards of western informational society, and major part of its gross domestic product comes from the service sector (59.6%), it still remains a backward country on the world map in terms of information technologies and electronic governance. E-transparency in Georgia should be based on such parameters as government accountability when the government provides citizens information about their activities; e-participation which involves government’s consideration of external expert assessments; cooperation between officials and citizens in order to solve national problems. In order to improve electronic systems the government should actively do the following: Fully develop electronic programs concerning HR and exchange of data between public organizations; develop all possible electronic services; improve existing electronic programs; make electronic services available on different mobile platforms (iPhone, Android, etc.).

Keywords: electronic transparency, electronic services, information technology, information society, electronic systems

Procedia PDF Downloads 250
3296 Sex Work Practice and Health Seeking Behavior among Hiv Positive Female Sex Workers in Rural Karnataka, India

Authors: Rajeshwari Biradar

Abstract:

Background: The anecdotal evidences indicate that utilization of HIV services especially in Government facilities is affected by stigma and discrimination among HIV positive female sex workers (FSWs) in Karnataka. To our knowledge, there is no quantitative study on this issue. In this study an attempt is made to examine these aspects among positive FSWs exposed to prevention programs. Methods: This is a cross‐ sectional quantitative survey of HIV positive FSWs in the 3 districts of northern Karnataka using a structured questionnaire. The list of HIV Positive FSWs was organized by stratification, and 607 positive FSWs were selected using a systematic random selection. The data were analyzed using both bivariate and multivariate statistical techniques. Results: Half of the sex workers (52%) are traditional (devadasi, dedicated to the temple), 22% are widowed and the mean age is 33 years. The FSWs practice sex work on an average 13 days a month with 2.3 clients per day and was in sex work for about 13 years. Almost all of them (97%) used condom with the clients they had on the last day of sex work. About 74% were ever registered in the ART center and 47% of them reported being ever on ART, of which 6% dropped out. Multivariate results support the hypothesis that the interventions addressing stigma and discrimination enabled accessing health services in the government facilities (AOR=1.37; p=0.17). Conclusions: Based on the results of the study, programs addressing stigma, discrimination and positive prevention can be implemented in places where government health services are not utilized by HIV positive FSWs. However, the study may be limited by the fact that majority of the FSWs entered into sex work through the traditional devadasi system, which may not be the case in other parts of India.

Keywords: sex work, HIV/AIDS, female sex workers, health

Procedia PDF Downloads 159
3295 The History Of Mental Health In The Middle East: Analytical Literature Review

Authors: Mohamad Musa

Abstract:

The history of mental health practices and services in the Middle East region has been deeply intertwined with its rich cultural, religious, and societal context. Tracing back to ancient times, mental health approaches were heavily influenced by the traditions of major monotheistic religions, with a strong emphasis on spiritual and traditional healing methods. As psychiatric institutions and Western medicine gradually gained a foothold in the region during the 20th century, a notable shift occurred. However, the integration of Western psychiatric practices faced significant challenges due to cultural barriers and deeply rooted beliefs. Families and communities often turned to traditional healers and religious practices as their initial recourse for mental health concerns, viewing Western interventions with skepticism and hesitation. Historically, mental health services in the Middle East have been overshadowed by a focus on physical health and the biomedical model. Mental illness carried substantial stigma, with individuals and families often reluctant to disclose mental health struggles due to fears of societal ostracization and discrimination. This stigma posed a significant barrier to accessing and accepting formal mental health support. Later in the 20th century, governments in the Middle East began recognizing the need for modernizing mental health services and integrating them into the broader healthcare system. However, this process was hindered by several factors, including limited resources, inadequate training for healthcare professionals, and ongoing conflicts and instability in certain regions, which disrupted the delivery of mental health services. As the 21st century progressed, several Middle Eastern nations, particularly those in the Arabian Gulf region, began implementing national mental health strategies and legislative reforms to address the growing need for comprehensive mental health care. These efforts aimed to destigmatize mental illness, protect the rights of individuals with mental health conditions, and promote public awareness and education. Despite these positive developments, the historical legacy of stigma, cultural barriers, and limited resources continues to pose challenges in the provision of accessible and culturally responsive mental health services across the diverse populations of the Middle East.

Keywords: mental health, history, middle east, literature review

Procedia PDF Downloads 12
3294 A Development of Practice Guidelines for Surgical Safety Management to Reduce Undesirable Incidents from Surgical Services in the Operating Room of Songkhla Hospital, Thailand

Authors: Thitima Plejai

Abstract:

The practice in the operating room has been continually performed according to standards of services; however, undesirable incidents from surgical services are found such as surgical complications in the operating room. This participation action research aimed to develop practice guidelines for surgical safety management to reduce undesirable incidents from surgical services in the operating room of Songkhla Hospital. The target population was all 84 members of the multidisciplinary team who were involved in surgical services in the operating room consisting of 28 surgeons from five branches of surgery, 27 anesthetists and nurse anesthetists, and 29 surgical nurses. The data were collected through in-depth interviews, and non-participatory observations. The research instrument was tested by three experts, and the steps of the development consisted of four cycles, each consisting of assessment, planning, practice, practice reflection, and improvement until every step is practicable. The data were validated through triangulation research method, analyzed through content analysis and statistical analysis with number and percentage. The results of the development of practice guidelines surgical safety management to reduce undesirable incidents from surgical services could be concluded as follows. 1) The multidisciplinary team in surgery participated in the needs assessment for development of practice guidelines for surgical patient safety, and agreed on adapting the WHO Surgical Safety Checklists for use. 2) The WHO Surgical Safety Checklists was implemented, and meetings were held for the multidisciplinary team in surgery and the organizational risk committee to improve the practice guidelines to make them more practicable. 3) The multidisciplinary team consisting of surgeons from five branches of surgery, anesthetists, nurse anesthetists, surgical nurses, and the organizational risk committee announced policy on safety for surgical patients; the organizational risk committee designated the Surgical Safety Checklist as an instrument for surgical patient safety. The results of the safety management found that the surgical team members who could follow 100 percent of the guidelines were: professional nurses who checked patient identity and information before taking the patient to the operating room and kept complete records of data on the patients; surgical nurses who checked readiness of the patient before surgery; nurse anesthetists who assessed readiness before administering anesthetic drugs, and confirmed correctness of the patient; and circulating perioperative nurses who gave confirmation to the surgical team after completion of the surgery. The rates of undesirable incidents (surgical complications rates) before and after the implementation of the surgical safety management were 1.60 percent and 0.66 percent, respectively. The satisfaction of the surgery-related teams towards the use of the guidelines was 89 percent. The practice guidelines for surgical safety management to reduce undesirable incidents were taken as guidelines for surgical safety that the multidisciplinary team involved in the surgical process implemented correctly and in the same direction and clearly reduced undesirable incidents in surgical patients.

Keywords: practice guidelines, surgical safety management, reduce undesirable incidents, operating Room

Procedia PDF Downloads 273
3293 Post-Experts in Polish Mainstream Media: Quantitative and Qualitative Analysis of Selected Information Programs

Authors: Aldona Guzik

Abstract:

Experts have always played a special role in society. Drawing on their opinions was and most certainly is one of the most important strategies that direct people when they make decisions; something often used with the aim of exerting influence and ensuring social conformism. Many factors decide on who becomes an expert. The most important of these have hitherto been: the possession of extensive knowledge, charisma, authority as well as experience. Increasingly, however, these factors are insufficient and may even be deemed unnecessary. This state of affairs has been brought about (among other things) by the development of the media and the media’s influence on our lives. The inspiration to write the present article has its grounding in the book by Tom Nichols The Death of Expertise. The Campaign Against Established Knowledge and Why it Matters, in which the author claims that in our present-day open society experts and their expertise count for increasingly less for everyone who has unlimited access to the Internet and education. This has, in turn, resulted in the creation of so-called ‘collective wisdom,’ which is placed higher than any of the specialist knowledge proclaimed by experts. However, this is an incomplete picture, because admittedly, access to knowledge is nowadays unlimited, but on the other hand, the ubiquitous risk causes that the expert is someone who allows them to minimize it. Therefore, a modern society so readily refers to their opinion; from the smallest matters, eg home appliance, to important political issues. Hence, many information services include numerous experts (scientists, journalists, specialists, celebrities), whose task is to explain to the viewers in a simple way the presented reality. However, more and more often their role is also to give credence to what they explain. Hence the questions arise: who are the experts, what is their typology and what roles they play in Polish information services? To answer them, quantitative and qualitative research was used, such as analysis of lists of 100 most influential experts, analysis of expert profiles and their statements in three differentiated information services (TVN - commercial, TVP1 - public, TV Trwam - non-commercial/religious). They will be the basis for answering the above-mentioned questions and, above all, determining their role in information services in Poland.

Keywords: experts, media, public discours, symbolic elites

Procedia PDF Downloads 106
3292 Fostering Social Challenges Within Entrepreneur University Systems: The Case of UPV

Authors: Cristobal Miralles Insa

Abstract:

The network of chairs of the "Valencian Public System of Social Services" (VPSSS) is sponsored by the Valencian Institute of Training, Research, and Quality in Social Services and aims to promote research, dissemination, and evaluation of the needs that arise in the field of the public system of social services. It also seeks to transfer knowledge to foster the development of public policies in this field. Given that it is an Interuniversity Chair among the five public universities in Valencia, there is coordination of complementary themes and roles for this objective, with Universitat Politènica de València focusing primarily on promoting innovation and social entrepreneurship to address multiple social challenges through its platform INSSPIRA. This approach is aimed at the entire university community and its various interest groups, carrying out research, teaching, and dissemination activities that promote social inclusion, personal development, and autonomy for groups in situations of vulnerability, lack of protection, dependence, or social urgency. Although it focuses on the Valencian context, both the issues in this context and the tools in process to address them, often have a universal and scalable character and has been inspiring for the innovation system of UPV. This entrepreneurial incubator goes along from early stages of students on the campus until the so-called “StartUPV” system, where students are challenged with social problems that require creative solutions. Therefore, the Chair is conceived with a holistic spirit and an inspiring vocation that engages the whole university community. In this communication, it is described the entities and individuals participating in this UPV Chair of VPSSS, followed by the presentation of different work lines and objectives for the chair. Subsequently, a description of various activities undertaken to promote innovation in social services are described, where support to teaching and extracurricular activities in this field are exposed. It must be noted that some awareness and dissemination of activities are carried out in a transversal mode as they contribute to different objectives simultaneously; with special focus on Learning-Service approaches that achieved very good results which are also summarized.

Keywords: social innovation, entrepeneurship, university, vulnerable sectors

Procedia PDF Downloads 36
3291 A Deforestation Dilemma: An Integrated Approach to Conservation and Development in Madagascar

Authors: Tara Moore

Abstract:

Madagascar is one of the regions of the world with the highest biodiversity, with more than 600 new species discovered in just the last decade. In parallel with its record-breaking biodiversity, Madagascar is also the tenth poorest country in the world. The resultant socio-economic pressures are leading to a highly threatened environment. In particular, deforestation is at the core of biodiversity and ecosystem loss, primarily from slash and burn agriculture and illegal rosewood tree harvesting. Effective policy response is imperative for improved conservation in Madagascar. However, these changes cannot come from the current, unstable government institutions. After a violent and politically turbulent coup in 2009, any effort to defend Madagascar's biodiversity has been eclipsed by the high corruption of government bodies. This paper presents three policy options designed for a private donor to invest in conservation in Madagascar. The first proposed policy consists of payments for ecosystem services model, which involves paying local Malagasy women to reforest nearby territories. The second option is a micro-irrigation system proposal involving relocating local Malagasy out of the threatened forest region. The final proposition is captive breeding funding for the Madagascar Fauna and Flora Group, which could then lead to new reintroductions in the threatened northeastern rainforests. In the end, all three options present feasible, impactful options for a conservation-minded major donor. Ideally, the policy change would involve a combination of all three options, as each provides necessary development and conservation re-structuring goals. Option one, payments for ecosystem services, would be the preferred choice if there were only enough funding for one project. The payments for ecosystem services project both support local populations and promotes sustainable development while reforesting the threatened Marojejy National Park. Regardless of the chosen policy solution, any support from a donor will make a huge impact if it supports both sustainable development and biodiversity conservation.

Keywords: captive breeding, cnservation policy, lemur conservation, Madagascar conservation, payments for ecosystem services

Procedia PDF Downloads 112
3290 An E-Government Implementation Model for Peruvian State Companies Based on COBIT 5.0: Definition and Goals of the Model

Authors: M. Bruzza, M. Tupia, F. Rodríguez

Abstract:

As part of the regulatory compliance process and the streamlining of public administration, the Peruvian government has implemented the National E-Government Plan in all state institutions with the aim of providing citizens with solid services based on the use of Information and Communications Technologies (ICT). As part of the regulations, the requisites to be met by public institutions have been submitted. However, the lack of an implementation model was detected, one that can serve as a guide to such institutions in order to materialize the organizational and technological structures needed, which allow them to provide the required digital services. This paper develops an implementation model of electronic government (e-government) for Peru’s state institutions, in compliance with current regulations based on a COBIT 5.0 framework. Furthermore, the paper introduces phase 1 of this model: business and IT goals, the goals cascade and the future model of processes.

Keywords: e-government, u-government, COBIT, implementation model

Procedia PDF Downloads 303
3289 Increased Availability and Accessibility of Family Planning Services: An Approach Leading to Improved Contraceptive Uptake and Reproductive Behavior of Women Living in Pakistan

Authors: Lutaf Ali, Haris Ahmed, Hina Najmi

Abstract:

Background: Access, better counseling and quality in the provision of family planning services remain big challenges. Sukh Initiative (a project of three different foundations) is a multi-pronged approach, working in one million underserved population residing peri urban slums in Karachi and providing door to door services by lady health workers (LHWs) and community health workers (CHWs) linked with quality family planning and reproductive (FP/RH) services both at public and private health care facilities. Objective: To assess the improvement in family planning and reproductive health behavior among MWRAs by improving access in peri-urban-underserved population of Karachi. Methodology: Using cross sectional study design 3866 married women with reproductive age (MWRAs) were interviewed in peri urban region of Karachi during November 2016 to January 2017. All face to face structured interviews were conducted with women aged 15-49 currently living with their husbands. Based on the project intervention question on reproductive health were developed and questions on contraceptive use were adopted from PDHS- Pakistan 2013. Descriptive and inferential analysis was performed on SPSS version 22. Results: 65% of population sample are literate, 51% women were in young age group- 15–29. On the poverty index, 6% of the population sample living at national poverty line 1.25$ and 52% at 2.50$. During the project years 79% women opted for facility based delivery; private facilities are the priority choice. 61.7% women initiated the contraceptive use in last two years (after the project).Use of family planning was increased irrespective of education level and poverty index- about 55.5% women with no formal education are using any form of contraception and trend of current modern contraceptives across poverty scores strata equally distributed amongst all groups. Age specific modern contraceptive prevalence rate (mCPR)(between 25-34) was found to be 43.8%. About 23% of this contraceptive ascertained from door to door services- short acting, (pills and condoms) are common, 29.5% from public facilities and 47.6% are from public facilities in which long acting and permanent method most received methods. Conclusion: Strategy of expanding access and choice in the form of providing family planning information and supplies at door step and availability of quality family planning services in the peripheries of underserved may improve the behavior of women regarding FP/RH.

Keywords: access, family planning, underserved population, socio-demographic facts

Procedia PDF Downloads 168
3288 Protective Custody in Child Protection: Reflection of Residential Care Workers in the Philippines

Authors: Hazel S. Cometa-Lamberte

Abstract:

This paper presents the residential care workers reflections in working with children who were under protective custody and placed in a residential care facility for children. Key informant interviews and focus group discussion were employed in this study to analyze the views of residential care workers on the programs and services and case management system in residential care for children. Results suggest that working in a residential care facility for children needs the interplay of both the worker’s personal and professional values, knowledge and skills in working with children. Analyzing the residential care workers experiences in handling children in residential care facilities is vital for the improvement of the policies, programs and services, the repertoire of techniques and facilitate the creation of a new social work practice framework/model in child protection specifically in residential care facilities.

Keywords: child protection, residential care, residential care workers, social workers

Procedia PDF Downloads 144
3287 Short and Long Term Effects of an Attachment-Based Intervention on Child Behaviors

Authors: Claire Baudry, Jessica Pearson, Laura-Emilie Savage, George Tarbulsy

Abstract:

Over the last fifty years, maternal sensitivity and child development among vulnerable families have been a priority for researchers. For this reason, attachment-based interventions have been implemented and been shown to be effective in enhancing child development. Most of the time, child outcomes are measured shortly after the intervention. Objectives: The goal of the study was to investigate the effects of an attachment-based intervention on child development shortly after the intervention ended and one-year post-intervention. Methods: Over the seventy-two mother-child dyads referred by Child Protective Services in the province of Québec, Canada, forty-two were included in this study: 24 dyads who received 6 to 8 intervention sessions and 18 dyads who did not. Intervention and none intervention dyads were matched for the following variables: duration of child protective services, the reason for involvement with child protection, age, sex, and family status. Internalizing and externalizing behaviors were measured 3 and 12 months after the end of the intervention when the average age of children were respectively 45 and 54 months old. Findings: Independent-sample t-tests were conducted to compare scores between the two groups and the two data collection times. In general, on differences observed between the two groups three months after the intervention ended, just a few of them were still present nine months later. Conclusions: This first set of analyses suggests that the effects of attachment-based intervention observed three months following the intervention are not lasting for most of them. Those results inform us of the importance of considering the possibility to offer more attachment-based intervention sessions for those highly vulnerable families.

Keywords: attachment-based intervention, child behaviors, child protective services, highly vulnerable families

Procedia PDF Downloads 107
3286 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 85
3285 The Impact of Information Communication Technology on Promoting Travel Trade Industry in a Developing Economy, Case Study Nigeria

Authors: Murtala Mohammed Alamai, Abdullahi Marshal Idris, Adama Idris

Abstract:

Today, marketing does not only involve selecting target markets, but it also involves communicating with the customers through various means to put across your selling point. Modern marketing involves driving new product development based on customer needs by getting feedback from them. Utilizing the latest technology for better communication with the customers is the latest advancement in Marketing in the 21st century. The survey approach was used where a sample of tourist destinations across the six geographical zones of the country at random was done to ascertain the use of information communication systems in promoting their products and or services, the findings revealed that only a few utilize these modern advanced means in marketing and promoting their products and a need to develop effective and up to date online services for marketing was proffered as solutions to the findings observed.

Keywords: information, communication, travel, trade, promotion

Procedia PDF Downloads 302
3284 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 352
3283 User Requirements Analysis for the Development of Assistive Navigation Mobile Apps for Blind and Visually Impaired People

Authors: Paraskevi Theodorou, Apostolos Meliones

Abstract:

In the context of the development process of two assistive navigation mobile apps for blind and visually impaired people (BVI) an extensive qualitative analysis of the requirements of potential users has been conducted. The analysis was based on interviews with BVIs and aimed to elicit not only their needs with respect to autonomous navigation but also their preferences on specific features of the apps under development. The elicited requirements were structured into four main categories, namely, requirements concerning the capabilities, functionality and usability of the apps, as well as compatibility requirements with respect to other apps and services. The main categories were then further divided into nine sub-categories. This classification, along with its content, aims to become a useful tool for the researcher or the developer who is involved in the development of digital services for BVI.

Keywords: accessibility, assistive mobile apps, blind and visually impaired people, user requirements analysis

Procedia PDF Downloads 95