Search results for: internet psychological clinics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3725

Search results for: internet psychological clinics

3155 Intervention Guide for Holistic Needs and Coping Strategies of Cancer Patients

Authors: Arvin Baes

Abstract:

This study was conducted to assess the holistic needs of cancer patients in terms of physiological, psychological, social, and spiritual needs and to determine how they respond through coping. It was conducted from January-April 2018 from various hospitals in Laguna, with 20 respondents. It utilized a survey descriptive type of research, a checklist type of questionnaire, and purposive sampling in selecting the respondents. It was found out that in terms of physiological needs, fatigue is the most common symptoms they experienced. In terms of psychological, social, and spiritual needs, most of the patients experienced a significant concern. Meanwhile, in coping, religion dominates among the 14 strategies followed by Use of Emotional Support and Positive Reframing, and Substance Use obtained the lowest response. Most of the respondents were female, and its significant relationship in terms of Positive Reframing agrees significantly. In coping and civil status, Positive Reframing and Humor are significant among married respondents. In coping and stage of cancer, 'Positive Reframing' and 'Humor' are significant with the stage of cancer. In coping and treatment modalities, Active Coping, Use of Emotional Support, and Religion are significantly related to patients’ treatment modalities. There is also a significant relationship between Active Coping and Physiological Needs, Religion and Psychological Needs, and Self-blaming and Psychological, Social, and Spiritual Needs. Thus, it is concluded that holistic needs and coping are essential to each other to meet the wholeness of cancer patients. A formulated care intervention program would be beneficial among this group of patients.

Keywords: coping strategies, cancer, cancer patients, holistic needs

Procedia PDF Downloads 109
3154 Design and Implementation a Virtualization Platform for Providing Smart Tourism Services

Authors: Nam Don Kim, Jungho Moon, Tae Yun Chung

Abstract:

This paper proposes an Internet of Things (IoT) based virtualization platform for providing smart tourism services. The virtualization platform provides a consistent access interface to various types of data by naming IoT devices and legacy information systems as pathnames in a virtual file system. In the other words, the IoT virtualization platform functions as a middleware which uses the metadata for underlying collected data. The proposed platform makes it easy to provide customized tourism information by using tourist locations collected by IoT devices and additionally enables to create new interactive smart tourism services focused on the tourist locations. The proposed platform is very efficient so that the provided tourism services are isolated from changes in raw data and the services can be modified or expanded without changing the underlying data structure.

Keywords: internet of things (IoT), IoT platform, serviceplatform, virtual file system (VSF)

Procedia PDF Downloads 498
3153 Study on Energy Performance Comparison of Information Centric Network Based on Difference of Network Architecture

Authors: Takumi Shindo, Koji Okamura

Abstract:

The first generation of the wide area network was circuit centric network. How the optimal circuit can be signed was the most important issue to get the best performance. This architecture had succeeded for line based telephone system. The second generation was host centric network and Internet based on this architecture has very succeeded world widely. And Internet became as new social infrastructure. Currently the architecture of the network is based on the location of the information. This future network is called Information centric network (ICN). The information-centric network (ICN) has being researched by many projects and different architectures for implementation of ICN have been proposed. The goal of this study is to compare performances of those ICN architectures. In this paper, the authors propose general ICN model which can represent two typical ICN architectures and compare communication performances using request routing. Finally, simulation results are shown. Also, we assume that this network architecture should be adapt to energy on-demand routing.

Keywords: ICN, information centric network, CCN, energy

Procedia PDF Downloads 331
3152 Information Technology Application for Knowledge Management in Medium-Size Businesses

Authors: S. Thongchai

Abstract:

Result of the study on knowledge management systems in businesses was shown that the most of these businesses provide internet accessibility for their employees in order to study new knowledge via internet, corporate website, electronic mail, and electronic learning system. These business organizations use information technology application for knowledge management because of convenience, time saving, ease of use, accuracy of information and knowledge usefulness. The result indicated prominent improvements for corporate knowledge management systems as the following; 1) administrations must support corporate knowledge management system 2) the goal of corporate knowledge management must be clear 3) corporate culture should facilitate the exchange and sharing of knowledge within the organization 4) cooperation of personnel of all levels must be obtained 5) information technology infrastructure must be provided 6) they must develop the system regularly and constantly.

Keywords: business organizations, information technology application, knowledge management systems, prominent improvements

Procedia PDF Downloads 382
3151 Adaptation and Habituation to new Complete Dentures

Authors: Mohamed Khaled Ahmed Azzam

Abstract:

Complete dentures, a non biological appliance, were and are still used to replace missing teeth and surrounding structures. Its main objectives are esthetics, speech, function and psychological state improvement. Dentists must realize that, just as dentate patients vary in their dental treatment complexity; edentulous patients also vary in the difficulty of their treatment plan. There are two main problems facing the removable Prosthodontist which harden his/her task how to please his patient with their new dentures being: Denture construction which however its fabrication is at the highest standards still is an unpleasant experience to all patients in the beginning and improves by time. This varies from one to several years according to the patient’s attitude, age, gender, socio-economical level and culture. The second problem of edentulous patients is both physical and psychological. Good interview, communication and note how patients present themselves for the concerns of their appearance, overall attitude and expectations concerning treatment is very important physically. On the psychological aspect patients have great difficulty to cope with new dentures to the extent of not using them at all. Hence their mind preparation should be commenced from day one by more than one method. This had a great impact on the acceptance which led to habituation to their dentures and patients were appreciative and pleased. In conclusion to successfully treat edentulous patients a great deal of information is required to complete a proper diagnosis, including patient mental attitude, past and present medical and dental conditions, and extra and intra-oral examinations. In addition to the clinical experience and skill of the whole dental team.

Keywords: complete dentures, edentulous patients, management of denture, psychological mind preparation

Procedia PDF Downloads 248
3150 An Evaluation of Medical Waste in Health Facilities through Data Envelopment Analysis (DEA) Method: Turkey-Amasya Public Hospitals Union Model

Authors: Murat Iskender Aktaş, Sadi Ergin, Rasime Acar Aktaş

Abstract:

In the light of fast-paced changes and developments in the health sector, the Ministry of Health started a new structuring with decree law numbered 663 within the scope of the Project of Transformation in Health. Accordingly, hospitals should ensure patient satisfaction through more efficient, more effective use of resources and sustainable finance by placing patients in the centre and should operate to increase efficiency to its maximum level while doing these. Within this study, in order to find out how efficient the hospitals were in terms of medical waste management between the years 2011-2014, the data from six hospitals of Amasya Public Hospitals Union were evaluated separately through Data Envelopment Analysis (DEA) method. First of all, input variables were determined. Input variables were the number of patients admitted to polyclinics, the number of inpatients in clinics, the number of patients who were operated and the number of patients who applied to the laboratory. Output variable was the cost of medical wastes in Turkish liras. Each hospital’s total medical waste level before and after public hospitals union; the amounts of average medical waste per patient admitted to polyclinics, per inpatient in clinics, per patient admitted to laboratory and per operated patient were compared within each group. In addition, average medical waste levels and costs were compared for Turkey in general and Europe in general. Paired samples t-test was used to find out whether the changes (increase-decrease) after public hospitals union were statistically significant. The health facilities that were unsuccessful in terms of medical waste management before and after public hospital union and the factors that caused this failure were determined. Based on the results, for each health facility that was ineffective in terms of medical waste management, the level of improvement required for each input was determined. The results of the study showed that there was an improvement in medical waste management applications after the health facilities became a member of public hospitals union; their medical waste levels were lower than the average of Turkey and Europe while the averages of cost of disposal were the highest.

Keywords: medical waste management, cost of medical waste, public hospitals, data envelopment analysis

Procedia PDF Downloads 413
3149 21st Century Business Dynamics: Acting Local and Thinking Global through Extensive Business Reporting Language (XBRL)

Authors: Samuel Faboyede, Obiamaka Nwobu, Samuel Fakile, Dickson Mukoro

Abstract:

In the present dynamic business environment of corporate governance and regulations, financial reporting is an inevitable and extremely significant process for every business enterprise. Several financial elements such as Annual Reports, Quarterly Reports, ad-hoc filing, and other statutory/regulatory reports provide vital information to the investors and regulators, and establish trust and rapport between the internal and external stakeholders of an organization. Investors today are very demanding, and emphasize greatly on authenticity, accuracy, and reliability of financial data. For many companies, the Internet plays a key role in communicating business information, internally to management and externally to stakeholders. Despite high prominence being attached to external reporting, it is disconnected in most companies, who generate their external financial documents manually, resulting in high degree of errors and prolonged cycle times. Chief Executive Officers and Chief Financial Officers are increasingly susceptible to endorsing error-laden reports, late filing of reports, and non-compliance with regulatory acts. There is a lack of common platform to manage the sensitive information – internally and externally – in financial reports. The Internet financial reporting language known as eXtensible Business Reporting Language (XBRL) continues to develop in the face of challenges and has now reached the point where much of its promised benefits are available. This paper looks at the emergence of this revolutionary twenty-first century language of digital reporting. It posits that today, the world is on the brink of an Internet revolution that will redefine the ‘business reporting’ paradigm. The new Internet technology, eXtensible Business Reporting Language (XBRL), is already being deployed and used across the world. It finds that XBRL is an eXtensible Markup Language (XML) based information format that places self-describing tags around discrete pieces of business information. Once tags are assigned, it is possible to extract only desired information, rather than having to download or print an entire document. XBRL is platform-independent and it will work on any current or recent-year operating system, or any computer and interface with virtually any software. The paper concludes that corporate stakeholders and the government cannot afford to ignore the XBRL. It therefore recommends that all must act locally and think globally now via the adoption of XBRL that is changing the face of worldwide business reporting.

Keywords: XBRL, financial reporting, internet, internal and external reports

Procedia PDF Downloads 283
3148 The Application of Fuzzy Set Theory to Mobile Internet Advertisement Fraud Detection

Authors: Jinming Ma, Tianbing Xia, Janusz Getta

Abstract:

This paper presents the application of fuzzy set theory to implement of mobile advertisement anti-fraud systems. Mobile anti-fraud is a method aiming to identify mobile advertisement fraudsters. One of the main problems of mobile anti-fraud is the lack of evidence to prove a user to be a fraudster. In this paper, we implement an application by using fuzzy set theory to demonstrate how to detect cheaters. The advantage of our method is that the hardship in detecting fraudsters in small data samples has been avoided. We achieved this by giving each user a suspicious degree showing how likely the user is cheating and decide whether a group of users (like all users of a certain APP) together to be fraudsters according to the average suspicious degree. This makes the process more accurate as the data of a single user is too small to be predictable.

Keywords: mobile internet, advertisement, anti-fraud, fuzzy set theory

Procedia PDF Downloads 176
3147 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 73
3146 Students’ Perception of Their M-Learning Readiness

Authors: Sulaiman Almutairy, Trevor Davies, Yota Dimitriadi

Abstract:

This paper presents study investigating how to understand better the psychological readiness for mobile learning (m-learning) among Saudi students, while also evaluating m-learning in Saudi Arabia-a topic that has not yet received adequate attention from researchers. Data was acquired through a questionnaire administered to 131 Saudi students at UK universities, in July 2013. The study confirmed that students are confident using mobile devices in their daily lives and that they would welcome more opportunities for mobile learning. The findings indicated that Saudi higher education students are highly familiar with, and are psychologically ready for, m-learning.

Keywords: m-learning, mobile technologies, psychological readiness, higher education

Procedia PDF Downloads 515
3145 Trauma inside and Out: A Descriptive Cross-Sectional Study of Family, Community and Psychological Wellbeing amongst Pediatric Victims of Interpersonal Violence

Authors: Mary Bernardin, Margie Batek, Joseph Moen, David Schnadower

Abstract:

Background: Exposure to violence not only has negative psychological impact on children but is a risk factor for children becoming recurrent victims of violence. However, little is known regarding the degree to which child victims of violence are exposed to trauma at home and in their community, or its association with specific psychological diagnoses. Objective: The aims of this study were to perform in-depth characterizations of family, community and psychological wellness amongst pediatric victims of interpersonal violence. Methods: As standard of care at the Saint Louis Children’s Hospital pediatric emergency department (ED), social workers perform in-depth interviews with all children presenting due to violent interpersonal encounters. In this retrospective cross-sectional study, we collected data from social work interviews on family structure, exposure to violence in the community and the home, as well as history of psychological diagnoses amongst children ages 8-19 years who presented to the ED for injuries related to interpersonal violence from 2014-2017. Results: A total of 407 patients presenting to the ED for an interpersonal violent encounter were analyzed. The average age of studied youths was 14.7 years (SD 2.5). Youths were 97.5% African American ethnicity and 66.6% male. 67.8% described their home having a nonnuclear family structure, 50% of which reported living with a single mother. Of the 21% who reported having incarcerated family members, 56.3% reported their father being incarcerated, 15% reported their mother being incarcerated, and 12.5% reported multiple family members being incarcerated. 11.3% reported witnessing domestic violence in their home. 12.8% of youths reported some form of child abuse. The type of child abuse was not specified in 29.3% of cases, but physical abuse (32.8%) followed by sexual abuse (22.4%) were the most commonly reported. 14.5% had history of placement in foster care and/or adoption. 64% reported having witnessed violence in their community. 30.2% reported having lost friends or family due to violence, and of those, 26.4% reported the loss of a cousin, 18.9% the loss of a friend, 16% the loss of their father, and 12.3% the loss of their brother due to violence. Of the 22.4% youths with psychiatric diagnose(s), 48.4% had multiple diagnoses, the most common of which were ADD/ADHD (62.6%), followed by depression (31.9%), bipolar disorder (27.5%) and anxiety (15.4%). Conclusions: A remarkable proportion of children presenting to EDs due to interpersonal violence have a history of exposure to instability and violence in their homes and communities. Additionally, psychological diagnoses are frequent among pediatric victims of violence. More research is needed to better understand the association between trauma exposure, psychological health and violent victimization amongst children.

Keywords: community violence, emergency department, pediatric interpersonal violence, pediatric trauma, psychological effects of trauma

Procedia PDF Downloads 233
3144 The Effect of Theory of Mind Training on Adolescents with Low Social Cognition and Eudaimonic Well-Being

Authors: Leema Jacob

Abstract:

The concept of psychological well-being is complex and has familiar use not only in psychology but also in the area of lifespan development. Eudaimonic well-being is finding a purpose and meaning in life, and this depends on both the individual and society, especially during adolescence; the social-cognitive environment can be decisive. The social environment of adolescents, including family, school, and friends, is recognized as an essential context for successful human life. The development of mature social relationships is also undoubtedly important. Theory of Mind is an emerging domain in cognitive neuroscience that involves the ability to attribute mental states to oneself and others. ToM skills training constitutes a new aspect of the adolescent’s social development, including four domains: cognitive ToM, affective ToM, and an inter-intra-personal understanding of social norms. Still, little effort has been made to promote this training as a modality to foster their psychological well-being. This study aims to use the eudaimonic approach to evaluate psychological well-being with a quasi-experimental research design (pre-post-test). The major objective of the study was to identify the effect of ToM skills training on the eudaimonic well-being of adolescents with low social cognition. The data was analyzed to find their effect size from a sample of 74 adolescents from India between 17 and 19 years old. The result revealed that ToM skills training has a positive outcome on the well-being of adolescents post-training. The results are discussed based on the effect of ToM skills training on psychological well-being during adolescence, as well as on the importance of focusing on mental health as a developmental asset that can potentially influence mental well-being in the future.

Keywords: ToM training, adolescents, eudaimonic well-being, social cognition

Procedia PDF Downloads 70
3143 Pre-Operative Psychological Factors Significantly Add to the Predictability of Chronic Narcotic Use: A Two Year Prospective Study

Authors: Dana El-Mughayyar, Neil Manson, Erin Bigney, Eden Richardson, Dean Tripp, Edward Abraham

Abstract:

Use of narcotics to treat pain has increased over the past two decades and is a contributing factor to the current public health crisis. Understanding the pre-operative risks of chronic narcotic use may be aided through investigation of psychological measures. The objective of the reported study is to determine predictors of narcotic use two years post-surgery in a thoracolumbar spine surgery population, including an array of psychological factors. A prospective observational study of 191 consecutively enrolled adult patients having undergone thoracolumbar spine surgery is presented. Baseline measures of interest included the Pain Catastrophizing Scale (PCS), Tampa Scale for Kinesiophobia, Multidimensional Scale for Perceived Social Support (MSPSS), Chronic Pain Acceptance Questionnaire (CPAQ-8), Oswestry Disability Index (ODI), Numeric Rating Scales for back and leg pain (NRS-B/L), SF-12’s Mental Component Summary (MCS), narcotic use and demographic variables. The post-operative measure of interest is narcotic use at 2-year follow-up. Narcotic use is collapsed into binary categories of use and no use. Descriptive statistics are run. Chi Square analysis is used for categorical variables and an ANOVA for continuous variables. Significant variables are built into a hierarchical logistic regression to determine predictors of post-operative narcotic use. Significance is set at α < 0.05. Results: A total of 27.23% of the sample were using narcotics two years after surgery. The regression model included ODI, NRS-Leg, time with condition, chief complaint, pre-operative drug use, gender, MCS, PCS subscale helplessness, and CPAQ subscale pain willingness and was significant χ² (13, N=191)= 54.99; p = .000. The model accounted for 39.6% of the variance in narcotic use and correctly predicted in 79.7% of cases. Psychological variables accounted for 9.6% of the variance over and above the other predictors. Conclusions: Managing chronic narcotic usage is central to the patient’s overall health and quality of life. Psychological factors in the preoperative period are significant predictors of narcotic use 2 years post-operatively. The psychological variables are malleable, potentially allowing surgeons to direct their patients to preventative resources prior to surgery.

Keywords: narcotics, psychological factors, quality of life, spine surgery

Procedia PDF Downloads 141
3142 Communication Tools Used in Teaching and Their Effects: An Empirical Study on the T. C. Selcuk University Samples

Authors: Sedat Simsek, Tugay Arat

Abstract:

Today's communication concept, which has a great revolution with the printing press which has been found by Gutenberg, has no boundary thanks to advanced communication devices and the internet. It is possible to take advantage in many areas, such as from medicine to social sciences or from mathematics to education, from the computers that was first produced for the purpose of military services. The use of these developing technologies in the field of education has created a great vision changes in both training and having education. Materials, which can be considered as basic communication resources and used in traditional education has begun to lose its significance, and some technologies have begun to replace them such as internet, computers, smart boards, projection devices and mobile phone. On the other hand, the programs and applications used in these technologies have also been developed. University students use virtual books instead of the traditional printed book, use cell phones instead of note books, use the internet and virtual databases instead of the library to research. They even submit their homework with interactive methods rather than printed materials. The traditional education system, these technologies, which increase productivity, have brought a new dimension to education. The aim of this study is to determine the influence of technologies in the learning process of students and to find whether is there any similarities and differences that arise from the their faculty that they have been educated and and their learning process. In addition to this, it is aimed to determine the level of ICT usage of students studying at the university level. In this context, the advantages and conveniences of the technology used by students are also scrutinized. In this study, we used surveys to collect data. The data were analyzed by using SPSS 16 statistical program with the appropriate testing.

Keywords: education, communication technologies, role of technology, teaching

Procedia PDF Downloads 298
3141 Mitigating Denial of Service Attacks in Information Centric Networking

Authors: Bander Alzahrani

Abstract:

Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.

Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network

Procedia PDF Downloads 194
3140 Empowering Leadership and Constructive Voice: A Sequential Mediation Analysis

Authors: Umamaheswara Rao Jada, Susmita Mukhopadhyay

Abstract:

In the present highly complex, dynamic and interdependent organizational environment, employees' ideas, opinions and suggestions which is technically referred to as ‘constructive employee voice’ is increasingly being recognized and valued. Literature has consistently demonstrated the relevance of leadership in employee voicing behavior, however the new form of leadership, ‘empowering leadership’ has not been given much attention. The study, therefore, devotes itself to the effort to explore the impact of this new form of leadership on employee voice behavior and the interplay with leader member exchange (LMX) and psychological safety as mediators in the same. The study utilizes structural equation modeling for analyzing the data collected from 310 Indian service industry employees through the questionnaire developed for the study. The findings of the study demonstrate the significant impact of empowering form of leadership on employees’ constructive voice behavior. Additionally, supporting results were observed for the mediating impact of leader member exchange (LMX) and psychological safety between empowering leadership and employees’ constructive voice behavior. The results of this study provide insights into the intervening mechanisms by linking leaders’ empowering behavior with employees’ constructive voice, while also highlighting the potential importance of LMX relationship in organizations and psychological safety in the context of constructive voice behavior. The study brings forth the relevance of the new form of leadership, ‘empowering leadership’ for fostering the better exchange of ideas, opinions, and suggestions between leaders and followers which tend to benefit the organization, providing empirical evidence of the sequential mediation of LMX and psychological safety. The piece of work is assumed to benefit the leaders in organizations by providing them the basis for adopting empowering form of leadership in light of results displayed.

Keywords: constructive voice, empowering leadership, leader member exchange (LMX), psychological safety, sequential mediation, structural equation modeling

Procedia PDF Downloads 302
3139 Sexual Cognitive Behavioral Therapy: Psychological Performance and Openness to Experience

Authors: Alireza Monzavi Chaleshtari, Mahnaz Aliakbari Dehkordi, Amin Asadi Hieh, Majid Kazemnezhad

Abstract:

This research was conducted with the aim of determining the effectiveness of sexual cognitive behavioral therapy on psychological performance and openness to experience in women. The type of research was experimental in the form of pre-test-post-test. The statistical population of this research was made up of all working and married women with membership in the researcher's Instagram social network who had problems in marital-sexual relationships (N=900). From the statistical community, which includes working and married women who are members of the researcher's Instagram social network who have problems in marital-sexual relationships, there are 30 people including two groups (15 people in the experimental group and 15 people in the control group) as available sampling and selected randomly. They were placed in two experimental and control groups. The anxiety, stress, and depression scale (DASS) and the Costa and McCree personality questionnaire were used to collect data, and the cognitive behavioral therapy protocol of Dr. Mehrnaz Ali Akbari was used for the treatment sessions. To analyze the data, the covariance test was used in the SPSS22 software environment. The results showed that sexual cognitive behavioral therapy has a positive and significant effect on psychological performance and openness to experience in women. Conclusion: It can be concluded that interventions such as cognitive-behavioral sex can be used to treat marital problems.

Keywords: sexual cognitive behavioral therapy, psychological function, openness to experience, women

Procedia PDF Downloads 74
3138 Online Shopping vs Privacy – Results of an Experimental Study

Authors: Andrzej Poszewiecki

Abstract:

The presented paper contributes to the experimental current of research on privacy. The question of privacy is being discussed at length at present, primarily among lawyers and politicians. However, the matter of privacy has been of interest for economists for some time as well. The valuation of privacy by people is of great importance now. This article is about how people valuate their privacy. An experimental method has been utilised in the conducted research – the survey was carried out among customers of an online store, and the studied issue was whether their readiness to sell their data (WTA) was different from the willingness to buy data back (WTP). The basic aim of this article is to analyse whether people shopping on the Internet differentiate their privacy depending on whether they protect or sell it. The achieved results indicate the presence of major differences in this respect, which do not always come up with the original expectations. The obtained results have supported the hypothesis that people are more willing to sell their data than to repurchase them. However, the hypothesis that the value of proposed remuneration affects the willingness to sell/buy back personal data (one’s privacy) has not been supported.

Keywords: privacy, experimental economics, behavioural economics, internet

Procedia PDF Downloads 287
3137 The Effect of Artificial Intelligence on Banking Development and Progress

Authors: Mina Malak Hanna Saad

Abstract:

New strategies for supplying banking services to the customer have been brought, which include online banking. Banks have begun to recall electronic banking (e-banking) as a manner to replace some conventional department features by means of the usage of the internet as a brand-new distribution channel. A few clients have at least one account at multiple banks and get admission to those debts through online banking. To test their present-day internet worth, customers need to log into each of their debts, get particular statistics, and paint closer to consolidation. Not only is it time-ingesting; however, but it is also a repeatable activity with a certain frequency. To solve this problem, the idea of account aggregation was delivered as a solution. Account consolidation in e-banking as a form of digital banking appears to build stronger dating with clients. An account linking service is usually known as a service that permits customers to manipulate their bank accounts held at exceptional institutions through a common online banking platform that places a high priority on safety and statistics protection. The object affords an outline of the account aggregation approach in e-banking as a distinct carrier in the area of e-banking. The advanced facts generation is becoming a vital thing in the improvement of financial services enterprise, specifically the banking enterprise. It has brought different ways of delivering banking to the purchaser, which includes net Banking. Banks began to study electronic banking (e-banking) as a means to update some of their traditional branch functions and the use of the net as a distribution channel. Some clients have at least multiple accounts throughout banks and get the right of entry to that money owed through the usage of e-banking offerings. To examine the contemporary internet's well-worth position, customers have to log in to each of their money owed, get the information and work on consolidation. This no longer takes sufficient time; however, it is a repetitive interest at a specified frequency. To address this point, an account aggregation idea is brought as an answer. E-banking account aggregation, as one of the e-banking kinds, appeared to construct a more potent dating with clients. Account Aggregation carrier usually refers to a service that allows clients to control their bank bills maintained in one-of-a-kind institutions via a common Internet banking working platform, with an excessive subject to protection and privateness. This paper offers an overview of an e-banking account aggregation technique as a new provider in the e-banking field.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise developmente-banking, enterprise development

Procedia PDF Downloads 25
3136 Factors Affecting Internet Behavior and Life Satisfaction of Older Adult Learners with Use of Smartphone

Authors: Horng-Ji Lai

Abstract:

The intuitive design features and friendly interface of smartphone attract older adults. In Taiwan, many senior education institutes offer smartphone training courses for older adult learners who are interested in learning this innovative technology. It is expected that the training courses can help them to enjoy the benefits of using smartphone and increase their life satisfaction. Therefore, it is important to investigate the factors that influence older adults’ behavior of using smartphone. The purpose of the research was to develop and test a research model that investigates the factors (self-efficacy, social connection, the need to seek health information, and the need to seek financial information) affecting older adult learners’ Internet behaviour and their life satisfaction with use of smartphone. Also, this research sought to identify the relationship between the proposed variables. Survey method was used to collect research data. A Structural Equation Modeling was performed using Partial Least Squares (PLS) regression for data exploration and model estimation. The participants were 394 older adult learners from smartphone training courses in active aging learning centers located in central Taiwan. The research results revealed that self-efficacy significantly affected older adult learner’ social connection, the need to seek health information, and the need to seek financial information. The construct of social connection yielded a positive influence in respondents’ life satisfaction. The implications of these results for practice and future research are also discussed.

Keywords: older adults, smartphone, internet behaviour, life satisfaction

Procedia PDF Downloads 186
3135 Generative Behaviors and Psychological Well-Being in Mexican Elders

Authors: Ana L. Gonzalez-Celis, Edgardo Ruiz-Carrillo, Karina Reyes-Jarquin, Margarita Chavez-Becerra

Abstract:

Since recent decades, the aging has been viewed from a more positive perspective, where is not only about losses and damage, but also about being on a stage where you can enjoy life and live with well-being and quality of life. The challenge to feel better is to find those resources that seniors have. For that reason, psychological well-being has shown interest in the study of the affect and life satisfaction (hedonic well-being), while from a more recent tradition, focus on the development of capabilities and the personal growth, considering both as the main indicators of the quality of life. A resource that can be used in the later age is generativity, which refers to the ability of older people to develop and grow through activities that contribute with the improvement of the context in which they live and participate. In this way the generative interest is understood as a favourable attitude that contribute to the common benefit while strengthening and enriching the social institutions, to ensure continuity between generations and social development. On the other hand, generative behavior, differentiating from generative interest, is the expression of that attitude reflected in activities that make a social contribution and a benefit for generations to come. Hence the purpose of the research was to test if there is an association between the generative behaviour type and the psychological well-being with their dimensions. For this reason 188 Mexican adults from 60 to 94 years old (M = 69.78), 67% women, 33% men, completed two instruments: The Ryff’s Well-Being Scales to measure psychological well-being with 39 items with two dimensions (Hedonic and Eudaimonic well-being), and the Loyola’s Generative Behaviors Scale, grouped in five categories: Knowledge transmitted to the next generation, things to be remember, creativity, be productive, contribution to the community, and responsibility of other people. In addition, the socio-demographic data sheet was tested, and self-reported health status. The results indicated that the psychological well-being and its dimensions were significantly associated with the presence of generative behavior, where the level of well-being was higher when the frequency of some generative behaviour excelled; finding that the behavior with greater psychological well-being (M = 81.04, SD = 8.18) was "things to be remembered"; while with greater hedonic well-being (M = 73.39, SD = 12.19) was the behavior "responsibility of other people"; and with greater Eudaimonic well-being (M = 84.61, SD = 6.63), was the behavior "things to be remembered”. The most important findings highlight the importance of generative behaviors in adulthood, finding empirical evidence that the generativity in the last stage of life is associated with well-being. However, by finding differences in the types of generative behaviors at the level of well-being, is proposed the idea that generativity is not situated as an isolated construct, but needs other contextualized and related constructs that can simultaneously operate at different levels, taking into account the relationship between the environment and the individual, encompassing both the social and psychological dimension.

Keywords: eudaimonic well-being, generativity, hedonic well-being, Mexican elders, psychological well-being

Procedia PDF Downloads 266
3134 A Failure to Strike a Balance: The Use of Parental Mediation Strategies by Foster Carers and Social Workers

Authors: Jennifer E Simpson

Abstract:

Background and purpose: The ubiquitous use of the Internet and social media by children and young people has had a dual effect. The first is to open a world of possibilities and promise that is characterized by the ability to consume and create content, connect with friends, explore and experiment. The second relates to risks such as unsolicited requests, sexual exploitation, cyberbullying and commercial exploitation. This duality poses significant difficulties for a generation of foster carers and social workers who have no childhood experience to draw on in terms of growing up using the Internet, social media and digital devices. This presentation is concerned with the findings of a small qualitative study about the use of digital devices and the Internet by care-experienced young people to stay in touch with their families and the way this was managed by foster carers and social workers using specific parental mediation strategies. The findings highlight that restrictive strategies were used by foster carers and endorsed by social workers. An argument is made for an approach that develops a series of balanced solutions that move foster carers from such restrictive approaches to those that are grounded in co-use and are interpretive in nature. Methods: Using a purposive sampling strategy, 12 triads consisting of care-experienced young people (aged 13-18 years), their foster carers and allocated social workers were recruited. All respondents undertook a semi-structured interview, with the young people detailing what social media apps and other devices they used to contact their families via an Ecomap. The foster carers and social workers shared details of the methods and approaches they used to manage digital devices and the Internet in general. Data analysis was performed using a Framework analytic method to explore the various attitudes, as well as complementary and contradictory perspectives of the young people, their foster carers and allocated social workers. Findings: The majority of foster carers made use of parental mediation strategies that erred on the side of typologies that included setting rules and regulations (restrictive), ad-hoc checking of a young person’s behavior and device (monitoring), and software used to limit or block access to inappropriate websites (technical). It was noted that minimal use was made by foster carers of parental mediation strategies that included talking about content (active/interpretive) or sharing Internet activities (co-use). Amongst the majority of the social workers, they also had a strong preference for restrictive approaches. Conclusions and implications: Trepidations on the part of both foster carers and social workers about the use of digital devices and the Internet meant that the parental strategies used were weighted more towards restriction, with little use made of approaches such as co-use and interpretative. This lack of balance calls for solutions that are grounded in co-use and an interpretive approach, both of which can be achieved through training and support, as well as wider policy change.

Keywords: parental mediation strategies, risk, children in state care, online safety

Procedia PDF Downloads 68
3133 Detection of Adulterants in Milk Using IoT

Authors: Shaik Mohammad Samiullah Shariff, Siva Sreenath, Sai Haripriya, Prathyusha, M. Padma Lalitha

Abstract:

The Internet of Things (IoT) is the emerging technology that has been utilized to extend the possibilities for smart dairy farming (SDF). Milk consumption is continually increasing due to the world's growing population. As a result, some providers are prone to using dishonest measures to close the supply-demand imbalance, such as adding adulterants to milk. To identify the presence of adulterants in milk, traditional testing methods necessitate the use of particular chemicals and equipment. While efficient, this method has the disadvantage of yielding difficult and time-consuming qualitative results. Furthermore, same milk sample cannot be tested for other adulterants later. As a result, this study proposes an IoT-based approach for identifying adulterants in milk by measuring electrical conductivity (EC) or Total Dissolved Solids (TDS) and PH. In order to achieve this, an Arduino UNO microcontroller is used to assess the contaminants. When there is no adulteration, the pH and TDS values of milk range from 6.45 to 6.67 and 750 to 780ppm, respectively, according to this study. Finally, the data is uploaded to the cloud via an IoT device attached to the Ubidot web platform.

Keywords: internet of things (IoT), pH sensor, TDS sensor, EC sensor, industry 4.0

Procedia PDF Downloads 75
3132 Grandparent's Psychologically Control, Parent's Well-Being and the Coparenting Practice among Vietnamese Families

Authors: Nam-Phuong T. Hoang, Divna Haslam, Matthew Sanders

Abstract:

Parenting psychological control (PPC) is a parenting manner of which intrusive tactics such as guilt induction, shaming or love withdrawal is adopted to manipulate the child's behavior, emotion and beliefs. PPC has been widely reported to be associated with both psychological dysfunction and low self-esteem in adolescents. Highly demanding and restrictive parenting was also found to related to high rate of risk behaviors, depression, anxiety and anti-social behaviors in adults who co-live with their parents. In many cultures like that of Asia, adults keep on co-live with their parents even after having their own families, and this is not an uncommon practice. Due to the culture obligation of family relationship and the filial piety, children are expected to stay with their parents to taking care of them when they get older, and the parents are also expected to co-live with their children in order to support them with grandchild care. As one become a grandparent, however, it does not means one stop being the parent to their own child. The effect of PPC if exist thus might continue to interfere one’s relationship with their adult children and also their adult child’s parenting. This study was designed to examine that effect of PPC on adults’ life as parents. Data was collected from 501 Vietnamese parents whose children between the age of 2 to 12 and having their parent living with them or taking care of the grandchild on daily basic. Findings show that grandparent psychological control (GPPC) is significantly associated with parent’s harsh parenting, parent’s well-being, and parent-grandparent coparenting relationship. Significantly, GPPC is the strongest predictor for the coparenting conflict between parent and grandparent.

Keywords: parenting psychological control, grandparent, coparenting, well-being

Procedia PDF Downloads 246
3131 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation

Authors: Mohammad Hadi Khorashadi Zadeh

Abstract:

Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.

Keywords: BYOD, mobile cloud computing, mobile security, information management

Procedia PDF Downloads 314
3130 Commericializing Fashion Goods in the Digital Age

Authors: Jianli Hu

Abstract:

The internet has fundamentally revolutionized access to data and ushered new ways of creating and accessing information for commercializing products. Digital media such as computer programs, software, apps, websites, and social media have allowed the proliferation of information and ideas to grow exponentially. In recent years, a new wave of innovative e-commerce formats has begun to emerge in the fashion marketplace, responding to the ever-greater need for transparency and connectivity. For example, many fashion wholesalers and retailers have modified their operations using software systems that enable brands to cost, track, and analyze products and client orders, sales tools that connect buyers and brands to create a more dynamic market-place, as well as retailer-end apps designed to drive traffic back to brick-and-mortar stores. In this paper, we review the recently developed tools and applications of commercializing fashion, and present results of several field studies and interviews with fashion producers and buyers.

Keywords: fashion, digital media, commercializing products, internet

Procedia PDF Downloads 375
3129 Employee Commitment as a Means of Revitalising the Hospitality Industry post-Covid: Considering the Impact of Psychological Contract and Psychological Capital

Authors: Desere Kokt

Abstract:

Hospitality establishments worldwide are bearing the brunt of the effects of Covid-19. As the hospitality industry is looking to recover, emphasis is placed on rejuvenating the industry. This is especially pertinent for economic development in areas of high unemployment, such as the Free State province of South Africa. The province is not a main tourist area and thus depends on the influx of tourists. The province has great scenic beauty with many accommodation establishments that provide job opportunities to the local population. The two main economic hubs of the Free State province namely Bloemfontein and Clarens, were the focus of the investigation. The emphasis was on graded accommodation establishments as they must adhere to the quality principles of the Tourism Grading Council of South Africa (TGCSA) to obtain star grading. The hospitality industry is known for being labour intensive, and employees need to be available to cater for the needs of paying customers. This is referred to as ‘emotional labour’ and implies that employees need to manage their feelings and emotions as part of performing their jobs. The focus of this study was thus on psychological factors related to working in the hospitality industry – specifically psychological contract and psychological capital and its impact on the commitment of employees in graded accommodation establishments. Employee commitment can be explained as a psychological state that binds the individual to the organisation and involves a set of psychological relationships that include affective (emotions), normative (perceived obligation) and continuance (staying with the organisation) dimensions. Psychological contract refers to the reciprocal beliefs and expectations between the employer and the employee and consists of transactional and rational contracts. Transactional contracts are associated with the economic exchange, and contractional issues related to the employment contract and rational contracts relate to the social exchange between the employee and the organisation. Psychological capital refers to an individual’s positive psychology state of development that is characterised by self-efficiency (having confidence in doing one’s job), optimism (being positive and persevering towards achieving one’s goals), hope (expectations for goals to succeed) and resilience (bouncing back to attain success when beset by problems and adversity). The study employed a quantitative research approach, and a structured questionnaire was used to gather data from respondents. The study was conducted during the Covid-19 pandemic, which hampered the data gathering efforts of the researchers. Many accommodation establishments were either closed or temporarily closed, which meant that data gathering was an intensive and laborious process. The main researcher travelled to the various establishments to collect the data. Nine hospitality establishments participated in the study, and around 150 employees were targeted for data collection. Ninety-two (92) questionnaires were completed, which represents a response rate of 61%. Data were analysed using descriptive and inferential statistics, and partial least squares structural equation modelling (PLS-SEM) was applied to examine the relationship between the variables.

Keywords: employee commitment, hospitality industry, psychological contract, psychological capital

Procedia PDF Downloads 98
3128 Smart Airport: Application of Internet of Things for Confronting Airport Challenges

Authors: Ali Safaeianpour, Nima Shamandi

Abstract:

As air traffic expands, many airports have evolved into transit centers for people, information, and commerce, and technology implementation is an absolute part of airport development. Several challenges are in the way of implementing technology in an airport. Airport 4.0 proposes the "Smart Airport" concept, which focuses on using modern technologies such as Big Data, the Internet of Things (IoT), advanced biometric systems, blockchain, and cloud computing to alter and enhance passengers' journeys. Several common IoT concrete topics as partial keys to smart airports are discussed and introduced, ranging from automated check-in systems to exterior tracking processes, with the goal of enlightening more and more insightful ideas and proposals about smart airport solutions. IoT will dramatically alter people's lives by infusing intelligence, boosting the quality of life, and assembling it smarter. This paper reviews the approaches to transforming an airport into a smart airport and describes several enabling components of IoT and challenges that can hinder the implementation of a smart airport's function, which require to be addressed.

Keywords: airport 4.0, digital airport, smart airport, IoT

Procedia PDF Downloads 109
3127 A Review Paper on Data Security in Precision Agriculture Using Internet of Things

Authors: Tonderai Muchenje, Xolani Mkhwanazi

Abstract:

Precision agriculture uses a number of technologies, devices, protocols, and computing paradigms to optimize agricultural processes. Big data, artificial intelligence, cloud computing, and edge computing are all used to handle the huge amounts of data generated by precision agriculture. However, precision agriculture is still emerging and has a low level of security features. Furthermore, future solutions will demand data availability and accuracy as key points to help farmers, and security is important to build robust and efficient systems. Since precision agriculture comprises a wide variety and quantity of resources, security addresses issues such as compatibility, constrained resources, and massive data. Moreover, conventional protection schemes used in the traditional internet may not be useful for agricultural systems, creating extra demands and opportunities. Therefore, this paper aims at reviewing state of the art of precision agriculture security, particularly in open field agriculture, discussing its architecture, describing security issues, and presenting the major challenges and future directions.

Keywords: precision agriculture, security, IoT, EIDE

Procedia PDF Downloads 86
3126 A Model Outlining Feelings vs. Emotions and Why Distinction is Critical

Authors: Brendan Mooney

Abstract:

Context: Feelings and emotions are commonly misunderstood and the terms often used interchangeably, leading to potential negative impacts on individuals' mental well-being and relationships. The distinction between these two fundamentally different experiences of human life is crucial for effective psychological practice and communication. Research Aim: The aim of this study is to outline the disparities between feelings and emotions, emphasising the significance of this differentiation in psychological practice to enhance clients' observation, decision-making, problem-solving, and communication skills. Methodology: This research utilises a conceptual model developed by the author in 2017 based on clinical experience, client observations, and feedback. The model serves to guide effective clinical practice by providing clear definitions and understanding of feelings versus emotions. Case study examples were utilised to support the efficacy of the model. Findings: The study highlights that recognising and expressing feelings rather than emotions is more empowering and conducive to resolving unresolved issues, thereby fostering better psychological well-being and interpersonal relationships. Theoretical Importance: This research underscores the importance of clarifying fundamental definitions related to feelings and emotions in enhancing psychological interventions and preventing various relationship conflicts and individual issues. Data Collection and Analysis Procedures: Data was collected through the author's clinical experience and interactions with clients, informing the development of the Feeling Emotions Mental (FEM) model. Analysis involved synthesising observations and feedback to elucidate the distinctions between feelings and emotions. Questions Addressed: What are the disparities between feelings and emotions? How does the confusion between these two fundamentally different experiences of human life impact individuals' mental well-being and relationships? Why is it essential to differentiate between feelings and emotions in psychological practice? Conclusion: The study advocates for a clear understanding of feelings versus emotions to support clients in addressing unresolved issues and improving their overall psychological functioning and communication skills, thereby preventing potential conflicts and relationship challenges.

Keywords: couples, mental, misinformation, misunderstanding, relationships

Procedia PDF Downloads 37