Search results for: personal cyber insurance
2280 Selecting Special Education as a Career: A Qualitative Study of Motivating Factors for Special Education Teachers
Authors: Jennifer Duffy, Liz Fleming
Abstract:
Teacher shortage in special education is an American educational problem. Due to the implementation of The No Child Left Behind Act (2001) and The Individuals with Disabilities Education Improvement Act (2004), there has been an increase in the number of students requiring special education services. Consequently, there has been an influx to hire more special education teachers. However, the historic challenge of hiring certified special education teachers has been intensified with this the profession’s increasing demand of positions to fill. Efforts to improve recruitment and entry into the field must be informed by an understanding of the factors that initially inspire special education teachers to choose this career pathway. Hence, an understanding of reasons why teachers select special education as a profession is needed. The purpose of this study was to explore personal, academic, and professional motivations that lead to the selection of special education as a career choice. Using the grounded theory approach, this research investigation examined the factors that were most instrumental in influencing applicants to select special education as a career choice. Over one hundred de-identified graduate school applications to Bay Path University’s Graduate Special Education Programs from 2014- 2017 were qualitatively analyzed. Grounded coding was used to discover themes that emerged in applicants’ admissions essays explaining why he/she was pursuing a career in special education. The central themes that were most influential in applicants’ selection of special education as a career trajectory were (a) personal/familial connections to disability, (b) meaningful paraprofessional experiences working with disabled children, (c) aptitudes for teaching, and (d) finding personal rewards and professional fulfillment by advocating for vulnerable children. Implications from these findings include educating family members of children with disabilities about possible career tracks in special education, designing programs for paraprofessionals to become certified teachers, exposing prospective teacher candidates to the field of special education, and recruiting professionals from the human services field who seek to improve the quality of life and educational opportunities for children with special needs.Keywords: career choice, professional pathways to teaching children with disabilities, special education, teacher recruitment
Procedia PDF Downloads 2952279 Luxury in Fashion: Visual Analysis on Bag Advertising
Authors: Lama Ajinah
Abstract:
Luxury brands witnessed continuous growth which followed women’s desire towards individual distinctiveness and social glare. Bags are a woman’s best friend either for aesthetic or functional purposes when she leaves her home for leisure or work. One way of women constant aspiration for being distinguished while reflecting their wealth is through handbags. Subsequently, the demand and attraction by consumers towards the dazzle of luxurious brands for personal pleasure and social status have flourished. According to the literature review, a visual analysis on luxury brands has been explored yet a focus on bags was not discussed in details. Hence, a deep analysis will be dedicated on the two segments by showcasing examples of high-end bag advertising. The research is conducted to understand advertising strategies used in promoting for luxurious products. Furthermore, the paper explores the definition of the term luxury, the condition in which it is used in, and the visual language used along with the term. As luxury is an indicator of superior satisfaction, it is obtained on two levels: a personal and a social level. The examples of luxury brand ads are selected from the last five years to uncover the latest, most common strategies used to promote for luxurious brands. The methods employed in this paper consist of literature review, semiotic analysis, and content analysis. The researcher concludes with revealing the methods used in advertising while categorizing them into various themes.Keywords: advertising, brands, fashion, graphic design, luxury, semiotic analysis, semiology, visual analysis, visual communication
Procedia PDF Downloads 2442278 Work-Life Balance and Job Satisfaction among Female Professionals: A Study at a Government Hospital
Authors: Mohd Sarfaraz
Abstract:
The objective of this study is to investigate the work-life balance and job satisfaction among women employees in a hospital in India. It is believed that balancing a successful career with a family life or personal life can be challenging. WLB impacts on persons' satisfaction in their work and personal life roles. For this purpose, a questionnaire is developed with 22 items. The data collected from women employees who are working in a hospital in Aligarh, India. The constructs considered in this study include WLB and job satisfaction. The demographic and organisational variables considered in the study are genders, age and tenure of the job. Factors of WLB are flexible working conditions, work-life balance programs, and employee intention to change/leave a job, work pressure/stress and long working hours. This paper examines the relationship between work-family conflict, policies, and job and life satisfaction. Appropriate statistical tool using SPSS will be applied to achieve the objective. The anxiety over work-life balance is progressively becoming a common talk, especially for female employees.Increasing demands from the work and family domains represent a high strain for employees which even lead to the health problems among employees. Although it is believed that work-family role strain is more common among women employees. Therefore, the study will focus on these issues of WLB and job satisfaction among female professionals.Keywords: work-life balance, job satisfaction, work- family conflict, health
Procedia PDF Downloads 2912277 An Unexpected Helping Hand: Consequences of Redistribution on Personal Ideology
Authors: Simon B.A. Egli, Katja Rost
Abstract:
Literature on redistributive preferences has proliferated in past decades. A core assumption behind it is that variation in redistributive preferences can explain different levels of redistribution. In contrast, this paper considers the reverse. What if it is redistribution that changes redistributive preferences? The core assumption behind the argument is that if self-interest - which we label concrete preferences - and ideology - which we label abstract preferences - come into conflict, the former will prevail and lead to an adjustment of the latter. To test the hypothesis, data from a survey conducted in Switzerland during the first wave of the COVID-19 crisis is used. A significant portion of the workforce at the time unexpectedly received state money through the short-time working program. Short-time work was used as a proxy for self-interest and was tested (1) on the support given to hypothetical, ailing firms during the crisis and (2) on the prioritization of justice principles guiding state action. In a first step, several models using OLS-regressions on political orientation were estimated to test our hypothesis as well as to check for non-linear effects. We expected support for ailing firms to be the same regardless of ideology but only for people on short-time work. The results both confirm our hypothesis and suggest a non-linear effect. Far-right individuals on short-time work were disproportionally supportive compared to moderate ones. In a second step, ordered logit models were estimated to test the impact of short-time work and political orientation on the rankings of the distributive justice principles need, performance, entitlement, and equality. The results show that being on short-time work significantly alters the prioritization of justice principles. Right-wing individuals are much more likely to prioritize need and equality over performance and entitlement when they receive government assistance. No such effect is found among left-wing individuals. In conclusion, we provide moderate to strong evidence that unexpectedly finding oneself at the receiving end changes redistributive preferences if personal ideology is antithetical to redistribution. The implications of our findings on the study of populism, personal ideologies, and political change are discussed.Keywords: COVID-19, ideology, redistribution, redistributive preferences, self-interest
Procedia PDF Downloads 1402276 ISIS and Social Media
Authors: Neda Jebellie
Abstract:
New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies
Procedia PDF Downloads 4872275 Auditory Function in MP3 Users and Association with Hidden Hearing Loss
Authors: Nana Saralidze, Nino Sharashenidze, Zurab Kevanishvili
Abstract:
Hidden hearing loss may occur in humans exposed to prolonged high-level sound. It is the loss of ability to hear high-level background noise while having normal hearing in quiet. We compared the hearing of people who regularly listen 3 hours and more to personal music players and those who do not. Forty participants aged 18-30 years were divided into two groups: regular users of music players and people who had never used them. And the third group – elders aged 50-55 years, had 15 participants. Pure-tone audiometry (125-16000 Hz), auditory brainstem response (ABR) (70dB SPL), and ability to identify speech in noise (4-talker babble with a 65-dB signal-to-noise ratio at 80 dB) were measured in all participants. All participants had normal pure-tone audiometry (all thresholds < 25 dB HL). A significant difference between groups was observed in that regular users of personal audio systems correctly identified 53% of words, whereas the non-users identified 74% and the elder group – 63%. This contributes evidence supporting the presence of a hidden hearing loss in humans and demonstrates that speech-in-noise audiometry is an effective method and can be considered as the GOLD standard for detecting hidden hearing loss.Keywords: mp3 player, hidden hearing loss, speech audiometry, pure tone audiometry
Procedia PDF Downloads 742274 Interpretable Deep Learning Models for Medical Condition Identification
Authors: Dongping Fang, Lian Duan, Xiaojing Yuan, Mike Xu, Allyn Klunder, Kevin Tan, Suiting Cao, Yeqing Ji
Abstract:
Accurate prediction of a medical condition with straight clinical evidence is a long-sought topic in the medical management and health insurance field. Although great progress has been made with machine learning algorithms, the medical community is still, to a certain degree, suspicious about the model's accuracy and interpretability. This paper presents an innovative hierarchical attention deep learning model to achieve good prediction and clear interpretability that can be easily understood by medical professionals. This deep learning model uses a hierarchical attention structure that matches naturally with the medical history data structure and reflects the member’s encounter (date of service) sequence. The model attention structure consists of 3 levels: (1) attention on the medical code types (diagnosis codes, procedure codes, lab test results, and prescription drugs), (2) attention on the sequential medical encounters within a type, (3) attention on the medical codes within an encounter and type. This model is applied to predict the occurrence of stage 3 chronic kidney disease (CKD3), using three years’ medical history of Medicare Advantage (MA) members from a top health insurance company. The model takes members’ medical events, both claims and electronic medical record (EMR) data, as input, makes a prediction of CKD3 and calculates the contribution from individual events to the predicted outcome. The model outcome can be easily explained with the clinical evidence identified by the model algorithm. Here are examples: Member A had 36 medical encounters in the past three years: multiple office visits, lab tests and medications. The model predicts member A has a high risk of CKD3 with the following well-contributed clinical events - multiple high ‘Creatinine in Serum or Plasma’ tests and multiple low kidneys functioning ‘Glomerular filtration rate’ tests. Among the abnormal lab tests, more recent results contributed more to the prediction. The model also indicates regular office visits, no abnormal findings of medical examinations, and taking proper medications decreased the CKD3 risk. Member B had 104 medical encounters in the past 3 years and was predicted to have a low risk of CKD3, because the model didn’t identify diagnoses, procedures, or medications related to kidney disease, and many lab test results, including ‘Glomerular filtration rate’ were within the normal range. The model accurately predicts members A and B and provides interpretable clinical evidence that is validated by clinicians. Without extra effort, the interpretation is generated directly from the model and presented together with the occurrence date. Our model uses the medical data in its most raw format without any further data aggregation, transformation, or mapping. This greatly simplifies the data preparation process, mitigates the chance for error and eliminates post-modeling work needed for traditional model explanation. To our knowledge, this is the first paper on an interpretable deep-learning model using a 3-level attention structure, sourcing both EMR and claim data, including all 4 types of medical data, on the entire Medicare population of a big insurance company, and more importantly, directly generating model interpretation to support user decision. In the future, we plan to enrich the model input by adding patients’ demographics and information from free-texted physician notes.Keywords: deep learning, interpretability, attention, big data, medical conditions
Procedia PDF Downloads 912273 A Systematic Review Emotion Regulation through Music in Children, Adults, and Elderly
Authors: Fabiana Ribeiro, Ana Moreno, Antonio Oliveira, Patricia Oliveira-Silva
Abstract:
Music is present in our daily lives, and to our knowledge music is often used to change the emotions in the listeners. For this reason, the objective of this study was to explore and synthesize results examining the use and effects of music on emotion regulation in children, adults, and elderly, and clarify if the music is effective across ages to promote emotion regulation. A literature search was conducted using ISI Web of Knowledge, Pubmed, PsycINFO, and Scopus, inclusion criteria comprised children, adolescents, young, and old adults, including health population. Articles applying musical intervention, specifically musical listening, and assessing the emotion regulation directly through reports or neurophysiological measures were included in this review. Results showed age differences in the function of musical listening; initially, adolescents revealed age increments in emotional listening compared to children, and young adults in comparison to older adults, in which the first use music aiming to emotion regulation and social connection, while older adults also utilize music as emotion regulation searching for personal growth. Moreover, some of the studies showed that personal characteristics also would determine the efficiency of the emotion regulation strategy. In conclusion, it was observed that music could beneficiate all ages investigated, however, this review detected a necessity to develop adequate paradigms to explore the use of music for emotion regulation.Keywords: music, emotion, regulation, musical listening
Procedia PDF Downloads 1712272 The Impact of AI on Consumers’ Morality: An Empirical Evidence
Authors: Mingxia Zhu, Matthew Tingchi Liu
Abstract:
AI grows gradually in the market with its efficiency and accuracy, influencing people’s perceptions, attitude, and even consequential behaviors. Current study extends prior research by focusing on AI’s impact on consumers’ morality. First, study 1 tested individuals’ believes about AI and human’s moral perceptions and people’s attribution of moral worth to AI and human. Moral perception refers to a computational system an entity maintains to detect and identify moral violations, while moral worth here denotes whether individual regard an entity as worthy of moral treatment. To identify the effect of AI on consumers’ morality, two studies were employed. Study 1 is a within-subjects survey, while study 2 is an experimental study. In the study 1, one hundred and forty participants were recruited through online survey company in China (M_age = 27.31 years, SD = 7.12 years; 65% female). The participants were asked to assign moral perception and moral worth to AI and human. A paired samples t-test reveals that people generally regard that human has higher moral perception (M_Human = 6.03, SD = .86) than AI (M_AI = 2.79, SD = 1.19; t(139) = 27.07, p < .001; Cohen’s d = 1.41). In addition, another paired samples t-test results showed that people attributed higher moral worth to the human personnel (M_Human = 6.39, SD = .56) compared with AIs (M_AI = 5.43, SD = .85; t(139) = 12.96, p < .001; d = .88). In the next study, two hundred valid samples were recruited from survey company in China (M_age = 27.87 years, SD = 6.68 years; 55% female) and the participants were randomly assigned to two conditions (AI vs. human). After viewing the stimuli of human versus AI, participants are informed that one insurance company would determine the price purely based on their declaration. Therefore, their open-ended answers were coded into ethical, honest behavior and unethical, dishonest behavior according to the design of prior literature. A Chi-square analysis revealed that 64% of the participants would immorally lie towards AI insurance inspector while 42% of participants reported deliberately lower mileage facing with human inspector (χ^2 (1) = 9.71, p = .002). Similarly, the logistic regression results suggested that people would significantly more likely to report fraudulent answer when facing with AI (β = .89, odds ratio = 2.45, Wald = 9.56, p = .002). It is demonstrated that people would be more likely to behave unethically in front of non-human agents, such as AI agent, rather than human. The research findings shed light on new practical ethical issues in human-AI interaction and address the important role of human employees during the process of service delivery in the new era of AI.Keywords: AI agent, consumer morality, ethical behavior, human-AI interaction
Procedia PDF Downloads 822271 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking
Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye
Abstract:
The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.Keywords: algorithm, cryptography, cryptosystem, network
Procedia PDF Downloads 3492270 Visual Odometry and Trajectory Reconstruction for UAVs
Authors: Sandro Bartolini, Alessandro Mecocci, Alessio Medaglini
Abstract:
The growing popularity of systems based on unmanned aerial vehicles (UAVs) is highlighting their vulnerability, particularly in relation to the positioning system used. Typically, UAV architectures use the civilian GPS, which is exposed to a number of different attacks, such as jamming or spoofing. This is why it is important to develop alternative methodologies to accurately estimate the actual UAV position without relying on GPS measurements only. In this paper, we propose a position estimate method for UAVs based on monocular visual odometry. We have developed a flight control system capable of keeping track of the entire trajectory travelled, with a reduced dependency on the availability of GPS signals. Moreover, the simplicity of the developed solution makes it applicable to a wide range of commercial drones. The final goal is to allow for safer flights in all conditions, even under cyber-attacks trying to deceive the drone.Keywords: visual odometry, autonomous uav, position measurement, autonomous outdoor flight
Procedia PDF Downloads 2172269 Personal Development of School-Children on Lessons Physical Culture
Authors: Rogaleva Liudmila, Malkin Valery
Abstract:
Physical culture lessons are considered not only to be a means of physical development of students, but a matter of their personal development. Physical culture lessons can enable to develop such qualities of students as activity and initiation, readiness to cooperate, self-confidence, ability to define and reach targets, readiness to overcome difficulties and assess their abilities (and disadvantages) properly in any precise situation as well to be responsible for their own decision. The solution of this problem is possible under the circumstance if the students aware themselves as the subject of the activity that are able to develop their possibilities. The research was aimed to learn the matters that enable female teenagers of senior forms to become strong personalities attending physical culture lessons. There were two stages of the research. At the first stage we define the interests and demands of the girls. According the results of research we changed the programme of physical culture lessons. We took into consideration values of youth subculture: youth music, preferences to sport-dancing physical activities, demand of self-determination, revealing their individualities, needs of cooperative work. At the second stage we worked out motivating technology of course. This technology was aimed to create sush conditions under which students could show themselves as the subjects of activity and self-development. The active participation sport-dance festivals during 2-3 years creates the conditions for their self-realization. 78% students of the experimental groups considered their main motives to were: the interest, developing of their abilities, the satisfaction of the achievements of targets. Control groups 67% of the students claimed the success school good marks. The girls said that due to festivals they became self-confident (94%), responsible (86%), ability to cooperate (73%), aspiration for reaching the target (68%), self-exactingness (57 %). The main factors that provide successful performance were called: efforts to reach the target (87%), mutual support and mutual understanding (77%). The research on values showed that in the experimental groups we can find increase of importance of such values as: social initiative (active life) 83%, friends (75%), self-control (73%), effectiveness in deeds (58%).Keywords: physical culture, subject, personal development, self-determination
Procedia PDF Downloads 4702268 Thermal Perception by Older People in Open Spaces in Madrid: Relationships between Weather Parameters and Personal Characteristics
Authors: María Teresa Baquero, Ester Higueras
Abstract:
One of the challenges facing 21st century cities, is their adaptation to the phenomenon of an ageing population. International policies have been developed, such as the "Global Network for Age-friendly Cities and Communities". These cities must recognize the diversity of the elderly population, and facilitate an active, healthy, satisfied aging and promote inclusion. In order to promote active and healthy aging, older people should be encouraged to engage in physical activity, sunbathe, socialize and enjoy the public open spaces in the city. Some studies recognize thermal comfort as one of the factors that most influence the use of public open spaces. However, although some studies have shown vulnerability to thermal extremes and environmental conditions in older people, there is little research on thermal comfort for older adults, because it is usually analyzed based on the characteristics of the ¨average young person¨ without considering the physiological, physical and psychological differences that characterize the elderly. This study analyzes the relationship between the microclimate parameters as air temperature, relative humidity, wind speed and sky view factor (SVF) with the personal thermal perception of older adults in three public spaces in Madrid, through a mixed methodology that combines weather measurements with interviews, made during the year 2018. Statistical test like Chi-square, Spearman, and analysis of variance were used to analyze the relationship between preference votes and thermal sensation votes with environmental and personal parameters. The results show that there is a significant correlation between thermal sensation and thermal preference with the measured air temperature, age, level of clothing, the color of clothing, season, time of the day and kind of space while no influence of gender or other environmental variables was detected. These data would contribute to the design of comfortable public spaces that improve the welfare of the elderly contributing to "active and healthy aging" as one of the 21st century challenges cities face.Keywords: healthy ageing, older adults, outdoor public space, thermal perception
Procedia PDF Downloads 1342267 Simon Says: What Should I Study?
Authors: Fonteyne Lot
Abstract:
SIMON (Study capacities and Interest Monitor is a freely accessible online self-assessment tool that allows secondary education pupils to evaluate their interests and capacities in order to choose a post-secondary major that maximally suits their potential. The tool consists of two broad domains that correspond with two general questions pupils ask: 'What study fields interest me?' and 'Am I capable to succeed in this field of study?'. The first question is addressed by a RIASEC-type interest inventory that links personal interests to post-secondary majors. Pupils are provided with a personal profile and an overview of majors with their degree of congruence. The output is dynamic: respondents can manipulate their score and they can compare their results to the profile of all fields of study. That way they are stimulated to explore the broad range of majors. To answer whether pupils are capable of succeeding in a preferred major, a battery of tests is provided. This battery comprises a range of factors that are predictive of academic success. Traditional predictors such as (educational) background and cognitive variables (mathematical and verbal skills) are included. Moreover, non-cognitive predictors of academic success (such as 'motivation', 'test anxiety', 'academic self-efficacy' and 'study skills') are assessed. These non-cognitive factors are generally not included in admission decisions although research shows they are incrementally predictive of success and are less discriminating. These tests inform pupils on potential causes of success and failure. More important, pupils receive their personal chances of success per major. These differential probabilities are validated through the underlying research on academic success of students. For example, the research has shown that we can identify 22 % of the failing students in psychology and educational sciences. In this group, our prediction is 95% accurate. SIMON leads more students to a suitable major which in turn alleviates student success and retention. Apart from these benefits, the instrument grants insight into risk factors of academic failure. It also supports and fosters the development of evidence-based remedial interventions and therefore gives way to a more efficient use of means.Keywords: academic success, online self-assessment, student retention, vocational choice
Procedia PDF Downloads 4032266 Beyond the Dust: Workers' Perspectives on Enhancing Silica Exposure Control in Tunnel Construction
Authors: Frederick Anlimah, Vinod Gopaldasani, Catherine MacPhail, Brian Davies
Abstract:
The construction industry, particularly tunnel construction, exposes workers to respirable crystalline silica (RCS), which can cause incurable illnesses such as silicosis and lung cancer. Despite various control measures, exposures remain inadequately controlled. This research aimed to examine what workers on a tunnelling project in Australia think should be done to reduce exposure to dust to protect them from RCS exposure. A qualitative research approach consisting of interviews and focus group discussions was employed for this research. The preliminary analysis of the data reveals a diverse array of solutions proposed to address the different sociotechnical factors that present challenges for effectively reducing dust exposure. Solutions are proposed to address challenges such as cost, time pressure, low-risk perception, inadequate awareness, inadequate enforcement and compliance with personal protective equipment. The findings highlight the need to make dust control a level playing field for all contractors during the bidding process, with more collaboration and enforcement after the signing of contracts. The research highlights that although improvements have been made in the past years regarding dust controls, many opportunities exist to reduce worker exposure to RCS.Keywords: tunnel, respirable crystalline silica, RCS, dust exposure, personal protective equipment, worker perspectives
Procedia PDF Downloads 802265 Canadian High School Students' Attitudes and Perspectives Towards People with Disabilities, Autism and Attention Deficit Hyperactivity Disorder (ADHD)
Authors: Khodi Morgan, Kasey Crowe, Amanda Morgan
Abstract:
Canadian High School Students' Attitudes & Objective: To survey Canadian high school students regarding their attitudes and perspectives towards people with disabilities and explore how age, gender, and personal experience with a disability may impact these views. Methods: A survey was developed using the standardized Attitude Toward Persons With Disability Scale as its base, with the addition of questions specifically about Autism and Attention Deficit Hyperactivity Disorder (ADHD). The survey also gathered information about the participant’s age and gender and whether or not they, or a close family member, had any disabilities. Participants were recruited at a public Canadian high school by fellow student researchers. Results: A total of 219 (N=219) students ranging from 13 - 19 years old participated in the study (m= 15.9 years of age). Gender was equally split, with 44% male, 42% female and 14% undeclared. Experience with a disability was common amongst participants, with 25% self-identifying as having a personal disability and 48% claiming to have a close family member with a disability. Exploratory trends indicated that females, people with self-identified disabilities, and people with close family members with disabilities trended towards having more positive attitudes toward persons with disabilities.Keywords: disability, autism, ADHD, high school, adolescence, community research, acceptance
Procedia PDF Downloads 782264 Addressing Supply Chain Data Risk with Data Security Assurance
Authors: Anna Fowler
Abstract:
When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.Keywords: security by design, data security architecture, cybersecurity framework, data security assurance
Procedia PDF Downloads 882263 The Perspectives of Adult Learners Towards Online Learning
Authors: Jacqueline Żammit
Abstract:
Online learning has become more popular as a substitute for traditional classroom instruction because of the COVID-19 epidemic. The study aimed to investigate how adult Maltese language learners evaluated the benefits and drawbacks of online instruction. 35 adult participants provided data through semi-structured interviews with open-ended questions. NVivo software was used to analyze the interview data using the thematic analysis method in order to find themes and group the data based on common responses. The advantages of online learning that the participants mentioned included accessing subject content even without live learning sessions, balancing learning with household duties, and lessening vulnerability to problems like fatigue, time-wasting traffic, school preparation, and parking space constraints. Conversely, inadequate Internet access, inadequate IT expertise, a shortage of personal computers, and domestic distractions adversely affected virtual learning. Lack of an Internet connection, IT expertise, a personal computer, or a phone with Internet access caused inequality in access to online learning sessions. Participants thought online learning was a way to resume academic activity, albeit with drawbacks. In order to address the challenges posed by online learning, several solutions are proposed in the research's conclusion.Keywords: adult learners, online education, e-learning, challenges of online learning, benefits ofonline learning
Procedia PDF Downloads 602262 LuMee: A Centralized Smart Protector for School Children who are Using Online Education
Authors: Lumindu Dilumka, Ranaweera I. D., Sudusinghe S. P., Sanduni Kanchana A. M. K.
Abstract:
This study was motivated by the challenges experienced by parents and guardians in ensuring the safety of children in cyberspace. In the last two or three years, online education has become very popular all over the world due to the Covid 19 pandemic. Therefore, parents, guardians and teachers must ensure the safety of children in cyberspace. Children are more likely to go astray and there are plenty of online programs are waiting to get them on the wrong track and also, children who are engaging in the online education can be distracted at any moment. Therefore, parents should keep a close check on their children's online activity. Apart from that, due to the unawareness of children, they tempt to share their sensitive information, causing a chance of being a victim of phishing attacks from outsiders. These problems can be overcome through the proposed web-based system. We use feature extraction, web tracking and analysis mechanisms, image processing and name entity recognition to implement this web-based system.Keywords: online education, cyber bullying, social media, face recognition, web tracker, privacy data
Procedia PDF Downloads 882261 Downhole Logging and Dynamics Data Resolving Lithology-Related Drilling Behavior
Authors: Christopher Viens, Steve Krase
Abstract:
Terms such as “riding a hard streak”, “formation push”, and “fighting formation” are commonly used in the directional drilling world to explain BHA behavior that causes unwanted trajectory change. Theories about downhole directional tendencies are commonly speculated from various personal experiences with little merit due to the lack of hard data to reveal the actual mechanisms behind the phenomenon, leaving interpretation of the root cause up to personal perception. Understanding and identifying in real time the lithological factors that influence the BHA to change or hold direction adds tremendous value in terms reducing sliding time and targeting zones for optimal ROP. Utilizing surface drilling parameters and employing downhole measurements of azimuthal gamma, continuous inclination, and bending moment, a direct measure of the rock related directional phenomenon have been captured and quantified. Furthermore, identifying continuous zones of like lithology with consistent bit to rock interaction has value from a reservoir characterization and completions standpoint. The paper will show specific examples of lithology related directional tendencies from the Spraberry and Wolfcamp in the Delaware Basin.Keywords: Azimuthal gamma imaging, bending moment, continuous inclination, downhole dynamics measurements, high frequency data
Procedia PDF Downloads 2902260 Nurse Metamorphosis: Lived Experience in the RN HEALS Proram
Authors: Dennis Glen G. Ramos, Angelica S. Mendoza, Juliene Marie A. Alvarez, Claudette A. Nagal, Kayzee C. Blanza, Jayson M. Narbonita, John Anthony D. Dayot, Rebecca M. Reduca, Jermaine Jem M. Flojo, Michael E. Resultan, Clyde C. Fomocod, Cindy A. Vinluan, Jeffrie Aleona Mari C. Maclang
Abstract:
RN HEALS, an acronym for Registered Nurses for Health Enhancement and Local Service, is expected to address the shortage of skilled and experienced nurses in 1,221 rural and unserved or underserved communities for one year. The study would like to explore the lived experiences of the nurses deployed under this program.The study is a Descriptive Qualitative Research. Interview was utilized as a data gathering tool. Six community nurses who are deployed under the RN HEALS program are included in the study. Van Kaam method was used as data management. Data gathering was done from October to December 2013.Two themes emerged in the study; Value and Challenge. Under Value, it had three sub-themes; Job Satisfaction, Upholding Competency, including Personal Development and Professional Growth, and Employability. While under Challenge, it had one sub-theme, Job Stress. The study concludes that nurses adapt to strategies to pursue personal and professional competence and an evolutionary journey. The researchers recommend that Health Administrators improve the work environment of nurses to lessen the challenges experienced by nurses.Keywords: lived experience, RN HEALS, health enhancement, local service
Procedia PDF Downloads 5122259 Burnout and Salivary Cortisol Among Laboratory Personnel in Klang Valley, Malaysia During COVID-19 Pandemic
Authors: Maznieda Mahjom, Rohaida Ismail, Masita Arip, Mohd Shaiful Azlan, Nor’Ashikin Othman, Hafizah Abdullah, nor Zahrin Hasran, Joshita Jothimanickam, Syaqilah Shawaluddin, Nadia Mohamad, Raheel Nazakat, Tuan Mohd Amin, Mizanurfakhri Ghazali, Rosmanajihah Mat Lazim
Abstract:
COVID-19 outbreak is particularly detrimental to the mental health of everyone as well as leaving a long devastating crisis in the healthcare sector. Daily increment of COVID-19 cases and close contact, necessitating the testing of a large number of samples, thus increasing the workload and burden to laboratory personnel. This study aims to determine the prevalence of personal-, work- and client-related burnout as well as to measure the concentration of salivary cortisol among laboratory personnel in the main laboratories in Klang Valley, Malaysia. This cross-sectional study was conducted in late 2021 and recruited a total of 404 respondents from three laboratories in Klang Valley, Malaysia. The level of burnout was assessed using Copenhagen Burnout Inventory (CBI) comprising three sub-dimensions of personal-, work- and client-related burnout. The cut-off score of 50% and above indicated possible burnout. Meanwhile, salivary cortisol was measured using a competitive enzyme immunoassay kit (Salimetrics, State College, PA, USA). Normal levels of salivary cortisol concentration in adults are within 0.094 to 1.551 μg/dl (morning) and can be none detected to 0.359 μg/dl (evening). The prevalence of personal-, work- and client-related burnout among laboratory personnel were 36.1%, 17.8% and 7.2% respectively. Meanwhile, the abnormal morning and evening cortisol concentration recorded were 29.5% and 21.8% excluding 6.9%-7.4% missing data. While the IgA level is normal for most of the respondents, which recorded at 95.53%. Laboratory personnel were at risk of suffering burnout during the COVID-19 pandemic. Thus, mental health programs need to be addressed at the department and hospital level by regularly screening healthcare workers and designing an intervention program. It is also vital to improve the coping skills of laboratory personnel by increasing the awareness of good coping skill techniques. The training must be in an innovative way to ensure that the lab personnel can internalise the technique and practise it in real life.Keywords: burnout, COVID-19, laborotary personnel, salivary cortisol
Procedia PDF Downloads 682258 Retrospective Study on the Impacts of Age, Gender, Economic Status, Education Level and Drug Availability in Public Hospital on Seeking Care of Dermatological Condition in Rwanda
Authors: Uwizera Egide
Abstract:
Introduction: Dermatological conditions are one of the most burdensome diseases in our health system. Global studies suggest that around 1 in 3 people gets a skin disease at a certain point in their life, though this does not necessarily guarantee the urge to consult. For a high-ranking disease, it is surprising how there is not enough data to support its effect on the economy and the general health system impact. It is for that reason that this study’s aim is to identify the burden of dermatological conditions in Rwanda so as to have a general picture of what our population is going through in regards to dermatological conditions. Methods: We used a cross sectional retrospective study. Data were obtained from patient’s information recorded in an open clinic at CHUB in a period of six months from July to December of the year 2021. Results: The study had a total of 4600 patients who attended dermatology service in a period of six months from July to December of the year 2021. We found a list of 102 dermatological diseases that presented at variable rates. The most prevalent disease was atopic dermatitis, at a rate of 23%. About 90% of presented conditions had only one choice of treatment from the hospital pharmacy. Most patients who presented were between 18-35 years old and with a predominance of the female gender; the level of education was either secondary or University Degree in our study, 65.4% of patients who presented were female; the majority, around 45% were between 18-35 years old, mostly being single 56%. The majority came from Southern province as it is the location of the hospital. The insurance mostly used was community-based health insurance with 63.8%, followed by RSSB with 18.5%, MS/UR, and other private insurances. The frequency of group drugs prescribed among all dermatological medications, steroids were the most commonly given medications at a rate of 39%, followed by emollients, antibiotics, and antifungal. The drugs prescribed were mostly available in the pharmacy of CHUB, with 60% and 40% being found in pharmacies outside the hospital. Conclusion: Dermatological conditions are prevalent in all age groups and distributed through all socioeconomic classes. About 9.2% of patient who consulted CHUB in 2021 presented one Dermatological condition of which 40 % of prescribed medications is never found in Hospital urging a need to buy medication in private pharmacies with more expenses and a risk of not complying on prescribed medication if in case they can’t afford paying them outside the CHUB. This finding urges a need to avail all essential dermatological drugs in hospital pharmacies to allow our patients to get them for the proper compliance of prescribed drugs in the management of skin diseases.Keywords: atopic dermatitis, CHUB (centre hopitalier univerisitaire de butare), dermatological condition, fungal infections
Procedia PDF Downloads 1152257 Identity and Citizenship Crises of Rohingya from the Perspective of Diaspora Communities
Authors: Mufizur Rahman
Abstract:
This thesis argues that by the citizenship policies of the Myanmar government, the rights of Rohingya have been taken away and the identity of Rohingya has been marginalized. An emphasis is made on the history, ancestors, homeland, and ideal when an individual seeks recognition for ethnic identity. Ethnic groups hold on to their unique culture, cultural heritage, language, homeland, and historical past not only to act in solidarity but also to reinforce the consciousness of national identity. Rohingya ethnic group in Rakhine state (formerly Arakan state) is in seek for identity and citizenship rights in the country. Even though Rohingya people have been living in Arakan for centuries, they are being marginalized and have been deprived of their rights by the 1982 citizenship law, which was created by the authoritarian leader after the military coup in 1962. This study elaborated marginalized and persecuted life of Rohingyas for decades by the Government of Myanmar (GOM) in their homeland and after the enactment of the 1982 Citizenship Law and citizenship policies enforced by the government. Thereby, every right was deprived systematically from the Rohingya by the GOM. By this circumstance of the country, many Rohingyas have fled from the country and sought asylum in other countries. This study primarily used the qualitative research data of in-depth personal interviews by conducting 18 Rohingya participants from the diaspora community, including male and female participants. The study examined the narrative of the Rohingya identity and citizenship policies of their homeland from the personal experience of the diaspora community.Keywords: Rohingya, identity, citizenship policies, Diaspora community, homeland, Myanmar
Procedia PDF Downloads 812256 Strategies to Combat the Covid-19 Epidemic
Authors: Marziye Hadian, Alireza Jabbari
Abstract:
Background: The World Health Organization has identified COVID-19 as a public health emergency and is urging governments to stop the virus transmission by adopting appropriate policies. In this regard, the countries have taken different approaches to cutting the chain or controlling the spread of the disease. Methods: The present study was a systematize review of publications relating to prevention strategies for covid-19 disease. The study was carried out based on the PRISMA guidelines and CASP for articles and AACODS for grey literature. Finding: The study findings showed that in order to confront the COVID-19 epidemic, in general, there are three approaches of "mitigation", "active control" and "suppression" and four strategies of "quarantine", "isolation", "social distance" as well as "lockdown" in both individual and social dimensions to deal with epidemics that the choice of each approach requires specific strategies and has different effects when it comes to controlling and inhibiting the disease. Conclusion: The only way to control the disease is to change your behavior and lifestyle. In addition to prevention strategies, use of masks, observance of personal hygiene principles such as regular hand washing and non-contact of contaminated hands with the face, as well as observance of public health principles such as control of sneezing and coughing, safe extermination of personal protective equipment, etc. have not been included in the category of prevention tools. However, it has a great impact on controlling the epidemic, especially the new coronavirus epidemic.Keywords: novel corona virus, COVID-19, prevention tools, prevention strategies
Procedia PDF Downloads 1402255 Incidence of Breast Cancer and Enterococcus Infection: A Retrospective Analysis
Authors: Matthew Cardeiro, Amalia D. Ardeljan, Lexi Frankel, Dianela Prado Escobar, Catalina Molnar, Omar M. Rashid
Abstract:
Introduction: Enterococci comprise the natural flora of nearly all animals and are ubiquitous in food manufacturing and probiotics. However, its role in the microbiome remains controversial. The gut microbiome has shown to play an important role in immunology and cancer. Further, recent data has suggested a relationship between gut microbiota and breast cancer. These studies have shown that the gut microbiome of patients with breast cancer differs from that of healthy patients. Research regarding enterococcus infection and its sequala is limited, and further research is needed in order to understand the relationship between infection and cancer. Enterococcus may prevent the development of breast cancer (BC) through complex immunologic and microbiotic adaptations following an enterococcus infection. This study investigated the effect of enterococcus infection and the incidence of BC. Methods: A retrospective study (January 2010- December 2019) was provided by a Health Insurance Portability and Accountability Act (HIPAA) compliant national database and conducted using a Humans Health Insurance Database. International Classification of Disease (ICD) 9th and 10th codes, Current Procedural Terminology (CPT), and National Drug Codes were used to identify BC diagnosis and enterococcus infection. Patients were matched for age, sex, Charlson Comorbidity Index (CCI), antibiotic treatment, and region of residence. Chi-squared, logistic regression, and odds ratio were implemented to assess the significance and estimate relative risk. Results: 671 out of 28,518 (2.35%) patients with a prior enterococcus infection and 1,459 out of 28,518 (5.12%) patients without enterococcus infection subsequently developed BC, and the difference was statistically significant (p<2.2x10⁻¹⁶). Logistic regression also indicated enterococcus infection was associated with a decreased incidence of BC (RR=0.60, 95% CI [0.57, 0.63]). Treatment for enterococcus infection was analyzed and controlled for in both enterococcus infected and noninfected populations. 398 out of 11,523 (3.34%) patients with a prior enterococcus infection and treated with antibiotics were compared to 624 out of 11,523 (5.41%) patients with no history of enterococcus infection (control) and received antibiotic treatment. Both populations subsequently developed BC. Results remained statistically significant (p<2.2x10-16) with a relative risk of 0.57 (95% CI [0.54, 0.60]). Conclusion & Discussion: This study shows a statistically significant correlation between enterococcus infection and a decrease incidence of breast cancer. Further exploration is needed to identify and understand not only the role of enterococcus in the microbiome but also the protective mechanism(s) and impact enterococcus infection may have on breast cancer development. Ultimately, further research is needed in order to understand the complex and intricate relationship between the microbiome, immunology, bacterial infections, and carcinogenesis.Keywords: breast cancer, enterococcus, immunology, infection, microbiome
Procedia PDF Downloads 1732254 A Machine Learning Approach to Detecting Evasive PDF Malware
Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran
Abstract:
The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.Keywords: PDF, PDF malware, decision tree classifier, random forest classifier
Procedia PDF Downloads 912253 A.T.O.M.- Artificial Intelligent Omnipresent Machine
Authors: R. Kanthavel, R. Yogesh Kumar, T. Narendrakumar, B. Santhosh, S. Surya Prakash
Abstract:
This paper primarily focuses on developing an affordable personal assistant and the implementation of it in the field of Artificial Intelligence (AI) to create a virtual assistant/friend. The problem in existing home automation techniques is that it requires the usage of exact command words present in the database to execute the corresponding task. Our proposed work is ATOM a.k.a ‘Artificial intelligence Talking Omnipresent Machine’. Our inspiration came from an unlikely source- the movie ‘Iron Man’ in which a character called J.A.R.V.I.S has omnipresence, and device controlling capability. This device can control household devices in real time and send the live information to the user. This device does not require the user to utter the exact commands specified in the database as it can capture the keywords from the uttered commands, correlates the obtained keywords and perform the specified task. This ability to compare and correlate the keywords gives the user the liberty to give commands which are not necessarily the exact words provided in the database. The proposed work has a higher flexibility (due to its keyword extracting ability from the user input) comparing to the existing work Intelligent Home automation System (IHAS), is more accurate, and is much more affordable as it makes use of WI-FI module and raspberry pi 2 instead of ZigBee and a computer respectively.Keywords: home automation, speech recognition, voice control, personal assistant, artificial intelligence
Procedia PDF Downloads 3362252 Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code
Authors: Deborah Garcia-Magna
Abstract:
The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc.Keywords: criminal law reform, ECHR jurisprudence, right to privacy, sexting
Procedia PDF Downloads 1942251 Quick Response(QR) Code for Vehicle Registration and Identification
Authors: S. Malarvizhi, S. Sadiq Basha, M. Santhosh Kumar, K. Saravanan, R. Sasikumar, R. Satheesh
Abstract:
This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages.Keywords: QR code, QR reader, registration, authentication, idenfication
Procedia PDF Downloads 494