Search results for: information services for mission-oriented institute
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 14299

Search results for: information services for mission-oriented institute

13609 The Voluntary Audit of Semi-Annual Consolidated Financial Statements Decision and Accounting Conservatism

Authors: Shuofen Hsu, Ya-Yi Chao, Chao-Wei Li

Abstract:

This paper investigates the relationship between voluntary audit (hereafter, VA) of semi-annual consolidated financial statements decision and accounting conservatism. In general, there are four kinds of auditors' assurance services, which include audit, review, agreed-upon procedure and compliance engagements base on degree of assurance. The VA work by auditors may not only have the higher audit quality but an important signal of more reliable information than the review work. In Taiwan, The listed companies must prepare the semi-annual consolidated financial statements and with auditors' review before 2012, but some of the listed companies choose the assurance work from review to audit voluntarily. Due to the adoption of International Financial Reporting Standards, the listed companies were required to prepare the second quarterly consolidated financial statements which should be reviewed by auditors since 2013. This rule will change some of the assurance work from audit to review by auditors, and the information asymmetry maybe increased. To control the selection bias, we use two-stage model to test the relationship between VA decision and accounting conservatism. Our empirical results indicate that the VA decision and accounting conservatism have a significant positive relationship in firms with family-controlled. That is, firms with family-controlled are more likely to do VA and to prepare more conservative consolidated financial statements to reduce the information asymmetry, meaning that there is a complementary effect between VA and accounting conservatism for firms with more information asymmetry. But on the contrary, we find that the VA decision and accounting conservatism have a significant negative relationship in firms with professional managers-controlled, meaning that there is a substitution effect between VA and accounting conservatism for firms with less information asymmetry. Finally, the accounting conservatism of consolidated financial statements decrease after the adoption of IFRSs (International Financial Reporting Standards) in Taiwan. It means that the disclosure and transparency of consolidated financial statements had be improved.

Keywords: voluntary audit, accounting conservatism, audit quality, information asymmetry

Procedia PDF Downloads 222
13608 Socio-Ecological Factors Characterising Migrants and Refugee Youth’s Sexual and Reproductive Health and Rights

Authors: Michaels Aibangbee, Sowbhagya Micheal, Pranee Liamputtong, Elias Mpofu, Tinashe Dune

Abstract:

Background: The challenges migrants and refugee youth (MRY) experience in maintaining their sexual and reproductive health and rights (SRHR) continues to be a global public health issue. Consequently, MRY is more likely to encounter adverse SRH experiences due to limited access to and knowledge of SRH services. Using a socio-ecological framework, this study examined the MRY’s SRHR micro-level experiences to macro-levels analyses of SRH-related social systems and constructions. Methods: Eighteen focus groups were conducted using participatory action research (PAR) methodology to understand the phenomena. The focus groups included MRY participants (ages 16-26) living in Greater Western Sydney and facilitated by youth project liaisons (YPL). The data was afterward synthesised and analysed using the thematic-synthesis method. Results: In total, 86 MRY (male n= 25, female n= 61) MRY (across 20 different cultural backgrounds) participated in the focus groups. The findings identified socio-ecological factors characterising MRY SRHR, highlighting facilitators such as social media and significant barriers such as lack of access to services and socio-cultural dissonance, and the under-implementation of SRHR support and services by MRY. Key themes from the data included traditional and institutional stigma, lack of SRH education, high reliance on social media for SRH information, anonymity, and privacy concerns. Conclusion: The data shows a limited extent to which MRY SRHR is considered and the intergenerational understanding and stigma affecting the rights of MRY. Therefore, these findings suggest a need for policies and practices to empower MRY’s agency through a collaborative SRHR strategy and policy design to maintain relevance in multicultural contexts.

Keywords: migrant and refugee youth, sexual health, reproductive health, sexual and reproductive health and rights, culture, agency

Procedia PDF Downloads 62
13607 Technology Valuation of Unconventional Gas R&D Project Using Real Option Approach

Authors: Young Yoon, Jinsoo Kim

Abstract:

The adoption of information and communication technologies (ICT) in all industry is growing under industry 4.0. Many oil companies also are increasingly adopting ICT to improve the efficiency of existing operations, take more accurate and quicker decision making and reduce entire cost by optimization. It is true that ICT is playing an important role in the process of unconventional oil and gas development and companies must take advantage of ICT to gain competitive advantage. In this study, real option approach has been applied to Unconventional gas R&D project to evaluate ICT of them. Many unconventional gas reserves such as shale gas and coal-bed methane(CBM) has developed due to technological improvement and high energy price. There are many uncertainties in unconventional development on the three stage(Exploration, Development, Production). The traditional quantitative benefits-cost method, such as net present value(NPV) is not sufficient for capturing ICT value. We attempted to evaluate the ICT valuation by applying the compound option model; the model is applied to real CBM project case, showing how it consider uncertainties. Variables are treated as uncertain and a Monte Carlo simulation is performed to consider variables effect. Acknowledgement—This work was supported by the Energy Efficiency & Resources Core Technology Program of the Korea Institute of Energy Technology Evaluation and Planning (KETEP) granted financial resource from the Ministry of Trade, Industry & Energy, Republic of Korea (No. 20152510101880) and by the National Research Foundation of Korea Grant funded by the Korean Government (NRF-205S1A3A2046684).

Keywords: information and communication technologies, R&D, real option, unconventional gas

Procedia PDF Downloads 227
13606 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 570
13605 Copyright Infringement for Academic Authorship in Uganda: Implications on Exemptions of Fair Use for Educational Purposes in Universities

Authors: Elisam Magara

Abstract:

Like any other property, Intellectual Property (IP) must be regarded, respected, and remunerated to address the historical, ethical, economical and informational needs of society. Article 26 of the Constitution of the Republic of Uganda 1995, the Copyright and Neighbouring Rights (CNR) Act 2006 and CNR Regulations 2010 guide copyright protection in Uganda. However, an unpredictable environment has negatively impact on certain author/intellectual freedoms; and the infringements on academic works that affect the economic rights of authors that limit authors from fully enjoying the benefits of authorship. Notwithstanding the different licensing systems and copyright protection avenues, educational institutions and custodians of copyright works (libraries, archives) have continued to advocate for open access to information resources, under the legal exceptions of fair use for educational purposes. Thus, a study was conducted in educational institutions, libraries and archives in Uganda to assess the state of copyright infringement in Uganda in an increased use of academic authored works. The study attempted to establish the nature and forms of Copyright Infringement, the circumstances for copyright infringement, assessed the opinions from the custodians on strategies for balancing copyright protection for economic and moral gains by authors and increased access to information for educational purposes and fair-use. Through a survey, using a self-administered questionnaire, interviews and physical visits, the study was conducted in higher education institutions, libraries and archives among the officers that manage and keep copyright works. It established that the uncontrolled reproduction of copyright works in educational institutions and information institutions, have contributed copyright infringement robbing authors of their potential economic earnings and limiting their academic innovativeness and creativity. The study also established that lack of consciousness and awareness on copyright issues by lecturers, universities and libraries has made copyright works in Universities highly susceptible to copyright infringement. Thus the increased access to materials without restrictions has resulted in copyright infringement among the educational institutions, libraries and archives. A strategic alliance by the collecting Society (Uganda Reproduction Rights Organisation (URRO), government, Universities and right holders organisations (UTANA) to work together and institute a programme to address copyright protection and access to information is pertinently required.

Keywords: access to information, academic Writing, copyright, copyright infringement, copyright protection, exemptions of fair use, intellectual property rights

Procedia PDF Downloads 447
13604 Motherhood Managerial in Health Services: Need Eustress Internalization

Authors: Retty Ratnawati, Santi Sri Wulandari, Tulus Sabrina

Abstract:

Feminine and masculine gender role stress could occur in some work situation. Being manager in health services that is known to be more women’ role in Indonesia, has expected to have feminine stereotype role. In the communities, this has been done in the program kesejahteraan keluarga (welfare family program) since the 1970s, for example through family planning program. The aim of the study was to explore the experience of being a motherhood managerial in health services. Our auto ethnographic study has revealed that motherhood managerial, even though running by a woman, could have some stress conditions whether she has realized or has not. The challenge would occur when the manager did not realize that she needed the eustress. The autonomy concept for a woman to be a manager could be a complex cycle that needs open communication continually and understanding the four elements surround her life. In conclusion, there is a demand to have the eustress when the manager does not realize that she has to be an autonomy person. However, it does not need eustress when the manager understands about how to deal with the complex cycle of being autonomy.

Keywords: motherhood managerial, eustress, feminine gender role stress, masculine gender role stress, autonomy concept in women

Procedia PDF Downloads 270
13603 Survival of Islamic Banking Services in Tanzania: A Quick Survey on Conflicting Legal Framework

Authors: Ayoub Ali Maulana

Abstract:

“The success and sustainability of an Islamic finance system depends on the ability to establish a comprehensive legal and regulatory framework that supports synergy amongst the components in the system”. Numbers of banks have introduced Islamic banking windows claiming that their products follow Islamic banking values without any compromise. National Bank of Commerce Limited, Stanbic Bank Limited, Kenya Commercial Bank, The Peoples Bank of Zanzibar and Amana Bank Limited are some of the banks which offer Islamic banking products in Tanzania. To date, there is no single provision in Tanzanian laws that speak of Islamic banking activities in the country. Despite the fact that consultancy commissioned to International Monetary Fund (IMF) to research on the best laws to govern Islamic banking industry in the country, the speed is not encouraging in making sure that the same is introduced as soon as possible. This paper highlights the trend of the banking services in Tanzania and examines the application of Islamic banking system in the Tanzanian conventional banking environment. In particular the paper considers whether the Islamic banking services in Tanzania can survive without an appropriate legal framework that accommodates it.

Keywords: islamic banks, interest, islamic windows, Tanzania

Procedia PDF Downloads 342
13602 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 233
13601 Sustainable Community Participation in Australia

Authors: Virginia Dickson-Swift, Amanda Kenny, Jane Farmer, Sarah Larkins, Karen Carlisle, Helen Hickson

Abstract:

In this presentation, we will focus on the methods of Remote Services Futures (RSF), an evidence-based method of community participation that was developed in Scotland. Using oral health as the focus, we will discuss the ways that RSF can be used to achieve sustainable engagement with stakeholders from various parts of the community. We will describe our findings of using RSF methods to engage with rural communities, including the steps involved and what happened when we asked people about the oral health services that they thought were needed in their community. We found that most community members started by thinking that a public dental clinic was required in every community, which is not a sustainable health service delivery option. Through a series of facilitated workshops, communities were able to discuss and prioritise their needs and develop a costed plan for their community which will ensure sustainable service delivery into the future. Our study highlights the complexities of decision making in rural communities. It is important to ensure that when communities participate in health care planning that the outcomes are practical, feasible and sustainable.

Keywords: community participation, sustainable health planning, Remote Services Futures, rural communities

Procedia PDF Downloads 527
13600 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 227
13599 Analyzing Essential Patents of Mobile Communication Based on Patent Portfolio: Case Study of Long Term Evolution-Advanced

Authors: Kujhin Jeong, Sungjoo Lee

Abstract:

In the past, cross-licensing was made up of various application or commercial patents. Today, cross-licensing is restricted to essential patents, which has emphasized their importance significantly. Literature has shown that patent portfolio provides information for patent protection or strategy decision-making, but little empirical research has found strategic tool of essential patents. This paper will highlight four types of essential patent portfolio and analysis about each strategy in the field of LTE-A. Specifically we collected essential patents of mobile communication company through ETSI (European Telecommunication Standards Institute) and build-up portfolio activity, concentration, diversity, and quality. Using these portfolios, we can understand each company’s strategic character about the technology of LTE-A and comparison analysis of financial results. Essential patents portfolio displays a mobile communication company’s strategy and its strategy’s impact on the performance of a company.

Keywords: essential patent, portfolio, patent portfolio, essential patent portfolio

Procedia PDF Downloads 381
13598 Acceptance towards Counselling Services among Flood Victims in Selangor

Authors: Husni Mohd Radzi, Lilie Zahara Ramly, Sapora Sipon, Salhah Abdullah

Abstract:

Malaysia have been experiencing series of huge floods all around the country for the past decades despide planned development done by local authorities. The floods incurred due to factors like natural climate change or man-made disaster. Floods have caused a lot of damages, destructions and losses in term of infrastructure, financial implications and physical health. However, other damaging aspect was not being given much attention are the psychological need of the flood victim. The traumatic impact from the natural disaster like floods may cause serious psychological and spiritual deterioration. Many flood relief shelters in the past did not provide counseling services for flood victims to consult, and as a result, it contributes to added stress among the flood victims, as the issue were not being addressed. Some studies indicates that flood victims did not look for counseling service being offered. A total of 257 flood victim was involved in this study. Main area of the study was Kg Bukit Changgang, Kg. Rancangan Tanah Belia, Kg. Labohan Dagang and Kg.Olak Lempit in Kuala Langat, Selangor. The flood victims have responded to the survey given and the data was analyze using SPSS for descriptive information and other measures. At least 13 victims were reported to have experienced moderate to severe level of stress and anxiety over the flood disaster incidents and a total of 88 respondents admitted to have at least thought and consider getting counseling service.

Keywords: perception, acceptance towards counseling, counseling service for flood victim, disaster

Procedia PDF Downloads 312
13597 Optimization of Economic Order Quantity of Multi-Item Inventory Control Problem through Nonlinear Programming Technique

Authors: Prabha Rohatgi

Abstract:

To obtain an efficient control over a huge amount of inventory of drugs in pharmacy department of any hospital, generally, the medicines are categorized on the basis of their cost ‘ABC’ (Always Better Control), first and then categorize on the basis of their criticality ‘VED’ (Vital, Essential, desirable) for prioritization. About one-third of the annual expenditure of a hospital is spent on medicines. To minimize the inventory investment, the hospital management may like to keep the medicines inventory low, as medicines are perishable items. The main aim of each and every hospital is to provide better services to the patients under certain limited resources. To achieve the satisfactory level of health care services to outdoor patients, a hospital has to keep eye on the wastage of medicines because expiry date of medicines causes a great loss of money though it was limited and allocated for a particular period of time. The objectives of this study are to identify the categories of medicines requiring incentive managerial control. In this paper, to minimize the total inventory cost and the cost associated with the wastage of money due to expiry of medicines, an inventory control model is used as an estimation tool and then nonlinear programming technique is used under limited budget and fixed number of orders to be placed in a limited time period. Numerical computations have been given and shown that by using scientific methods in hospital services, we can give more effective way of inventory management under limited resources and can provide better health care services. The secondary data has been collected from a hospital to give empirical evidence.

Keywords: ABC-VED inventory classification, multi item inventory problem, nonlinear programming technique, optimization of EOQ

Procedia PDF Downloads 250
13596 Increasing The Role of Civil Society through LAPOR!: National Complaint Handling System in Indonesia

Authors: Izzati Nabiyla Risfa

Abstract:

The role of civil society has become an important issue in national and international level nowadays. Government all over the world started to realize that the involvement of civil society can boost up public services and better policy making. Global Policy Forum stated that there are five good reasons for civil society to be engaged in global governance; (1) to conferring legitimacy on policy decisions; (2) to increasing the pool of policy ideas; (3) to support less powerful governments; (4) countering a lack of political will; and (5) helping states to put nationalism aside. Indonesia also keeps up with this good trend. In November 2011, Indonesian Government set up LAPOR! (means “to report” in Indonesian), an online portal for complaints about public services, which is accessible through its website lapor.ukp.go.id. LAPOR! also accessible through social media (Twitter, Facebook) and text message. This program is an initiative from the government to provide an integrated and accessible portal for the Indonesian public to submit complaints and inquiries as a means of enhancing public participation in national development programs. LAPOR! aims to catalyze public participation as well as to have a more coordinated national complaint handling mechanism. The goal of this program is to increase the role of civil society in order to develop better public services. Thus, LAPOR! works in a simplest way possible. Public can submit any complaints or report their problem concerning development programs and public services simply through the website, short message services to 1708 and mobile applications for BlackBerry and Android. LAPOR! will then transfer every validated input to relevant institutions to be featured and responded on the website. LAPOR! is now integrated with 81 Ministries, 5 local government, and 44 State Owned Enterprise. Public can also give comments, likes or share them through Facebook and Twitter to have a discussion and to ensure the completeness of the reports. LAPOR! has unexpectedly contributed to various successful cases concerning public services. So far the portal has over 280,704 registered users, receiving an average of 1,000 reports every day. Government's response rate increase time to time, with 81% of complaints and inquiries have been solved or are being investigated. This paper will examine the effectiveness of LAPOR! as a tools to increase the role of civil society in order to develop better public services in Indonesia. Beside their promising story, there still are various difficulties that need to be solved. With qualitative approach as methodology for this research, writers will also explore potential improvement of LAPOR! so it can perform effectively as a leading national complaint handling system in Indonesia.

Keywords: civil society, government, Indonesia, public services

Procedia PDF Downloads 483
13595 Improving System Performance through User's Resource Access Patterns

Authors: K. C. Wong

Abstract:

This paper demonstrates a number of examples in the hope to shed some light on the possibility of designing future operating systems in a more adaptation-based manner. A modern operating system, we conceive, should possess the capability of 'learning' in such a way that it can dynamically adjust its services and behavior according to the current status of the environment in which it operates. In other words, a modern operating system should play a more proactive role during the session of providing system services to users. As such, a modern operating system is expected to create a computing environment, in which its users are provided with system services more matching their dynamically changing needs. The examples demonstrated in this paper show that user's resource access patterns 'learned' and determined during a session can be utilized to improve system performance and hence to provide users with a better and more effective computing environment. The paper also discusses how to use the frequency, the continuity, and the duration of resource accesses in a session to quantitatively measure and determine user's resource access patterns for the examples shown in the paper.

Keywords: adaptation-based systems, operating systems, resource access patterns, system performance

Procedia PDF Downloads 132
13594 The Impact of Equine-Assisted Therapy on Occupational Engagement for Children with Intellectual and/or Developmental Disabilities: From the Perspectives of the Children and Their Caregivers

Authors: Morgan Dempsey, Sam Lewis, Maggie Pierce, Alex Goodman

Abstract:

This research investigates the impact of equine-assisted therapy programs on occupational engagement for children with intellectual and developmental disabilities. There is a general lack of evidence for equine-based services for this population, so this research aims to decrease gaps in the current literature. To gain comprehensive insight, data will be collected from both the child and their caregiver. This study takes a qualitative approach utilizing online surveys and in-person guided interviews. The participants are individuals ages 4-17 with a diagnosed intellectual or developmental disability who are currently participating in a PATH int. certified equine-assisted therapy program. Also, caregivers of individuals who meet this criterion are included. This study decreases gaps in the literature by providing comprehensive data regarding the impacts of these services on occupational engagement. The addressed domains are physical, behavioral, emotional, and social functioning, as well as overall activity engagement and impacts in everyday life. With a better understanding of how equine-assisted therapy affects relevant outcomes for children with disabilities, an increased number of occupational therapists can implement these uniquely effective services while adhering to standards of evidence-based practice. Ultimately, this research strives to contribute to generalizable data in occupational therapy by supporting the implementation of equine-assisted services for children with intellectual and/or developmental disabilities and their caregivers/families.

Keywords: occupational therapy, pediatric, rehabilitation, hippotherapy

Procedia PDF Downloads 27
13593 The Influence of Website Quality on Customer E-Satisfaction in Low Cost Airline

Authors: Zainab Khalifah, Wong Chiet Bing, Noor Hazarina Hashim

Abstract:

The evolution of customer behavior in purchasing products or services through the Internet leads to airline companies engaging in the e-ticketing process in order to maintain their business. A well-designed website is vitally significant for the airline companies to provide effective communication, support, and competitive advantage. This study was conducted to identify the dimensions of website quality for low cost airline and to investigate the relationship between the website quality and customer e-satisfaction at low cost airline. A total of 381 responses were conveniently collected among local passengers at Low Cost Carrier Terminal, Kuala Lumpur via questionnaire distribution. This study found that the five determinant factors of website quality for AirAsia were Information Content, Navigation, Responsiveness, Personalization, and Security and Privacy. The results of this study revealed that there is a positive relationship between the five dimensions of website quality and customer e-satisfaction, and also information content was the most significant contributor to customer e-satisfaction.

Keywords: website quality, customer e-satisfaction, low cost airline, e-ticketing

Procedia PDF Downloads 414
13592 A Secure System for Handling Information from Heterogeous Sources

Authors: Shoohira Aftab, Hammad Afzal

Abstract:

Information integration is a well known procedure to provide consolidated view on sets of heterogeneous information sources. It not only provides better statistical analysis of information but also facilitates users to query without any knowledge on the underlying heterogeneous information sources The problem of providing a consolidated view of information can be handled using Semantic data (information stored in such a way that is understandable by machines and integrate-able without manual human intervention). However, integrating information using semantic web technology without any access management enforced, will results in increase of privacy and confidentiality concerns. In this research we have designed and developed a framework that would allow information from heterogeneous formats to be consolidated, thus resolving the issue of interoperability. We have also devised an access control system for defining explicit privacy constraints. We designed and applied our framework on both semantic and non-semantic data from heterogeneous resources. Our approach is validated using scenario based testing.

Keywords: information integration, semantic data, interoperability, security, access control system

Procedia PDF Downloads 344
13591 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services

Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen

Abstract:

Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.

Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes

Procedia PDF Downloads 269
13590 Cryptography Based Authentication Methods

Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf

Abstract:

This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.

Keywords: information security, cryptography, system access control, authentication, network security

Procedia PDF Downloads 462
13589 The Experiences and Needs of Mothers’ of Children With Cancer in Coping With the Child's Disease

Authors: Maarja Karbus, Elsbet Lippmaa, Kadri Kööp, Mare Tupits

Abstract:

Aim: The aim is to describe the experiences and needs of mothers of children with cancer in coping with the child's illness. Background: Cancer affects different life areas. Especially if it is a child, in this case the whole family is involved. Loved ones are mentally affected, there are limitations, and life changes need to be made to make the whole treatment regimen and recovery as comfortable as possible. Also, the whole process is expensive and time consuming. The research is part of a larger project that covers the experiences and needs of parents of children with chronic illness and coping strategies related to the child's illness. Design: Qualitative, empirical, descriptive research. Method: Semi-structured interviews were used to collect data and inductive content analysis was used to analyze the data. The interviews were conducted in the autumn of 2020, 5 respondents participated in the research. Results and Conclusions: The research revealed that the mothers' experiences of coping with a child's disease included health-related experiences, material aspects, changes in lifestyle, support systems and contact with professionals. Regarding the organizational and material aspects of life, the subjects presented experiences with economic problems, adaptation of changes in lifestyle, access to information and changes in the treatment process. With regard to health, the respondents identified experiences with the mother's physical and mental health and experiences with the health of an ill child. The experience of different support systems was related to the support of family, friends, acquaintances, various organizations and specialists. Experiences with specialist support included experiences with family relationships and positive and negatiive experiences with staff. The mothers' needs in dealing with the child's disease included the mother's emotional needs, the support of other family members, and the need for various support systems and services. The needs of coping with the child were the need for understanding, support, confidence, the need to be strong and courageous, the need to ignore one's own needs, and the need for personal time and rest. The needs of other family members included the needs of an ill child and the need to pay attention to other children in the family. The needs of different supporters and services were related to different helpers and different services.

Keywords: cancer, mother, coping, child, need, experience, illness

Procedia PDF Downloads 144
13588 Impact of Emergency Medicine Department Crowding on Mortality

Authors: Morteza Gharibi, Abdolghader Pakniat, Somayeh Bahrampouri

Abstract:

Introduction: Emergency department (E.R.) crowding is a serious widespread problem in hospitals that leads to irregularities, a slower rate of delivery of services to patients, and a long-term stay. In addition, the long-term stay in the E.D. reduces the possibility of providing services with appropriate quality to other patients who are undergoing medical emergencies, which leads to dissatisfaction among patients. This study aimed to determine the relationship between ED-crowding and the mortality rate of the patients referred to the E.D. In a retrospective cohort study, all patients who expired in first 24 hours of admission were enrolled in the study. Crowding index at the moment of admission was calculated using Edwin Score. The data including history and physical examination, time of arrival in the E.D., diagnosis (using ICD 10 code), time of death, cause of death, demographic information was recoded based on triage forms on admission and patients’ medical files. Data analysis was performed by using descriptive statistics and chi square test, ANOVA tests using SPSS ver. 19. The time of arrival in E.D. to death in crowded E.D. conditions, with an average of five hours and 25 minutes, was significantly higher than the average admission Time of arrival in E.D. to death in active and crowded E.D. conditions. More physicians and nurses can be employed during crowded times to reduce staff fatigue and improve their performance during these hours.

Keywords: mortality, emergency, department, crowding

Procedia PDF Downloads 88
13587 Meta Root ID Passwordless Authentication Using ZKP Bitcoin Protocol

Authors: Saransh Sharma, Atharv Dekhne

Abstract:

Passwords stored on central services and hashed are prone to cyberattacks and hacks. Hence, given all these nuisances, there’s a need to eliminate character-based authentication protocols, which would ultimately benefit all developers as well as end-users.To replace this conventional but antiquated protocol with a secure alternative would be Passwordless Authentication. The meta root.id system creates a public and private key, of which the user is only able to access the private key. Further, after signing the key, the user sends the information over the API to the server, which checks its validity with the public key and grants access accordingly.

Keywords: passwordless, OAuth, bitcoin, ZKP, SIN, BIP

Procedia PDF Downloads 89
13586 Workplace Risk Assessment in a Paint Factory

Authors: Rula D. Alshareef, Safa S. Alqathmi, Ghadah K. Alkhouldi, Reem O. Bagabas, Farheen B. Hasan

Abstract:

Safety engineering is among the most crucial considerations in any work environment. Providing mentally, physically, and environmentally safe work conditions must be the top priority of any successful organization. Company X is a local paint production company in Saudi Arabia; in a month, the factory experienced two significant accidents, which indicates that workers’ safety is overlooked. The aim of the research is to examine the risks, assess the root causes and recommend control measures that will eventually contribute to providing a safe workplace. The methodology used is sectioned into three phases, risk identification, assessment, and finally, mitigation. In the identification phase, the team used Rapid Entire Body Assessment (REBA) and National Institute for Occupational Safety and Health Lifting Index (NIOSH LI) tools to holistically establish knowledge about the current risk posed to the factory. The physical hazards in the factory were assessed in two different operations, which are mixing and filling/packaging. For the risk assessment phase, the hazards were deeply analyzed through their severity and impact. Additionally, through risk mitigation, the Rapid Entire Body Assessment (REBA) score decreased from 11 to 7, and the National Institute for Occupational Safety and Health Lifting Index (NIOSH LI) has been reduced from 5.27 to 1.85.

Keywords: ergonomics, safety, workplace risks, hazards, awkward posture, fatigue, work environment

Procedia PDF Downloads 75
13585 Imputing the Minimum Social Value of Public Healthcare: A General Equilibrium Model of Israel

Authors: Erez Yerushalmi, Sani Ziv

Abstract:

The rising demand for healthcare services, without a corresponding rise in public supply, led to a debate on whether to increase private healthcare provision - especially in hospital services and second-tier healthcare. Proponents for increasing private healthcare highlight gains in efficiency, while opponents its risk to social welfare. None, however, provide a measure of the social value and its impact on the economy in terms of a monetary value. In this paper, we impute a minimum social value of public healthcare that corresponds to indifference between gains in efficiency, with losses to social welfare. Our approach resembles contingent valuation methods that introduce a hypothetical market for non-commodities, but is different from them because we use numerical simulation techniques to exploit certain market failure conditions. In this paper, we develop a general equilibrium model that distinguishes between public-private healthcare services and public-private financing. Furthermore, the social value is modelled as a by product of healthcare services. The model is then calibrated to our unique health focused Social Accounting Matrix of Israel, and simulates the introduction of a hypothetical health-labour market - given that it is heavily regulated in the baseline (i.e., the true situation in Israel today). For baseline parameters, we estimate the minimum social value at around 18% public healthcare financing. The intuition is that the gain in economic welfare from improved efficiency, is offset by the loss in social welfare due to a reduction in available social value. We furthermore simulate a deregulated healthcare scenario that internalizes the imputed value of social value and searches for the optimal weight of public and private healthcare provision.

Keywords: contingent valuation method (CVM), general equilibrium model, hypothetical market, private-public healthcare, social value of public healthcare

Procedia PDF Downloads 140
13584 Patients' Satisfaction about Private Sector Primary Care Nurses in Sri Lanka

Authors: N. R. N. Mendis, S. N. Silva

Abstract:

Introduction: Patient satisfaction of services provided by primary care health services depends on many factors. One key factor in this depends on is the nursing services received in primary care. Since majority of the primary care in Sri Lanka is provided by the private sector, it is important to assess patient satisfaction on this. Objective: To assess the satisfaction among the public on nurses working in dispensaries in Sri Lanka. Methods: A descriptive study was done on 200 individual selected using convenient sampling among dispensaries in Gampaha district, Sri Lanka. Results: 59.3% of the sample had long term illnesses or disabilities and all of them preferred speaking to a nurse. 70.9% of the sample used to make appointments with nurses while 57.8% out of them were comfortable in discussing their health concerns. 98.9 % agreed that they get individual attention by the nurses. Majority of the sample that is 34.2% spends around 20 minutes with the nurse without even making any pay. Significantly, the whole sample believes that the nurses are professional and admits that the care given is of high quality. All 100% of the sample said that the nurses could understand their concerns while 93.5% admitted that it was very useful in their recovery. Conclusions: Majority of the public were very much satisfied with the nurses and their practice at the dispensaries.

Keywords: health education, nurses practices, patient satisfaction, primary care

Procedia PDF Downloads 374
13583 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 109
13582 Co-payment Strategies for Chronic Medications: A Qualitative and Comparative Analysis at European Level

Authors: Pedro M. Abreu, Bruno R. Mendes

Abstract:

The management of pharmacotherapy and the process of dispensing medicines is becoming critical in clinical pharmacy due to the increase of incidence and prevalence of chronic diseases, the complexity and customization of therapeutic regimens, the introduction of innovative and more expensive medicines, the unbalanced relation between expenditure and revenue as well as due to the lack of rationalization associated with medication use. For these reasons, co-payments emerged in Europe in the 70s and have been applied over the past few years in healthcare. Co-payments lead to a rationing and rationalization of user’s access under healthcare services and products, and simultaneously, to a qualification and improvement of the services and products for the end-user. This analysis, under hospital practices particularly and co-payment strategies in general, was carried out on all the European regions and identified four reference countries, that apply repeatedly this tool and with different approaches. The structure, content and adaptation of European co-payments were analyzed through 7 qualitative attributes and 19 performance indicators, and the results expressed in a scorecard, allowing to conclude that the German models (total score of 68,2% and 63,6% in both elected co-payments) can collect more compliance and effectiveness, the English models (total score of 50%) can be more accessible, and the French models (total score of 50%) can be more adequate to the socio-economic and legal framework. Other European models did not show the same quality and/or performance, so were not taken as a standard in the future design of co-payments strategies. In this sense, we can see in the co-payments a strategy not only to moderate the consumption of healthcare products and services, but especially to improve them, as well as a strategy to increment the value that the end-user assigns to these services and products, such as medicines.

Keywords: clinical pharmacy, co-payments, healthcare, medicines

Procedia PDF Downloads 247
13581 Institutional Cooperation to Foster Economic Development: Universities and Social Enterprises

Authors: Khrystyna Pavlyk

Abstract:

In the OECD countries, percentage of adults with higher education degrees has increased by 10 % during 2000-2010. Continuously increasing demand for higher education gives universities a chance of becoming key players in socio-economic development of a territory (region or city) via knowledge creation, knowledge transfer, and knowledge spillovers. During previous decade, universities have tried to support spin-offs and start-ups, introduced courses on sustainability and corporate social responsibility. While much has been done, new trends are starting to emerge in search of better approaches. Recently a number of universities created centers that conduct research in a field social entrepreneurship, which in turn underpin educational programs run at these universities. The list includes but is not limited to the Centre for Social Economy at University of Liège, Institute for Social Innovation at ESADE, Skoll Centre for Social Entrepreneurship at Oxford, Centre for Social Entrepreneurship at Rosklide, Social Entrepreneurship Initiative at INSEAD. Existing literature already examined social entrepreneurship centers in terms of position in the institutional structure, initial and additional funding, teaching initiatives, research achievements, and outreach activities. At the same time, Universities can become social enterprises themselves. Previous research revealed that universities use both business and social entrepreneurship models. Universities which are mainly driven by a social mission are more likely to transform into social entrepreneurial institutions. At the same time, currently, there is no clear understanding of what social entrepreneurship in higher education is about and thus social entrepreneurship in higher education needs to be studied and promoted at the same time. Main roles which socially oriented university can play in city development include: buyer (implementation of socially focused local procurement programs creates partnerships focused on local sustainable growth.); seller (centers created by universities can sell socially oriented goods and services, e.g. in consultancy.); employer (Universities can employ socially vulnerable groups.); business incubator (which will help current student to start their social enterprises). In the paper, we will analyze these in more detail. We will also examine a number of indicators that can be used to assess the impact, both direct and indirect, that universities can have on city's economy. At the same time, originality of this paper mainly lies not in methodological approaches used, but in countries evaluated. Social entrepreneurship is still treated as a relatively new phenomenon in post-transitional countries where social services were provided only by the state for many decades. Paper will provide data and example’s both from developed countries (the US and EU), and those located in CIS and CEE region.

Keywords: social enterprise, university, regional economic development, comparative study

Procedia PDF Downloads 250
13580 On Flexible Preferences for Standard Taxis, Electric Taxis, and Peer-to-Peer Ridesharing

Authors: Ricardo Daziano

Abstract:

In the analysis and planning of the mobility ecosystem, preferences for ride-hailing over incumbent street-hailing services need better understanding. In this paper, a seminonparametric discrete choice model that allows for flexible preference heterogeneity is fitted with data from a discrete choice experiment among adult commuters in Montreal, Canada (N=760). Participants chose among Uber, Teo (a local electric ride-hailing service that was in operation when data was collected in 2018), and a standard taxi when presented with information about cost, time (on-trip, waiting, walking), powertrain of the car (gasoline/hybrid) for Uber and taxi, and whether the available electric Teo was a Tesla (which was one of the actual features of the Teo fleet). The fitted flexible model offers several behavioral insights. Waiting time for ride-hailing services is associated with a statistically significant but low marginal disutility. For other time components, including on-ride, and street-hailing waiting and walking the estimates of the value of time show an interesting pattern: whereas in a conditional logit on-ride time reductions are valued higher, in the flexible LML specification means of the value of time follow the expected pattern of waiting and walking creating a higher disutility. At the same time, the LML estimates show the presence of important, multimodal unobserved preference heterogeneity.

Keywords: discrete choice, electric taxis, ridehailing, semiparametrics

Procedia PDF Downloads 156