Search results for: healthcare data security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27201

Search results for: healthcare data security

26451 Healthcare Professionals' Perspectives on Warfarin Therapy at Lao-Luxembourg Heart Centre, Mahosot Hospital, Lao PDR

Authors: Vanlounni Sibounheuang, Wanarat Anusornsangiam, Pattarin Kittiboonyakun, Chanthanom Manithip

Abstract:

In worldwide, one of the most common use of oral anticoagulant is warfarin. Its margin between therapeutic inhibition of clot formation and bleeding complications is narrow. Mahosot Hospital, warfarin clinic had not been established yet. The descriptive study was conducted by investigating drug-related problems of outpatients using warfarin, the value of the international normalized ratio (INR) higher than normal ranges (25.40 % of the total 272 outpatients) were mostly identified at Lao-Luxembourg Heart Centre, Mahosot Hospital, Lao PDR. This result led to the present study conducting qualitative interviews in order to help establish a warfarin clinic at Mahosot Hospital for the better outcomes of patients using warfarin. The purpose of this study was to explore perspectives of healthcare professional providing services for outpatients using warfarin. The face to face, in-depth interviews were undertaken among nine healthcare professionals (doctor=3, nurse=3, pharmacist=3) working at out-patient clinic, Lao-Luxembourg Heart Centre, Mahosot Hospital, Lao PDR. The interview guides were developed, and they were validated by the experts in the fields of qualitative research. Each interview lasted approximately 20 minutes. Three major themes emerged; healthcare professional’s experiences of current practice problems with warfarin therapy, healthcare professionals’ views of medical problems related to patients using warfarin, and healthcare professionals’ perspectives on ways of service improvement. All healthcare professionals had the same views that it’s difficult to achieve INR goal for individual patients because of some important patient barriers especially lack of knowledge about to use warfarin properly and safety, patients not regularly follow-up due to problems with transportations and financial support. Doctors and nurses agreed to have a pharmacist running a routine warfarin clinic and provided counselling to individual patients on the following points: how to take drug properly and safety, drug-drug and food-drug interactions, common side effects and how to manage them, lifestyle modifications. From the interviews, some important components of the establishment of a warfarin clinic included financial support, increased human resources, improved the system of keeping patients’ medical records, short course training for pharmacists. This study indicated the acceptance of healthcare professionals on the important roles of pharmacists and the feasibility of setting up warfarin clinic by working together with the multidisciplinary health care team in order to help improve health outcomes of patients using warfarin at Mahosot Hospital, Lao PDR.

Keywords: perspectives, healthcare professional, warfarin therapy, Mahosot Hospital

Procedia PDF Downloads 96
26450 Changing the Dynamics of the Regional Water Security in the Mekong River Basin: An Explorative Study Understanding the Cooperation and Conflict from Critical Hydropolitical Perspective

Authors: Richard Grünwald, Wenling Wang, Yan Feng

Abstract:

The presented paper explores the changing dynamics of regional water security in the Mekong River Basin and examines the contemporary water-related challenges from a critical hydropolitical perspective. By drawing on the Lancang-Mekong Cooperation and Conflict Database (LMCCD) recording more than 3000 water-related events within the basin in the last 30 years, we identified several trends changing the dynamics of the regional water security in the Mekong River Basin. Firstly, there is growing politicization of water that is no longer interpreted as abundant. While some scientists blame the rapid basin development, particularly in upstream countries, other researchers consider climate change and cumulative environmental impacts of various water projects as the main culprit for changing the water flow. Secondly, there is an increasing securitization of large-scale hydropower dams with questionable outcomes. Despite hydropower dams raise many controversies, many riparian states push the development at all cost. Such water security dilemma can be especially traced to Laos and Cambodia, which highly invest in the hydropower sector even at the expense of the local environment and good relations with neighbouring countries situated lower on the river. Thirdly, there is a lack of accountable transboundary water governance that will effectively face a looming water crisis. To date, most of the existing cooperation mechanisms are undermined by the geopolitical interests of foreign donors and increasing mistrust to scientific approaches dealing with water insecurity. Our findings are beneficial for the policy-makers and other water experts who want to grasp the broader hydropolitical context in the Mekong River Basin and better understand the new water security threats, including misinterpretation of the hydrological data and legitimization of the pro-development narratives.

Keywords: critical hydropolitics, mekong river, politicization of science, water governance, water security

Procedia PDF Downloads 208
26449 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 116
26448 Talent Management by Employee Involvement in Healthcare Industries of India: An Analytical Case Study

Authors: Alpa Mehta

Abstract:

Talent acquisition, development, and retention are major issues encountered in the health care industries in any country. Recent authentic data showed that employee turnover in the field of health care is increasing day by day compare to other industrial sectors. There are many reasons behind retention issues. One of such can be the lack of involvement and engagement of health workers in day to day HRM. Health care is a noble profession and employee has to deal with the patient with the optimum level of satisfaction and productivity. So employee morale and motivation should be high. This area of concern is mostly ignored by management, and ultimately it turns into dissatisfaction and abandonment in search of other jobs. The paper analyses the HRM tools to retain healthcare employee with high moral through employee involvement. The paper includes the case study of One of the Prominent Health care institute of India has found out a way to retain talented employees in the organization with the tool of employee engagement.

Keywords: employee involvement, health care industry, human resources management, talent retention

Procedia PDF Downloads 455
26447 Implementation and Use of Person-Centered Care in Europe: A Literature Review

Authors: Kristina Rosengren, Petra Brannefors, Eric Carlstrom

Abstract:

Background: Implementation and use of person-centered care (PCC) is increasing worldwide, and why the current study intends to increase knowledge regarding how PCC is used in different European countries. Purpose: To describe the extent of person-centred care in 23 European countries in relation to use specific countries healthcare system (Beveridge, Bismarck, Mixed/OOP). Methods: The study was conducted by literature review inspired by Spice, both scientific empirical studies (Cinahl, Medline, Scopus) as well as grey literature (Google) were used. Totally 1194 documents were included divided into Cinahl n=139, Medline n=245, Scopus n=493 and Google n=317. Data were analysed with descriptive (percentage, range) regarding content and scope of PCC/country according to content and scope of PCC in each country, grouped into the healthcare system (Beveridge, Bismarck, Mixed/OOP) and geographic placement. Results: PCC were most common in UK (England, Scotland, Wales, North Ireland), n=481, 40.3%, Sweden (n=231, 19.3%), The Netherlands (n=80, 6.7%), Ireland (n=79, 6.6%) and Norway (n=61, 5.1%); and less common in Poland (0.6%), Hungary (0.5%), Greece (0.4%), Latvia (0.4%) and Serbia (0%). Beveridge healthcare system (12/23=0.5217, 52.2%) show 85 percent of documents with advantage of scientific literature valued 2.92 (n=999, 0.55-4.07), compare to advantage of grey literature in Bismarck (10/23=0.4347, 43.5%) with 15 percentage valued 2.35 (n=190, 0-3.27) followed by Mixed/OOP (1/23=4%) with 0.4 valued 2.25. Conclusions: Seven out of 10 countries with Beveridge health system used PCC compare to less-used PCC in countries with the Bismarck system. Research, as well as national regulations regarding PCC, are important tools to motivate the advantage of PCC in clinical practice. Moreover, implementation of PCC needs a systematic approach, from national (politicians), regional (guideline) and local (specific healthcare settings) levels visualized by decision-making as law, mission, policies, and routines in clinical practice to establish a well-integrated phenomenon in Europe.

Keywords: Beveridge, Bismarck, Europe, evidence-based, literature review, person-centered care

Procedia PDF Downloads 108
26446 The Food and Nutrition Security in Brazilian Quilombo: The Account of Experiences in Two Titled Territories

Authors: Dyego Ramos Henrique, Viviane Pimentel, Katia Souto, Ana Valéria Mendonça, Andrea Gallassi

Abstract:

Socioeconomic inequalities in Brazil have accentuated the aggravations of poverty among the most vulnerable populations, among which are the quilombola communities. The objective was to reflect on a situation of food and nutritional security in two Brazilian quilombola communities. The data were collected by means of reports of experience through the production of talk wheels in two quilombola communities (Itamatatiua and Mesquita), located in the cities of Alcântara and Cidade Ocidental. Access to health services and health promotion actions were still incipient in the quilombola communities visited. The perceptions of the participants of the quilombolas revealed that there are still repressed demands that have rendered the fulfillment of the principles of equity, universality and integrality, both for access to health and for access and availability of food. They recognize in governmental instances a socioeconomic-cultural valorization and nutritional qualities intrinsic to the foods produced by them. Although they have been used as communities of quilombolas live and their level of access to services and programs, dealing with quilombola communities does not mean dealing with 'isolated groups or a strictly homogeneous population.' It demands a great need of attention in relation to the access and availability of food, besides overcoming barriers that made it an unfeasible valuation of social, economic and cultural precepts, intrinsic to the thought about food and nutritional security in Brazilian quilombos.

Keywords: access to services, food and nutrition security, health promotion, quilombo population

Procedia PDF Downloads 222
26445 Enhancing Health Information Management with Smart Rings

Authors: Bhavishya Ramchandani

Abstract:

A little electronic device that is worn on the finger is called a smart ring. It incorporates mobile technology and has features that make it simple to use the device. These gadgets, which resemble conventional rings and are usually made to fit on the finger, are outfitted with features including access management, gesture control, mobile payment processing, and activity tracking. A poor sleep pattern, an irregular schedule, and bad eating habits are all part of the problems with health that a lot of people today are facing. Diets lacking fruits, vegetables, legumes, nuts, and whole grains are common. Individuals in India also experience metabolic issues. In the medical field, smart rings will help patients with problems relating to stomach illnesses and the incapacity to consume meals that are tailored to their bodies' needs. The smart ring tracks all bodily functions, including blood sugar and glucose levels, and presents the information instantly. Based on this data, the ring generates what the body will find to be perfect insights and a workable site layout. In addition, we conducted focus groups and individual interviews as part of our core approach and discussed the difficulties they're having maintaining the right diet, as well as whether or not the smart ring will be beneficial to them. However, everyone was very enthusiastic about and supportive of the concept of using smart rings in healthcare, and they believed that these rings may assist them in maintaining their health and having a well-balanced diet plan. This response came from the primary data, and also working on the Emerging Technology Canvas Analysis of smart rings in healthcare has led to a significant improvement in our understanding of the technology's application in the medical field. It is believed that there will be a growing demand for smart health care as people become more conscious of their health. The majority of individuals will finally utilize this ring after three to four years when demand for it will have increased. Their daily lives will be significantly impacted by it.

Keywords: smart ring, healthcare, electronic wearable, emerging technology

Procedia PDF Downloads 58
26444 Exploring Teledermatology in Selected Dermatology Clinics in San Fernando City, La Union

Authors: Everdeanne Javier, Kelvin Louie Abat, Alodia Rizzalynn Cabaya, Chynna Allyson Manzano, Vlasta Sai Espiritu, Raniah May Puzon, Michelle Tobler

Abstract:

Teledermatology is becoming a more popular form of providing dermatologic healthcare worldwide, and it will almost certainly play a larger role in the future. As the current pandemic continues to worsen, Teledermatology is seen as the primary alternative to face-to-face dermatology consultation; therefore, it needs to be enhanced and developed to become as convenient and reliable as it can be for both patients and doctors. This research paper seeks to know the processes used in teledermatology regarding delivery modalities and proper consultation. This study's research design is a Qualitative Descriptive approach to describe further the processes used by teledermatologists. An online survey questionnaire was used to collect data from Teledermatology Clinics in San Fernando City, La Union. Research showed that patients tend to embrace and be pleased with teledermatology as a way of accessing healthcare. On the other hand, clinicians have usually reported positive outcomes from teledermatology. Furthermore, it is not intended to be used instead of a face-to-face appointment with a dermatologist.

Keywords: teledermatology, online dermatology consultation, dermatology, dermatologist

Procedia PDF Downloads 262
26443 A Quantitative Study on the Structure of Corporate Social Responsibility in India

Authors: Raj C. Aparna

Abstract:

In India, the mandatory clause on Corporate Social Responsibility (CSR) in Companies Act, 2013 has led to varying responses from the companies. From excessive spending to resistance, the private and the public stakeholders have been considering the law from different perspectives. This paper tends to study the characteristics of CSR spending in India with emphasis on the locations to which the funds are routed. This study examines the effects of CSR fund flow on regional development by considering the growth in Gross State Domestic Product (GSDP), agriculture, education and healthcare using panel data for the 29 States in the country. The results confirm that the CSR funds have been instrumental in improving the quality of teaching and healthcare in the areas around the industrial hubs. However, the study shows that the corporates mostly invest in regions which are easily accessible to them, by their physical presence, irrespective of whether the area is developed or not. Such a skewness is visible in the extensive spending in and around the metropolitan cities, the established centers, in the country to which large chunks of CSR funds are channeled. The results show that there is a variation from what the government had proposed while initiating the CSR law to promote social inclusion and equality in the rural and isolated areas in the country. The implication is that even though societal improvement is the aim of CSR, ease of access to the needy is an essential factor in corporate choices. As poverty and lack of facilities are found in the innermost parts, it is vital to have government policies for their aid as corporate help.

Keywords: corporate social responsibility, geographic spread, panel data analysis, strategic implementation

Procedia PDF Downloads 106
26442 Challenges to Tuberculosis Control in Angola: The Narrative of Medical Professionals

Authors: Domingos Vita, Patrick Brady

Abstract:

Background: There is a tuberculosis (TB) epidemic in Angola that has been getting worse for more than a decade despite the active implementation of the DOTS strategy. The aim of this study was to directly interrogate healthcare workers involved in TB control on what they consider to be the drivers of the TB epidemic in Angola. Methods: Twenty four in-depth qualitative interviews were conducted with medical staff working in this field in the provinces of Luanda and Benguela. Results: The healthcare professionals see the migrant working poor as a particular problem for the control of TB. These migrants are constructed as ‘Rural People’ and are seen as non-compliant and late-presenting. This is a stigmatized and marginal group contending with the additional stigma associated with TB infection. The healthcare professionals interviewed also see the interruption of treatment and self medication generally as a better explanation for the TB epidemic than urbanization or lack of medication. Conclusions: The local narrative is in contrast to previous explanations used elsewhere in the developing world. To be effective policy must recognize the local issues of the migrant workforce, interruption of treatment and the stigma associated with TB in Angola.

Keywords: Africa, Angola, migrants, qualitative, research, tuberculosis

Procedia PDF Downloads 157
26441 A Novel Software Model for Enhancement of System Performance and Security through an Optimal Placement of PMU and FACTS

Authors: R. Kiran, B. R. Lakshmikantha, R. V. Parimala

Abstract:

Secure operation of power systems requires monitoring of the system operating conditions. Phasor measurement units (PMU) are the device, which uses synchronized signals from the GPS satellites, and provide the phasors information of voltage and currents at a given substation. The optimal locations for the PMUs must be determined, in order to avoid redundant use of PMUs. The objective of this paper is to make system observable by using minimum number of PMUs & the implementation of stability software at 22OkV grid for on-line estimation of the power system transfer capability based on voltage and thermal limitations and for security monitoring. This software utilizes State Estimator (SE) and synchrophasor PMU data sets for determining the power system operational margin under normal and contingency conditions. This software improves security of transmission system by continuously monitoring operational margin expressed in MW or in bus voltage angles, and alarms the operator if the margin violates a pre-defined threshold.

Keywords: state estimator (SE), flexible ac transmission systems (FACTS), optimal location, phasor measurement units (PMU)

Procedia PDF Downloads 405
26440 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 163
26439 Barriers to Access among Indigenous Women Seeking Prenatal Care: A Literature Review

Authors: Zarish Jawad, Nikita Chugh, Karina Dadar

Abstract:

Introduction: This paper aims to identify barriers indigenous women face in accessing prenatal care in Canada. It explores the differences in prenatal care received between indigenous and non-indigenous women. The objective is to look at changes or programs in Canada's healthcare system to reduce barriers to accessing safe prenatal care for indigenous women. Methods: A literature search of 12 papers was conducted using the following databases: PubMed, Medline, OVID, Google Scholar, and ScienceDirect. The studies included were written in English only, including indigenous females between the age of 19-35, and review articles were excluded. Participants in the studies examined did not have any severe underlying medical conditions for the duration of the study, and study designs included in the review are prospective cohort, cross-sectional, case report, and case-control studies. Results: Among all the barriers Indigenous women face in accessing prenatal care, the three most significant barriers Indigenous women face include a lack of culturally safe prenatal care, lack of services in the Indigenous community, proximity of prenatal facilities to Indigenous communities and costs of transportation. Discussion: The study found three significant barriers indigenous women face in accessing prenatal care in Canada; the geographical distribution of healthcare facilities, distrust between patients and healthcare professionals, and cultural sensitivity. Some of the suggested solutions include building more birthing and prenatal care facilities in rural areas for indigenous women, educating healthcare professionals on culturally sensitive healthcare, and involving indigenous people in the decision-making process to reduce distrust and power imbalances. Conclusion: The involvement of indigenous women and community leaders is important in making decisions regarding the implementation of effective healthcare and prenatal programs for indigenous women. However, further research is required to understand the effectiveness of the solutions and the barriers that make prenatal care less accessible for indigenous women in Canada.

Keywords: indigenous, maternal health, prenatal care, barriers

Procedia PDF Downloads 148
26438 “It’s All in Your Head”: Epistemic Injustice, Prejudice, and Power in the Modern Healthcare System

Authors: David Tennison

Abstract:

Epistemic injustice, an injustice done to a person specifically in their capacity as a “knower”, is a subtle form of discrimination, yet its effects can be as dehumanizing and damaging as more overt forms of discrimination. The lens of epistemic injustice has, in recent years, been fruitfully applied to the field of healthcare, examining questions of agency, power, credibility and belief in doctor-patient interactions. Contested illness patients (e.g., those with illnesses lacking scientific consensuses such as fibromyalgia (FM), Myalgic Encephalomyelitis/ Chronic Fatigue Syndrome (ME/CFS) and Long Covid) face higher levels of scrutiny than other patient groups and are often disbelieved or dismissed when their ailments cannot be easily imaged or tested for- often encapsulated by the expression “it’s all in your head”. Using the case study of FM, the trials of contested illness patients in healthcare can be conceptualized in terms of epistemic injustice, and what is going wrong in these doctor-patient relationships can be effectively diagnosed. This case study also helps reveal epistemic dysfunction (structural epistemic issues embedded in the healthcare system), how this relates to stigma identity-based prejudice, and how the healthcare system upholds existing societal hierarchies and disenfranchises the most vulnerable. In the modern landscape, where cases of these chronic illnesses are not only on the rise but future pandemics threaten to add to their number, this conversation is crucial for the well-being of patients and providers. This presentation will cover what epistemic injustice is and how it can be applied to the politics of the doctor-patient interaction on a micro level and the politics of the healthcare system more broadly. Contested illnesses will be explored in terms of how the “contested” label causes the patient to experience disease stigma and lowers their credibility in healthcare and across other aspects of life. This will be explored in tandem with a discussion of existing identity-based prejudice in the healthcare system and how social identities (such as those of gender, race, and socioeconomic status) intersect with the contested illness label. The effects of epistemic injustice, which include worsening patients’ symptoms of mental health and potentially disenfranchising them from the healthcare system altogether, will be presented alongside the potential ethical quandaries this poses for providers. Finally, issues with the way healthcare appointments and the modern NHS function will be explored in terms of epistemic injustice and solutions to improve doctor-patient communication and patient care will be discussed. The relationship between contested illness patients and healthcare providers is notoriously poor, and while this can mean frustration or feelings of unfulfillment in providers, the negative effects for patients are much more severe. The purpose of this research, then, is to highlight these issues and suggest ways in which to improve the healthcare experience for these patients, along with improving doctor-patient communication and mending the doctor-patient relationship in a tangible and realistic way. This research also aims to provoke important conversations about belief and hierarchy in medical settings and how these aspects intersect with identity prejudices.

Keywords: epistemic injustice, fibromyalgia, contested illnesses, chronic illnesses, doctor-patient relationships, philosophy of medicine

Procedia PDF Downloads 56
26437 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria

Authors: Adebisi A. Sunday, Babajide Adeokin

Abstract:

The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.

Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer

Procedia PDF Downloads 138
26436 Application of Logistics Regression Model to Ascertain the Determinants of Food Security among Households in Maiduguri, Metropolis, Borno State, Nigeria

Authors: Abdullahi Yahaya Musa, Harun Rann Bakari

Abstract:

The study examined the determinants of food security among households in Maiduguri, Metropolis, Borno State, Nigeria. The objectives of the study are to: examine the determinants of food security among households; identify the coping strategies employed by food-insecure households in Maiduguri, Metropolis, Borno State, Nigeria. The population of the study is 843,964 respondents out of which 400 respondents were sampled. The study used a self-developed questionnaire to collect data from four hundred (400) respondents. Four hundred (400) copies of questionnaires were administered and all were retrieved, making 100% return rate. The study employed descriptive and inferential statistics for data analysis. Descriptive statistics (frequency counts and percentages) was used to analyze the socio-economic characteristics of the respondents and objective four, while inferential statistics (logit regression analysis) was used to analyze one. Four hundred (400) copies of questionnaires were administered and all the four hundred (400) were retrieved, making a 100% return rate. The results were presented in tables and discussed according to the research objectives. The study revealed that HHA, HHE, HHSZ, HHSX, HHAS, HHI, HHFS, HHFE, HHAC and HHCDR were the determinants of food security in Maiduguri Metropolis. Relying on less preferred foods, purchasing food on credit, limiting food intake to ensure children get enough, borrowing money to buy foodstuffs, relying on help from relatives or friends outside the household, adult family members skipping or reducing a meal because of insufficient finances and ration money to household members to buy street food were the coping strategies employed by food-insecure households in Maiduguri metropolis. The study recommended that Nigeria Government should intensify the fight against the Boko haram insurgency. This will put an end to Boko Haram Insurgency and enable farmers to return to farming in Borno state.

Keywords: internally displaced persons, food security, coping strategies, descriptive statistics, logistics regression model, odd ratio

Procedia PDF Downloads 138
26435 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks

Authors: C. N. Vanitha, M. Usha

Abstract:

In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.

Keywords: neural networks, pattern learning, security, wireless sensor networks

Procedia PDF Downloads 402
26434 An Observational Study Assessing the Baseline Communication Behaviors among Healthcare Professionals in an Inpatient Setting in Singapore

Authors: Pin Yu Chen, Puay Chuan Lee, Yu Jen Loo, Ju Xia Zhang, Deborah Teo, Jack Wei Chieh Tan, Biauw Chi Ong

Abstract:

Background: Synchronous communication, such as telephone calls, remains the standard communication method between nurses and other healthcare professionals in Singapore public hospitals despite advances in asynchronous technological platforms, such as instant messaging. Although miscommunication is one of the most common causes of lapses in patient care, there is a scarcity of research characterizing baseline inter-professional healthcare communications in a hospital setting due to logistic difficulties. Objective: This study aims to characterize the frequency and patterns of communication behaviours among healthcare professionals. Methods: The one-week observational study was conducted on Monday through Sunday at the nursing station of a cardiovascular medicine and cardiothoracic surgery inpatient ward at the National Heart Centre Singapore. Subjects were shadowed by two physicians for sixteen hours or consecutive morning and afternoon nursing shifts. Communications were logged and characterized by type, duration, caller, and recipient. Results: A total of 1,023 communication events involving the attempted use of the common telephones at the nursing station were logged over a period of one week, corresponding to a frequency of one event every 5.45 minutes (SD 6.98, range 0-56 minutes). Nurses initiated the highest proportion of outbound calls (38.7%) via the nursing station common phone. A total of 179 face-to-face communications (17.5%), 362 inbound calls (35.39%), 481 outbound calls (47.02%), and 1 emergency alert (0.10%) were captured. Average response time for task-oriented communications was 159 minutes (SD 387.6, range 86-231). Approximately 1 in 3 communications captured aimed to clarify patient-related information. The total duration of time spent on synchronous communication events over one week, calculated from total inbound and outbound calls, was estimated to be a total of 7 hours. Conclusion: The results of our study showed that there is a significant amount of time spent on inter-professional healthcare communications via synchronous channels. Integration of patient-related information and use of asynchronous communication channels may help to reduce the redundancy of communications and clarifications. Future studies should explore the use of asynchronous mobile platforms to address the inefficiencies observed in healthcare communications.

Keywords: healthcare communication, healthcare management, nursing, qualitative observational study

Procedia PDF Downloads 208
26433 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 93
26432 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 378
26431 Exploring the Intersection Between the General Data Protection Regulation and the Artificial Intelligence Act

Authors: Maria Jędrzejczak, Patryk Pieniążek

Abstract:

The European legal reality is on the eve of significant change. In European Union law, there is talk of a “fourth industrial revolution”, which is driven by massive data resources linked to powerful algorithms and powerful computing capacity. The above is closely linked to technological developments in the area of artificial intelligence, which has prompted an analysis covering both the legal environment as well as the economic and social impact, also from an ethical perspective. The discussion on the regulation of artificial intelligence is one of the most serious yet widely held at both European Union and Member State level. The literature expects legal solutions to guarantee security for fundamental rights, including privacy, in artificial intelligence systems. There is no doubt that personal data have been increasingly processed in recent years. It would be impossible for artificial intelligence to function without processing large amounts of data (both personal and non-personal). The main driving force behind the current development of artificial intelligence is advances in computing, but also the increasing availability of data. High-quality data are crucial to the effectiveness of many artificial intelligence systems, particularly when using techniques involving model training. The use of computers and artificial intelligence technology allows for an increase in the speed and efficiency of the actions taken, but also creates security risks for the data processed of an unprecedented magnitude. The proposed regulation in the field of artificial intelligence requires analysis in terms of its impact on the regulation on personal data protection. It is necessary to determine what the mutual relationship between these regulations is and what areas are particularly important in the personal data protection regulation for processing personal data in artificial intelligence systems. The adopted axis of considerations is a preliminary assessment of two issues: 1) what principles of data protection should be applied in particular during processing personal data in artificial intelligence systems, 2) what regulation on liability for personal data breaches is in such systems. The need to change the regulations regarding the rights and obligations of data subjects and entities processing personal data cannot be excluded. It is possible that changes will be required in the provisions regarding the assignment of liability for a breach of personal data protection processed in artificial intelligence systems. The research process in this case concerns the identification of areas in the field of personal data protection that are particularly important (and may require re-regulation) due to the introduction of the proposed legal regulation regarding artificial intelligence. The main question that the authors want to answer is how the European Union regulation against data protection breaches in artificial intelligence systems is shaping up. The answer to this question will include examples to illustrate the practical implications of these legal regulations.

Keywords: data protection law, personal data, AI law, personal data breach

Procedia PDF Downloads 54
26430 Future Considerations for Wounded Service Members and Veterans of the Global War on Terror

Authors: Selina Doncevic, Lisa Perla, Angela Kindvall

Abstract:

The Global War on Terror which began after September 11, 2011, increased survivability of severe injuries requiring varying trajectories of rehabilitation and recovery. The costs encompass physiologic, functional, social, emotional, psychological, vocational and scholastic domains of life. The purpose of this poster is to inform private sector health care practitioners and clinicians at various levels of the unique and long term dynamics of healthcare recovery for polytrauma, and traumatic brain injured service members and veterans in the United States of America. Challenges include care delivery between the private sector, the department of defense, and veterans affairs healthcare systems while simultaneously supporting the dynamics of acute as well as latent complications associated with severe injury and illness. Clinical relevance, subtleties of protracted recovery, and overwhelmed systems of care are discussed in the context of lessons learned and in reflection on previous wars. Additional concerns for consideration and discussion include: the cost of protracted healthcare, various U.S. healthcare payer systems, lingering community reintegration challenges, ongoing care giver support, the rise of veterans support groups and the development of private sector clinical partnerships.

Keywords: brain injury, future, polytrauma, rehabilitation

Procedia PDF Downloads 194
26429 Elevating Healthcare Social Work: Implementing and Evaluating the (Introduction, Subjective, Objective, Assessment, Plan, Summary) Documentation Model

Authors: Shir Daphna-Tekoah, Nurit Eitan-Gutman, Uri Balla

Abstract:

Background: Systemic documentation is essential in social work practice. Collaboration between an institution of higher education and social work health care services enabled adaptation of the medical documentation model of SOAP in the field of social work, by creating the ISOAPS model (Introduction, Subjective, Objective, Assessment, Plan, Summary) model. Aims: The article describes the ISOAPS model and its implementation in the field of social work, as a tool for standardization of documentation and the enhancement of multidisciplinary collaboration. Methods: We examined the changes in standardization using a mixed methods study, both before and after implementation of the model. A review of social workers’ documentation was carried out by medical staff and social workers in the Clalit Healthcare Services, the largest provider of public and semi-private health services in Israel. After implementation of the model, semi-structured qualitative interviews were undertaken. Main findings: The percentage of reviewers who evaluated their documentation as correct increased from 46%, prior to implementation, to 61% after implementation. After implementation, 81% of the social workers noted that their documentation had become standardized. The training process prepared them for the change in documentation and most of them (83%) started using the model on a regular basis. The qualitative data indicate that the use of the ISOAPS model creates uniform documentation, improves standards and is important to teach social work students. Conclusions: The ISOAPS model standardizes documentation and promotes communication between social workers and medical staffs. Implications for practice: In the intricate realm of healthcare, efficient documentation systems are pivotal to ensuring coherent interdisciplinary communication and patient care. The ISOAPS model emerges as a quintessential instrument, meticulously tailored to the nuances of social work documentation. While it extends its utility across the broad spectrum of social work, its specificity is most pronounced in the medical domain. This model not only exemplifies rigorous academic and professional standards but also serves as a testament to the potential of contextualized documentation systems in elevating the overall stature of social work within healthcare. Such a strategic documentation tool can not only streamline the intricate processes inherent in medical social work but also underscore the indispensable role that social workers play in the broader healthcare ecosystem.

Keywords: ISOAPS, professional documentation, medial social-work, social work

Procedia PDF Downloads 67
26428 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 275
26427 The Principle of Methodological Rationality and Security of Organisations

Authors: Jan Franciszek Jacko

Abstract:

This investigation presents the principle of methodological rationality of decision making and discusses the impact of an organisation's members' methodologically rational or irrational decisions on its security. This study formulates and partially justifies some research hypotheses regarding the impact. The thinking experiment is used according to Max Weber's ideal types method. Two idealised situations("models") are compared: Model A, whereall decision-makers follow methodologically rational decision-making procedures. Model B, in which these agents follow methodologically irrational decision-making practices. Analysing and comparing the two models will allow the formulation of some research hypotheses regarding the impact of methodologically rational and irrational attitudes of members of an organisation on its security. In addition to the method, phenomenological analyses of rationality and irrationality are applied.

Keywords: methodological rationality, rational decisions, security of organisations, philosophy of economics

Procedia PDF Downloads 135
26426 The Developing of Knowledge-Based System for the Medical Treatment with Herbs

Authors: Rujijan Vichivanives

Abstract:

This research aims to create a knowledge-based system as a database for self-healthcare analysis, diagnosis of simple illnesses, and the use of Thai herbs instead of modern medicine by using principles of Thai traditional medication theory. These were disseminated by website network programs within Suan Sunandha Rajabhat University. The population used in this study was divided into two groups: the first group consisted of four experts of Thai traditional medication and the second group was 300 website users. The methods used for collecting data were paper questionnaires and poll questionnaires on the website. The statistics used for analyzing data was at an average level. The results were divided into three parts: the first part was the development of a knowledge-based system and the second part was applied programs on website. Both parts could be fulfilled and achieved according to the set goal. The third part was the evaluation of the study: The evaluation of the viewpoints of the experts towards website designs were evaluated at a good level of 4.20. The satisfaction evaluation of the users was found at a good level of average satisfactory level at 4.24. It was found that the young population of those under the age of 16 had less cares about their health than the population of other teenagers, working age adults and those of older age. The research findings should be extended in order to encourage the lifestyle modifications to people of all ages by using the self-healthcare principles.

Keywords: developing, herbs, knowledge-based system, medical treatment

Procedia PDF Downloads 323
26425 Regulatory Measures on Effective Nuclear Security and Safeguards System in Nigeria

Authors: Nnodi Chinweikpe Akelachi, Adebayo Oladini Kachollom Ifeoma

Abstract:

Insecurity and the possession of nuclear weapons for non-peaceful purposes constitute a major threat to global peace and security, and this undermines the capacity for sustainable development. In Nigeria, the threat of terrorism is a challenge to national stability. For over a decade, Nigeria has been faced with insecurity ranging from Boko-Haram terrorist groups, kidnapping and banditry. The threat exhibited by this non-state actor poses a huge challenge to nuclear and radiological high risks facilities in Nigeria. This challenge has resulted in the regulatory authority and International stakeholders formulating policies for a good mitigation strategy. This strategy is enshrined in formulated laws, regulations and guides like the repealed Nuclear Safety and Radiation Protection Act 19 of 1995 (Nuclear safety, Physical Security and Safeguards Bill), the Nigerian Physical Protection of Nuclear Material and Nuclear Facilities, and Nigerian Nuclear Safeguards Regulations of 2021. All this will help Nigeria’s effort to meet its national nuclear security and safeguards obligations. To further enhance the implementation of nuclear security and safeguards system, Nigeria has signed the Non-Proliferation Treaty (NPT) in 1970, the Comprehensive Safeguards Agreement (INFCIRC/358) in 1988, Additional Protocol in 2007 as well as the Convention on Physical Protection of Nuclear Material and its amendment in 2005. In view of the evolving threats by non-state actors in Nigeria, physical protection security upgrades are being implemented in nuclear and all high-risk radiological facilities through the support of the United States Department of Energy (US-DOE). Also, the IAEA has helped strengthen nuclear security and safeguard systems through the provision of technical assistance and capacity development. Efforts are being made to address some of the challenges identified in the cause of implementing the measures for effective nuclear security and safeguards systems in Nigeria. However, there are eminent challenges in the implementation of the measures within the security and systems in Nigeria. These challenges need to be addressed for an effective security and safeguard regime in Nigeria. This paper seeks to address the challenges encountered in implementing the regulatory and stakeholder measures for effective security and safeguards regime in Nigeria, amongst others.

Keywords: nuclear regulatory body, nuclear facilities and activities, international stakeholders, security and safeguards measures

Procedia PDF Downloads 108
26424 The Sustained Utility of Japan's Human Security Policy

Authors: Maria Thaemar Tana

Abstract:

The paper examines the policy and practice of Japan’s human security. Specifically, it asks the question: How does Japan’s shift towards a more proactive defence posture affect the place of human security in its foreign policy agenda? Corollary to this, how is Japan sustaining its human security policy? The objective of this research is to understand how Japan, chiefly through the Ministry of Foreign Affairs (MOFA) and JICA (Japan International Cooperation Agency), sustains the concept of human security as a policy framework. In addition, the paper also aims to show how and why Japan continues to include the concept in its overall foreign policy agenda. In light of the recent developments in Japan’s security policy, which essentially result from the changing security environment, human security appears to be gradually losing relevance. The paper, however, argues that despite the strategic challenges Japan faced and is facing, as well as the apparent decline of its economic diplomacy, human security remains to be an area of critical importance for Japanese foreign policy. In fact, as Japan becomes more proactive in its international affairs, the strategic value of human security also increases. Human security was initially envisioned to help Japan compensate for its weaknesses in the areas of traditional security, but as Japan moves closer to a more activist foreign policy, the soft policy of human security complements its hard security policies. Using the framework of neoclassical realism (NCR), the paper recognizes that policy-making is essentially a convergence of incentives and constraints at the international and domestic levels. The theory posits that there is no perfect 'transmission belt' linking material power on the one hand, and actual foreign policy on the other. State behavior is influenced by both international- and domestic-level variables, but while systemic pressures and incentives determine the general direction of foreign policy, they are not strong enough to affect the exact details of state conduct. Internal factors such as leaders’ perceptions, domestic institutions, and domestic norms, serve as intervening variables between the international system and foreign policy. Thus, applied to this study, Japan’s sustained utilization of human security as a foreign policy instrument (dependent variable) is essentially a result of systemic pressures (indirectly) (independent variables) and domestic processes (directly) (intervening variables). Two cases of Japan’s human security practice in two regions are examined in two time periods: Iraq in the Middle East (2001-2010) and South Sudan in Africa (2011-2017). The cases show that despite the different motives behind Japan’s decision to participate in these international peacekeepings ad peace-building operations, human security continues to be incorporated in both rhetoric and practice, thus demonstrating that it was and remains to be an important diplomatic tool. Different variables at the international and domestic levels will be examined to understand how the interaction among them results in changes and continuities in Japan’s human security policy.

Keywords: human security, foreign policy, neoclassical realism, peace-building

Procedia PDF Downloads 128
26423 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 141
26422 AI as a Tool Hindering Digital Education

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

The article presents the results of a survey conducted among students from various European countries. The aim of the study was to understand how artificial intelligence (AI) affects educational processes in a digital environment. The survey covered a wide range of topics, including students' understanding and use of AI, its impact on motivation and engagement, interaction and support issues, accessibility and equity, and data security and privacy concerns. Most respondents admitted having difficulties comprehending the advanced functions of AI in educational tools. Many students believe that excessive use of AI in education can decrease their motivation for self-study and active participation in classes. Additionally, students reported that interaction with AI-based tools is often less satisfying compared to direct contact with teachers. Furthermore, the survey highlighted inequalities in access to advanced AI tools, which can widen the educational gap between students from different economic backgrounds. Students also expressed concerns about the security and privacy of their personal data collected and processed by AI systems. The findings suggest that while AI has the potential to support digital education, significant challenges need to be addressed to make these tools more effective and acceptable for students. Recommendations include increasing training for students and teachers on using AI, providing more interactive and engaging forms of education, and implementing stricter regulations on data protection.

Keywords: AI, digital education, education tools, motivation and engagement

Procedia PDF Downloads 21