Search results for: healthcare data security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27741

Search results for: healthcare data security

26991 Global Health Student Selected Components in Undergraduate Medical Education: Analysis of Student Feedback and Reflective Writings

Authors: Harriet Bothwell, Lowri Evans, Kevin Jones

Abstract:

Background: The University of Bristol provides all medical students the opportunity to undertake student selected components (SSCs) at multiple stages of the undergraduate programme. SSCs enable students to explore areas of interest that are not necessarily covered by the curriculum. Students are required to produce a written report and most use SSCs as an opportunity to undertake an audit or small research project. In 2013 Swindon Academy, based at the Great Western Hospital, offered eight students the opportunity of a global health SSC which included a two week trip to rural hospital in Uganda. This SSC has since expanded and in 2017 a total of 20 students had the opportunity to undertake small research projects at two hospitals in rural Uganda. 'Tomorrows Doctors' highlights the importance of understanding healthcare from a 'global perspective' and student feedback from previous SSCs suggests that self-assessed knowledge of global health increases as a result of this SSC. Through the most recent version of this SSC students had the opportunity to undertake projects in a wide range of specialties including paediatrics, palliative care, surgery and medical education. Methods: An anonymous online questionnaire was made available to students following the SSC. There was a response rate of 80% representing 16 out of the 20 students. This questionnaire surveyed students’ satisfaction and experience of the SSC including the level of academic, project and spiritual support provided as well as perceived challenges in completing the project and barriers to healthcare delivery in the low resource setting. This survey had multiple open questions allowing the collection of qualitative data. Further qualitative data was collected from the students’ project report. The suggested format included a reflection and all students completed these. All qualitative data underwent thematic analysis. Results: All respondents rated the overall experience of the SSC as 'good' or 'excellent'. Preliminary data suggest that students’ confidence in their knowledge of global health, diagnosis of tropical diseases and management of tropical diseases improved after completing this SSC. Thematic analysis of students' reflection is ongoing but suggests that students gain far more than improved knowledge of tropical diseases. Students reflect positively on having the opportunity to research in a low resource setting and feel that by completing these projects they will be 'useful' to the hospital. Several students reflect the stark contrast to healthcare delivery in the UK and recognise the 'privilege' of having a healthcare system that is free at the point of access. Some students noted the different approaches that clinicians in Uganda had to train in 'taking ownership' of their own learning. Conclusions: Students completing this SSC report increased knowledge of global health and tropical medicine. However, their reflections reveal much broader learning outcomes and demonstrate considerable insight in multiple topics including conducting research in the low resource setting, training and healthcare inequality.

Keywords: global health, medical education, student feedback, undergraduate

Procedia PDF Downloads 128
26990 Challenges to Tuberculosis Control in Angola: The Narrative of Medical Professionals

Authors: Domingos Vita, Patrick Brady

Abstract:

Background: There is a tuberculosis (TB) epidemic in Angola that has been getting worse for more than a decade despite the active implementation of the DOTS strategy. The aim of this study was to directly interrogate healthcare workers involved in TB control on what they consider to be the drivers of the TB epidemic in Angola. Methods: Twenty four in-depth qualitative interviews were conducted with medical staff working in this field in the provinces of Luanda and Benguela. Results: The healthcare professionals see the migrant working poor as a particular problem for the control of TB. These migrants are constructed as ‘Rural People’ and are seen as non-compliant and late-presenting. This is a stigmatized and marginal group contending with the additional stigma associated with TB infection. The healthcare professionals interviewed also see the interruption of treatment and self medication generally as a better explanation for the TB epidemic than urbanization or lack of medication. Conclusions: The local narrative is in contrast to previous explanations used elsewhere in the developing world. To be effective policy must recognize the local issues of the migrant workforce, interruption of treatment and the stigma associated with TB in Angola.

Keywords: Africa, Angola, migrants, qualitative, research, tuberculosis

Procedia PDF Downloads 161
26989 Innovative Technology to Sustain Food Security in Qatar

Authors: Sana Abusin

Abstract:

Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). Achieving food security requires three actions: 1) transforming surplus food to those who are insecure; 2) reducing food loss and waste by recycling food into valuable resources such as compost (“green fertilizer”) that can be used in growing food; and, finally, 3) establishing strong enforcement agencies to protect consumers from outdated food and promote healthy food. Currently, these objectives are approached separately and not in a sustainable fashion. Food security in Qatar is a research priority of Qatar University (2021-2025) and all national strategies, including the Qatar National Vision 2030 and food security strategy (2018-2023). The study aims to develop an innovative mobile application that supports a sustainable solution to food insecurity and food waste in Qatar. The application will provide a common solution for many different users. For producers, it will facilitate easy disposal of excess food. For charities, it will notify them about surplus food ready for redistribution. The application will also benefit the second layer of end-users in the form of food recycling companies, who will receive information about available food waste that is unable to be consumed. We will use self-exoplanetary diagrams and digital pictures to show all the steps to the final stage. The aim is to motivate the young generation toward innovation and creation, and to encourage public-private collaboration in this sector.

Keywords: food security, innovative technology, sustainability, food waste, Qatar

Procedia PDF Downloads 123
26988 Design and Implementation of a Nano-Power Wireless Sensor Device for Smart Home Security

Authors: Chia-Chi Chang

Abstract:

Most battery-driven wireless sensor devices will enter in sleep mode as soon as possible to extend the overall lifetime of a sensor network. It is necessary to turn off unnecessary radio and peripheral functions, especially the radio unit always consumes more energy than other components during wireless communication. The microcontroller is the most important part of the wireless sensor device. It is responsible for the manipulation of sensing data and communication protocols. The microcontroller always has different sleep modes, each with a different level of energy usage. The deeper the sleep, the lower the energy consumption. Most wireless sensor devices can only enter the sleep mode: the external low-frequency oscillator is still running to wake up the sleeping microcontroller when the sleep timer expires. In this paper, our sensor device can enter the extended sleep mode: none of the oscillator is running and the wireless sensor device has the nanoampere consumption and self-awaking ability. Finally, these wireless sensor devices were deployed in a smart home security network.

Keywords: wireless sensor network, battery-driven, sleep mode, home security

Procedia PDF Downloads 309
26987 Research on Malware Application Patterns of Using Permission Monitoring System

Authors: Seung-Hwan Ju, Yo-Han Choi, Hee-Suk Seo, Tae-Kyung Kim

Abstract:

This study investigates the permissions requested by Android applications, and the possibility of identifying suspicious applications based only on information presented to the user before an application is downloaded. The pattern analysis is based on a smaller data set consisting of confirmed malicious applications. The method is evaluated based on its ability to recognize malicious potential in the analyzed applications. In this study, we develop a system to monitor that mobile application permission at application update. This study is a service-based malware analysis. It will be based on the mobile security study.

Keywords: malware patterns, application permission, application analysis, security

Procedia PDF Downloads 525
26986 Pre-Shared Key Distribution Algorithms' Attacks for Body Area Networks: A Survey

Authors: Priti Kumari, Tricha Anjali

Abstract:

Body Area Networks (BANs) have emerged as the most promising technology for pervasive health care applications. Since they facilitate communication of very sensitive health data, information leakage in such networks can put human life at risk, and hence security inside BANs is a critical issue. Safe distribution and periodic refreshment of cryptographic keys are needed to ensure the highest level of security. In this paper, we focus on the key distribution techniques and how they are categorized for BAN. The state-of-art pre-shared key distribution algorithms are surveyed. Possible attacks on algorithms are demonstrated with examples.

Keywords: attacks, body area network, key distribution, key refreshment, pre-shared keys

Procedia PDF Downloads 366
26985 Barriers to Access among Indigenous Women Seeking Prenatal Care: A Literature Review

Authors: Zarish Jawad, Nikita Chugh, Karina Dadar

Abstract:

Introduction: This paper aims to identify barriers indigenous women face in accessing prenatal care in Canada. It explores the differences in prenatal care received between indigenous and non-indigenous women. The objective is to look at changes or programs in Canada's healthcare system to reduce barriers to accessing safe prenatal care for indigenous women. Methods: A literature search of 12 papers was conducted using the following databases: PubMed, Medline, OVID, Google Scholar, and ScienceDirect. The studies included were written in English only, including indigenous females between the age of 19-35, and review articles were excluded. Participants in the studies examined did not have any severe underlying medical conditions for the duration of the study, and study designs included in the review are prospective cohort, cross-sectional, case report, and case-control studies. Results: Among all the barriers Indigenous women face in accessing prenatal care, the three most significant barriers Indigenous women face include a lack of culturally safe prenatal care, lack of services in the Indigenous community, proximity of prenatal facilities to Indigenous communities and costs of transportation. Discussion: The study found three significant barriers indigenous women face in accessing prenatal care in Canada; the geographical distribution of healthcare facilities, distrust between patients and healthcare professionals, and cultural sensitivity. Some of the suggested solutions include building more birthing and prenatal care facilities in rural areas for indigenous women, educating healthcare professionals on culturally sensitive healthcare, and involving indigenous people in the decision-making process to reduce distrust and power imbalances. Conclusion: The involvement of indigenous women and community leaders is important in making decisions regarding the implementation of effective healthcare and prenatal programs for indigenous women. However, further research is required to understand the effectiveness of the solutions and the barriers that make prenatal care less accessible for indigenous women in Canada.

Keywords: indigenous, maternal health, prenatal care, barriers

Procedia PDF Downloads 152
26984 Vaccination against Hepatitis B in Tunisian Health Care Workers

Authors: Asma Ammar, Nabiha Bouafia , Asma BenCheikh, Mohamed Mahjoub, Olfa Ezzi, Wadiaa Bannour, Radhia Helali, Mansour Njah

Abstract:

Background: The objective of the present study was to identify factors associated with vaccination against Hepatitis B virus (HBV) among healthcare workers (HWs) in the University Hospital Center (UHC) Farhat Hached Sousse, Tunisia. Methods: We conducted a descriptive cross-sectional study all licensed physicians (n= 206) and a representative sample of paramedical staff (n= 372) exercising at UHC Hached Sousse (Tunisia) during two months (January and February 2014). Data were collected using a self-administered and pre-tested questionnaire, which composed by 21 questions. In order to determinate factors associated with vaccination against hepatitis B among HWs, this questionnaire was based on the Health Belief Model, one of the most classical behavior theories. Logistic regression with the stepwise method of Hosmer and Lemeshow was used to identify the determinants of the use of vaccination against HBV. Results: The response rates were 79.8%. Fifty two percent believe that HBV is frequent in our healthcare units and 60.6% consider it a severe infection. The prevalence of HWs vaccination was 39%, 95% CI [34.49%; 43.5%]. In multivariate analysis, determinants of the use of vaccination against HBV among HWs were young age (p=10-4), male gender (p = 0. 006), high or very high importance accorded to health (p = 0.035), perception membership in a risk group for HBV infection (p = 0.038) and very favorable or favorable opinion about vaccination against HVB (p=10-4). Conclusion: The results of our study should be considered in any strategy for preventing VHB infection in HWs. In the mean time, coverage with standard vaccines should be improved also by supplying complete information on the risks of VHB infection and on the safety and efficacy of vaccination.

Keywords: Hepatitis B virus, healthcare workers, prevalence, vaccination

Procedia PDF Downloads 351
26983 “It’s All in Your Head”: Epistemic Injustice, Prejudice, and Power in the Modern Healthcare System

Authors: David Tennison

Abstract:

Epistemic injustice, an injustice done to a person specifically in their capacity as a “knower”, is a subtle form of discrimination, yet its effects can be as dehumanizing and damaging as more overt forms of discrimination. The lens of epistemic injustice has, in recent years, been fruitfully applied to the field of healthcare, examining questions of agency, power, credibility and belief in doctor-patient interactions. Contested illness patients (e.g., those with illnesses lacking scientific consensuses such as fibromyalgia (FM), Myalgic Encephalomyelitis/ Chronic Fatigue Syndrome (ME/CFS) and Long Covid) face higher levels of scrutiny than other patient groups and are often disbelieved or dismissed when their ailments cannot be easily imaged or tested for- often encapsulated by the expression “it’s all in your head”. Using the case study of FM, the trials of contested illness patients in healthcare can be conceptualized in terms of epistemic injustice, and what is going wrong in these doctor-patient relationships can be effectively diagnosed. This case study also helps reveal epistemic dysfunction (structural epistemic issues embedded in the healthcare system), how this relates to stigma identity-based prejudice, and how the healthcare system upholds existing societal hierarchies and disenfranchises the most vulnerable. In the modern landscape, where cases of these chronic illnesses are not only on the rise but future pandemics threaten to add to their number, this conversation is crucial for the well-being of patients and providers. This presentation will cover what epistemic injustice is and how it can be applied to the politics of the doctor-patient interaction on a micro level and the politics of the healthcare system more broadly. Contested illnesses will be explored in terms of how the “contested” label causes the patient to experience disease stigma and lowers their credibility in healthcare and across other aspects of life. This will be explored in tandem with a discussion of existing identity-based prejudice in the healthcare system and how social identities (such as those of gender, race, and socioeconomic status) intersect with the contested illness label. The effects of epistemic injustice, which include worsening patients’ symptoms of mental health and potentially disenfranchising them from the healthcare system altogether, will be presented alongside the potential ethical quandaries this poses for providers. Finally, issues with the way healthcare appointments and the modern NHS function will be explored in terms of epistemic injustice and solutions to improve doctor-patient communication and patient care will be discussed. The relationship between contested illness patients and healthcare providers is notoriously poor, and while this can mean frustration or feelings of unfulfillment in providers, the negative effects for patients are much more severe. The purpose of this research, then, is to highlight these issues and suggest ways in which to improve the healthcare experience for these patients, along with improving doctor-patient communication and mending the doctor-patient relationship in a tangible and realistic way. This research also aims to provoke important conversations about belief and hierarchy in medical settings and how these aspects intersect with identity prejudices.

Keywords: epistemic injustice, fibromyalgia, contested illnesses, chronic illnesses, doctor-patient relationships, philosophy of medicine

Procedia PDF Downloads 60
26982 An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods

Authors: Issa Qabaja, Fadi Thabtah

Abstract:

Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.

Keywords: data mining, email classification, phishing, online security

Procedia PDF Downloads 433
26981 Climate Change and Its Impact on Water Security and Health in Coastal Community: A Gender Outlook

Authors: Soorya Vennila

Abstract:

The present study answers the questions; how does climate change affect the water security in drought prone Ramanathapuram district? and what has water insecurity done to the health of the coastal community? The study area chosen is Devipattinam in Ramanathapuram district. Climate change evidentially wreaked havoc on the community with saltwater intrusion, water quality degradation, water scarcity and its eventual economic, social like power inequality within family and community and health hazards. The climatological data such as rainfall, minimum temperature and maximum temperature were statistically analyzed for trend using Mann-Kendall test. The test was conducted for 14 years (1989-2002) of rainfall data, maximum and minimum temperature and the data were statistically analyzed. At the outset, the water quality samples were collected from Devipattinam to test its physical and chemical parameters and their spatial variation. The results were derived as shown in ARC GIS. Using the water quality test water quality index were framed. And finally, key Informant interview, questionnaire were conducted to capture the gender perception and problem. The data collected were thereafter interpreted using SPSS software for recommendations and suggestions to overcome water scarcity and health problems.

Keywords: health, watersecurity, water quality, climate change

Procedia PDF Downloads 79
26980 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand

Authors: John Battersby, Rhys Ball

Abstract:

After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.

Keywords: academic, counter terrorism, intelligence, practitioner, research, security

Procedia PDF Downloads 108
26979 Real-Time Pedestrian Detection Method Based on Improved YOLOv3

Authors: Jingting Luo, Yong Wang, Ying Wang

Abstract:

Pedestrian detection in image or video data is a very important and challenging task in security surveillance. The difficulty of this task is to locate and detect pedestrians of different scales in complex scenes accurately. To solve these problems, a deep neural network (RT-YOLOv3) is proposed to realize real-time pedestrian detection at different scales in security monitoring. RT-YOLOv3 improves the traditional YOLOv3 algorithm. Firstly, the deep residual network is added to extract vehicle features. Then six convolutional neural networks with different scales are designed and fused with the corresponding scale feature maps in the residual network to form the final feature pyramid to perform pedestrian detection tasks. This method can better characterize pedestrians. In order to further improve the accuracy and generalization ability of the model, a hybrid pedestrian data set training method is used to extract pedestrian data from the VOC data set and train with the INRIA pedestrian data set. Experiments show that the proposed RT-YOLOv3 method achieves 93.57% accuracy of mAP (mean average precision) and 46.52f/s (number of frames per second). In terms of accuracy, RT-YOLOv3 performs better than Fast R-CNN, Faster R-CNN, YOLO, SSD, YOLOv2, and YOLOv3. This method reduces the missed detection rate and false detection rate, improves the positioning accuracy, and meets the requirements of real-time detection of pedestrian objects.

Keywords: pedestrian detection, feature detection, convolutional neural network, real-time detection, YOLOv3

Procedia PDF Downloads 143
26978 Identifying Indicative Health Behaviours and Psychosocial Factors Affecting Multi-morbidity Conditions in Ageing Populations: Preliminary Results from the ELSA study of Ageing

Authors: Briony Gray, Glenn Simpson, Hajira Dambha-Miller, Andrew Farmer

Abstract:

Multimorbidity may be strongly affected by a variety of conditions, factors, and variables requiring higher demands on health and social care services, infrastructure, and expenses. Holding one or more conditions increases one’s risk for development of future conditions; with patients over 65 years old at highest risk. Psychosocial factors such as anxiety and depression are rising exponentially globally, which has been amplified by the COVID19 pandemic. These are highly correlated and predict poorer outcomes when held in coexistence and increase the likelihood of comorbid physical health conditions. While possible future reform of social and healthcare systems may help to alleviate some of these mounting pressures, there remains an urgent need to better understand the potential role health behaviours and psychosocial conditions - such as anxiety and depression – may have on aging populations. Using the UK healthcare scene as a lens for analysis, this study uses big data collected in the UK Longitudinal Study of Aging (ELSA) to examine the role of anxiety and depression in ageing populations (65yrs+). Using logistic regression modelling, results identify the 10 most significant variables correlated with both anxiety and depression from data categorised into the areas of health behaviour, psychosocial, socioeconomic, and life satisfaction (each demonstrated through literature review to be of significance). These are compared with wider global research findings with the aim of better understanding the areas in which social and healthcare reform can support multimorbidity interventions, making suggestions for improved patient-centred care. Scope of future research is outlined, which includes analysis of 59 total multimorbidity variables from the ELSA dataset, going beyond anxiety and depression.

Keywords: multimorbidity, health behaviours, patient centred care, psychosocial factors

Procedia PDF Downloads 92
26977 Analyzing Environmental Emotive Triggers in Terrorist Propaganda

Authors: Travis Morris

Abstract:

The purpose of this study is to measure the intersection of environmental security entities in terrorist propaganda. To the best of author’s knowledge, this is the first study of its kind to examine this intersection within terrorist propaganda. Rosoka, natural language processing software and frame analysis are used to advance our understanding of how environmental frames function as emotive triggers. Violent jihadi demagogues use frames to suggest violent and non-violent solutions to their grievances. Emotive triggers are framed in a way to leverage individual and collective attitudes in psychological warfare. A comparative research design is used because of the differences and similarities that exist between two variants of violent jihadi propaganda that target western audiences. Analysis is based on salience and network text analysis, which generates violent jihadi semantic networks. Findings indicate that environmental frames are used as emotive triggers across both data sets, but also as tactical and information data points. A significant finding is that certain core environmental emotive triggers like “water,” “soil,” and “trees” are significantly salient at the aggregate level across both data sets. All environmental entities can be classified into two categories, symbolic and literal. Importantly, this research illustrates how demagogues use environmental emotive triggers in cyber space from a subcultural perspective to mobilize target audiences to their ideology and praxis. Understanding the anatomy of propaganda construction is necessary in order to generate effective counter narratives in information operations. This research advances an additional method to inform practitioners and policy makers of how environmental security and propaganda intersect.

Keywords: propaganda analysis, emotive triggers environmental security, frames

Procedia PDF Downloads 140
26976 End to End Monitoring in Oracle Fusion Middleware for Data Verification

Authors: Syed Kashif Ali, Usman Javaid, Abdullah Chohan

Abstract:

In large enterprises multiple departments use different sort of information systems and databases according to their needs. These systems are independent and heterogeneous in nature and sharing information/data between these systems is not an easy task. The usage of middleware technologies have made data sharing between systems very easy. However, monitoring the exchange of data/information for verification purposes between target and source systems is often complex or impossible for maintenance department due to security/access privileges on target and source systems. In this paper, we are intended to present our experience of an end to end data monitoring approach at middle ware level implemented in Oracle BPEL for data verification without any help of monitoring tool.

Keywords: service level agreement, SOA, BPEL, oracle fusion middleware, web service monitoring

Procedia PDF Downloads 482
26975 Implementation and Use of Person-Centered Care in Europe: A Literature Review

Authors: Kristina Rosengren, Petra Brannefors, Eric Carlstrom

Abstract:

Background: Implementation and use of person-centered care (PCC) is increasing worldwide, and why the current study intends to increase knowledge regarding how PCC is used in different European countries. Purpose: To describe the extent of person-centred care in 23 European countries in relation to use specific countries healthcare system (Beveridge, Bismarck, Mixed/OOP). Methods: The study was conducted by literature review inspired by Spice, both scientific empirical studies (Cinahl, Medline, Scopus) as well as grey literature (Google) were used. Totally 1194 documents were included divided into Cinahl n=139, Medline n=245, Scopus n=493 and Google n=317. Data were analysed with descriptive (percentage, range) regarding content and scope of PCC/country according to content and scope of PCC in each country, grouped into the healthcare system (Beveridge, Bismarck, Mixed/OOP) and geographic placement. Results: PCC were most common in UK (England, Scotland, Wales, North Ireland), n=481, 40.3%, Sweden (n=231, 19.3%), The Netherlands (n=80, 6.7%), Ireland (n=79, 6.6%) and Norway (n=61, 5.1%); and less common in Poland (0.6%), Hungary (0.5%), Greece (0.4%), Latvia (0.4%) and Serbia (0%). Beveridge healthcare system (12/23=0.5217, 52.2%) show 85 percent of documents with advantage of scientific literature valued 2.92 (n=999, 0.55-4.07), compare to advantage of grey literature in Bismarck (10/23=0.4347, 43.5%) with 15 percentage valued 2.35 (n=190, 0-3.27) followed by Mixed/OOP (1/23=4%) with 0.4 valued 2.25. Conclusions: Seven out of 10 countries with Beveridge health system used PCC compare to less-used PCC in countries with the Bismarck system. Research, as well as national regulations regarding PCC, are important tools to motivate the advantage of PCC in clinical practice. Moreover, implementation of PCC needs a systematic approach, from national (politicians), regional (guideline) and local (specific healthcare settings) levels visualized by decision-making as law, mission, policies, and routines in clinical practice to establish a well-integrated phenomenon in Europe.

Keywords: Beveridge, Bismarck, Europe, evidence-based, literature review, person-centered care

Procedia PDF Downloads 112
26974 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 167
26973 Changing the Dynamics of the Regional Water Security in the Mekong River Basin: An Explorative Study Understanding the Cooperation and Conflict from Critical Hydropolitical Perspective

Authors: Richard Grünwald, Wenling Wang, Yan Feng

Abstract:

The presented paper explores the changing dynamics of regional water security in the Mekong River Basin and examines the contemporary water-related challenges from a critical hydropolitical perspective. By drawing on the Lancang-Mekong Cooperation and Conflict Database (LMCCD) recording more than 3000 water-related events within the basin in the last 30 years, we identified several trends changing the dynamics of the regional water security in the Mekong River Basin. Firstly, there is growing politicization of water that is no longer interpreted as abundant. While some scientists blame the rapid basin development, particularly in upstream countries, other researchers consider climate change and cumulative environmental impacts of various water projects as the main culprit for changing the water flow. Secondly, there is an increasing securitization of large-scale hydropower dams with questionable outcomes. Despite hydropower dams raise many controversies, many riparian states push the development at all cost. Such water security dilemma can be especially traced to Laos and Cambodia, which highly invest in the hydropower sector even at the expense of the local environment and good relations with neighbouring countries situated lower on the river. Thirdly, there is a lack of accountable transboundary water governance that will effectively face a looming water crisis. To date, most of the existing cooperation mechanisms are undermined by the geopolitical interests of foreign donors and increasing mistrust to scientific approaches dealing with water insecurity. Our findings are beneficial for the policy-makers and other water experts who want to grasp the broader hydropolitical context in the Mekong River Basin and better understand the new water security threats, including misinterpretation of the hydrological data and legitimization of the pro-development narratives.

Keywords: critical hydropolitics, mekong river, politicization of science, water governance, water security

Procedia PDF Downloads 215
26972 An Observational Study Assessing the Baseline Communication Behaviors among Healthcare Professionals in an Inpatient Setting in Singapore

Authors: Pin Yu Chen, Puay Chuan Lee, Yu Jen Loo, Ju Xia Zhang, Deborah Teo, Jack Wei Chieh Tan, Biauw Chi Ong

Abstract:

Background: Synchronous communication, such as telephone calls, remains the standard communication method between nurses and other healthcare professionals in Singapore public hospitals despite advances in asynchronous technological platforms, such as instant messaging. Although miscommunication is one of the most common causes of lapses in patient care, there is a scarcity of research characterizing baseline inter-professional healthcare communications in a hospital setting due to logistic difficulties. Objective: This study aims to characterize the frequency and patterns of communication behaviours among healthcare professionals. Methods: The one-week observational study was conducted on Monday through Sunday at the nursing station of a cardiovascular medicine and cardiothoracic surgery inpatient ward at the National Heart Centre Singapore. Subjects were shadowed by two physicians for sixteen hours or consecutive morning and afternoon nursing shifts. Communications were logged and characterized by type, duration, caller, and recipient. Results: A total of 1,023 communication events involving the attempted use of the common telephones at the nursing station were logged over a period of one week, corresponding to a frequency of one event every 5.45 minutes (SD 6.98, range 0-56 minutes). Nurses initiated the highest proportion of outbound calls (38.7%) via the nursing station common phone. A total of 179 face-to-face communications (17.5%), 362 inbound calls (35.39%), 481 outbound calls (47.02%), and 1 emergency alert (0.10%) were captured. Average response time for task-oriented communications was 159 minutes (SD 387.6, range 86-231). Approximately 1 in 3 communications captured aimed to clarify patient-related information. The total duration of time spent on synchronous communication events over one week, calculated from total inbound and outbound calls, was estimated to be a total of 7 hours. Conclusion: The results of our study showed that there is a significant amount of time spent on inter-professional healthcare communications via synchronous channels. Integration of patient-related information and use of asynchronous communication channels may help to reduce the redundancy of communications and clarifications. Future studies should explore the use of asynchronous mobile platforms to address the inefficiencies observed in healthcare communications.

Keywords: healthcare communication, healthcare management, nursing, qualitative observational study

Procedia PDF Downloads 211
26971 Talent Management by Employee Involvement in Healthcare Industries of India: An Analytical Case Study

Authors: Alpa Mehta

Abstract:

Talent acquisition, development, and retention are major issues encountered in the health care industries in any country. Recent authentic data showed that employee turnover in the field of health care is increasing day by day compare to other industrial sectors. There are many reasons behind retention issues. One of such can be the lack of involvement and engagement of health workers in day to day HRM. Health care is a noble profession and employee has to deal with the patient with the optimum level of satisfaction and productivity. So employee morale and motivation should be high. This area of concern is mostly ignored by management, and ultimately it turns into dissatisfaction and abandonment in search of other jobs. The paper analyses the HRM tools to retain healthcare employee with high moral through employee involvement. The paper includes the case study of One of the Prominent Health care institute of India has found out a way to retain talented employees in the organization with the tool of employee engagement.

Keywords: employee involvement, health care industry, human resources management, talent retention

Procedia PDF Downloads 457
26970 Analyzing Current Transformers Saturation Characteristics for Different Connected Burden Using LabVIEW Data Acquisition Tool

Authors: D. Subedi, S. Pradhan

Abstract:

Current transformers are an integral part of power system because it provides a proportional safe amount of current for protection and measurement applications. However when the power system experiences an abnormal situation leading to huge current flow, then this huge current is proportionally injected to the protection and metering circuit. Since the protection and metering equipment’s are designed to withstand only certain amount of current with respect to time, these high currents pose a risk to man and equipment. Therefore during such instances, the CT saturation characteristics have a huge influence on the safety of both man and equipment and also on the reliability of the protection and metering system. This paper shows the effect of burden on the Accuracy Limiting factor/ Instrument security factor of current transformers and also the change in saturation characteristics of the CT’s. The response of the CT to varying levels of overcurrent at different connected burden will be captured using the data acquisition software LabVIEW. Analysis is done on the real time data gathered using LabVIEW. Variation of current transformer saturation characteristics with changes in burden will be discussed.

Keywords: accuracy limiting factor, burden, current transformer, instrument security factor, saturation characteristics

Procedia PDF Downloads 417
26969 Exploring Teledermatology in Selected Dermatology Clinics in San Fernando City, La Union

Authors: Everdeanne Javier, Kelvin Louie Abat, Alodia Rizzalynn Cabaya, Chynna Allyson Manzano, Vlasta Sai Espiritu, Raniah May Puzon, Michelle Tobler

Abstract:

Teledermatology is becoming a more popular form of providing dermatologic healthcare worldwide, and it will almost certainly play a larger role in the future. As the current pandemic continues to worsen, Teledermatology is seen as the primary alternative to face-to-face dermatology consultation; therefore, it needs to be enhanced and developed to become as convenient and reliable as it can be for both patients and doctors. This research paper seeks to know the processes used in teledermatology regarding delivery modalities and proper consultation. This study's research design is a Qualitative Descriptive approach to describe further the processes used by teledermatologists. An online survey questionnaire was used to collect data from Teledermatology Clinics in San Fernando City, La Union. Research showed that patients tend to embrace and be pleased with teledermatology as a way of accessing healthcare. On the other hand, clinicians have usually reported positive outcomes from teledermatology. Furthermore, it is not intended to be used instead of a face-to-face appointment with a dermatologist.

Keywords: teledermatology, online dermatology consultation, dermatology, dermatologist

Procedia PDF Downloads 268
26968 Black Womens Healthcare Policy Reform: Navigating their Sexual and Reproductive Care Needs

Authors: Renata Hall

Abstract:

This presentation seeks to highlight an arts-based, Black feminist, and community based participatory approach to exploring the strengths and pleasures, concerns and barriers, and wants and needs of diverse Black women in navigating formal and informal sexual and reproductive healthcare continuums. Recognizing the ongoing intersectional discrimination that Black women face interpersonally and systemically in community and healthcare spaces that service needs such as, early and unwanted pregnancy, sexually transmitted infection (STI) treatment and testing, human immune-deficiency virus (HIV) treatment and testing, pre and post-natal care, gynecology and obstetrics, sex education, sexual violence and assault reporting and support, gender affirming spaces and more, this presentation unveils the community and embodied pathways to caring for the sexual self through cultural practices, advocacy and peer support. The presentation will be grounded in the arts and lived experience of 8 Black women, aiming to highlight the sexual and reproductive subjectivities of Black women, through the application and discussion of Black feminist arts-based methodology and praxis. The presentation not only seeks to illuminate methods and grammars of Blackness but so too, invite practitioners to engage in cultural and community-based methods to care. There are many themes of the conference covered in this presentation; feminist methodologies revealing narratives community and inclusion, how the utilization of technology, social media and cultural forces can drive community feminist activism and self-advocacy, how feminist methodologies can uncover opportunities for anti-racist praxis, and lastly enhancing collaboration in research. Specifically revealing how Black feminist thought and associated methods can be enhanced through community based participatory action (CBPAR) research approaches such as, photovoice, this presentation reveals the systemic histories and modern-day experiences of Black women when accessing sexual and reproductive care whilst also uncovering embodied and community-based strengths that produce grassroots, digital, and self-advocacy within healthcare systems. The ways in which the arts, digital age, cultural influences, and lived experiences can come to the fore in collaborative data collection and analysis with research participants, will be the crux of my presentation, bridging to how both Black feminist, CBPAR, and arts-based methods can create tangible, anti-racist and racially reflexive implications for the healthcare and community sector seeking to pedestal Black women's strengths and resilience's and corroborate with their lived experiences. This conversation will center around 3 of the 9 themes derived from my dissertation research, which focuses on the strengths of Black women's community care, culturally informed self-care practices, and communication and vocal pathways to strengthen their sexual and reproductive self-concept and navigational skills in the face of intersectional discrimination in care continuums.

Keywords: sexual and reproductive healthcare, black feminisms, black feminist research, antiracist healthcare policy, antiracist healthcare delivery, arts based research, photovoice

Procedia PDF Downloads 0
26967 Future Considerations for Wounded Service Members and Veterans of the Global War on Terror

Authors: Selina Doncevic, Lisa Perla, Angela Kindvall

Abstract:

The Global War on Terror which began after September 11, 2011, increased survivability of severe injuries requiring varying trajectories of rehabilitation and recovery. The costs encompass physiologic, functional, social, emotional, psychological, vocational and scholastic domains of life. The purpose of this poster is to inform private sector health care practitioners and clinicians at various levels of the unique and long term dynamics of healthcare recovery for polytrauma, and traumatic brain injured service members and veterans in the United States of America. Challenges include care delivery between the private sector, the department of defense, and veterans affairs healthcare systems while simultaneously supporting the dynamics of acute as well as latent complications associated with severe injury and illness. Clinical relevance, subtleties of protracted recovery, and overwhelmed systems of care are discussed in the context of lessons learned and in reflection on previous wars. Additional concerns for consideration and discussion include: the cost of protracted healthcare, various U.S. healthcare payer systems, lingering community reintegration challenges, ongoing care giver support, the rise of veterans support groups and the development of private sector clinical partnerships.

Keywords: brain injury, future, polytrauma, rehabilitation

Procedia PDF Downloads 198
26966 Social Inclusion Challenges in Indigenous Communities: Case of the Baka Pygmies Community of Cameroon

Authors: Igor Michel Gachig, Samanta Tiague

Abstract:

Baka ‘Pygmies’ is an indigenous community living in the rainforest region of Cameroon. This community is known to be poor and marginalized from the political, economic and social life, regardless of sedentarization and development efforts. In fact, the social exclusion of ‘Pygmy’ people prevents them from gaining basic citizen’s rights, among which access to education, land, healthcare, employment and justice. In this study, social interactions, behaviors, and perceptions were considered. An interview guide and focus group discussions were used to collect data. A sample size of 97 was used, with 60 Baka Pygmies and 37 Bantus from two Baka-Bantu settlements/villages of the south region of Cameroon. The data were classified in terms of homogenous, exhaustive and exclusive categories. This classification has enabled factors explaining social exclusion in the Baka community to be highlighted using content analysis. The study shows that (i) limited access to education, natural resources and care in modern healthcare organizations, and (ii) different views on the development expectations and integration approaches both highlight the social exclusion in the Baka ‘Pygmies’ community. Therefore, an effective and adequate social integration of ‘Pygmies’ based on cultural peculiarities and identity, as well as reduction of disparities and improvement of their access to education should be of major concern to the government and policy makers.

Keywords: development, indigenous people, integration, social exclusion

Procedia PDF Downloads 138
26965 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 102
26964 The Food and Nutrition Security in Brazilian Quilombo: The Account of Experiences in Two Titled Territories

Authors: Dyego Ramos Henrique, Viviane Pimentel, Katia Souto, Ana Valéria Mendonça, Andrea Gallassi

Abstract:

Socioeconomic inequalities in Brazil have accentuated the aggravations of poverty among the most vulnerable populations, among which are the quilombola communities. The objective was to reflect on a situation of food and nutritional security in two Brazilian quilombola communities. The data were collected by means of reports of experience through the production of talk wheels in two quilombola communities (Itamatatiua and Mesquita), located in the cities of Alcântara and Cidade Ocidental. Access to health services and health promotion actions were still incipient in the quilombola communities visited. The perceptions of the participants of the quilombolas revealed that there are still repressed demands that have rendered the fulfillment of the principles of equity, universality and integrality, both for access to health and for access and availability of food. They recognize in governmental instances a socioeconomic-cultural valorization and nutritional qualities intrinsic to the foods produced by them. Although they have been used as communities of quilombolas live and their level of access to services and programs, dealing with quilombola communities does not mean dealing with 'isolated groups or a strictly homogeneous population.' It demands a great need of attention in relation to the access and availability of food, besides overcoming barriers that made it an unfeasible valuation of social, economic and cultural precepts, intrinsic to the thought about food and nutritional security in Brazilian quilombos.

Keywords: access to services, food and nutrition security, health promotion, quilombo population

Procedia PDF Downloads 227
26963 A User Interface for Easiest Way Image Encryption with Chaos

Authors: D. López-Mancilla, J. M. Roblero-Villa

Abstract:

Since 1990, the research on chaotic dynamics has received considerable attention, particularly in light of potential applications of this phenomenon in secure communications. Data encryption using chaotic systems was reported in the 90's as a new approach for signal encoding that differs from the conventional methods that use numerical algorithms as the encryption key. The algorithms for image encryption have received a lot of attention because of the need to find security on image transmission in real time over the internet and wireless networks. Known algorithms for image encryption, like the standard of data encryption (DES), have the drawback of low level of efficiency when the image is large. The encrypting based on chaos proposes a new and efficient way to get a fast and highly secure image encryption. In this work, a user interface for image encryption and a novel and easiest way to encrypt images using chaos are presented. The main idea is to reshape any image into a n-dimensional vector and combine it with vector extracted from a chaotic system, in such a way that the vector image can be hidden within the chaotic vector. Once this is done, an array is formed with the original dimensions of the image and turns again. An analysis of the security of encryption from the images using statistical analysis is made and is used a stage of optimization for image encryption security and, at the same time, the image can be accurately recovered. The user interface uses the algorithms designed for the encryption of images, allowing you to read an image from the hard drive or another external device. The user interface, encrypt the image allowing three modes of encryption. These modes are given by three different chaotic systems that the user can choose. Once encrypted image, is possible to observe the safety analysis and save it on the hard disk. The main results of this study show that this simple method of encryption, using the optimization stage, allows an encryption security, competitive with complicated encryption methods used in other works. In addition, the user interface allows encrypting image with chaos, and to submit it through any public communication channel, including internet.

Keywords: image encryption, chaos, secure communications, user interface

Procedia PDF Downloads 493
26962 Data Science-Based Key Factor Analysis and Risk Prediction of Diabetic

Authors: Fei Gao, Rodolfo C. Raga Jr.

Abstract:

This research proposal will ascertain the major risk factors for diabetes and to design a predictive model for risk assessment. The project aims to improve diabetes early detection and management by utilizing data science techniques, which may improve patient outcomes and healthcare efficiency. The phase relation values of each attribute were used to analyze and choose the attributes that might influence the examiner's survival probability using Diabetes Health Indicators Dataset from Kaggle’s data as the research data. We compare and evaluate eight machine learning algorithms. Our investigation begins with comprehensive data preprocessing, including feature engineering and dimensionality reduction, aimed at enhancing data quality. The dataset, comprising health indicators and medical data, serves as a foundation for training and testing these algorithms. A rigorous cross-validation process is applied, and we assess their performance using five key metrics like accuracy, precision, recall, F1-score, and area under the receiver operating characteristic curve (AUC-ROC). After analyzing the data characteristics, investigate their impact on the likelihood of diabetes and develop corresponding risk indicators.

Keywords: diabetes, risk factors, predictive model, risk assessment, data science techniques, early detection, data analysis, Kaggle

Procedia PDF Downloads 77