Search results for: healthcare data security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27201

Search results for: healthcare data security

26361 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures

Authors: Zeinab Ranjbar

Abstract:

Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.

Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security

Procedia PDF Downloads 376
26360 Influenza Vaccine Uptake Among Tunisian Physicians in the 2018-2019 Influenza Season

Authors: Ines Cherif, Ghassen Kharroubi, Leila Bouabid, Adel Gharbi, Aicha Boukthir, Margaret Mccarron, Nissaf Ben Alaya, Afif Ben Salah, Jihene Bettaieb

Abstract:

Healthcare workers' flu vaccination prevents influenza disease among both patients and caregivers. We aimed in this study to assess influenza vaccine (IV) coverage in 2018-2019 among Tunisian physicians and to determine factors associated with IV receipt. A cross sectional study was carried out in Tunisian primary and secondary health care facilities in the 2018-2019 influenza season. Physicians with direct patient contact were recruited according to a self-weighted multistage sampling. Data were collected through a face to face questionnaire containing questions on knowledge, attitudes, and practices regarding IV. Bivariate analysis was used in order to determine factors associated with IV receipt. A total of 167 physicians were included in the study with a mean age of 48.2 ± 7.7 years and a sex-ratio (M: F) of 0.37. Among participants, 15.1% (95% CI: [9.7%-20.3%]) were vaccinated against influenza in the 2018-2019 influenza season. Bivariate analysis revealed that previous flu immunization in the four years preceding the 2018-2019 influenza season (OR=32.3; p < 10-3), belief that vaccinating healthcare workers may reduce work absenteeism (OR=4.7, p=0.028), belief that flu vaccine should be mandatory to healthcare workers (OR=3.3, p=0.01) and high confidence towards IV efficacy in preventing influenza among caregivers (OR= 4.5, p=0.01) were associated with a higher IV receipt in 2018-2019 among physicians. Less than one fifth of Tunisian physicians were vaccinated against influenza in 2018-2019. Higher vaccine uptake was related to a higher belief in vaccine efficacy in preventing influenza disease among both patients and caregivers. This underscores the need for periodic educational campaigns to raise physicians' awareness about IV efficacy. The switch to an IV mandatory policy should also be considered.

Keywords: influenza vaccine, physicians, Tunisia, vaccination uptake

Procedia PDF Downloads 131
26359 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes

Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana

Abstract:

The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.

Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes

Procedia PDF Downloads 242
26358 Food Security in Nigeria: An Examination of Food Availability and Accessibility in Nigeria

Authors: Okolo Chimaobi Valentine, Obidigbo Chizoba

Abstract:

As a basic physiology need, the threat to sufficient food production is the threat to human survival. Food security has been an issue that has gained global concern. This paper looks at the food security in Nigeria by assessing the availability of food and accessibility of the available food. The paper employed multiple linear regression technique and graphic trends of growth rates of relevant variables to show the situation of food security in Nigeria. Results of the tests revealed that population growth rate was higher than the growth rate of food availability in Nigeria for the earlier period of the study. Commercial bank credit to the agricultural sector, foreign exchange utilization for food and the Agricultural Credit Guarantee Scheme Fund (ACGSF) contributed significantly to food availability in Nigeria. Food prices grew at a faster rate than the average income level, making it difficult to access sufficient food. It implies that prior to the year 2012; there was insufficient food to feed the Nigerian populace. However, continued credit to the food and agricultural sector will ensure sustained and sufficient production of food in Nigeria. Microfinance banks should make sufficient credit available to the smallholder farmer. The government should further control and subsidize the rising price of food to make it more accessible by the people.

Keywords: food, accessibility, availability, security

Procedia PDF Downloads 370
26357 Mutual Authentication for Sensor-to-Sensor Communications in IoT Infrastructure

Authors: Shadi Janbabaei, Hossein Gharaee Garakani, Naser Mohammadzadeh

Abstract:

Internet of things is a new concept that its emergence has caused ubiquity of sensors in human life, so that at any time, all data are collected, processed and transmitted by these sensors. In order to establish a secure connection, the first challenge is authentication between sensors. However, this challenge also requires some features so that the authentication is done properly. Anonymity, untraceability, and being lightweight are among the issues that need to be considered. In this paper, we have evaluated the authentication protocols and have analyzed the security vulnerabilities found in them. Then an improved light weight authentication protocol for sensor-to-sensor communications is presented which uses the hash function and logical operators. The analysis of protocol shows that security requirements have been met and the protocol is resistant against various attacks. In the end, by decreasing the number of computational cost functions, it is argued that the protocol is lighter than before.

Keywords: anonymity, authentication, Internet of Things, lightweight, un-traceability

Procedia PDF Downloads 284
26356 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology

Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar

Abstract:

The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.

Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology

Procedia PDF Downloads 111
26355 The Fusion of Blockchain and AI in Supply Chain Finance: Scalability in Distributed Systems

Authors: Wu You, Burra Venkata Durga Kumar

Abstract:

This study examines the promising potential of integrating Blockchain and Artificial Intelligence (AI) technologies to scalability in Distributed Systems within the field of supply chain finance. The finance industry is continually confronted with scalability challenges in its Distributed Systems, particularly within the supply chain finance sector, impacting efficiency and security. Blockchain, with its inherent attributes of high scalability and secure distributed ledger system, coupled with AI's strengths in optimizing data processing and decision-making, holds the key to innovating the industry's approach to these issues. This study elucidates the synergistic interplay between Blockchain and AI, detailing how their fusion can drive a significant transformation in the supply chain finance sector's Distributed Systems. It offers specific use-cases within this field to illustrate the practical implications and potential benefits of this technological convergence. The study also discusses future possibilities and current challenges in implementing this groundbreaking approach within the context of supply chain finance. It concludes that the intersection of Blockchain and AI could ignite a new epoch of enhanced efficiency, security, and transparency in the Distributed Systems of supply chain finance within the financial industry.

Keywords: blockchain, artificial intelligence (AI), scaled distributed systems, supply chain finance, efficiency and security

Procedia PDF Downloads 85
26354 The Food and Nutritional Effects of Smallholders’ Participation in Milk Value Chain in Ethiopia

Authors: Geday Elias, Montaigne Etienne, Padilla Martine, Tollossa Degefa

Abstract:

Smallholder farmers’ participation in agricultural value chain identified as a pathway to get out of poverty trap in Ethiopia. The smallholder dairy activities have a huge potential in poverty reduction through enhancing income, achieving food and nutritional security in the country. However, much less is known about the effects of smallholder’s participation in milk value chain on household food security and nutrition. This paper therefore, aims at evaluating the effects of smallholders’ participation in milk value chain on household food security taking in to account the four pillars of food security measurements (availability, access, utilization and stability). Using a semi-structured interview, a cross sectional farm household data collected from a randomly selected sample of 333 households (170 in Amhara and 163 in Oromia regions).Binary logit and propensity score matching( PSM) models are employed to examine the mechanisms through which smallholder’s participation in the milk value chain affects household food security where crop production, per capita calorie intakes, diet diversity score, and food insecurity access scale are used to measure food availability, access, utilization and stability respectively. Our findings reveal from 333 households, only 34.5% of smallholder farmers are participated in the milk value chain. Limited access to inputs and services, limited access to inputs markets and high transaction costs are key constraints for smallholders’ limited access to the milk value chain. To estimate the true average participation effects of milk value chain for participated households, the outcome variables (food security) of farm households who participated in milk value chain are compared with the outcome variables if the farm households had not participated. The PSM analysis reveals smallholder’s participation in milk value chain has a significant positive effect on household income, food security and nutrition. Smallholder farmers who are participated in milk chain are better by 15 quintals crops production and 73 percent of per capita calorie intakes in food availability and access respectively than smallholder farmers who are not participated in the market. Similarly, the participated households are better in dietary quality by 112 percents than non-participated households. Finally, smallholders’ who are participated in milk value chain are better in reducing household vulnerability to food insecurity by an average of 130 percent than non participated households. The results also shows income earned from milk value chain participation contributed to reduce capital’s constraints of the participated households’ by higher farm income and total household income by 5164 ETB and 14265 ETB respectively. This study therefore, confirms the potential role of smallholders’ participation in food value chain to get out of poverty trap through improving rural household income, food security and nutrition. Therefore, identified the determinants of smallholder participation in milk value chain and the participation effects on food security in the study areas are worth considering as a positive knock for policymakers and development agents to tackle the poverty trap in the study area in particular and in the country in general.

Keywords: effects, food security and nutrition, milk, participation, smallholders, value chain

Procedia PDF Downloads 336
26353 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance

Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz

Abstract:

The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.

Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor

Procedia PDF Downloads 63
26352 Apathetic Place, Hostile Space: A Qualitative Study on the Ability of Immigration Detention in the UK to Promote the Health and Dignity of Detainees

Authors: P. Dhesi, R. Burns

Abstract:

Background: The UK has one of the largest immigration detention estates in Europe and is under increasing scrutiny, particularly regarding the lack of transparency over the use of detention and the conditions. Therefore, this research seeks to explore the professional perceptions of the ability of immigration detention in the UK to promote health and dignity. Methods: A phenomenological approach to qualitative methods were used, with social constructivist theorisations of health and dignity. Seven semi-structured interviews were conducted using Microsoft Teams. Participants included a range of immigration detention stakeholders who have visited closed immigration detention centres in the UK in a professional capacity. Recorded interviews were transcribed verbatim, and analysis was data-driven through inductive reflexive thematic analysis of the entire data set to account for the small sample size. This study received ethical approval from University College London Research Ethics Committee. Results: Two global themes were created through analysis: apathetic place and hostile space. Apathetic place discusses the lack of concern for detainees' daily living and healthcare needs within immigration detention in the UK. This is explored through participants' perceptions of the lack of ability of monitoring and evaluation processes to ensure detainees are able to live with dignity and understand the unfulfilled duty of care that exists in detention. Hostile space discusses immigration detention in the UK as a wider system of hostility. This is explored through the disempowering impact on detainees, the perception of a failing system as a result of inadequate safeguarding procedures, and a belief that the intention of immigration detention is misaligned with its described purpose. Conclusion: This research explains why the current immigration detention system in the UK is unable to promote health and dignity, offering a social justice and action-orientated approach to research in this sphere. The findings strengthen the discourse against the use of detention as an immigration control tool in the UK. Implications for further research include a stronger emphasis on investigating alternatives to detention and culturally considerate opportunities for patient-centred healthcare.

Keywords: access to healthcare, dignity, health, immigration detention, migrant, refugee, UK

Procedia PDF Downloads 98
26351 Advancing Healthcare Excellence in China: Crafting a Strategic Operational Evaluation Index System for Chinese Hospital Departments amid Payment Reform Initiatives

Authors: Jing Jiang, Yuguang Gao, Yang Yu

Abstract:

Facing increasingly challenging insurance payment pressures, the Chinese healthcare system is undergoing significant transformations, akin to the implementation of DRG payment models by the United States' Medicare. Consequently, there is a pressing need for Chinese hospitals to establish optimizations in departmental operations tailored to the ongoing healthcare payment reforms. This abstract delineates the meticulous construction of a scientifically rigorous and comprehensive index system at the departmental level in China strategically aligned with the evolving landscape of healthcare payment reforms. Methodologically, it integrates key process areas and maturity assessment theories, synthesizing relevant literature and industry standards to construct a robust framework and indicator pool. Employing the Delphi method, consultations with 21 experts were conducted, revealing a collective demonstration of high enthusiasm, authority, and coordination in designing the index system. The resulting model comprises four primary indicators -technical capabilities, cost-effectiveness, operational efficiency, and disciplinary potential- supported by 14 secondary indicators and 23 tertiary indicators with varied coefficient adjustment for department types (platform or surgical). The application of this evaluation system in a Chinese hospital within the northeastern region yielded results aligning seamlessly with the actual operational scenario. In conclusion, the index system comprehensively considers the integrity and effectiveness of structural, process, and outcome indicators and stands as a comprehensive reflection of the collective expertise of the engaged experts, manifesting in a model designed to elevate the operational management of hospital departments. Its strategic alignment with healthcare payment reforms holds practical significance in guiding departmental development positioning, brand cultivation, and talent development.

Keywords: Chinese healthcare system, Delphi method, departmental management, evaluation indicators, hospital operations, weight coefficients

Procedia PDF Downloads 56
26350 Co-payment Strategies for Chronic Medications: A Qualitative and Comparative Analysis at European Level

Authors: Pedro M. Abreu, Bruno R. Mendes

Abstract:

The management of pharmacotherapy and the process of dispensing medicines is becoming critical in clinical pharmacy due to the increase of incidence and prevalence of chronic diseases, the complexity and customization of therapeutic regimens, the introduction of innovative and more expensive medicines, the unbalanced relation between expenditure and revenue as well as due to the lack of rationalization associated with medication use. For these reasons, co-payments emerged in Europe in the 70s and have been applied over the past few years in healthcare. Co-payments lead to a rationing and rationalization of user’s access under healthcare services and products, and simultaneously, to a qualification and improvement of the services and products for the end-user. This analysis, under hospital practices particularly and co-payment strategies in general, was carried out on all the European regions and identified four reference countries, that apply repeatedly this tool and with different approaches. The structure, content and adaptation of European co-payments were analyzed through 7 qualitative attributes and 19 performance indicators, and the results expressed in a scorecard, allowing to conclude that the German models (total score of 68,2% and 63,6% in both elected co-payments) can collect more compliance and effectiveness, the English models (total score of 50%) can be more accessible, and the French models (total score of 50%) can be more adequate to the socio-economic and legal framework. Other European models did not show the same quality and/or performance, so were not taken as a standard in the future design of co-payments strategies. In this sense, we can see in the co-payments a strategy not only to moderate the consumption of healthcare products and services, but especially to improve them, as well as a strategy to increment the value that the end-user assigns to these services and products, such as medicines.

Keywords: clinical pharmacy, co-payments, healthcare, medicines

Procedia PDF Downloads 248
26349 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 291
26348 High Speed Rail vs. Other Factors Affecting the Tourism Market in Italy

Authors: F. Pagliara, F. Mauriello

Abstract:

The objective of this paper is to investigate the relationship between the increase of accessibility brought by high speed rail (HSR) systems and the tourism market in Italy. The impacts of HSR projects on tourism can be quantified in different ways. In this manuscript, an empirical analysis has been carried out with the aid of a dataset containing information both on tourism and transport for 99 Italian provinces during the 2006-2016 period. Panel data regression models have been considered, since they allow modelling a wide variety of correlation patterns. Results show that HSR has an impact on the choice of a given destination for Italian tourists while the presence of a second level hub mainly affects foreign tourists. Attraction variables are also significant for both categories and the variables concerning security, such as number of crimes registered in a given destination, have a negative impact on the choice of a destination.

Keywords: tourists, overnights, high speed rail, attractions, security

Procedia PDF Downloads 151
26347 The Role of Critical Thinking in Disease Diagnosis: A Comprehensive Review

Authors: Mohammad Al-Mousawi

Abstract:

This academic article explores the indispensable role of critical thinking in the process of diagnosing diseases. Employing a multidisciplinary approach, we delve into the cognitive skills and analytical mindset that clinicians, researchers, and healthcare professionals must employ to navigate the complexities of disease identification. By examining the integration of critical thinking within the realms of medical education, diagnostic decision-making, and technological advancements, this article aims to underscore the significance of cultivating and applying critical thinking skills in the ever-evolving landscape of healthcare.

Keywords: critical thinking, medical education, diagnostic decision-making, fostering critical thinking

Procedia PDF Downloads 65
26346 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria

Authors: Nuhu Bitrus Mailabari

Abstract:

Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.

Keywords: border, cross border, migration, Nigeria, northeast region, security

Procedia PDF Downloads 160
26345 The Study of Implications on Modern Businesses Performances by Digital Communities: Case of Data Leak

Authors: Asim Majeed, Anwar Ul Haq, Ayesha Asim, Mike Lloyd-Williams, Arshad Jamal, Usman Butt

Abstract:

This study aims to investigate the impact of data leak of M&S customers on digital communities. Modern businesses are using digital communities as an important public relations tool for marketing purposes. This form of communication helps companies to build better relationship with their customers which also act as another source of information. The communication between the customers and the organizations is not regulated so users may post positive and negative comments. There are new platforms being developed on a daily basis and it is very crucial for the businesses to not only get themselves familiar with those but also know how to reach their existing and perspective consumers. The driving force of marketing and communication in modern businesses is the digital communities and these are continuously increasing and developing. This phenomenon is changing the way marketing is conducted. The current research has discussed the implications on M&S business performance since the data was exploited on digital communities; users contacted M&S and raised the security concerns. M&S closed down its website for few hours to try to resolve the issue. The next day M&S made a public apology about this incidence. This information was proliferated on various digital communities and it has impacted negatively on M&S brand name, sales and customers. The content analysis approach is being used to collect qualitative data from 100 digital bloggers including social media communities such as Facebook and Twitter. The results and finding provide useful new insights into the nature and form of security concerns of digital users. Findings have theoretical and practical implications. This research will showcase a large corporation utilizing various digital community platforms and can serve as a model for future organizations.

Keywords: Digital, communities, performance, dissemination, implications, data, exploitation

Procedia PDF Downloads 393
26344 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East

Authors: Zahra Bakhtiari

Abstract:

Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.

Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy

Procedia PDF Downloads 76
26343 The Duty of Application and Connection Providers Regarding the Supply of Internet Protocol by Court Order in Brazil to Determine Authorship of Acts Practiced on the Internet

Authors: João Pedro Albino, Ana Cláudia Pires Ferreira de Lima

Abstract:

Humanity has undergone a transformation from the physical to the virtual world, generating an enormous amount of data on the world wide web, known as big data. Many facts that occur in the physical world or in the digital world are proven through records made on the internet, such as digital photographs, posts on social media, contract acceptances by digital platforms, email, banking, and messaging applications, among others. These data recorded on the internet have been used as evidence in judicial proceedings. The identification of internet users is essential for the security of legal relationships. This research was carried out on scientific articles and materials from courses and lectures, with an analysis of Brazilian legislation and some judicial decisions on the request of static data from logs and Internet Protocols (IPs) from application and connection providers. In this article, we will address the determination of authorship of data processing on the internet by obtaining the IP address and the appropriate judicial procedure for this purpose under Brazilian law.

Keywords: IP address, digital forensics, big data, data analytics, information and communication technology

Procedia PDF Downloads 119
26342 Using Computer Vision and Machine Learning to Improve Facility Design for Healthcare Facility Worker Safety

Authors: Hengameh Hosseini

Abstract:

Design of large healthcare facilities – such as hospitals, multi-service line clinics, and nursing facilities - that can accommodate patients with wide-ranging disabilities is a challenging endeavor and one that is poorly understood among healthcare facility managers, administrators, and executives. An even less-understood extension of this problem is the implications of weakly or insufficiently accommodative design of facilities for healthcare workers in physically-intensive jobs who may also suffer from a range of disabilities and who are therefore at increased risk of workplace accident and injury. Combine this reality with the vast range of facility types, ages, and designs, and the problem of universal accommodation becomes even more daunting and complex. In this study, we focus on the implication of facility design for healthcare workers suffering with low vision who also have physically active jobs. The points of difficulty are myriad and could span health service infrastructure, the equipment used in health facilities, and transport to and from appointments and other services can all pose a barrier to health care if they are inaccessible, less accessible, or even simply less comfortable for people with various disabilities. We conduct a series of surveys and interviews with employees and administrators of 7 facilities of a range of sizes and ownership models in the Northeastern United States and combine that corpus with in-facility observations and data collection to identify five major points of failure common to all the facilities that we concluded could pose safety threats to employees with vision impairments, ranging from very minor to severe. We determine that lack of design empathy is a major commonality among facility management and ownership. We subsequently propose three methods for remedying this lack of empathy-informed design, to remedy the dangers posed to employees: the use of an existing open-sourced Augmented Reality application to simulate the low-vision experience for designers and managers; the use of a machine learning model we develop to automatically infer facility shortcomings from large datasets of recorded patient and employee reviews and feedback; and the use of a computer vision model fine tuned on images of each facility to infer and predict facility features, locations, and workflows, that could again pose meaningful dangers to visually impaired employees of each facility. After conducting a series of real-world comparative experiments with each of these approaches, we conclude that each of these are viable solutions under particular sets of conditions, and finally characterize the range of facility types, workforce composition profiles, and work conditions under which each of these methods would be most apt and successful.

Keywords: artificial intelligence, healthcare workers, facility design, disability, visually impaired, workplace safety

Procedia PDF Downloads 103
26341 Enhancing Nursing Teams' Learning: The Role of Team Accountability and Team Resources

Authors: Sarit Rashkovits, Anat Drach- Zahavy

Abstract:

The research considers the unresolved question regarding the link between nursing team accountability and team learning and the resulted team performance in nursing teams. Empirical findings reveal disappointing evidence regarding improvement in healthcare safety and quality. Therefore, there is a need in advancing managerial knowledge regarding the factors that enhance constant healthcare teams' proactive improvement efforts, meaning team learning. We first aim to identify the organizational resources that are needed for team learning in nursing teams; second, to test the moderating role of nursing teams' learning resources in the team accountability-team learning link; and third, to test the moderated mediation model suggesting that nursing teams' accountability affects team performance by enhancing team learning when relevant resources are available to the team. We point on the intervening role of three team learning resources, namely time availability, team autonomy and performance data on the relation between team accountability and team learning and test the proposed moderated mediation model on 44 nursing teams (462 nurses and 44 nursing managers). The results showed that, as was expected, there was a positive significant link between team accountability and team learning and the subsequent team performance when time availability and team autonomy were high rather than low. Nevertheless, the positive team accountability- team learning link was significant when team performance feedback was low rather than high. Accordingly, there was a positive mediated effect of team accountability on team performance via team learning when either time availability or team autonomy were high and the availability of team performance data was low. Nevertheless, this mediated effect was negative when time availability and team autonomy were low and the availability of team performance data was high. We conclude that nurturing team accountability is not enough for achieving nursing teams' learning and the subsequent improved team performance. Rather there is need to provide nursing teams with adequate time, autonomy, and be cautious with performance feedback, as the latter may motivate nursing teams to repeat routine work strategies rather than explore improved ones.

Keywords: nursing teams' accountability, nursing teams' learning, performance feedback, teams' autonomy

Procedia PDF Downloads 260
26340 Association of Maternal Age, Ethnicity and BMI with Gestational Diabetes Prevalence in Multi-Racial Singapore

Authors: Nur Atiqah Adam, Mor Jack Ng, Bernard Chern, Kok Hian Tan

Abstract:

Introduction: Gestational diabetes (GDM) is a common pregnancy complication with short and long-term health consequences for both mother and fetus. Factors such as family history of diabetes mellitus, maternal obesity, maternal age, ethnicity and parity have been reported to influence the risk of GDM. In a multi-racial country like Singapore, it is worthwhile to study the GDM prevalences of different ethnicities. We aim to investigate the influence of ethnicity on the racial prevalences of GDM in Singapore. This is important as it may help us to improve guidelines on GDM healthcare services according to significant risk factors unique to Singapore. Materials and Methods: Obstetric cohort data of 926 singleton deliveries in KK Women’s and Children’s Hospital (KKH) from 2011 to 2013 was obtained. Only patients aged 18 and above and without complicated pregnancies or chronic illnesses were targeted. Factors such as ethnicity, maternal age, parity and maternal body mass index (BMI) at booking visit were studied. A multivariable logistic regression model, adjusted for confounders, was used to determine which of these factors are significantly associated with an increased risk of GDM. Results: The overall GDM prevalence rate based on WHO 1999 criteria & at risk screening (race alone not a risk factor) was 8.86%. GDM rates were higher among women above 35 years old (15.96%), obese (15.15%) and multiparous women (10.12%). Indians had a higher GDM rate (13.0 %) compared to the Chinese (9.57%) and Malays (5.20%). However, using multiple logistic regression model, variables that are significantly related to GDM rates were maternal age (p < 0.001) and maternal BMI at booking visit (p = 0.006). Conclusion: Maternal age (p < 0.001) and maternal booking BMI (p = 0.006) are the strongest risk factors for GDM. Ethnicity per se does not seem to have a significant influence on the prevalence of GDM in Singapore (p = 0.064). Hence we should tailor guidelines on GDM healthcare services according to maternal age and booking BMI rather than ethnicity.

Keywords: ethnicity, gestational diabetes, healthcare, pregnancy

Procedia PDF Downloads 223
26339 Beyond Inclusion: The Need for Health Equity for Women with Disabilities

Authors: Jaishree Ellis

Abstract:

The United States Centers for Disease Control tells us that many women with disabilities will not receive regular health screenings, including Pap Smears and mammograms. This article was comprised and written to recognize the barriers to care, gaps in existing healthcare implementation, and viable methodologies for the provision of comprehensive and robust gynecologic care for women with disabilities. According to the World Health Organization, 15% of the world's population, or approximately 1 billion people, have disabilities, most of whom are identified as women. Women with disabilities are described as being multi-disabled, as in some places, they suffer exclusion because of their disabilities as well as their gender. The paucity of information regarding how to create a healthcare system that is inclusive of every woman, regardless of her type of disability (physical, mental, intellectual or medical), has made it challenging to establish an environment that makes it possible for individuals to access care in an equitable, respectful and comprehensive way. A review of the current literature, institutional websites within the United States and American resource guides was implemented to determine where comprehensive models of care for women with disabilities exist, as well as the modalities that are being employed to meet their healthcare needs. The many barriers to care that women with disabilities face were also extracted from various sources within the literature to provide an exhaustive list that can be tackled, one by one. Of the 637 Hospital Systems in the United States, only 7 provide website documentation of health care services that address the unique needs of women with disabilities. The presumption is that if institutions have not marketed such interventions to the community, then it is likely that they do not have a robust suite of services with which to make gynecologic care available to patients with disabilities. Through this review, 7 main barriers to comprehensive gynecologic care were identified, with more than 20 sub-categories existing within those. As with many other areas of community life, inclusion remains lacking in the delivery of healthcare for women with disabilities. There are at least 7 barriers that must be overcome in order to provide equity in the medical office, the exam room, the hospital and the operating room. While few institutions have prioritized this, those few have provided blueprints that can easily be adopted by others. However, as the general population lives longer and ages, the incidence of disabilities increases, as do the healthcare disparities surrounding them. Further compounded by this is a lack of formal education for medical providers in the United States.

Keywords: health equity, inclusion, healthcare disparities, education

Procedia PDF Downloads 51
26338 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 353
26337 An Innovative Auditory Impulsed EEG and Neural Network Based Biometric Identification System

Authors: Ritesh Kumar, Gitanjali Chhetri, Mandira Bhatia, Mohit Mishra, Abhijith Bailur, Abhinav

Abstract:

The prevalence of the internet and technology in our day to day lives is creating more security issues than ever. The need for protecting and providing a secure access to private and business data has led to the development of many security systems. One of the potential solutions is to employ the bio-metric authentication technique. In this paper we present an innovative biometric authentication method that utilizes a person’s EEG signal, which is acquired in response to an auditory stimulus,and transferred wirelessly to a computer that has the necessary ANN algorithm-Multi layer perceptrol neural network because of is its ability to differentiate between information which is not linearly separable.In order to determine the weights of the hidden layer we use Gaussian random weight initialization. MLP utilizes a supervised learning technique called Back propagation for training the network. The complex algorithm used for EEG classification reduces the chances of intrusion into the protected public or private data.

Keywords: EEG signal, auditory evoked potential, biometrics, multilayer perceptron neural network, back propagation rule, Gaussian random weight initialization

Procedia PDF Downloads 395
26336 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 137
26335 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 358
26334 Empowering a New Frontier in Heart Disease Detection: Unleashing Quantum Machine Learning

Authors: Sadia Nasrin Tisha, Mushfika Sharmin Rahman, Javier Orduz

Abstract:

Machine learning is applied in a variety of fields throughout the world. The healthcare sector has benefited enormously from it. One of the most effective approaches for predicting human heart diseases is to use machine learning applications to classify data and predict the outcome as a classification. However, with the rapid advancement of quantum technology, quantum computing has emerged as a potential game-changer for many applications. Quantum algorithms have the potential to execute substantially faster than their classical equivalents, which can lead to significant improvements in computational performance and efficiency. In this study, we applied quantum machine learning concepts to predict coronary heart diseases from text data. We experimented thrice with three different features; and three feature sets. The data set consisted of 100 data points. We pursue to do a comparative analysis of the two approaches, highlighting the potential benefits of quantum machine learning for predicting heart diseases.

Keywords: quantum machine learning, SVM, QSVM, matrix product state

Procedia PDF Downloads 91
26333 Assessment of Oral and Dental Health Status of Pregnant Women in Malaga, Spain

Authors: Nepton Kiani

Abstract:

Dental decay is one of the most common chronic diseases worldwide and imposes significant costs annually on people and healthcare systems. Addressing this issue is among the important programs of the World Health Organization in the field of oral and dental disease prevention and health promotion. In this context, oral and dental health in vulnerable groups, especially pregnant women, is of greater importance due to the health maintenance of the mother and fetus. The aim of this study is to investigate the DMFT index and various factors affecting it in order to identify different factors influencing the process of dental decay and to take an effective step in reducing the progression of this disease, control, and prevention. In this cross-sectional descriptive study, 120 pregnant women attending Nepton Policlinica clinic in Malaga, Spain, were evaluated for the DMFT index and oral and dental hygiene. In this regard, interviews, precise observations, and data collection were used. Subsequently, data analysis was performed using SPSS software and employing correlation tests, Kruskal-Wallis, and Mann-Whitney tests. The DMFT index for pregnant women in three age groups 22-26, 27- 31, and 32-36 years was respectively 2.8, 4.5, and 5.6. The results of logistic regression analysis showed that demographic variables (age, education, job, economic status) and the frequency of brushing and flossing lead to preventive behavior up to 49.58 percent (P<0.05). Generally, the results indicated that oral and dental care during pregnancy is poor. Only a small number of pregnant women regularly used toothbrush and dental floss or visited the dentist regularly. On the other hand, poor performance in adopting oral and dental care was more observed in pregnant women with lower economic and educational status. The present study showed that raising the level of awareness and education on oral and dental health in pregnant women is essential. In this field, it is necessary to focus on conducting educational-care courses at the level of healthcare centers for midwives, healthcare personnel, and at the community level for families, to prevent and perform dental treatments before the pregnancy period

Keywords: Malaga, oral and dental health, pregnant women, Spain

Procedia PDF Downloads 50
26332 Assessing the Effects of Climate Change on Wheat Production, Ensuring Food Security and Loss Compensation under Crop Insurance Program in Punjab-Pakistan

Authors: Mirza Waseem Abbas, Abdul Qayyum, Muhammad Islam

Abstract:

Climate change has emerged as a significant threat to global food security, affecting crop production systems worldwide. This research paper aims to examine the specific impacts of climate change on wheat production in Pakistan, Punjab in particular, a country highly dependent on wheat as a staple food crop. Through a comprehensive review of scientific literature, field observations, and data analysis, this study assesses the key climatic factors influencing wheat cultivation and the subsequent implications for food security in the region. A comparison of two subsequent Wheat seasons in Punjab was examined through climatic conditions, area, yield, and production data. From the analysis, it is observed that despite a decrease in the area under cultivation in the Punjab during the Wheat 2023 season, the production and average yield increased due to favorable weather conditions. These uncertain climatic conditions have a direct impact on crop yields. Last year due to heat waves, Wheat crop in Punjab suffered a significant loss. Through crop insurance, Wheat growers were provided with yield loss protection keeping in view the devastating heat wave and floods last year. Under crop insurance by the Government of the Punjab, 534,587 Wheat growers were insured with a $1.6 million premium subsidy. However, due to better climatic conditions, no loss in the yield was recorded in the insured areas. Crop Insurance is one of the suitable options for policymakers to protect farmers against climatic losses in the future as well.

Keywords: climate change, crop insurance, heatwave, wheat yield punjab

Procedia PDF Downloads 77