Search results for: electronic exchange of information
12291 Study of Buried Interfaces in Fe/Si Multilayer by Hard X-Ray Emission Spectroscopy
Authors: Hina Verma, Karine Le Guen, Renaud Dalaunay, Iyas Ismail, Vita Ilakovac, Jean Pascal Rueff, Yunlin Jacques Zheng, Philippe Jonnard
Abstract:
To the extent of our knowledge, X-ray emission spectroscopy (XES) has been applied in the soft x-ray region (photon energy ≤ 2 keV) to study the buried layers and interfaces of stacks of nanometer-thin films. Now we extend the methodology to study the buried interfaces in the hard X-ray region (i.e., ≥ five keV). The emission spectra allow us to study the interactions between elements in the buried layers from the analysis of their valence states, thereby providing sensitive information about the physical-chemical environment of the emitting element in multilayers. We exploit the chemical sensitivity of XES to study the interfaces between Fe and Si layers in the Fe/Si multilayer from the Fe Kβ₂,₅ emission spectra (7108 eV). The Fe Kβ₅ emission line results from the electronic transition from occupied 3d to 1s levels (i.e., valence to core transition) and is hence sensitive to the chemical state of emitting Fe atoms. The comparison of emission spectra recorded for Fe/Si multilayer with Fe and FeSi₂ references reveal the formation of FeSi₂ at the Fe-Si interfaces inside the multilayer stack. The interfacial thickness was calculated to be 1.4 ± 0.2 nm by taking into consideration the intensity of Fe atoms emitted from the interface and the Fe layer. The formation of FeSi₂ at the interface was further confirmed by the X-ray diffraction and X-ray photoelectron spectroscopy done on the Fe/Si multilayer. Hence, we can conclude that the XES in the hard X-ray range could be used to study multilayers and their interfaces and obtain information both qualitatively and quantitatively.Keywords: buried interfaces, hard X-ray emission spectroscopy, X-ray diffraction, X-ray photoelectron spectroscopy
Procedia PDF Downloads 14312290 Pediatric Emergency Dental Visits at King Abdulaziz University Dental Hospital during the COVID-19 Lockdown: A Retrospective Study
Authors: Sara Alhabli, Eman Elashiry, Osama Felemban, Abdullah Almushayt, Faisal Dardeer, Ahmed Mohammad, Fajr Orri, Nada Bamashmous
Abstract:
Background: In December of 2019, the coronavirus (SARS-CoV-2) first appeared and quickly spread to become a worldwide pandemic. This study aimed to evaluate the prevalence and types of pediatric dental emergencies during the COVID-19 lockdown in Jeddah, Saudi Arabia, at the University Dental Hospital (UDH) of King Abdulaziz University (KAU) and identified the management provided for these dental emergency visits. Materials and Methods: Data collection was done retrospectively from electronic dental records for children aged 0-18 that attended the UDH emergency clinic during the period from March 1st, 2020, to September 30th, 2020. An electronic form formulated specifically for this study was used to collect the required data from electronic patient records, including demographic data, emergency classification, management, and referrals. Results: A total of 3146 patients were seen at the emergency clinics during this period, of which 661 were children (21%). Types of emergency conditions included 0.8% emergency cases, 34% urgent, and 65.2% non-urgent conditions. Severe dental pain (73.1%) and abscesses (20%) were the most common urgent dental conditions. Most non-urgent conditions presented for initial or periodic visits, recalls, or routine radiographs (74%). Treatments rarely involved restorations, with 8% among urgent conditions and 5.4% among non-urgent conditions. Antibiotics were only prescribed to 6.9% of urgent conditions. Conclusions: The largest group of children presenting at the emergency dental clinics were found to be children with non-urgent conditions. Tele dentistry can be a solution to avoid large numbers of non-urgent patients presenting to emergency clinics. Additionally, dental care for non-urgent conditions during the pandemic should focus more on procedures with less aerosol generation.Keywords: COVID-19 pandemic, dental emergencies, oral health, pediatric dentistry, children
Procedia PDF Downloads 9712289 Imputing Missing Data in Electronic Health Records: A Comparison of Linear and Non-Linear Imputation Models
Authors: Alireza Vafaei Sadr, Vida Abedi, Jiang Li, Ramin Zand
Abstract:
Missing data is a common challenge in medical research and can lead to biased or incomplete results. When the data bias leaks into models, it further exacerbates health disparities; biased algorithms can lead to misclassification and reduced resource allocation and monitoring as part of prevention strategies for certain minorities and vulnerable segments of patient populations, which in turn further reduce data footprint from the same population – thus, a vicious cycle. This study compares the performance of six imputation techniques grouped into Linear and Non-Linear models on two different realworld electronic health records (EHRs) datasets, representing 17864 patient records. The mean absolute percentage error (MAPE) and root mean squared error (RMSE) are used as performance metrics, and the results show that the Linear models outperformed the Non-Linear models in terms of both metrics. These results suggest that sometimes Linear models might be an optimal choice for imputation in laboratory variables in terms of imputation efficiency and uncertainty of predicted values.Keywords: EHR, machine learning, imputation, laboratory variables, algorithmic bias
Procedia PDF Downloads 8512288 The Adoption of Process Management for Accounting Information Systems in Thailand
Authors: Manirath Wongsim
Abstract:
Information Quality (IQ) has become a critical, strategic issue in Accounting Information Systems (AIS) adoption. In order to implement AIS adoption successfully, it is important to consider the quality of information use throughout the adoption process, which seriously impacts the effectiveness of AIS adoption practice and the optimization of AIS adoption decisions. There is a growing need for research to provide insights into issues and solutions related to IQ in AIS adoption. The need for an integrated approach to improve IQ in AIS adoption, as well as the unique characteristics of accounting data, demands an AIS adoption specific IQ framework. This research aims to explore ways of managing information quality and AIS adoption to investigate the relationship between the IQ issues and AIS adoption process. This study has led to the development of a framework for understanding IQ management in AIS adoption. This research was done on 44 respondents as ten organisations from manufacturing firms in Thailand. The findings of the research’s empirical evidence suggest that IQ dimensions in AIS adoption to provide assistance in all process of decision making. This research provides empirical evidence that information quality of AIS adoption affect decision making and suggests that these variables should be considered in adopting AIS in order to improve the effectiveness of AIS.Keywords: information quality, information quality dimensions, accounting information systems, accounting information system adoption
Procedia PDF Downloads 46712287 The Media and Reportage of Boko Haram Insurgency in Nigeria
Authors: Priscilla Marcus
Abstract:
The mass media was a force to reckon with in the struggle and attainment of Nigeria’s independence in 1960 and since then, the Nigerian media has carved a niche for itself in performing its traditional role of education, information, entertainment, shaping of opinions and swinging of views of the society on knotty national issues. Boko Haram insurgency in Nigeria which emerged from an unnoticed, negligible and quiet beginning, has turned out daring, monstrous and unstoppable. This paper examines The Media and Reportage of Boko Haram Insurgency in Nigeria and to suggest strategies the mass media could adopt in combating this form of terrorism. Data for the study were collected from a variety of sources including the print and electronic media. The major observation of this study is that the mass media have an enormous role to play if Boko Haram’s activities are to be combated. It argued that even though the media houses are just doing their job – reporting the incident(s) as they occur, thus keeping the citizens abreast of facts; the rate at which news keeps coming regarding the activities of the sect has portrayed the media as information dissemination and terror campaign spread. It also argued that the ceaseless reporting has not translated to a decrease in the activities of the sect or increase in the level of government actions to check the insurgency. However, the information being disseminated is enlightening the populace and also creating an atmosphere of panic and insecurity. It further argued that the media should move beyond mere recitation of events to providing the public with knowledge needed to make things better. This is because the sect has been accorded too much undeserved and unnecessary publicity while the government on the other hand has been portrayed, albeit indirectly as a weak organization incapable of handling the ‘more organized’ Boko Haram. The study, concluded that, to effectively address the problem of this form of terrorism in Nigeria, the media have to brace up to the task of uncovering activities of the sect in appreciation of their watch-dog role.Keywords: Boko Haram, insurgency, mass media, Nigeria
Procedia PDF Downloads 32612286 Geochemical and Spatial Distribution of Minerals in the Tailings of IFE/IJESA Gold Mine Zone, Nigeria
Authors: Oladejo S. O, Tomori W. B, Adebayo A. O
Abstract:
The main objective of this research is to identify the geochemical and mineralogical characteristics potential of unexplored tailings around the gold deposit region using spatial statistics and map modeling. Some physicochemical parameters such as pH, redox potential, electrical conductivity, cation exchange capacity, total organic carbon, total organic matter, residual humidity, Cation exchange capacity, and particle size were determined from both the mine drains and tailing samples using standard methods. The physicochemical parameters of tailings ranges obtained were pH (6.0 – 7.3), Eh (−16 - 95 Mev), EC (49 - 156 µS/cm), RH (0.20-2.60%), CEC (3.64-6.45 cmol/kg), TOC (3.57-18.62%), TOM (6.15-22.93%). The geochemical oxide composition were identified using Proton Induced X-ray emission and the results indicated that SiO2>Al2O3>Fe2O3>TiO2>K2O>MgO>CaO>Na2O> P2O5>MnO>Cr2O3>SrO>K2O>P2O5. The major mineralogical components in the tailing samples were determined by quantitative X-ray diffraction techniques using the Rietveld method. Geostatistical relationships among the known points were determined using ArcGIS 10.2 software to interpolate mineral concentration with respect to the study area. The Rietveld method gave a general Quartz value of 73.73-92.76%, IImenite as 0.38-4.77%, Kaolinite group as 3.19-20.83%, Muscovite as 0.77-11.70% with a trace of other minerals. The high percentage of quartz is an indication of a sandy environment with a loose binding site.Keywords: tailings, geochemical, mineralogy, spatial
Procedia PDF Downloads 7412285 A Case Study of Clinicians’ Perceptions of Enterprise Content Management at Tygerberg Hospital
Authors: Temitope O. Tokosi
Abstract:
Healthcare is a human right. The sensitivity of health issues has necessitated the introduction of Enterprise Content Management (ECM) at district hospitals in the Western Cape Province of South Africa. The objective is understanding clinicians’ perception of ECM at their workplace. It is a descriptive case study design of constructivist paradigm. It employed a phenomenological data analysis method using a pattern matching deductive based analytical procedure. Purposive and s4nowball sampling techniques were applied in selecting participants. Clinicians expressed concerns and frustrations using ECM such as, non-integration with other hospital systems. Inadequate access points to ECM. Incorrect labelling of notes and bar-coding causes more time wasted in finding information. System features and/or functions (such as search and edit) are not possible. Hospital management and clinicians are not constantly interacting and discussing. Information turnaround time is unacceptably lengthy. Resolving these problems would involve a positive working relationship between hospital management and clinicians. In addition, prioritising the problems faced by clinicians in relation to relevance can ensure problem-solving in order to meet clinicians’ expectations and hospitals’ objective. Clinicians’ perception should invoke attention from hospital management with regards technology use. The study’s results can be generalised across clinician groupings exposed to ECM at various district hospitals because of professional and hospital homogeneity.Keywords: clinician, electronic content management, hospital, perception, technology
Procedia PDF Downloads 23312284 How Addictive Are They: Effects of E-Cigarette Vapor on Intracranial Self-Stimulation Compared to Nicotine Alone
Authors: Annika Skansberg
Abstract:
Electronic cigarettes (e-cigarettes) use vapor to deliver nicotine, have recently become popular, especially amongst adolescents. Because of this, the FDA has decided to regulate e-cigarettes, and therefore would like to determine the abuse liability of the products compared to traditional nicotine products. This will allow them to determine the impact of regulating them on public health and shape the decisions they make when creating new laws. This study assessed the abuse liability of Aroma E-juice Dark Honey Tobacco compared to nicotine using an animal model. This e-liquid contains minor alkaloids that may increase abuse liability compared to nicotine alone. The abuse liability of nicotine alone and e-juice liquid were compared in rats using intracranial self-stimulation (ICSS) thresholds. E-liquid had less aversive effects at high nicotine doses in the ICSS model, suggesting that the minor alkaloids in the e-liquid allow users to use higher doses without experiencing the negative effects felt when using high doses of nicotine alone. This finding could mean that e-cigarettes have a higher abuse liability than nicotine alone, but more research is needed before this can be concluded. These findings are useful in observing the abuse liability of e-cigarettes and will help inform the FDA while regulating these products.Keywords: electronic cigarettes, intra-cranial self stimulation, abuse liability, anhedonia
Procedia PDF Downloads 31112283 Intrusion Detection in SCADA Systems
Authors: Leandros A. Maglaras, Jianmin Jiang
Abstract:
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection
Procedia PDF Downloads 55212282 Energy Conservation Strategies of Buildings in Hot, Arid Region: Al-Khobar, Saudi Arabia
Authors: M. H. Shwehdi, S. Raja Mohammad
Abstract:
Recently energy savings have become more pronounced as a result of the world financial crises as well the unstable oil prices. Certainly all entities needs to adapt Energy Conservation and Management Strategies due to high monthly consumption of their spread locations and advancements of its telecom systems. These system improvements necessitate the establishment of more exchange centers as well provide energy savings. This paper investigates the impact of HVAC System Characteristics, Operational Strategies, the impact of Envelope Thermal Characteristics, and energy conservation measures. These are classified under three types of measures i.e. Zero-Investment; Low-Investment and High-Investment Energy Conservation Measures. The study shows that the Energy Conservation Measures (ECMs) pertaining to the HVAC system characteristics and operation represent the highest potential for energy reduction, attention should be given to window thermal and solar radiation characteristics when large window areas are used. The type of glazing system needs to be carefully considered in the early design phase of future buildings. Paper will present the thermal optimization of different size centers in the two hot-dry and hot-humid Saudi Arabian city of Al Khobar, East province.Keywords: energy conservation, optimization, thermal design, intermittent operation, exchange centers, hot-humid climate, Saudi Arabia
Procedia PDF Downloads 45112281 Online Information Seeking: A Review of the Literature in the Health Domain
Authors: Sharifah Sumayyah Engku Alwi, Masrah Azrifah Azmi Murad
Abstract:
The development of the information technology and Internet has been transforming the healthcare industry. The internet is continuously accessed to seek for health information and there are variety of sources, including search engines, health websites, and social networking sites. Providing more and better information on health may empower individuals, however, ensuring a high quality and trusted health information could pose a challenge. Moreover, there is an ever-increasing amount of information available, but they are not necessarily accurate and up to date. Thus, this paper aims to provide an insight of the models and frameworks related to online health information seeking of consumers. It begins by exploring the definition of information behavior and information seeking to provide a better understanding of the concept of information seeking. In this study, critical factors such as performance expectancy, effort expectancy, and social influence will be studied in relation to the value of seeking health information. It also aims to analyze the effect of age, gender, and health status as the moderator on the factors that influence online health information seeking, i.e. trust and information quality. A preliminary survey will be carried out among the health professionals to clarify the research problems which exist in the real world, at the same time producing a conceptual framework. A final survey will be distributed to five states of Malaysia, to solicit the feedback on the framework. Data will be analyzed using SPSS and SmartPLS 3.0 analysis tools. It is hoped that at the end of this study, a novel framework that can improve online health information seeking is developed. Finally, this paper concludes with some suggestions on the models and frameworks that could improve online health information seeking.Keywords: information behavior, information seeking, online health information, technology acceptance model, the theory of planned behavior, UTAUT
Procedia PDF Downloads 27412280 Formulating Rough Approximations in Information Tables with Possibilistic Information
Authors: Michinori Nakata, Hiroshi Sakai
Abstract:
A rough set, which consists of lower and upper approximations, is formulated in information tables containing possibilistic information. First, lower and upper approximations on the basis of possible world semantics in the same way as Lipski did in the field of incomplete databases are shown in order to clarify fundamentals of rough sets under possibilistic information. Possibility and necessity measures are used, as is done in possibilistic databases. As a result, each object has certain and possible membership degrees to lower and upper approximations, which degrees are the lower and upper bounds. Therefore, the degree that the object belongs to lower and upper approximations is expressed by an interval value. And the complementary property linked with the lower and upper approximations holds, as is valid under complete information. Second, the approach based on indiscernibility relations, which is proposed by Dubois and Prade, are extended in three cases. The first case is that objects used to approximate a set of objects are characterized by possibilistic information. The second case is that objects used to approximate a set of objects with possibilistic information are characterized by complete information. The third case is that objects that are characterized by possibilistic information approximate a set of objects with possibilistic information. The extended approach create the same results as the approach based on possible world semantics. This justifies our extension.Keywords: rough sets, possibilistic information, possible world semantics, indiscernibility relations, lower approximations, upper approximations
Procedia PDF Downloads 32112279 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester
Procedia PDF Downloads 14812278 Corporate Voluntary Greenhouse Gas Emission Reporting in United Kingdom: Insights from Institutional and Upper Echelons Theories
Authors: Lyton Chithambo
Abstract:
This paper reports the results of an investigation into the extent to which various stakeholder pressures influence voluntary disclosure of greenhouse-gas (GHG) emissions in the United Kingdom (UK). The study, which is grounded on institutional theory, also borrows from the insights of upper echelons theory and examines whether specific managerial (chief executive officer) characteristics explain and moderates various stakeholder pressures in explaining GHG voluntary disclosure. Data were obtained from the 2011 annual and sustainability reports of a sample of 216 UK companies on the FTSE350 index listed on the London Stock Exchange. Generally the results suggest that there is no substantial shareholder and employee pressure on a firm to disclose GHG information but there is significant positive pressure from the market status of a firm with those firms with more market share disclosing more GHG information. Consistent with the predictions of institutional theory, we found evidence that coercive pressure i.e. regulatory pressure and mimetic pressures emanating in some industries notably industrials and consumer services have a significant positive influence on firms’ GHG disclosure decisions. Besides, creditor pressure also had a significant negative relationship with GHG disclosure. While CEO age had a direct negative effect on GHG voluntary disclosure, its moderation effect on stakeholder pressure influence on GHG disclosure was only significant on regulatory pressure. The results have important implications for both policy makers and company boards strategizing to reign in their GHG emissions.Keywords: greenhouse gases, voluntary disclosure, upper echelons theory, institution theory
Procedia PDF Downloads 23312277 The Role of Health Tourism in Enhancing the Quality of life and Cultural Transmission in Developing Countries
Authors: Fatemeh Noughani, Seyd Mehdi Sadat
Abstract:
Medical tourism or travel therapy is travelling from one country to another to be under medical treatment, utilizing the health factors of natural sector like mineral water springs and so on. From 1990s medical tourism around the world developed and grew because of different factors like globalization and free trade in the fields of health services, changes in exchange rates in the world economy (which caused the desirability of Asian countries as a medical tourist attraction) in a way that currently there is a close competition in this field among famous countries in medical services to make them find a desirable place in medical tourism market of the world as a complicated and growing industry in a short time. Perhaps tourism is an attractive industry and a good support for the economy of Iran, if we try to merge oil earnings and tourism industry it would be better and more constructive than putting them in front of each other. Moving from oil toward tourism economy especially medical tourism, must be one of the prospects of Iran's government for the oil industry to provide a few percent of the yearly earnings of the country. Among the achievements in medical tourism we can name the prevention of brain drain to other countries and an increase in employment rate for healthcare staff, increase in foreign exchange earnings of the country because of the tourists' staying and followed by increasing the quality of life and cultural transmission as well as empowering the medical human resources.Keywords: developing countries, health tourism, quality of life, cultural transmission
Procedia PDF Downloads 43612276 Analog Railway Signal Object Controller Development
Authors: Ercan Kızılay, Mustafa Demi̇rel, Selçuk Coşkun
Abstract:
Railway signaling systems consist of vital products that regulate railway traffic and provide safe route arrangements and maneuvers of trains. SIL 4 signal lamps are produced by many manufacturers today. There is a need for systems that enable these signal lamps to be controlled by commands from the interlocking. These systems should act as fail-safe and give error indications to the interlocking system when an unexpected situation occurs for the safe operation of railway systems from the RAMS perspective. In the past, driving and proving the lamp in relay-based systems was typically done via signaling relays. Today, the proving of lamps is done by comparing the current values read over the return circuit, the lower and upper threshold values. The purpose is an analog electronic object controller with the possibility of easy integration with vital systems and the signal lamp itself. During the study, the EN50126 standard approach was considered, and the concept, definition, risk analysis, requirements, architecture, design, and prototyping were performed throughout this study. FMEA (Failure Modes and Effects Analysis) and FTA (Fault Tree) Analysis) have been used for safety analysis in accordance with EN 50129. Concerning these analyzes, the 1oo2D reactive fail-safe hardware design of a controller has been researched. Electromagnetic compatibility (EMC) effects on the functional safety of equipment, insulation coordination, and over-voltage protection were discussed during hardware design according to EN 50124 and EN 50122 standards. As vital equipment for railway signaling, railway signal object controllers should be developed according to EN 50126 and EN 50129 standards which identify the steps and requirements of the development in accordance with the SIL 4(Safety Integrity Level) target. In conclusion of this study, an analog railway signal object controller, which takes command from the interlocking system, is processed in driver cards. Driver cards arrange the voltage level according to desired visibility by means of semiconductors. Additionally, prover cards evaluate the current upper and lower thresholds. Evaluated values are processed via logic gates which are composed as 1oo2D by means of analog electronic technologies. This logic evaluates the voltage level of the lamp and mitigates the risks of undue dimming.Keywords: object controller, railway electronic, analog electronic, safety, railway signal
Procedia PDF Downloads 10012275 Indonesia: Top Five Tax Haven Countries as the Strategy to Tax Avoidance
Authors: Maya Safira Dewi
Abstract:
Indonesia is one in the top ten countries most funds flowing into Tax Haven. Illegal funds flowing out of Indonesia reached USD 10.9 billion per year. While the total to 2010 of the Indonesian financial assets are in tax havens from Indonesia amounted to USD 331 billion (Kar and Freitas, 2012). Singapore, Netherlands, Virgin Island, Mauritius and Cayman Island are the highest countries that became the location of companies affiliated with the company listed in Indonesia Stock Exchange. The 469 companies listed on the stock exchange there are 128 companies (27.29%) with overseas entities, listed total overseas affiliated companies amounted to 417 firms in 2012 and 415 companies in 2011. The most of the branches or the parent company are located in Singapore, Netherlands, Virgin Island, Mauritius and Cayman Island. Judging from the existing tax provisions in these countries, have corporate tax rates that is lower than Indonesia. Tax avoidance to tax haven countries can be made by using some Strategies. They are transfer pricing, shopping treaty, thin capitalization and the controlled foreign company. Singapore, Netherlands, Virgin Island, Mauritius and Cayman Island are tax haven countries which become a tax heaven for Indonesian tax payer. It can be concluded that tax havens are a serious problem for Indonesia, and the need for a more assertive policy establishment and more detail about tax havens.Keywords: tax avoidance, tax haven, transfer pricing, tax rate, tax payer
Procedia PDF Downloads 41112274 An Educational Electronic Health Record with a Configurable User Interface
Authors: Floriane Shala, Evangeline Wagner, Yichun Zhao
Abstract:
Background: Proper educational training and support are proven to be major components of EHR (Electronic Health Record) implementation and use. However, the majority of health providers are not sufficiently trained in EHR use, leading to adverse events, errors, and decreased quality of care. In response to this, students studying Health Information Science, Public Health, Nursing, and Medicine should all gain a thorough understanding of EHR use at different levels for different purposes. The design of a usable and safe EHR system that accommodates the needs and workflows of different users, user groups, and disciplines is required for EHR learning to be efficient and effective. Objectives: This project builds several artifacts which seek to address both the educational and usability aspects of an educational EHR. The artifacts proposed are models for and examples of such an EHR with a configurable UI to be learned by students who need a background in EHR use during their degrees. Methods: Review literature and gather professional opinions from domain experts on usability, the use of workflow patterns, UI configurability and design, and the educational aspect of EHR use. Conduct interviews in a semi-casual virtual setting with open discussion in order to gain a deeper understanding of the principal aspects of EHR use in educational settings. Select a specific task and user group to illustrate how the proposed solution will function based on the current research. Develop three artifacts based on the available research, professional opinions, and prior knowledge of the topic. The artifacts capture the user task and user’s interactions with the EHR for learning. The first generic model provides a general understanding of the EHR system process. The second model is a specific example of performing the task of MRI ordering with a configurable UI. The third artifact includes UI mock-ups showcasing the models in a practical and visual way. Significance: Due to the lack of educational EHRs, medical professionals do not receive sufficient EHR training. Implementing an educational EHR with a usable and configurable interface to suit the needs of different user groups and disciplines will help facilitate EHR learning and training and ultimately improve the quality of patient care.Keywords: education, EHR, usability, configurable
Procedia PDF Downloads 15712273 Electrokinetics and Stability of Solder Powders in Aqueous Media
Authors: Terence Lucero F. Menor, Manolo G. Mena, Herman D. Mendoza
Abstract:
Solder pastes are widely used in creating mechanical, thermal and electrical connection between electronic components. Continued miniaturization of consumer electronics drives manufacturers to achieve smaller, lighter, and faster electronic packages at low cost. This faces them to the difficult challenge of dispensing solder pastes in extremely precise and repeatable manner. The most common problem in solder paste dispensing is the clogging of dispensers which results from agglomeration and settling of solder powders leading to increase on the effective particle size and uneven distribution of particles in the mixture. In this work, microelectrophoresis was employed to investigate the effect of pH and KNO₃ concentration on the electrokinetic behavior and stability of SAC305, PbSn5Ag2.5 and Sn powders in aqueous media. Results revealed that the electrokinetic behavior of the three types of solder powders are similar, which was attributed to high SnO₂ content on the surface of the particles. Electrokinetic measurements showed that the zeta potentials of the solder powders are highly dependent on pH and KNO₃ concentration with isoelectric points ranging from 3.5 to 5.5. Results were verified using stability tests.Keywords: electrokinetic behavior, isoelectric point, solder powder, stability, surface analysis
Procedia PDF Downloads 23012272 The Impact of the Information Technologies on the Accounting Department of the Romanian Companies
Authors: Dumitru Valentin Florentin
Abstract:
The need to use high volumes of data and the high competition are only two reasons which make necessary the use of information technologies. The objective of our research is to establish the impact of information technologies on the accounting department of the Romanian companies. In order to achieve it, starting from the literature review we made an empirical research based on a questionnaire. We investigated the types of technologies used, the reasons which led to the implementation of certain technologies, the benefits brought by the use of the information technologies, the difficulties brought by the implementation and the future effects of the applications. The conclusions show that there is an evolution in the degree of implementation of the information technologies in the Romanian companies, compared with the results of other studies conducted a few years before.Keywords: information technologies, impact, company, Romania, empirical study
Procedia PDF Downloads 42412271 A Framework for Green Use and Disposal of Information Communication Technology Devices
Authors: Frezer Alem Kebede
Abstract:
The notion of viewing ICT as merely support for the business process has shifted towards viewing ICT as a critical business enabler. As such, the need for ICT devices has increased, contributing to high electronic equipment acquisition and disposal. Hence, its use and disposal must be seen in light of environmental sustainability, i.e., in terms of green use and disposal. However, there are limited studies on green Use and Disposal framework to be used as guiding lens by organizations in developing countries. And this study endeavors to address that need taking one of the largest multinational ICT intensive company in the country. The design and development of this framework passed through several stages, initially factors affecting green use and disposal were identified after quantitative and qualitative data analysis then there were multiple brainstorming sessions for the design enhancement as participative modelling was employed. Given the difference in scope and magnitude of the challenges identified, the proposed framework approaches green use and disposal in four imperatives; strategically, tactically, operationally and through continuous improvement.Keywords: energy efficiency, green disposal, green ICT, green use, green use and disposal framework, sustainability
Procedia PDF Downloads 21012270 The Consumer Responses toward the Offensive Product Advertising
Authors: Chin Tangtarntana
Abstract:
The main purpose of this study was to investigate the effects of animation in offensive product advertising. Experiment was conducted to collect consumer responses toward animated and static ads of offensive and non-offensive products. The study was conducted by distributing questionnaires to the target respondents. According to statistics from Innovative Internet Research Center, Thailand, majority of internet users are 18 – 44 years old. The results revealed an interaction between ad design and offensive product. Specifically, when used in offensive product advertisements, animated ads were not effective for consumer attention, but yielded positive response in terms of attitude toward product. The findings support that information processing model is accurate in predicting consumer cognitive response toward cartoon ads, whereas U&G, arousal, and distinctive theory is more accurate in predicting consumer affective response. In practical, these findings can also be used to guide ad designers and marketers that are suitable for offensive products.Keywords: animation, banner ad design, consumer responses, offensive product advertising, stock exchange of Thailand
Procedia PDF Downloads 26912269 Visual Analytics of Higher Order Information for Trajectory Datasets
Authors: Ye Wang, Ickjai Lee
Abstract:
Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data
Procedia PDF Downloads 40212268 Value Relevance of Accounting Information: Empirical Evidence from China
Authors: Ying Guo, Miaochan Li, David Yang, Xiao-Yan Li
Abstract:
This paper examines the relevance of accounting information to stock prices at different periods using manufacturing companies listed in China’s Growth Enterprise Market (GEM). We find that both the average stock price at fiscal year-end and the average stock price one month after fiscal year-end are more relevant to the accounting information than the closing stock price four months after fiscal year-end. This implies that Chinese stock markets react before the public disclosure of accounting information, which may be due to information leak before official announcements. Our findings confirm that accounting information is relevant to stock prices for Chinese listed manufacturing companies, which is a critical question to answer for investors who have interest in Chinese companies.Keywords: accounting information, response time, value relevance, stock price
Procedia PDF Downloads 9612267 Developing Indicators in System Mapping Process Through Science-Based Visual Tools
Authors: Cristian Matti, Valerie Fowles, Eva Enyedi, Piotr Pogorzelski
Abstract:
The system mapping process can be defined as a knowledge service where a team of facilitators, experts and practitioners facilitate a guided conversation, enable the exchange of information and support an iterative curation process. System mapping processes rely on science-based tools to introduce and simplify a variety of components and concepts of socio-technical systems through metaphors while facilitating an interactive dialogue process to enable the design of co-created maps. System maps work then as “artifacts” to provide information and focus the conversation into specific areas around the defined challenge and related decision-making process. Knowledge management facilitates the curation of that data gathered during the system mapping sessions through practices of documentation and subsequent knowledge co-production for which common practices from data science are applied to identify new patterns, hidden insights, recurrent loops and unexpected elements. This study presents empirical evidence on the application of these techniques to explore mechanisms by which visual tools provide guiding principles to portray system components, key variables and types of data through the lens of climate change. In addition, data science facilitates the structuring of elements that allow the analysis of layers of information through affinity and clustering analysis and, therefore, develop simple indicators for supporting the decision-making process. This paper addresses methodological and empirical elements on the horizontal learning process that integrate system mapping through visual tools, interpretation, cognitive transformation and analysis. The process is designed to introduce practitioners to simple iterative and inclusive processes that create actionable knowledge and enable a shared understanding of the system in which they are embedded.Keywords: indicators, knowledge management, system mapping, visual tools
Procedia PDF Downloads 19512266 An E-Government Implementation Model for Peruvian State Companies Based on COBIT 5.0: Definition and Goals of the Model
Authors: M. Bruzza, M. Tupia, F. Rodríguez
Abstract:
As part of the regulatory compliance process and the streamlining of public administration, the Peruvian government has implemented the National E-Government Plan in all state institutions with the aim of providing citizens with solid services based on the use of Information and Communications Technologies (ICT). As part of the regulations, the requisites to be met by public institutions have been submitted. However, the lack of an implementation model was detected, one that can serve as a guide to such institutions in order to materialize the organizational and technological structures needed, which allow them to provide the required digital services. This paper develops an implementation model of electronic government (e-government) for Peru’s state institutions, in compliance with current regulations based on a COBIT 5.0 framework. Furthermore, the paper introduces phase 1 of this model: business and IT goals, the goals cascade and the future model of processes.Keywords: e-government, u-government, COBIT, implementation model
Procedia PDF Downloads 32712265 The Implications of Technological Advancements on the Constitutional Principles of Contract Law
Authors: Laura Çami (Vorpsi), Xhon Skënderi
Abstract:
In today's rapidly evolving technological landscape, the traditional principles of contract law are facing significant challenges. The emergence of new technologies, such as electronic signatures, smart contracts, and online dispute resolution mechanisms, is transforming the way contracts are formed, interpreted, and enforced. This paper examines the implications of these technological advancements on the constitutional principles of contract law. One of the fundamental principles of contract law is freedom of contract, which ensures that parties have the autonomy to negotiate and enter into contracts as they see fit. However, the use of technology in the contracting process has the potential to disrupt this principle. For example, online platforms and marketplaces often offer standard-form contracts, which may not reflect the specific needs or interests of individual parties. This raises questions about the equality of bargaining power between parties and the extent to which parties are truly free to negotiate the terms of their contracts. Another important principle of contract law is the requirement of consideration, which requires that each party receives something of value in exchange for their promise. The use of digital assets, such as cryptocurrencies, has created new challenges in determining what constitutes valuable consideration in a contract. Due to the ambiguity in this area, disagreements about the legality and enforceability of such contracts may arise. Furthermore, the use of technology in dispute resolution mechanisms, such as online arbitration and mediation, may raise concerns about due process and access to justice. The use of algorithms and artificial intelligence to determine the outcome of disputes may also raise questions about the impartiality and fairness of the process. Finally, it should be noted that there are many different and complex effects of technical improvements on the fundamental constitutional foundations of contract law. As technology continues to evolve, it will be important for policymakers and legal practitioners to consider the potential impacts on contract law and to ensure that the principles of fairness, equality, and access to justice are preserved in the contracting process.Keywords: technological advancements, constitutional principles, contract law, smart contracts, online dispute resolution, freedom of contract
Procedia PDF Downloads 15012264 Building a Model for Information Literacy Education in School Settings
Authors: Tibor Koltay
Abstract:
Among varied new literacies, information literacy is not only the best-known one but displays numerous models and frameworks. Nonetheless, there is still a lack of its complex theoretical model that could be applied to information literacy education in public (K12) education, which often makes use of constructivist approaches. This paper aims to present the main features of such a model. To develop a complex model, the literature and practice of phenomenographic and sociocultural theories, as well as discourse analytical approaches to information literacy, have been reviewed. Besides these constructivist and expressive based educational approaches, the new model is intended to include the innovation of coupling them with a cognitive model that takes developing informational and operational knowledge into account. The convergences between different literacies (information literacy, media literacy, media and information literacy, and data literacy) were taken into account, as well. The model will also make use of a three-country survey that examined secondary school teachers’ attitudes to information literacy. The results of this survey show that only a part of the respondents feel properly prepared to teach information literacy courses, and think that they can teach information literacy skills by themselves, while they see a librarian as an expert in educating information literacy. The use of the resulting model is not restricted to enhancing theory. It is meant to raise the level of awareness about information literacy and related literacies, and the next phase of the model’s development will be a pilot study that verifies the usefulness of the methodology for practical information literacy education in selected Hungarian secondary schools.Keywords: communication, data literacy, discourse analysis, information literacy education, media and information literacy media literacy, phenomenography, public education, sociocultural theory
Procedia PDF Downloads 14712263 Phishing Attacks Facilitated by Open Source Intelligence
Authors: Urva Maryam
Abstract:
Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego
Procedia PDF Downloads 8112262 Extreme Value Modelling of Ghana Stock Exchange Indices
Authors: Kwabena Asare, Ezekiel N. N. Nortey, Felix O. Mettle
Abstract:
Modelling of extreme events has always been of interest in fields such as hydrology and meteorology. However, after the recent global financial crises, appropriate models for modelling of such rare events leading to these crises have become quite essential in the finance and risk management fields. This paper models the extreme values of the Ghana Stock Exchange All-Shares indices (2000-2010) by applying the Extreme Value Theory to fit a model to the tails of the daily stock returns data. A conditional approach of the EVT was preferred and hence an ARMA-GARCH model was fitted to the data to correct for the effects of autocorrelation and conditional heteroscedastic terms present in the returns series, before EVT method was applied. The Peak Over Threshold (POT) approach of the EVT, which fits a Generalized Pareto Distribution (GPD) model to excesses above a certain selected threshold, was employed. Maximum likelihood estimates of the model parameters were obtained and the model’s goodness of fit was assessed graphically using Q-Q, P-P and density plots. The findings indicate that the GPD provides an adequate fit to the data of excesses. The size of the extreme daily Ghanaian stock market movements were then computed using the Value at Risk (VaR) and Expected Shortfall (ES) risk measures at some high quantiles, based on the fitted GPD model.Keywords: extreme value theory, expected shortfall, generalized pareto distribution, peak over threshold, value at risk
Procedia PDF Downloads 557