Search results for: healthcare data security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27744

Search results for: healthcare data security

26604 The Perceptions of Patients with Osteoarthritis at a Public Community Rehabilitation Centre in the Cape Metropole for Using Digital Technology in Rehabilitation

Authors: Gabriela Prins, Quinette Louw, Dawn Ernstzen

Abstract:

Background: Access to rehabilitation services is a major challenge globally, especially in low-and-middle income countries (LMICs) where resources and infrastructure are extremely limited. Telerehabilitation (TR) has emerged in recent decades as a highly promising method to dramatically expand accessibility to rehabilitation services globally. TR provides rehabilitation care remotely using communication technologies such as video conferencing, smartphones, and internet-connected devices. This boosts accessibility to underprivileged regions and allows for greater flexibility for patients. Despite this, TR is hindered by several factors, including limited technological resources, high costs, lack of digital access, and the unavailability of healthcare systems, which are major barriers to widespread adoption among LMIC patients. These barriers have collectively hindered the potential implementation and adoption of TR services in LMICs healthcare settings. Adoption of TR will also require the buy-in of end users and limited information is known on the perspectives of the SA population. Aim: The study aimed to understand patients' perspectives regarding the use of digital technology as part of their OA rehabilitation at a public community healthcare centre in the Cape Metropole Area. Methods: A qualitative descriptive study design was used on 10 OA patients from a public community rehabilitation centre in South Africa. Data collection included semi-structured interviews and patient-reported outcome measures (PSFS, ASES-8, and EuroQol EQ-5D-5L) on functioning and quality of life. Transcribed interview data were coded in Atlas.ti. 22.2 and analyzed using thematic analysis. The results were narratively documented. Results: Four themes arose from the interviews. The themes were Telerehabilitation awareness (Use of Digital Technology Information Sources and Prior Experience with Technology /TR), Telerehabilitation Benefits (Access to healthcare providers, Access to educational information, Convenience, Time and Resource Efficiency and Facilitating Family Involvement), Telerehabilitation Implementation Considerations (Openness towards TR Implementation, Learning about TR and Technology, Therapeutic relationship, and Privacy) and Future use of Telerehabilitation (Personal Preference and TR for the next generation). The ten participants demonstrated limited awareness and exposure to TR, as well as minimal digital literacy and skills. Skepticism was shown when comparing the effectiveness of TR to in-person rehabilitation and valued physical interactions with health professionals. However, some recognized potential benefits of TR for accessibility, convenience, family involvement and improving community health in the long term. Willingness existed to try TR with sufficient training. Conclusion: With targeted efforts addressing identified barriers around awareness, technological literacy, clinician readiness and resource availability, perspectives on TR may shift positively from uncertainty towards endorsement of this expanding approach for simpler rehabilitation access in LMICs.

Keywords: digital technology, osteoarthritis, primary health care, telerehabilitation

Procedia PDF Downloads 78
26603 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks

Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba

Abstract:

The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.

Keywords: authentication, long term evolution, security, vehicle-to-everything

Procedia PDF Downloads 168
26602 Promoting Resilience in Adolescents: Integrating Adolescent Medicine and Child Psychology Perspectives

Authors: Xu Qian

Abstract:

This abstract examines the concept of resilience in adolescents from both adolescent medicine and child psychology perspectives. It discusses the role of healthcare providers in fostering resilience among adolescents, encompassing physical, psychological, and social aspects. The paper highlights evidence-based interventions and practical strategies for promoting resilience in this population. Introduction: Resilience plays a crucial role in the healthy development of adolescents, enabling them to navigate through the challenges of this transitional period. This abstract explores the concept of resilience from the perspectives of adolescent medicine and child psychology, shedding light on the collective efforts of healthcare providers in fostering resilience. By integrating the principles and practices of these two disciplines, this abstract emphasizes the multidimensional nature of resilience and its significance in the overall well-being of adolescents. Methods: A comprehensive literature review was conducted, encompassing research articles, empirical studies, and expert opinions from both adolescent medicine and child psychology fields. The search included databases such as PubMed, PsycINFO, and Google Scholar, focusing on publications from the past decade. The review aimed to identify evidence-based interventions and practical strategies employed by healthcare providers to promote resilience among adolescents. Results: The review revealed several key findings regarding the promotion of resilience in adolescents. Firstly, resilience is a dynamic process influenced by individual characteristics, environmental factors, and the interaction between the two. Secondly, healthcare providers play a critical role in fostering resilience by addressing the physical, psychological, and social needs of adolescents. This entails comprehensive healthcare services that integrate medical care, mental health support, and social interventions. Thirdly, evidence-based interventions such as cognitive-behavioral therapy, social skills training, and positive youth development programs have shown promising outcomes in enhancing resilience. Discussion: The integration of adolescent medicine and child psychology perspectives provides a comprehensive framework for promoting resilience in adolescents. By acknowledging the interplay between physical health, psychological well-being, and social functioning, healthcare providers can tailor interventions to address the specific needs and challenges faced by adolescents. Collaborative efforts between medical professionals, psychologists, educators, and families are vital in creating a supportive environment that fosters resilience. Additionally, the findings highlight the importance of early identification and intervention, emphasizing the need for routine screening and assessment to identify adolescents at risk and provide timely support. Conclusion: Promoting resilience in adolescents requires a holistic approach that integrates adolescent medicine and child psychology perspectives. By recognizing the multifaceted nature of resilience, healthcare providers can implement evidence-based interventions and practical strategies to enhance the well-being of adolescents. The collaboration between healthcare professionals from different disciplines, alongside the involvement of families and communities, is crucial for creating a resilient support system. By investing in the promotion of resilience during adolescence, we can empower young individuals to overcome adversity and thrive in their journey toward adulthood.

Keywords: psychology, clinical psychology, child psychology, adolescent psychology, adolescent

Procedia PDF Downloads 79
26601 Introduce a New Model of Anomaly Detection in Computer Networks Using Artificial Immune Systems

Authors: Mehrshad Khosraviani, Faramarz Abbaspour Leyl Abadi

Abstract:

The fundamental component of the computer network of modern information society will be considered. These networks are connected to the network of the internet generally. Due to the fact that the primary purpose of the Internet is not designed for, in recent decades, none of these networks in many of the attacks has been very important. Today, for the provision of security, different security tools and systems, including intrusion detection systems are used in the network. A common diagnosis system based on artificial immunity, the designer, the Adhasaz Foundation has been evaluated. The idea of using artificial safety methods in the diagnosis of abnormalities in computer networks it has been stimulated in the direction of their specificity, there are safety systems are similar to the common needs of m, that is non-diagnostic. For example, such methods can be used to detect any abnormalities, a variety of attacks, being memory, learning ability, and Khodtnzimi method of artificial immune algorithm pointed out. Diagnosis of the common system of education offered in this paper using only the normal samples is required for network and any additional data about the type of attacks is not. In the proposed system of positive selection and negative selection processes, selection of samples to create a distinction between the colony of normal attack is used. Copa real data collection on the evaluation of ij indicates the proposed system in the false alarm rate is often low compared to other ir methods and the detection rate is in the variations.

Keywords: artificial immune system, abnormality detection, intrusion detection, computer networks

Procedia PDF Downloads 355
26600 Improved Classification Procedure for Imbalanced and Overlapped Situations

Authors: Hankyu Lee, Seoung Bum Kim

Abstract:

The issue with imbalance and overlapping in the class distribution becomes important in various applications of data mining. The imbalanced dataset is a special case in classification problems in which the number of observations of one class (i.e., major class) heavily exceeds the number of observations of the other class (i.e., minor class). Overlapped dataset is the case where many observations are shared together between the two classes. Imbalanced and overlapped data can be frequently found in many real examples including fraud and abuse patients in healthcare, quality prediction in manufacturing, text classification, oil spill detection, remote sensing, and so on. The class imbalance and overlap problem is the challenging issue because this situation degrades the performance of most of the standard classification algorithms. In this study, we propose a classification procedure that can effectively handle imbalanced and overlapped datasets by splitting data space into three parts: nonoverlapping, light overlapping, and severe overlapping and applying the classification algorithm in each part. These three parts were determined based on the Hausdorff distance and the margin of the modified support vector machine. An experiments study was conducted to examine the properties of the proposed method and compared it with other classification algorithms. The results showed that the proposed method outperformed the competitors under various imbalanced and overlapped situations. Moreover, the applicability of the proposed method was demonstrated through the experiment with real data.

Keywords: classification, imbalanced data with class overlap, split data space, support vector machine

Procedia PDF Downloads 308
26599 The Fadama Initiative: Implications for Human Security and Sustainable Development in Nigeria

Authors: Albert T. Akume, Yahya M. Abdullahi

Abstract:

The impact of poverty on individual and society is grave, hence the efforts by the government to eradicate or alleviate. In Nigeria the various efforts to reduce rural poverty by empowering them and making the process of their development self-sustaining have ended dismally. That notwithstanding, government determination to conquer poverty has not diminish as in the early 1990s the government with financial collaboration from the World Bank and African Development Bank introduced the fadama project. It is against this backdrop that this paper uses the documentary and analytical research methods to examine the implication the fadama development project has for community capacity development and human security in Nigeria. From the analysis it was discovered the fadama project improved household income of fadama farmers, community empowerment, participatory development planning and support for demand driven productive investment in farm and non-farm activities including community infrastructures. Despite this impressive result the fadama project is challenged by conflict especially in northern Nigeria and late delivery of necessary farm consumables that aid improved productivity. It was therefore recommended that the government should strengthen her various state security institutions to proactively mitigate conflicts and to ensure that farm consumables and other support services reach farmers timely.

Keywords: capacity development, empowerment, fadama, human security, poverty reduction, theory of change, sustainable development

Procedia PDF Downloads 499
26598 Measuring the Effect of a Music Therapy Intervention in a Neonatal Intensive Care Unit in Spain

Authors: Pablo González Álvarez, Anna Vinaixa Vergés, Paula Sol Ventura, Paula Fernández, Mercè Redorta, Gemma Ginovart Galiana, Maria Méndez Hernández

Abstract:

Context: The use of music therapy is gaining popularity worldwide, and it has shown positive effects in neonatology. Hospital Germans Trias i Pujol has recently established a music therapy unit and initiated a project in their neonatal intensive care unit (NICU). Research Aim: The aim of this study is to measure the effect of a music therapy intervention in the NICU of Hospital Germans Trias i Pujol in Spain. Methodology: The study will be an observational analytical case-control study. All newborns admitted to the neonatology unit, both term and preterm, and their parents will be offered a session of music therapy. Data will be collected from families who receive at least two music therapy sessions. Maternal and paternal anxiety levels will be measured through a pre- and post-intervention test. Findings: The study aims to demonstrate the benefits and acceptance of music therapy by patients, parents, and healthcare workers in the neonatal unit. The findings are expected to show a reduction in maternal and paternal anxiety levels following the music therapy sessions. Theoretical Importance: This study contributes to the growing body of literature on the effectiveness of music therapy in neonatal care. It will provide evidence of the acceptance and potential benefits of music therapy in reducing anxiety levels in both parents and babies in the NICU setting. Data Collection: Data will be collected from families who receive at least two music therapy sessions. This will include pre- and post-intervention test results to measure anxiety levels. Analysis Procedures: The collected data will be analyzed using appropriate statistical methods to determine the impact of music therapy on reducing anxiety levels in parents. Questions Addressed: - What is the effect of music therapy on maternal anxiety levels? - What is the effect of music therapy on paternal anxiety levels? - What is the acceptability and perceived benefits of music therapy among patients and healthcare workers in the NICU? Conclusion: The study aims to provide evidence supporting the value of music therapy in the neonatal intensive care unit. It seeks to demonstrate the positive effect of music therapy on reducing anxiety levels among parents.

Keywords: neonatology, music therapy, neonatal intensive care unit, babies, parents

Procedia PDF Downloads 51
26597 Undersea Communications Infrastructure: Risks, Opportunities, and Geopolitical Considerations

Authors: Lori W. Gordon, Karen A. Jones

Abstract:

Today’s high-speed data connectivity depends on a vast global network of infrastructure across space, air, land, and sea, with undersea cable infrastructure (UCI) serving as the primary means for intercontinental and ‘long-haul’ communications. The UCI landscape is changing and includes an increasing variety of state actors, such as the growing economies of Brazil, Russia, India, China, and South Africa. Non-state commercial actors, such as hyper-scale content providers including Google, Facebook, Microsoft, and Amazon, are also seeking to control their data and networks through significant investments in submarine cables. Active investments by both state and non-state actors will invariably influence the growth, geopolitics, and security of this sector. Beyond these hyper-scale content providers, there are new commercial satellite communication providers. These new players include traditional geosynchronous (GEO) satellites that offer broad coverage, high throughput GEO satellites offering high capacity with spot beam technology, low earth orbit (LEO) ‘mega constellations’ – global broadband services. And potential new entrants such as High Altitude Platforms (HAPS) offer low latency connectivity, LEO constellations offer high-speed optical mesh networks, i.e., ‘fiber in the sky.’ This paper focuses on understanding the role of submarine cables within the larger context of the global data commons, spanning space, terrestrial, air, and sea networks, including an analysis of national security policy and geopolitical implications. As network operators and commercial and government stakeholders plan for emerging technologies and architectures, hedging risks for future connectivity will ensure that our data backbone will be secure for years to come.

Keywords: communications, global, infrastructure, technology

Procedia PDF Downloads 89
26596 Transforming Data into Knowledge: Mathematical and Statistical Innovations in Data Analytics

Authors: Zahid Ullah, Atlas Khan

Abstract:

The rapid growth of data in various domains has created a pressing need for effective methods to transform this data into meaningful knowledge. In this era of big data, mathematical and statistical innovations play a crucial role in unlocking insights and facilitating informed decision-making in data analytics. This abstract aims to explore the transformative potential of these innovations and their impact on converting raw data into actionable knowledge. Drawing upon a comprehensive review of existing literature, this research investigates the cutting-edge mathematical and statistical techniques that enable the conversion of data into knowledge. By evaluating their underlying principles, strengths, and limitations, we aim to identify the most promising innovations in data analytics. To demonstrate the practical applications of these innovations, real-world datasets will be utilized through case studies or simulations. This empirical approach will showcase how mathematical and statistical innovations can extract patterns, trends, and insights from complex data, enabling evidence-based decision-making across diverse domains. Furthermore, a comparative analysis will be conducted to assess the performance, scalability, interpretability, and adaptability of different innovations. By benchmarking against established techniques, we aim to validate the effectiveness and superiority of the proposed mathematical and statistical innovations in data analytics. Ethical considerations surrounding data analytics, such as privacy, security, bias, and fairness, will be addressed throughout the research. Guidelines and best practices will be developed to ensure the responsible and ethical use of mathematical and statistical innovations in data analytics. The expected contributions of this research include advancements in mathematical and statistical sciences, improved data analysis techniques, enhanced decision-making processes, and practical implications for industries and policymakers. The outcomes will guide the adoption and implementation of mathematical and statistical innovations, empowering stakeholders to transform data into actionable knowledge and drive meaningful outcomes.

Keywords: data analytics, mathematical innovations, knowledge extraction, decision-making

Procedia PDF Downloads 75
26595 Graph Neural Network-Based Classification for Disease Prediction in Health Care Heterogeneous Data Structures of Electronic Health Record

Authors: Raghavi C. Janaswamy

Abstract:

In the healthcare sector, heterogenous data elements such as patients, diagnosis, symptoms, conditions, observation text from physician notes, and prescriptions form the essentials of the Electronic Health Record (EHR). The data in the form of clear text and images are stored or processed in a relational format in most systems. However, the intrinsic structure restrictions and complex joins of relational databases limit the widespread utility. In this regard, the design and development of realistic mapping and deep connections as real-time objects offer unparallel advantages. Herein, a graph neural network-based classification of EHR data has been developed. The patient conditions have been predicted as a node classification task using a graph-based open source EHR data, Synthea Database, stored in Tigergraph. The Synthea DB dataset is leveraged due to its closer representation of the real-time data and being voluminous. The graph model is built from the EHR heterogeneous data using python modules, namely, pyTigerGraph to get nodes and edges from the Tigergraph database, PyTorch to tensorize the nodes and edges, PyTorch-Geometric (PyG) to train the Graph Neural Network (GNN) and adopt the self-supervised learning techniques with the AutoEncoders to generate the node embeddings and eventually perform the node classifications using the node embeddings. The model predicts patient conditions ranging from common to rare situations. The outcome is deemed to open up opportunities for data querying toward better predictions and accuracy.

Keywords: electronic health record, graph neural network, heterogeneous data, prediction

Procedia PDF Downloads 87
26594 Energy Security and Sustainable Development: Challenges and Prospects

Authors: Abhimanyu Behera

Abstract:

Over the past few years, energy security and sustainable development have moved rapidly into the global agenda. There are two main reasons: first, the impact of high and often volatile energy prices; second, concerns over environmental sustainability particularly about the global climate. Both issues are critically important in which impressive economic growth has boosted the demand for energy and put corresponding strains on the environment. Energy security is a broad concept that focuses on energy availability and pricing. Specifically, it refers to the ability of the energy supply system i.e. suppliers, transporters, distributors and regulatory, financial and R&D institutions to deliver the amount of competitively priced energy that customers demand, within accepted standards of reliability, timeliness, quality, safety. Traditionally, energy security has been defined in the context of the geopolitical risks to external oil supplies but today it is encompassing all energy forms, all the external and internal links bringing the energy to the final consumer, and all the many ways energy supplies can be disrupted including equipment malfunctions, system design flaws, operator errors, malicious computer activities, deficient market and regulatory frameworks, corporate financial problems, labour actions, severe weather and natural events, aggressive acts (e.g. war, terrorism and sabotage), and geopolitical disruptions. In practice, the most challenging disruptions are those linked to: 1) extreme weather events; 2) mismatched electricity supply and demand; 3) regulatory failures; and 4) concentration of oil and gas resources in certain regions of the world. However, insecure energy supplies inhibit development by raising energy costs and imposing expensive cuts in services when disruptions actually occur. The energy supply sector can best advance sustainable development by producing and delivering secure and environmentally-friendly sources of energy and by increasing the efficiency of energy use. With this objective, this paper seeks to highlight the significance of energy security and sustainable development in today’s world. Moreover, it critically overhauls the major challenges towards sustainability of energy security and what are the major policies are taken to overcome these challenges by Government is lucidly explicated in this paper.

Keywords: energy, policies, security, sustainability

Procedia PDF Downloads 390
26593 Perception of Health Care Providers on the Use of Modern Contraception by Adolescents in Rwanda

Authors: Jocelyne Uwibambe, Ange Thaina Ndizeye, Dinah Ishimwe, Emmanuel Mugabo Byakagaba

Abstract:

Background: In low- and middle-income countries (LMICs), the use of modern contraceptive methods among women, including adolescents, is still low despite the desire to avoid pregnancy. In addition, countries have set a minimum age for marriage, which is 21 years for most countries, including Rwanda. The Rwandan culture, to a certain extent, and religion, to a greater extent, however, limit the freedom of young women to use contraceptive services because it is wrongly perceived as an encouragement for premarital sexual intercourse. In the end, what doesn’t change is that denying access to contraceptives to either male or female adolescents does not translate into preventing them from sexual activities, hence leading to an ever-increasing number of unwanted pregnancies, possible STIs, HIV, Human Papilloma Virus, and subsequent unsafe abortion followed by avoidable expensive complications. The purpose of this study is to evaluate the perception of healthcare providers regarding contraceptive use among adolescents. Methodology: This was a qualitative study. Interviews were done with different healthcare providers, including doctors, nurses, midwives, and pharmacists, through focused group discussions and in-depth interviews, then the audio was transcribed, translated and thematic coding was done. Results: This study explored the perceptions of healthcare workers regarding the provision of modern contraception to adolescents in Rwanda. The findings revealed that while healthcare providers had a good understanding of family planning and contraception, they were hesitant to provide contraception to adolescents. Sociocultural beliefs played a significant role in shaping their attitudes, as many healthcare workers believed that providing contraception to adolescents would encourage promiscuous behavior and go against cultural norms. Religious beliefs also influenced their reluctance, with some healthcare providers considering premarital sex and contraception as sinful. Lack of knowledge among parents and adolescents themselves was identified as a contributing factor to unwanted pregnancies, as inaccurate information from peers and social media influenced risky sexual behavior. Conditional policies, such as the requirement for parental consent, further hindered adolescents' access to contraception. The study suggested several solutions, including comprehensive sexual and reproductive health education, involving multiple stakeholders, ensuring easy access to contraception, and involving adolescents in policymaking. Overall, this research highlights the need for addressing sociocultural beliefs, improving healthcare providers' knowledge, and revisiting policies to ensure adolescents' reproductive health rights are met in Rwanda. Conclusion: The study highlights the importance of enhancing healthcare provider training, expanding access to modern contraception, implementing community-based interventions, and strengthening policy and programmatic support for adolescent contraception. Addressing these challenges is crucial for improving the provision of family planning services to adolescents in Rwanda and achieving the Sustainable Development Goals related to sexual and reproductive health. Collaborative efforts involving various stakeholders and organizations can contribute to overcoming these barriers and promoting the well-being of adolescents in Rwanda.

Keywords: adolescent, health care providers, contraception, reproductive health

Procedia PDF Downloads 51
26592 The Ethics of Physical Restraints in Geriatric Care

Authors: Bei Shan Lin, Chun Mei Lu, Ya Ping Chen, Li Chen Lu

Abstract:

This study explores the ethical issues concerning the use of physical restraint in geriatric care. Physical restraint use in a medical care setting is seen as a controversial form of treatment that has occurred over decades. There is no doubt that people nowadays are living longer than previous generations. The ageing process is inevitable. Common disease such as impaired comprehension, memory loss, and trouble expressing one’s self contribute to the difficulty that these older patients have in adapting to medical institution. For these reasons, physical restraint is often used in reducing the risk of falling, managing wandering behaviour, preventing agitation, and promoting patient compliance in geriatric care. It can mean that physical restraints are considered as a common practice that is used in the care of older patients. It is most commonly used for three specific purposes, including procedural restraint, restraint to prevent falls, and behavioural restraints. Although there have been well documented instances of morbidity and mortality recognised as being potential risks associated with physical restraint use, it continues to be permitted and used in healthcare, often in the name of safety. However, there is insufficient evidence supporting the effectiveness of physical restraint use reducing injuries from falls and controlling challenging behaviour in geriatric care settings. There is barely any empirical evidence of either a scientific basis or clinical trials have evaluated the improvement in patient safety following physical restraint. In difficult clinical situations, guidelines and practical suggestions for Healthcare professionals to comply requirements can help those making appropriate decisions and to facilitate better judgement regarding physical restraint use. The following recommendations are given for physical restraint use in long-term care settings: an interdisciplinary team approach to assess, evaluate, and treat underlying diseases to determine if treatment can ease issues precipitating physical restraint use; a clearly stated purpose of treatment plan should be made after weighing up the risk of physical restraint use against the risk of without physical restraint use; a care plan for physical restraint has to include individualised treatment planning, informed consent, identification and remedial action to avoid negative consequences, regular assessment and modification, reduction and removal of risks; patients and their families must have the opportunity to consider and give voluntary informed consent prior to physical restraint utilisation; patients, family members, and Healthcare professionals should be educated on use and adverse consequences of physical restraints in order to make raise awareness of potential risks and to take appropriate steps to prevent unnecessary harm; after physical restraint removal, Healthcare professionals should discuss with patients and family members about their experience, feelings, and any anxieties regarding the treatment. Physical restraint should always be considered a last resort as deprive patient’s freedom, control, and individuality. Healthcare professionals should emphasise on providing individualized care, interdisciplinary decision-making process, and creative and collaborative alternatives to promote older patient’s rights, dignity and overall well-being as much as possible.

Keywords: ethics healthcare, geriatric care, healthcare, physical restraint

Procedia PDF Downloads 133
26591 A Secure Proxy Signature Scheme with Fault Tolerance Based on RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Due to the rapid growth in modern communication systems, fault tolerance and data security are two important issues in a secure transaction. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a secure proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: proxy signature, fault tolerance, rsa, key agreement protocol

Procedia PDF Downloads 287
26590 Materialized View Effect on Query Performance

Authors: Yusuf Ziya Ayık, Ferhat Kahveci

Abstract:

Currently, database management systems have various tools such as backup and maintenance, and also provide statistical information such as resource usage and security. In terms of query performance, this paper covers query optimization, views, indexed tables, pre-computation materialized view, query performance analysis in which query plan alternatives can be created and the least costly one selected to optimize a query. Indexes and views can be created for related table columns. The literature review of this study showed that, in the course of time, despite the growing capabilities of the database management system, only database administrators are aware of the need for dealing with archival and transactional data types differently. These data may be constantly changing data used in everyday life, and also may be from the completed questionnaire whose data input was completed. For both types of data, the database uses its capabilities; but as shown in the findings section, instead of repeating similar heavy calculations which are carrying out same results with the same query over a survey results, using materialized view results can be in a more simple way. In this study, this performance difference was observed quantitatively considering the cost of the query.

Keywords: cost of query, database management systems, materialized view, query performance

Procedia PDF Downloads 281
26589 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 381
26588 Factors Affecting Citizens’ Behavioural Intention to Use E-voter Registration and Verification System Towards the Electoral Process in Nigeria

Authors: Aishatu Shuaibu

Abstract:

It is expected that electronic voter registration and verification in Nigeria will enhance the integrity of elections, which is vital for democratic development; it is also expected to enhance efficiency, transparency, and security. However, the reasons for citizens' intentions with respect to behavioral use of such platforms have not been studied in the literature much. This paper, therefore, intends to look into significant characteristics affecting the acceptance and use of e-voter technology among Nigerian residents. Data will be collected using a structured questionnaire from several local government areas (LGAs) around Nigeria to evaluate the influence of demographic characteristics, technology usability, security perceptions, and governmental education on the intention to implement e-voter systems. The results will offer vital insights into the barriers and drivers of voter technology acceptance, aiding in policy suggestions to enhance voter registration and verification processes within Nigeria's electoral framework. This study is designed to aid electoral stakeholders in devising successful strategies for encouraging the broad deployment of e-voter systems in Nigeria.

Keywords: e-governance, e-voting, e-democracy, INEC, Nigeria

Procedia PDF Downloads 23
26587 Brazilian Public Security: Governability and Constitutional Change

Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari

Abstract:

Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.

Keywords: public security, governability, rule of law, federalism

Procedia PDF Downloads 678
26586 'CardioCare': A Cutting-Edge Fusion of IoT and Machine Learning to Bridge the Gap in Cardiovascular Risk Management

Authors: Arpit Patil, Atharav Bhagwat, Rajas Bhope, Pramod Bide

Abstract:

This research integrates IoT and ML to predict heart failure risks, utilizing the Framingham dataset. IoT devices gather real-time physiological data, focusing on heart rate dynamics, while ML, specifically Random Forest, predicts heart failure. Rigorous feature selection enhances accuracy, achieving over 90% prediction rate. This amalgamation marks a transformative step in proactive healthcare, highlighting early detection's critical role in cardiovascular risk mitigation. Challenges persist, necessitating continual refinement for improved predictive capabilities.

Keywords: cardiovascular diseases, internet of things, machine learning, cardiac risk assessment, heart failure prediction, early detection, cardio data analysis

Procedia PDF Downloads 14
26585 Digitalize or Die-Responsible Innovations in Healthcare and Welfare Sectors

Authors: T. Iakovleva

Abstract:

Present paper suggests a theoretical model that describes the process of the development of responsible innovations on the firm level in health and welfare sectors. There is a need to develop new firm strategies in these sectors. This paper suggests to look on the concept of responsible innovation that was originally developed on the social level and to apply this new concept to the new area of firm strategy. The rapid global diffusion of information and communication technologies has greatly improved access to knowledge. At the same time, communication is cheap, information is a commodity, and global trade increases technological diffusion. As a result, firms and users, including those outside of industrialized nations, get early exposure to the latest technologies and information. General-purpose technologies such as mobile phones and 3D printers enable individuals to solve local needs and customize products. The combined effect of these changes is having a profound impact on the innovation landscape. Meanwhile, the healthcare sector is facing unprecedented challenges, which are magnified by budgetary constraints, an aging population and the desire to provide care for all. On the other hand, patients themselves are changing. They are savvier about their diseases, they expect their relation with the healthcare professionals to be open and interactive, but above all they want to be part of the decision process. All of this is a reflection of what is already happening in other industries where customers have access to large amount of information and became educated buyers. This article addresses the question of how ICT research and innovation may contribute to developing solutions to grand societal challenges in a responsible way. A broad definition of the concept of responsibility in the context of innovation is adopted in this paper. Responsibility is thus seen as a collective, uncertain and future-oriented activity. This opens the questions of how responsibilities are perceived and distributed and how innovation and science can be governed and stewarded towards socially desirable and acceptable ends. This article addresses a central question confronting politicians, business leaders, and regional planners.

Keywords: responsible innovation, ICT, healthcare, welfare sector

Procedia PDF Downloads 199
26584 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 555
26583 Introduction to Multi-Agent Deep Deterministic Policy Gradient

Authors: Xu Jie

Abstract:

As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decisionmaking problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security). By modeling the multi-job collaborative cryptographic service scheduling problem as a multiobjective optimized job flow scheduling problem, and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing, and effectively solves the problem of complex resource scheduling in cryptographic services.

Keywords: multi-agent reinforcement learning, non-stationary dynamics, multi-agent systems, cooperative and competitive agents

Procedia PDF Downloads 26
26582 Investigating the Impact of Migration Background on Pregnancy Outcomes During the End of Period of COVID-19 Pandemic: A Mixed-Method Study

Authors: Charlotte Bach, Albrecht Jahn, Mahnaz Motamedi, Maryam Karimi-Ghahfarokhi

Abstract:

Background: Maternal and infant deaths are most prevalent in the first month after birth, emphasizing the critical need for quality healthcare services during this period. Immigrant women, who are more susceptible to adverse pregnancy outcomes, often face neglect in accessing proper healthcare. The lack of adequate postpartum care significantly contributes to mortality rates. Therefore, utilizing maternal health care services and implementing postpartum care is crucial in reducing maternal and child mortality. Aims: This study aims to evaluate the assessment of pre- and postnatal care among women with and without migration background. In addition, the study explores the impact of COVID-19 procedures on women's experiences during pregnancy, birth, and the postpartum period. Methods: This research employs a cross-sectional Mixed-Method design. Data collection was facilitated through structured questionnaires administered to participants, alongside the utilization of patient bases, including Maternity and child medical records. Following the assumption that the investigator aimed to gain comprehensive insights, qualitative sampling focused on individuals with substantial experiences related to COVID-19, regarded as rich cases. Results: our study highlighted the influence of educational level, marital status, and consensual partnerships on the likelihood of Cesarean deliveries. Regarding breastfeeding practices, migrant women exhibited higher rates of breastfeeding initiation and continuation. Contraception utilization revealed interesting patterns, with non-migrants displaying higher odds of contraceptive use. The qualitative component of our research adds depth to the exploration of women's experiences during the COVID-19 pandemic, revealing nuanced challenges related to anxiety, hospital restrictions, breastfeeding support, and postnatal ward routines. Conclusion: Dissimilarity among studies toward cesarean rate between migrants and non-migrants underscores the importance of targeted interventions considering the diverse needs of distinct population groups. It also acknowledges potential cultural, contextual, and healthcare system influences on the association between mode of delivery and infant feeding practices. Studies acknowledge the influence of contextual variables on contraceptive preferences among migrants and non-migrants, emphasizing the need for tailored healthcare policies. The findings contribute to existing research, highlighting the need for a nuanced understanding of the impact of birth preparation courses on maternal and infant outcomes. Furthermore, they emphasize the universality of certain maternity care experiences, regardless of pandemic contexts, reinforcing the importance of patient-centred approaches in healthcare delivery.

Keywords: migration background, pregnancy outcome, covid-19, postpartum

Procedia PDF Downloads 56
26581 Women and Food Security: Evidence from Bangladesh Demographic Health Survey 2011

Authors: Abdullah Al. Morshed, Mohammad Nahid Mia

Abstract:

Introduction: Food security refers to the availability of food and a person’s access to it. It is a complex sustainable development issue, which is closely related to under-nutrition. Food security, in turn, can widely affect the living standard, and is rooted in poverty and leads to poor health, low productivity, low income, food shortage, and hunger. The study's aim was to identify the most vulnerable women who are in insecure positions. Method: 17,842 married women were selected for analysis from the Bangladesh Demographic and Health Survey 2011. Food security defined as dichotomous variables of skipped meals and eaten less food at least once in the last year. The outcome variables were cross-tabulated with women's socio-demographic characteristics and chi2 test was applied to see the significance. Logistic regression models were applied to identify the most vulnerable groups in terms of food security. Result: Only 18.5% of women said that they ever had to skip meals in the last year. 45.7% women from low socioeconomic status had skip meal for at least once whereas only 3.6% were from women with highest socioeconomic status. Women meal skipping was ranged from 1.4% to 34.2% by their educational status. 22% of women were eaten less food during the last year. The rate was higher among the poorest (51.6%), illiterate (39.9%) and household have no electricity connection (38.1) in compared with richest (4.4%), higher educated (2.0%), and household has electricity connection (14.0%). The logistic regression analysis indicated that household socioeconomic status, and women education show strong gradients to skip meals. Poorest have had higher odds (20.9) than richest and illiterate women had 7.7 higher odds than higher educated. In terms of religion, Christianity was 2.3 times more likely to skip their meals than Islam. On the other hand, a similar trend was observed in our other outcome variable eat less food. Conclusion: In this study we able to identify women with lower economics status and women with no education were mostly suffered group from starvation.

Keywords: food security, hunger, under-nutrition, women

Procedia PDF Downloads 374
26580 Development of an Intelligent Decision Support System for Smart Viticulture

Authors: C. M. Balaceanu, G. Suciu, C. S. Bosoc, O. Orza, C. Fernandez, Z. Viniczay

Abstract:

The Internet of Things (IoT) represents the best option for smart vineyard applications, even if it is necessary to integrate the technologies required for the development. This article is based on the research and the results obtained in the DISAVIT project. For Smart Agriculture, the project aims to provide a trustworthy, intelligent, integrated vineyard management solution that is based on the IoT. To have interoperability through the use of a multiprotocol technology (being the future connected wireless IoT) it is necessary to adopt an agnostic approach, providing a reliable environment to address cyber security, IoT-based threats and traceability through blockchain-based design, but also creating a concept for long-term implementations (modular, scalable). The ones described above represent the main innovative technical aspects of this project. The DISAVIT project studies and promotes the incorporation of better management tools based on objective data-based decisions, which are necessary for agriculture adapted and more resistant to climate change. It also exploits the opportunities generated by the digital services market for smart agriculture management stakeholders. The project's final result aims to improve decision-making, performance, and viticulturally infrastructure and increase real-time data accuracy and interoperability. Innovative aspects such as end-to-end solutions, adaptability, scalability, security and traceability, place our product in a favorable situation over competitors. None of the solutions in the market meet every one of these requirements by a unique product being innovative.

Keywords: blockchain, IoT, smart agriculture, vineyard

Procedia PDF Downloads 202
26579 Risk Factors for Acute Respiratory Infection Among Children Under Five in Tanzania: A Systematic Review and Analysis of the 2015 Demographic and Health Survey for Tanzania

Authors: Ayesha Ali, Emilia Lindquist, Arif Jalal, Hannah Yusuf, Kayan Cheung, Rowan Eastabrook

Abstract:

It is currently estimated that over a third of deaths in children under five in Tanzania are caused by acute respiratory infections (ARIs). However, despite being one of the leading causes of morbidity and mortality across the developing world, its risk factors are poorly understood. Therefore, a systematic review of the literature published between 2015 and 2020 was conducted, focusing on risk factors for ARI in Tanzanian children under the age of five. 2015 Demographic and Health Survey (DHS) for Tanzania was analysed to supplement these findings with national data. 2224 papers were retrieved from two databases and were analysed by three independent reviewers. Thirteen papers were eligible for inclusion, covering a wide range of risk factors among which comorbidities (n=6), malnutrition (n=5), lack of parental education (n=4), poor socio-economic status (n=3), and delay in seeking healthcare (n=3) were the most cited risk factors. The risk factors with the highest reported risk ratios/odds ratios were lack of parental education (RR=11.5-14.5), followed by enrolment in school (RR=4.4), delay in seeking healthcare (RR=3.8) and cooking indoors (aOR =1.8-RR=5.5). The DHS data provided local context to these risk factors. For instance, the number of children experiencing symptoms of ARI in both urban and rural areas ranged between 4.5-5% in the two weeks prior to the survey. However, 79% of symptomatic children in Zanzibar received antibiotics for treatment compared to just 34% of those in the Southern Highlands. As demonstrated by both the systematic review and the DHS analysis, risk factors for ARI are predominantly socially determined, with Tanzania’s poorer rural children possessing the highest risk for ARI and more adverse health outcomes. Therefore, the burden of ARIs in Tanzanian children may be alleviated through the provision of appropriate treatment and parental education in rural areas.

Keywords: acute respiratory infection, child, health education, morbidity, mortality, pneumonia, Tanzania

Procedia PDF Downloads 192
26578 Motherhood and Its Essence among Zimbabwean Migrant Women in Australia

Authors: Pranee Liamputtong

Abstract:

Childlessness in non-Western societies has wide-ranging social implications and profoundly affects the gender identity and well-being of women. The aspirations of women in these societies are shaped by various sociocultural expectations, encompassing social norms and their own social standing. Currently, there is limited knowledge regarding the perceptions and experiences of Zimbabwean migrant women living in Australia regarding childlessness and motherhood. This paper explores the cultural perspective on children in Zimbabwean society and investigates the personal and social consequences of infertility, as well as the cultural expectations of motherhood among Zimbabwean migrant women residing in Australia. The perceptions and experiences of this migrant community are of utmost importance in order to prevent misunderstandings about the core essence of motherhood among Zimbabwean women. Ultimately, this will lead to the provision of sensitive and culturally appropriate healthcare and social support for migrants in Australia's multicultural society. The study adopts a constructivist paradigm and employs qualitative methods, including in-depth interviews, drawings, and photo elicitation, involving 15 Zimbabwean women. Thematic analysis was employed to analyze the data. In Zimbabwean culture, the ability to bear a child holds significant meaning for women. Children not only ensure the continuity of society but also provide social security, as parents rely on their children for care in old age. Childlessness jeopardizes a woman's social status and carries social repercussions that have a profound impact on their gender identity and well-being. Cultural expectations of motherhood place the sole responsibility for the emotional and physical care of children on the mother. Despite residing in Australia, the procreative value has not diminished for Zimbabwean women. Raising awareness of the procreative needs of Zimbabwean women in a culturally sensitive manner would enhance the emotional well-being of these women.

Keywords: motherhood, culture, migrant women, Zimbabwe, Australia

Procedia PDF Downloads 89
26577 Politics of Violence and Terrorism in the Nigeria Democracy and Its Implications on National Peace and Security

Authors: Felix O. Akinboyewa

Abstract:

To say that Nigeria is faced with the problem of domestic terrorism is to say the obvious. The spate of political assassination during the fourth republic (1999-2010) is representative of what has become a growing trend. In this research, an attempt was made to examine the problems of political assassination within the context of significant categories of domestic-related terrorism in Nigeria Democracy. The central questions are: What exactly are the nature of political violence and terrorist act in the Nigeria nascent democracy? Was there any factor responsible for the politics of violence and terrorist act in the Nigeria democracy? What implications can the political violence and terrorist act have on democratic consolidation, national peace, and security? What solutions can be proffered to eradicate terrorist act and political violence in the Nigeria democracy? The study adopted a descriptive survey design which falls within the empirical research methodology. The sample size of the study consisted of 220 subjects randomly selected. The main instruments used were questionnaire and interview schedule. Data generated from the study were analyzed using descriptive statistics such as percentage and tables. The research findings showed that unemployed youths and the members of Nigeria Union of Road Transport Workers (NURTW) were the major actors in political violence in Nigeria. They have access to weapons and ammunitions which they use to terrorize the populace. The research showed that factors responsible for the political violence and terrorism in Nigeria are: poor electoral administration; election rigging; poor security system; religious and ethnic sentiment; problems of poverty and unemployment; over-exuberance and low level of education. The study also showed that electoral violence affects smooth running democracy in Nigeria. On the measures to be taken to eradicate political violence and terrorism in Nigeria, the research showed that provision of employment opportunities would go a long way to solving the problem. Civil society as an important institution can help to reduce incidence of political violence in Nigeria. Also, government has greater role to play. The study concludes that adherence to the proffered suggestions would reduce the level of political violence and terrorist act in Nigeria.

Keywords: consolidation, democracy, peace, security, terrorism, violence

Procedia PDF Downloads 124
26576 Food and Nutritional Security in the Context of Climate Change in Ethiopia: Using Household Panel Data

Authors: Aemro Tazeze Terefe, Mengistu K. Aredo, Abule M. Workagegnehu, Wondimagegn M. Tesfaye

Abstract:

Climate-induced shocks have been shown to reduce agricultural production and cause fluctuation in output in developing countries. When livelihoods depend on rain-fed agriculture, climate-induced shocks translate into consumption shocks. Despite the substantial improvements in household consumption, climate-induced shocks, and other factors adversely affect consumption dynamics at the household level in Ethiopia. Therefore, household consumption dynamics in the context of climate-induced shocks help to guide resilience capacity and establish appropriate interventions and programs. The research employed three-round panel data based on the Ethiopian Socioeconomic Survey with spatial rainfall data to define unique measures of rainfall variability. The linear dynamic panel model results show that the lagged value of consumption, market shocks, and rainfall variability positively affected consumption dynamics. In contrast, production shocks, temperature, and amount of rainfall had a negative relationship. Coping strategies mitigate adverse climate-induced shocks on consumption aftershocks that smooth consumption over time. Support to increase the resilience capacity of households can involve efforts to make existing livelihoods and forms of production or reductions in the vulnerability of households. Therefore, government interventions are mandatory for asset accumulation agendas that support household coping strategies and respond to shocks. In addition, the dynamic linkage between consumption and significant socioeconomic and institutional factors should be taken into account to minimize the effect of climate-induced shocks on consumption dynamics.

Keywords: climate shock, Ethiopia, fixed-effect model, food security

Procedia PDF Downloads 118
26575 Banking and Accounting Analysis Researches Effect on Environment

Authors: Marina Magdy Naguib Karas

Abstract:

New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time-consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.

Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development

Procedia PDF Downloads 51