Search results for: Fisher information
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10563

Search results for: Fisher information

10473 A Review of Information Systems Development in Developing Countries

Authors: B. N. Asare, O. A. Ajigini

Abstract:

Information systems (IS) are highly important in the operation of private and public organisations in developing and developed countries. Developing countries are saddled with many project failures during the implementation of information systems. However, successful information systems are greatly needed in developing countries in order to enhance their economies. This paper is highly important in view of the high failure rate of information systems in developing countries which needs to be reduced to minimum acceptable levels by means of recommended interventions. This paper centres on a review of IS development in developing countries. The paper presents evidences of the IS successes and failures in developing countries and posits a model to address the IS failures. The proposed model can then be utilised by developing countries to reduce their IS project implementation failure rate. A comparison is drawn between IS development in developing countries and developed countries. The paper provides valuable information to assist in reducing IS failure, and developing IS models and theories on IS development for developing countries.

Keywords: developing countries, information systems, IS development, information systems failure, information systems success, information systems success model

Procedia PDF Downloads 340
10472 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 671
10471 Standardized Description and Modeling Methods of Semiconductor IP Interfaces

Authors: Seongsoo Lee

Abstract:

IP reuse is an effective design methodology for modern SoC design to reduce effort and time. However, description and modeling methods of IP interfaces are different due to different IP designers. In this paper, standardized description and modeling methods of IP interfaces are proposed. It consists of 11 items such as IP information, model provision, data type, description level, interface information, port information, signal information, protocol information, modeling level, modeling information, and source file. The proposed description and modeling methods enables easy understanding, simulation, verification, and modification in IP reuse.

Keywords: interface, standardization, description, modeling, semiconductor IP

Procedia PDF Downloads 471
10470 Comparing the Effect of Group Education and Multimedia Software on Knowledge, Attitude and Self-Efficacy Mothers about of Sexual Health Education to the Boys of between 12-14 Years Old

Authors: Mirzaii Khadigeh

Abstract:

Background and objectives: Sexual health education is an important part of health promotion services. The major role of sex education is on mothers’ shoulders. So, they have to be equipped with enough knowledge, attitude and self-efficacy for teens’ education. The present study aimed to determine the effect of team-learning and multimedia software on mothers’ knowledge, attitudes and self-efficacy in sexual health education to 12-14-year-old sons in Mashhad in 1395. Materials and methods: In this research, two experimental and one control group were employed using random sampling, which was done on 132 mothers of high school pupils. They were randomly assigned into experimental and control groups. The data were collected using demographic information and a researcher-constructed questionnaire to investigate the mothers’ knowledge, attitude, and self-efficacy and DASS21(The Depression, Anxiety and Stress Scale). They were run after confirming their reliability and validity. Intervention for the multimedia group was in the form of four CDs- each for 45 minutes- that were given to the mothers each week. At the end of the fourth week, a question-and-answer session was administered for 60 minutes. The team-learning group received intervention once a week (totally four weeks). Two weeks later, the data were collected and analyzed via Chi-square, Fisher, Kruskal-Wallis and ANOVA. Findings: Knowledge, attitude and self-efficacy of mothers in sexual health before the intervention did not have any significant differences (p >0.05). At the end of the study, the difference between the scores of the knowledge, attitude and self-efficacy in the three groups was meaningfully different (p < 0/001), but the difference between the two groups of multimedia and team-learning was not significant (p> 0.05 ). Discussion and conclusion: The result reported the efficacy of both team-leaning and multimedia software, which implies that the multimedia software training method was as effective as team-learning training one on the knowledge, attitude and self-efficacy of mothers. But, the multimedia training method is highly advised due to its availability, flexibility, and interest.

Keywords: training one on the knowledge, attitude, self-efficacy of mothers, boys

Procedia PDF Downloads 149
10469 Earnings-Related Information, Cognitive Bias, and the Disposition Effect

Authors: Chih-Hsiang Chang, Pei-Shan Kao

Abstract:

This paper discusses the reaction of investors in the Taiwan stock market to the most probable unknown earnings-related information and the most probable known earnings-related information. As compared with the previous literature regarding the effect of an official announcement of earnings forecast revision, this paper further analyzes investors’ cognitive bias toward the unknown and known earnings-related information, and the role of media during the investors' reactions to the foresaid information shocks. The empirical results show that both the unknown and known earnings-related information provides useful information content for a stock market. In addition, cognitive bias and disposition effect are the behavioral pitfalls that commonly occur in the process of the investors' reactions to the earnings-related information. Finally, media coverage has a remarkable influence upon the investors' trading decisions.

Keywords: cognitive bias, role of media, disposition effect, earnings-related information, behavioral pitfall

Procedia PDF Downloads 201
10468 A Survey on Frequency of Cryptosporidiosis and Giardiasis in Horses in Ahvaz South-West of Iran

Authors: Ali R. Ghadrdan-Mashhadi, Hosein Hamidi-Nejat, Parisa Alizadehnia

Abstract:

Cryptosporidia and Giardia are protozoan parasites that have worldwide distribution and infect a variety of animals. Although, the infection to these parasites rarely caused to illness in horses, but some veterinarian recorded the clinical signs (such as diarrhea and malabsorbtion) especially in foals. In present study, the frequency of Cryptosporidiosis and Giardiasis in horses in Ahvaz investigated. The feces samples were taken from 100 horses that keep in seven horse breeding clubs, during spring and summer. The ages of horses were from 1 month to 27 years old. Fecal samples were stained by modified Ziehl-Neelsen and Tri-chrome methods. Results were analyzed with Chi-square Test and Fisher’s exact test. The results showed that the rate of infection to Cryptosporidium and Giardia were 18% and 40%, respectively. There weren't significant differences between infection to Cryptosporidium and Giardia with sex, age and fecal constancy. Although, the rate of infection to Cryptosporidium in studied horses is very similar to other studies but it seems, the rate of infection to Giardia is high in compare to other studies were done in the other countries.

Keywords: Ahvaz, cryptosporidium, giardia, horse

Procedia PDF Downloads 333
10467 Mitigating the Unwillingness of e-Forums Members to Engage in Information Exchange

Authors: Dora Triki, Irena Vida, Claude Obadia

Abstract:

Social networks such as e-Forums or dating sites often face the reluctance of key members to participate. Relying on the conation theory, this study investigates this phenomenon and proposes solutions to mitigate the issue. We show that highly experienced e-Forum members refuse to share business information in a peer to peer information exchange forums. However, forums managers can mitigate this behavior by developing a sentiment of belongingness to the network. Furthermore, by selecting only elite forum participants with ample experience, they can reduce the reluctance of key information providers to engage in information exchange. Our hypotheses are tested with PLS structural equations modeling using survey data from members of a French e-Forum dedicated to the exchange of business information about exporting.

Keywords: conation, e-Forum, information exchange, members participation

Procedia PDF Downloads 126
10466 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 401
10465 Research on the United Navigation Mechanism of Land, Sea and Air Targets under Multi-Sources Information Fusion

Authors: Rui Liu, Klaus Greve

Abstract:

The navigation information is a kind of dynamic geographic information, and the navigation information system is a kind of special geographic information system. At present, there are many researches on the application of centralized management and cross-integration application of basic geographic information. However, the idea of information integration and sharing is not deeply applied into the research of navigation information service. And the imperfection of navigation target coordination and navigation information sharing mechanism under certain navigation tasks has greatly affected the reliability and scientificity of navigation service such as path planning. Considering this, the project intends to study the multi-source information fusion and multi-objective united navigation information interaction mechanism: first of all, investigate the actual needs of navigation users in different areas, and establish the preliminary navigation information classification and importance level model; and then analyze the characteristics of the remote sensing and GIS vector data, and design the fusion algorithm from the aspect of improving the positioning accuracy and extracting the navigation environment data. At last, the project intends to analyze the feature of navigation information of the land, sea and air navigation targets, and design the united navigation data standard and navigation information sharing model under certain navigation tasks, and establish a test navigation system for united navigation simulation experiment. The aim of this study is to explore the theory of united navigation service and optimize the navigation information service model, which will lay the theory and technology foundation for the united navigation of land, sea and air targets.

Keywords: information fusion, united navigation, dynamic path planning, navigation information visualization

Procedia PDF Downloads 254
10464 The Role of Information Technology in the Supply Chain Management

Authors: Azar Alizadeh, Mohammad Reza Naserkhaki

Abstract:

The application of the IT systems for collecting and analyzing the data can have a significant effect on the performance of any company. In recent decade, different advancements and achievements in the field of information technology have changed the industry compared to the previous decade. The adoption and application of the information technology are one of the ways to achieve a distinctive competitive personality to the companies and their supply chain. The acceptance of the IT and its proper implementation cam reinforce and improve the cooperation between different parts of the supply chain by rapid transfer and distribution of the precise information and the application of the informational systems, leading to the increase in the supply chain efficiency. The main objective of this research is to study the effects and applications of the information technology on and in the supply chain management and to introduce the effective factors on the acceptance of information technology in the companies. Moreover, in order to understand the subject, we will investigate the role and importance of the information and electronic commerce in the supply chain and the characteristics of the supply chain based on the information flow approach.

Keywords: electronic commerce, industry, information technology, management, supply chain, system

Procedia PDF Downloads 454
10463 The Impact of COVID-19 on Antibiotic Prescribing in Primary Care in England: Evaluation and Risk Prediction of the Appropriateness of Type and Repeat Prescribing

Authors: Xiaomin Zhong, Alexander Pate, Ya-Ting Yang, Ali Fahmi, Darren M. Ashcroft, Ben Goldacre, Brian Mackenna, Amir Mehrkar, Sebastian C. J. Bacon, Jon Massey, Louis Fisher, Peter Inglesby, Kieran Hand, Tjeerd van Staa, Victoria Palin

Abstract:

Background: This study aimed to predict risks of potentially inappropriate antibiotic type and repeat prescribing and assess changes during COVID-19. Methods: With the approval of NHS England, we used the OpenSAFELY platform to access the TPP SystmOne electronic health record (EHR) system and selected patients prescribed antibiotics from 2019 to 2021. Multinomial logistic regression models predicted the patient’s probability of receiving an inappropriate antibiotic type or repeating the antibiotic course for each common infection. Findings: The population included 9.1 million patients with 29.2 million antibiotic prescriptions. 29.1% of prescriptions were identified as repeat prescribing. Those with same-day incident infection coded in the EHR had considerably lower rates of repeat prescribing (18.0%), and 8.6% had a potentially inappropriate type. No major changes in the rates of repeat antibiotic prescribing during COVID-19 were found. In the ten risk prediction models, good levels of calibration and moderate levels of discrimination were found. Important predictors included age, prior antibiotic prescribing, and region. Patients varied in their predicted risks. For sore throat, the range from 2.5 to 97.5th percentile was 2.7 to 23.5% (inappropriate type) and 6.0 to 27.2% (repeat prescription). For otitis externa, these numbers were 25.9 to 63.9% and 8.5 to 37.1%, respectively. Interpretation: Our study found no evidence of changes in the level of inappropriate or repeat antibiotic prescribing after the start of COVID-19. Repeat antibiotic prescribing was frequent and varied according to regional and patient characteristics. There is a need for treatment guidelines to be developed around antibiotic failure and clinicians provided with individualised patient information.

Keywords: antibiotics, infection, COVID-19 pandemic, antibiotic stewardship, primary care

Procedia PDF Downloads 81
10462 Tools for Transparency: The Role of Civic Technology in Increasing the Transparency of the State

Authors: Rebecca Rumbul

Abstract:

The operation of the state can often appear opaque to citizens wishing to access official information, who have to negotiate a path through numerous levels of bureaucracy rationalized through institutional policy to acquire what information they want. Even where individual states have 'Right to Information' legislation guaranteeing citizen access to information, public sector conformity to such laws vary between states and between state organizations. In response to such difficulties in bringing citizens and information together, many NGO's around the world have begun designing and hosting digital portals to facilitate the requesting and receiving of official information. How then, are these 'civic technology' tools affecting the behavior of the state? Are they increasing the transparency of the state? This study looked at 5 Right to Information civic technology sites in Chile, Uruguay, Ukraine, Hungary and the UK, and found that such sites were providing a useful platform to publish official information, but that states were still reluctant to comply with all requests. It concludes that civic technology can be an important tool in increasing the transparency of the state, but that the state must have an institutional commitment to information rights for this to be fully effective.

Keywords: digital, ICT, transparency, civic technology

Procedia PDF Downloads 634
10461 Tests for Zero Inflation in Count Data with Measurement Error in Covariates

Authors: Man-Yu Wong, Siyu Zhou, Zhiqiang Cao

Abstract:

In quality of life, health service utilization is an important determinant of medical resource expenditures on Colorectal cancer (CRC) care, a better understanding of the increased utilization of health services is essential for optimizing the allocation of healthcare resources to services and thus for enhancing the service quality, especially for high expenditure on CRC care like Hong Kong region. In assessing the association between the health-related quality of life (HRQOL) and health service utilization in patients with colorectal neoplasm, count data models can be used, which account for over dispersion or extra zero counts. In our data, the HRQOL evaluation is a self-reported measure obtained from a questionnaire completed by the patients, misreports and variations in the data are inevitable. Besides, there are more zero counts from the observed number of clinical consultations (observed frequency of zero counts = 206) than those from a Poisson distribution with mean equal to 1.33 (expected frequency of zero counts = 156). This suggests that excess of zero counts may exist. Therefore, we study tests for detecting zero-inflation in models with measurement error in covariates. Method: Under classical measurement error model, the approximate likelihood function for zero-inflation Poisson regression model can be obtained, then Approximate Maximum Likelihood Estimation(AMLE) can be derived accordingly, which is consistent and asymptotically normally distributed. By calculating score function and Fisher information based on AMLE, a score test is proposed to detect zero-inflation effect in ZIP model with measurement error. The proposed test follows asymptotically standard normal distribution under H0, and it is consistent with the test proposed for zero-inflation effect when there is no measurement error. Results: Simulation results show that empirical power of our proposed test is the highest among existing tests for zero-inflation in ZIP model with measurement error. In real data analysis, with or without considering measurement error in covariates, existing tests, and our proposed test all imply H0 should be rejected with P-value less than 0.001, i.e., zero-inflation effect is very significant, ZIP model is superior to Poisson model for analyzing this data. However, if measurement error in covariates is not considered, only one covariate is significant; if measurement error in covariates is considered, only another covariate is significant. Moreover, the direction of coefficient estimations for these two covariates is different in ZIP regression model with or without considering measurement error. Conclusion: In our study, compared to Poisson model, ZIP model should be chosen when assessing the association between condition-specific HRQOL and health service utilization in patients with colorectal neoplasm. and models taking measurement error into account will result in statistically more reliable and precise information.

Keywords: count data, measurement error, score test, zero inflation

Procedia PDF Downloads 263
10460 An Investigation for Information Asymmetry Nexus IPO Under-Pricing: A Case of Pakistan

Authors: Saqib Mehmood, Naveed Iqbal Chaudhry, Asif Mehmood

Abstract:

This study intends to investigate the information asymmetry theories of IPO and under-pricing in Pakistan. The purpose of the study is to validate the information asymmetry about firm value which leads to under-pricing. A total of 55 IPOs listed from 2000-2011 were included in this study. OLS multiple regression was applied to achieve the objectives of this study. The findings of the study confirm the significance of information asymmetry on under-pricing in Pakistan. The findings have implications for issuing firms and prospective investors.

Keywords: information asymmetry, initial public offerings, under-pricing, firm value

Procedia PDF Downloads 448
10459 The Breast Surgery Movement: A 50 Year Development of the Surgical Specialty

Authors: Lauren Zammerilla Westcott, Ronald C. Jones, James W. Fleshman

Abstract:

The surgical treatment of breast cancer has rapidly evolved over the past 50 years, progressing from Halsted’s radical mastectomy to a public campaign of surgical options, aesthetic reconstruction, and patient empowerment. This article examines the happenings that led to the transition of breast surgery as a subset of general surgery to its own specialized field. Sparked by the research of Dr. Bernard Fisher and the first National Surgical Adjuvant Breast and Bowel Project trial in 1971, the field of breast surgery underwent significant growth over the next several decades, enabling general surgeons to limit their practices to the breast. High surgical volumes eventually led to the development of the first formal breast surgical oncology fellowship in a large community-based hospital at Baylor University Medical Center in 1982. The establishment of the American Society of Breast Surgeons, as well several landmark clinical trials and public campaign efforts, further contributed to the advancement of breast surgery, making it the specialized field of the current era.

Keywords: breast cancer, breast fellowship, breast surgery, surgical history

Procedia PDF Downloads 109
10458 Impact of Artificial Intelligence Technologies on Information-Seeking Behaviors and the Need for a New Information Seeking Model

Authors: Mohammed Nasser Al-Suqri

Abstract:

Former information-seeking models are proposed more than two decades ago. These already existed models were given prior to the evolution of digital information era and Artificial Intelligence (AI) technologies. Lack of current information seeking models within Library and Information Studies resulted in fewer advancements for teaching students about information-seeking behaviors, design of library tools and services. In order to better facilitate the aforementioned concerns, this study aims to propose state-of-the-art model while focusing on the information seeking behavior of library users in the Sultanate of Oman. This study aims for the development, designing and contextualizing the real-time user-centric information seeking model capable of enhancing information needs and information usage along with incorporating critical insights for the digital library practices. Another aim is to establish far-sighted and state-of-the-art frame of reference covering Artificial Intelligence (AI) while synthesizing digital resources and information for optimizing information-seeking behavior. The proposed study is empirically designed based on a mix-method process flow, technical surveys, in-depth interviews, focus groups evaluations and stakeholder investigations. The study data pool is consist of users and specialist LIS staff at 4 public libraries and 26 academic libraries in Oman. The designed research model is expected to facilitate LIS by assisting multi-dimensional insights with AI integration for redefining the information-seeking process, and developing a technology rich model.

Keywords: artificial intelligence, information seeking, information behavior, information seeking models, libraries, Sultanate of Oman

Procedia PDF Downloads 88
10457 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 356
10456 Chemometric Estimation of Phytochemicals Affecting the Antioxidant Potential of Lettuce

Authors: Milica Karadzic, Lidija Jevric, Sanja Podunavac-Kuzmanovic, Strahinja Kovacevic, Aleksandra Tepic-Horecki, Zdravko Sumic

Abstract:

In this paper, the influence of six different phytochemical content (phenols, carotenoids, chlorophyll a, chlorophyll b, chlorophyll a + b and vitamin C) on antioxidant potential of Murai and Levistro lettuce varieties was evaluated. Variable selection was made by generalized pair correlation method (GPCM) as a novel ranking method. This method is used for the discrimination between two variables that almost equal correlate to a dependent variable. Fisher’s conditional exact and McNemar’s test were carried out. Established multiple linear (MLR) models were statistically evaluated. As the best phytochemicals for the antioxidant potential prediction, chlorophyll a, chlorophyll a + b and total carotenoids content stand out. This was confirmed through both GPCM and MLR, predictive ability of obtained MLR can be used for antioxidant potential estimation for similar lettuce samples. This article is based upon work from the project of the Provincial Secretariat for Science and Technological Development of Vojvodina (No. 114-451-347/2015-02).

Keywords: antioxidant activity, generalized pair correlation method, lettuce, regression analysis

Procedia PDF Downloads 363
10455 The Adoption of Process Management for Accounting Information Systems in Thailand

Authors: Manirath Wongsim

Abstract:

Information Quality (IQ) has become a critical, strategic issue in Accounting Information Systems (AIS) adoption. In order to implement AIS adoption successfully, it is important to consider the quality of information use throughout the adoption process, which seriously impacts the effectiveness of AIS adoption practice and the optimization of AIS adoption decisions. There is a growing need for research to provide insights into issues and solutions related to IQ in AIS adoption. The need for an integrated approach to improve IQ in AIS adoption, as well as the unique characteristics of accounting data, demands an AIS adoption specific IQ framework. This research aims to explore ways of managing information quality and AIS adoption to investigate the relationship between the IQ issues and AIS adoption process. This study has led to the development of a framework for understanding IQ management in AIS adoption. This research was done on 44 respondents as ten organisations from manufacturing firms in Thailand. The findings of the research’s empirical evidence suggest that IQ dimensions in AIS adoption to provide assistance in all process of decision making. This research provides empirical evidence that information quality of AIS adoption affect decision making and suggests that these variables should be considered in adopting AIS in order to improve the effectiveness of AIS.

Keywords: information quality, information quality dimensions, accounting information systems, accounting information system adoption

Procedia PDF Downloads 443
10454 Bacterial Causes of Cerebral Abscess and Impact on Long Term Patient Outcomes

Authors: Umar Rehman, Holly Roy, K. T. Tsang, D. S. Jeyaretna, W Singleton, B. Fisher, P. A. Glew, J. Greig, Peter C. Whitfield

Abstract:

Introduction: A brain abscess is a life-threatening condition, carrying significant mortality. It requires rapid identification and treatment. Management involves a combination of antibiotics and surgery. The aim of the current study was to identify common bacteria responsible for cerebral abscesses as well as the long term functional and neurological outcomes of patients following treatment in a retrospective series at a single UK neurosurgical centre. Methodology: We analysed patients that had received a diagnosis of 'cerebral abscess' or 'subdural empyema' between June 2002 and June 2018. This was done in the form of a retrospective review. The search resulted in a total of 180 patients; with 37 patients being excluded (spinal abscess, below 18 or non-abscess related admissions). Data were collected from medical case notes including information about demographics, comorbidities, immunosuppression, presentation, size/location of lesions, pathogens, treatment, and outcomes. Results: In total, we analysed 143 patients between the ages of 18-90. Focal neurological deficit and headaches were seen in 84% and 68% of patients respectively. 108 positive brain cultures were seen; with the largest proportion, 59.2% being gram-positive cocci, with strep intermedius being the most common pathogen identified in 13.9% of patients. Of the patients with positive blood cultures (n=11), 72.7% showed the same organism both in the blood and on the brain cultures. Long term outcomes (n=72) revealed that 48% of patients seizure-free without requiring anti-epileptics, 51.3% of patients had full recovery of their neurological symptoms. There was a mortality rate of 13.9% in the series. Conclusion: In conclusion, the largest bacterial cause of abscess within our population was due to gram-positive cocci. The majority of the patient demonstrated full neurological recovery with close to half of patients not requiring anti-epileptics following discharge.

Keywords: bacteria, cerebral abscess, long term outcome, neurological deficit

Procedia PDF Downloads 98
10453 Online Information Seeking: A Review of the Literature in the Health Domain

Authors: Sharifah Sumayyah Engku Alwi, Masrah Azrifah Azmi Murad

Abstract:

The development of the information technology and Internet has been transforming the healthcare industry. The internet is continuously accessed to seek for health information and there are variety of sources, including search engines, health websites, and social networking sites. Providing more and better information on health may empower individuals, however, ensuring a high quality and trusted health information could pose a challenge. Moreover, there is an ever-increasing amount of information available, but they are not necessarily accurate and up to date. Thus, this paper aims to provide an insight of the models and frameworks related to online health information seeking of consumers. It begins by exploring the definition of information behavior and information seeking to provide a better understanding of the concept of information seeking. In this study, critical factors such as performance expectancy, effort expectancy, and social influence will be studied in relation to the value of seeking health information. It also aims to analyze the effect of age, gender, and health status as the moderator on the factors that influence online health information seeking, i.e. trust and information quality. A preliminary survey will be carried out among the health professionals to clarify the research problems which exist in the real world, at the same time producing a conceptual framework. A final survey will be distributed to five states of Malaysia, to solicit the feedback on the framework. Data will be analyzed using SPSS and SmartPLS 3.0 analysis tools. It is hoped that at the end of this study, a novel framework that can improve online health information seeking is developed. Finally, this paper concludes with some suggestions on the models and frameworks that could improve online health information seeking.

Keywords: information behavior, information seeking, online health information, technology acceptance model, the theory of planned behavior, UTAUT

Procedia PDF Downloads 246
10452 Formulating Rough Approximations in Information Tables with Possibilistic Information

Authors: Michinori Nakata, Hiroshi Sakai

Abstract:

A rough set, which consists of lower and upper approximations, is formulated in information tables containing possibilistic information. First, lower and upper approximations on the basis of possible world semantics in the same way as Lipski did in the field of incomplete databases are shown in order to clarify fundamentals of rough sets under possibilistic information. Possibility and necessity measures are used, as is done in possibilistic databases. As a result, each object has certain and possible membership degrees to lower and upper approximations, which degrees are the lower and upper bounds. Therefore, the degree that the object belongs to lower and upper approximations is expressed by an interval value. And the complementary property linked with the lower and upper approximations holds, as is valid under complete information. Second, the approach based on indiscernibility relations, which is proposed by Dubois and Prade, are extended in three cases. The first case is that objects used to approximate a set of objects are characterized by possibilistic information. The second case is that objects used to approximate a set of objects with possibilistic information are characterized by complete information. The third case is that objects that are characterized by possibilistic information approximate a set of objects with possibilistic information. The extended approach create the same results as the approach based on possible world semantics. This justifies our extension.

Keywords: rough sets, possibilistic information, possible world semantics, indiscernibility relations, lower approximations, upper approximations

Procedia PDF Downloads 297
10451 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

The information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or websites, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecure web-surfing. This study allows to analyze the information retrieved from OSINT tools, i.e. theHarvester, and Maltego that can be used to send phishing attacks to individuals.

Keywords: e-mail spoofing, Maltego, OSINT, phishing, spear phishing, theHarvester

Procedia PDF Downloads 113
10450 The Impact of the Information Technologies on the Accounting Department of the Romanian Companies

Authors: Dumitru Valentin Florentin

Abstract:

The need to use high volumes of data and the high competition are only two reasons which make necessary the use of information technologies. The objective of our research is to establish the impact of information technologies on the accounting department of the Romanian companies. In order to achieve it, starting from the literature review we made an empirical research based on a questionnaire. We investigated the types of technologies used, the reasons which led to the implementation of certain technologies, the benefits brought by the use of the information technologies, the difficulties brought by the implementation and the future effects of the applications. The conclusions show that there is an evolution in the degree of implementation of the information technologies in the Romanian companies, compared with the results of other studies conducted a few years before.

Keywords: information technologies, impact, company, Romania, empirical study

Procedia PDF Downloads 397
10449 Socio-Demographic Predictors of Divorce Adjustment in Pakistani Women

Authors: Rukhsana Kausar, Nida Zafar

Abstract:

The present research investigated socio-demographic predictors of divorce adjustment in Pakistani women. The sample comprised of 80 divorced women from different areas of Lahore. Self developed Socio-Demographic predictor scale and Divorce Adjustment Scale by (Fisher, 2001) was used for assessment. Analyses showed that working divorced women living with joint family system are more adjusted as compared to non-working divorced women living with joint family system. Women having one child are more adjusted as compared to women having more than one child. Findings highlight importance of presence of father for healthy development of adolescents. Adjustment of divorcee women was positively associated with income, social support from the family, having favorable attitudes toward marital dissolution prior to divorce, and being the partner who initiated the divorce. In addition, older women showed some evidence of poorer adjustment than did younger women. Findings highlight importance of support for divorce adjustment.

Keywords: socio-demographic, adjustment, women, divorce

Procedia PDF Downloads 445
10448 Using Fishers Knowledge in Community Based Fisheries Management in River Nun Estuary, Niger Delta

Authors: Sabina Ngodigha, Roland Gbarabe, Aiyebatonworio Austin

Abstract:

A study of fisher’s knowledge (FK) and community-based fisheries management practices in River Nun estuary was conducted to assess the contribution of FK to fisheries resources conservation. A total of 390 fishers operates in the area of which 221 were interviewed based on having a minimum of 10 years of experience. Community-based fisheries management programme was introduced and implemented by fishermen’s union in 2010 for the sustainable management and conservation of fisheries resources. Local law introduced were: band on the use of mesh size of less than 5cm and band on chemical fishing. Defaulters were made to pay monetary fines ranging from #2,000 to #6,000 while fishers caught using chemicals to fish were arrested and landed over to the police for prosecution. The management method has enhanced conservation of fisheries resources which is a major source of livelihood for the people. Landings increased tremendously resulting in positive increase in the finances of the fishers. It is, therefore, pertinent to introduce community-based laws to check over exploitation of fisheries resources in the Niger Delta.

Keywords: community, conservation, fishers knowledge, local laws, management

Procedia PDF Downloads 250
10447 Visual Analytics of Higher Order Information for Trajectory Datasets

Authors: Ye Wang, Ickjai Lee

Abstract:

Due to the widespread of mobile sensing, there is a strong need to handle trails of moving objects, trajectories. This paper proposes three visual analytic approaches for higher order information of trajectory data sets based on the higher order Voronoi diagram data structure. Proposed approaches reveal geometrical information, topological, and directional information. Experimental results demonstrate the applicability and usefulness of proposed three approaches.

Keywords: visual analytics, higher order information, trajectory datasets, spatio-temporal data

Procedia PDF Downloads 384
10446 Value Relevance of Accounting Information: Empirical Evidence from China

Authors: Ying Guo, Miaochan Li, David Yang, Xiao-Yan Li

Abstract:

This paper examines the relevance of accounting information to stock prices at different periods using manufacturing companies listed in China’s Growth Enterprise Market (GEM). We find that both the average stock price at fiscal year-end and the average stock price one month after fiscal year-end are more relevant to the accounting information than the closing stock price four months after fiscal year-end. This implies that Chinese stock markets react before the public disclosure of accounting information, which may be due to information leak before official announcements. Our findings confirm that accounting information is relevant to stock prices for Chinese listed manufacturing companies, which is a critical question to answer for investors who have interest in Chinese companies.

Keywords: accounting information, response time, value relevance, stock price

Procedia PDF Downloads 60
10445 Building a Model for Information Literacy Education in School Settings

Authors: Tibor Koltay

Abstract:

Among varied new literacies, information literacy is not only the best-known one but displays numerous models and frameworks. Nonetheless, there is still a lack of its complex theoretical model that could be applied to information literacy education in public (K12) education, which often makes use of constructivist approaches. This paper aims to present the main features of such a model. To develop a complex model, the literature and practice of phenomenographic and sociocultural theories, as well as discourse analytical approaches to information literacy, have been reviewed. Besides these constructivist and expressive based educational approaches, the new model is intended to include the innovation of coupling them with a cognitive model that takes developing informational and operational knowledge into account. The convergences between different literacies (information literacy, media literacy, media and information literacy, and data literacy) were taken into account, as well. The model will also make use of a three-country survey that examined secondary school teachers’ attitudes to information literacy. The results of this survey show that only a part of the respondents feel properly prepared to teach information literacy courses, and think that they can teach information literacy skills by themselves, while they see a librarian as an expert in educating information literacy. The use of the resulting model is not restricted to enhancing theory. It is meant to raise the level of awareness about information literacy and related literacies, and the next phase of the model’s development will be a pilot study that verifies the usefulness of the methodology for practical information literacy education in selected Hungarian secondary schools.

Keywords: communication, data literacy, discourse analysis, information literacy education, media and information literacy media literacy, phenomenography, public education, sociocultural theory

Procedia PDF Downloads 112
10444 Phishing Attacks Facilitated by Open Source Intelligence

Authors: Urva Maryam

Abstract:

Information has become an important asset to the current cosmos. Globally, various tactics are being observed to confine the spread of information as it makes people vulnerable to security attacks. Open Source Intelligence (OSINT) is a publicly available source that has disseminated information about users or website, companies, and various organizations. This paper focuses on the quantitative method of exploring various OSINT tools that reveal public information of personals. This information could further facilitate the phishing attacks. Phishing attacks can be launched on email addresses, open ports, and unsecured web-surfing. This study allows to analyze information retrieved from OSINT tools i.e., the Harvester, and Maltego, that can be used to send phishing attacks to individuals.

Keywords: OSINT, phishing, spear phishing, email spoofing, the harvester, maltego

Procedia PDF Downloads 50