Search results for: information seeking behaviors
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12362

Search results for: information seeking behaviors

10982 A Conceptual Framework for Assessing the Development of Health Information Systems Enterprise Architecture Interoperability

Authors: Prosper Tafadzwa Denhere, Ephias Ruhode, Munyaradzi Zhou

Abstract:

Health Information Systems (HISs) interoperability is emerging to be the future of modern healthcare systems Enterprise Architecture (EA), where healthcare entities are seamlessly interconnected to share healthcare data. The reality that the healthcare industry has been characterised by an influx of fragmented stand-alone e-Health systems, which present challenges of healthcare information sharing across platforms, desires much attention for systems integration efforts. The lack of an EA conceptual framework resultantly crates the need for investigating an ideal solution to the objective of Health Information Systems interoperability development assessment. The study takes a qualitative exploratory approach through a design science research context. The research aims to study the various themes withdrawn from the literature that can help in the assessment of interoperable HISs development through a literature study. Themes derived from the study include HIS needs, HIS readiness, HIS constraints, and HIS technology integration elements and standards tied to the EA development architectural layers of The Open Group Architecture Framework (TOGAF) as an EA development methodology. Eventually, the themes were conceptualised into a framework reviewed by two experts. The essence of the study was to provide a framework within which interoperable EA of HISs should be developed.

Keywords: enterprise architecture, eHealth, health information systems, interoperability

Procedia PDF Downloads 80
10981 Way to Successful Enterprise Resource Planning System Implementation in Developing Countries: Case of Public Sector Unit

Authors: Suraj Kumar Mukti

Abstract:

Enterprise Resource Planning (ERP) system is a management tool to integrate all departments in an organization. It integrates business processes, manages resources efficiently and provides an appropriate decision support system to management. ERP system implementation is a typical and time taking process as well as money consuming process. Articles related to key success factors of ERP system implementation are available in the literature, but rare authors have focused on roadmap of successful ERP system implementation. Postponement is better if the organization is not ready to implement ERP system in better way; hence checking of organization’s preparation to adopt new system is an important prerequisite to ensure the success of ERP system implementation in an organization. Then comes what will be called as success of ERP system implementation. Benefits achieved by ERP system may be categorized into two categories; viz. tangible and intangible benefits. This research article presents a roadmap to ensure the success of ERP system implementation and benefits achieved through the new system as in success indicator. A case study is presented to evaluate the success and benefit achieved through the new system. The article gives a comprehensive approach to academicians and a roadmap to the organizations seeking to implement the ERP system.

Keywords: ERP system, decision support system, tangible, intangible

Procedia PDF Downloads 312
10980 Iot-Based Interactive Patient Identification and Safety Management System

Authors: Jonghoon Chun, Insung Kim, Jonghyun Lim, Gun Ro

Abstract:

We believe that it is possible to provide a solution to reduce patient safety accidents by displaying correct medical records and prescription information through interactive patient identification. Our system is based on the use of smart bands worn by patients and these bands communicate with the hybrid gateways which understand both BLE and Wifi communication protocols. Through the convergence of low-power Bluetooth (BLE) and hybrid gateway technology, which is one of short-range wireless communication technologies, we implement ‘Intelligent Patient Identification and Location Tracking System’ to prevent medical malfunction frequently occurring in medical institutions. Based on big data and IOT technology using MongoDB, smart band (BLE, NFC function) and hybrid gateway, we develop a system to enable two-way communication between medical staff and hospitalized patients as well as to store locational information of the patients in minutes. Based on the precise information provided using big data systems, such as location tracking and movement of in-hospital patients wearing smart bands, our findings include the fact that a patient-specific location tracking algorithm can more efficiently operate HIS (Hospital Information System) and other related systems. Through the system, we can always correctly identify patients using identification tags. In addition, the system automatically determines whether the patient is a scheduled for medical service by the system in use at the medical institution, and displays the appropriateness of the medical treatment and the medical information (medical record and prescription information) on the screen and voice. This work was supported in part by the Korea Technology and Information Promotion Agency for SMEs (TIPA) grant funded by the Korean Small and Medium Business Administration (No. S2410390).

Keywords: BLE, hybrid gateway, patient identification, IoT, safety management, smart band

Procedia PDF Downloads 299
10979 Mechanical Properties of the Sugarcane Bagasse Reinforced Polypropylene Composites

Authors: R. L. M. Paiva, M. R. Capri, D. R. Mulinari, C. F. Bandeira, S. R. Montoro

Abstract:

Natural fibers are used in polymer composites to improve mechanical properties, substituting inorganic reinforcing agents produced by non renewable resources. The present study investigates the tensile, flexural and impact behaviors of sugarcane bagasse fibers-polypropylene composite as a function of volume fraction. The surface of the fibers was modified by mercerization treatments to improve the wetting behavior of the apolar polypropylene. The treatment characterization was obtained by infrared spectroscopy and scanning electron microscopy. Results evidence that a good adhesion interfacial between fibers-matrix causing an increase strength and modulus flexural as well as impact strength in the modified fibers/PP composites when compared to the pure PP and unmodified fibers reinforced composites.

Keywords: sugarcane bagasse, polymer composites, mechanical properties, fibers

Procedia PDF Downloads 606
10978 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 13
10977 Mealtime Talk as a Context of Learning: A Multiple Case Study of Australian Chinese Parents' Interaction with Their Preschool Aged Children at Dinner Table

Authors: Jiangbo Hu, Frances Hoyte, Haiquan Huang

Abstract:

Research identifies that mealtime talk can be a significant learning context that provides children with rich experiences to foster their language and cognitive development. Middle-classed parents create an extended learning discourse for their children through sophisticated vocabulary, narrative and explanation genres at dinner table. However, mealtime opportunities vary with some parents having little interaction with their children and some parents focusing on directive of children’s behaviors. This study investigated five Chinese families’ parent-child interaction during mealtime that was rarely reported in the literature. The five families differ in terms of their living styles. Three families are from professional background where both mothers the fathers work in Australian companies and both of them present at dinner time. The other two families own business. The mothers are housemakers and the fathers are always absent at dinner time due to their busy business life. Employing case study method, the five Chinese families’ parent-child interactions at dinner table were recorded using a video camera. More than 3000 clauses were analyzed with the framework of 'systems of clause complexing' from systemic functional linguistic theory. The finding shows that mothers played a critical role in the interaction with their children by initiating most conversations. The three mothers from professional background tended to use more language in extending and expanding pattern that is beneficial for children’s language development and high level of thinking (e.g., logical thinking). The two house making mothers’ language focused more on the directive of their children’s social manners and dietary behaviors. The fathers though seemed to be less active, contributing to the richness of the conversation through their occasional props such as asking open questions or initiating a new topic. In general, the families from professional background were more advantaged in providing learning opportunities for their children at dinner table than the families running business were. The home experiences of Chinese children is an important topic in research due to the rapidly increasing number of Chinese children in Australia and other English speaking countries. Such research assist educators in the education of Chinese children with more awareness of Chinese children experiences at home that could be very unlike the settings in English schools. This study contributes to the research in this area through the analysis of language in parent-child interaction during mealtime, which is very different from previous research that mainly investigated Chinese families through survey and interview. The finding of different manners in language use between the professional families and business families has implication for the understanding of the variation of Chinese children’s home experiences that is influenced not only by parents’ socioeconomic status but their lifestyles.

Keywords: Chinese children, Chinese parents, mealtime talk, parent-child interaction

Procedia PDF Downloads 224
10976 A Game-Theory-Based Price-Optimization Algorithm for the Simulation of Markets Using Agent-Based Modelling

Authors: Juan Manuel Sanchez-Cartas, Gonzalo Leon

Abstract:

A price competition algorithm for ABMs based on game theory principles is proposed to deal with the simulation of theoretical market models. The algorithm is applied to the classical Hotelling’s model and to a two-sided market model to show it leads to the optimal behavior predicted by theoretical models. However, when theoretical models fail to predict the equilibrium, the algorithm is capable of reaching a feasible outcome. Results highlight that the algorithm can be implemented in other simulation models to guarantee rational users and endogenous optimal behaviors. Also, it can be applied as a tool of verification given that is theoretically based.

Keywords: agent-based models, algorithmic game theory, multi-sided markets, price optimization

Procedia PDF Downloads 428
10975 Study on Network-Based Technology for Detecting Potentially Malicious Websites

Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park

Abstract:

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits

Procedia PDF Downloads 346
10974 Witchcraft Belief and HIV/AIDS in Edo State, Nigeria: Implications for Health-Care

Authors: Celestina Omoso Isiramen

Abstract:

The influence of witchcraft belief on disease causation, cure and public health system in Nigeria cannot be underrated. This paper investigated the nexus between witchcraft phenomenon and health-seeking behaviour of HIV sufferers in Edo state, Nigeria. Survey methodology was adopted and stratified random sampling technique was employed in the selection of 600 sample group spread into 200 HIV sufferers, 200 spiritual healers and 200 bio-medics from the three Senatorial districts of the state. Data were collected through the use of structured questionnaire and in-dept interview and analyzed using simple percentage and frequency. Major findings were: belief in witchcraft significantly influenced the people’s perception of HIV causation and wellness and this impacted adversely on public health-care. Poverty, ignorance and dearth of retroviral drugs enhanced the people’s recourse to spiritual healers. Collaboration between spiritual healing techniques and biomedicine was recommended as panacea for curbing HIV/AIDS related morbidity and mortality. It concluded that socio-economic problems must be addressed while the importance of integrating the values of spiritual healing into biomedicine cannot be overstressed.

Keywords: biomedicine, health care, HIV/AIDS, spirituality, witchcraft

Procedia PDF Downloads 114
10973 The Antecedents of Facebook Check in Adoption Intention: The Perspective of Social Influence

Authors: Hsiu-Hua Cheng

Abstract:

Recently, the competition between websites becomes intense. How to make users “adopt” their websites is an issue of urgent importance for online communities companies. Social procedures (such as social influence) can possibly explain how and why users’ technologies usage behaviors affect other people to use the technologies. This study proposes two types of social influences on the initial usage of Facebook Check In-friends and group members. Besides, this study indicates that Facebook friends’ previous usage of Facebook Check In and Facebook group members’ previous usage of Facebook Check In will positively influence focal actors’ Facebook Check In adoption intention. The article concludes with contributions to academic research and practice.

Keywords: social influence, adoption intention, facebook check in, previous usage behavior

Procedia PDF Downloads 433
10972 A Framework for Enhancing Mobile Development Software for Rangsit University, Thailand

Authors: Thossaporn Thossansin

Abstract:

This paper presents the developing of a mobile application for students who are studying in a Faculty of Information Technology, Rangsit University (RSU), Thailand. RSU enhanced the enrollment process by leveraging its information systems, which allows students to download RSU APP. This helps students to access RSU’s information that is important for them. The reason to have a mobile application is to give support students’ ability to access the system at anytime, anywhere and anywhere. The objective of this paper was to develop an application on iOS platform for students who are studying in Faculty of Information Technology, Rangsit University, Thailand. Studies and learns student’s perception for a new mobile app. This paper has targeted a group of students who is studied in year 1-4 in the faculty of information technology, Rangsit University. This new application has been developed by the department of information technology, Rangsit University and it has generally called as RSU APP. This is a new mobile application development for RSU, which has useful features and functionalities in giving support to students. The core module has consisted of RSU’s announcement, calendar, event, activities, and ebook. The mobile app has developed on iOS platform that is related to RSU’s policies in giving free Tablets for the first year students. The user satisfaction is analyzed from interview data that has 81 interviews and Google application such as google form is taken into account for 122 interviews. Generally, users were satisfied to-use application with the most satisfaction at the level of 4.67. SD is 0.52, which found the most satisfaction in that users can learn and use quickly. The most satisfying is 4.82 and SD is 0.71 and the lowest satisfaction rating in its modern form, apps lists. The satisfaction is 4.01, and SD is 0.45.

Keywords: mobile application, development of mobile application, framework of mobile development, software development for mobile devices

Procedia PDF Downloads 308
10971 Critical and Strategic Issues in Compensation, Staffing and Personnel Management in Nigeria

Authors: Shonuga Olajumoke Adedoyinsola

Abstract:

Staffing and Compensation are at the core of any employment exchange, and they serve as the defining characteristics of any employment relationship. Most organizations understand the benefits that a longer term approach to staff planning can bring and the answer to this problem lies not in trying to implement the traditional approach more effectively, but in implementing a completely different kind of process for strategic staffing. The study focuses on critical points of compensation, staffing and personnel management. The fundamentals of these programs include the elements of vision, potential, communication and motivation. The aim of the paper is to identify the most important attributes of compensation and incentives, staffing and personnel management. Research method is the analysis and synthesis of scientific literature, logical, comparative and graphic representation. On the basis of analysis, the author presents the models of these systems for positive employee attitudes and behaviors.

Keywords: compensation, employees, incentives, staffing, personnel management

Procedia PDF Downloads 279
10970 A Survey on Protests Against Compulsory Hejab in Iran From Iranian Women’s Point of View After Mahsa Amini`S Death: A Grounded Theory Approach

Authors: Shirin Arefi

Abstract:

In Iran, women and girls are treated as second class citizens and suffer from many discrimination and inequality such as compulsory Hejab, a phenomena which has required all women to wear the hijab head-covering since the 1979 Islamic revolution. Now, the crackdown of new government has caused a massive uproar in the country. The morality police also continue to curb the choices of women, and the latest unfortunate incidents accelerate the hardened rules. The author is going to survey the views and of women against compulsory Hejab and morality and chastity police arrests. The methodology is a qualitative one in which narratives of them are coded based on grounded theory and horizons of the process is explained by phenomenological research as well. The findings and results will show the current attitudes of women of Hejab and their reactions against morality police behaviors.

Keywords: compulsory hejab, morality police, people, arrest

Procedia PDF Downloads 92
10969 Bearing Behavior of a Hybrid Monopile Foundation for Offshore Wind Turbines

Authors: Zicheng Wang

Abstract:

Offshore wind energy provides a huge potential for the expansion of renewable energies to the coastal countries. High demands are required concerning the shape and type of foundations for offshore wind turbines (OWTs) to find an economically, technically and environmentally-friendly optimal solution. A promising foundation concept is the hybrid foundation system, which consists of a steel plate attached to the outer side of a hollow steel pipe pile. In this study, the bearing behavior of a large diameter foundation is analyzed using a 3-dimensional finite element (FE) model. Non-linear plastic soil behavior is considered. The results of the numerical simulations are compared to highlight the priority of the hybrid foundation to the conventional monopile foundation.

Keywords: hybrid foundation system, mechanical parameters, plastic soil behaviors, numerical simulations

Procedia PDF Downloads 104
10968 Public Space Appropriation of a Public Peripheric Library in El Agustino, Lima Metropolitana: A Qualitative Study

Authors: Camila Freire Barrios, Gonzalo Rivera Talavera

Abstract:

The importance of public spaces has been shown for many years, and in different disciplines, with one example being their ability for developing a sustainable social environment, especially in mega cities like Lima. The aim of this study was to explore the process of space appropriation that occurs in the Peripheral Library of the district El Agustino in Lima, Peru. Space appropriation is a process by which people develop a link with a place within a specific sociocultural context. This process has been related to positive outcomes, such as: participation and in the development of compassionate behaviors with these places. To achieve the purpose of the research, a qualitative design was selected because this will allowed exploring in deep the process in an specific context. The study interviewed six adults, all of whom were deliberately chosen to have the longest residence time in the district and also utilized the library the most. In a complementary manner, two children and one adolescent were interviewed. Likewise, two observations were made on a weekday and weekend, and public documentation information was collected. As a result, five categories linked to this process were identified. It was found that the process of space appropriation begins with the needs of the people who arrive at the library, which provides benefits to these people by fulfilling them. Next in the process, through the construction of meanings, the library is then valued as a pleasant, productive, safe and regulated place; as a result, people become identified with the library. The identification generated is subsequently reflected in the level of participation that the person has in the library, which may go in a continuum from no participating at all to a more direct involvement in the library activities, as well as voluntary and altruistic work. Finally, this process leads to the library becoming part of the neighborhood. This study allows having a better understanding of how sociospatial processes work in a Latinamerican context and in cities like Lima, where the third of the country’s population lives. Also, Lima has grown in the past 50 years in a excessively way and with lack of planification. Therefore, these results brings new research questions and highlights the importance of learning how to design public spaces in order to promote these processes to develop.

Keywords: bond with the place, place identity, public spaces, space appropriation

Procedia PDF Downloads 218
10967 Structural Integrity Analysis of Baffle Former Assembly in Pressurized Water Reactors Considering Irradiation Aging

Authors: Jong-Sung Kim, Myung-Jo Jhung

Abstract:

BFA is one of the reactor internals components in PWR. The BFA has the intended functions to support fuel assembly, to keep structural integrity of upper/lower core support structures, and to secure reactor coolant flow path. Failure of the BFA may give rise to significant effect on reactor safety operation and stop. The BFA is subject to relatively high neutron irradiation dose due to location close to the core. Therefore, IASCC can occur on the BFA due to damage accumulation as operating year increases. In this study, IASCC susceptibility on the BFA was assessed via the FEA considering variations of mechanical material behaviors with neutron irradiation. As a result of the assessment, some points have susceptibility more than 0.2 to IASCC during design lifetime.

Keywords: baffle former assembly, finite element analysis, irradiation aging, nuclear power plant, pressurized water reactor

Procedia PDF Downloads 346
10966 Information Disclosure And Financial Sentiment Index Using a Machine Learning Approach

Authors: Alev Atak

Abstract:

In this paper, we aim to create a financial sentiment index by investigating the company’s voluntary information disclosures. We retrieve structured content from BIST 100 companies’ financial reports for the period 1998-2018 and extract relevant financial information for sentiment analysis through Natural Language Processing. We measure strategy-related disclosures and their cross-sectional variation and classify report content into generic sections using synonym lists divided into four main categories according to their liquidity risk profile, risk positions, intra-annual information, and exposure to risk. We use Word Error Rate and Cosin Similarity for comparing and measuring text similarity and derivation in sets of texts. In addition to performing text extraction, we will provide a range of text analysis options, such as the readability metrics, word counts using pre-determined lists (e.g., forward-looking, uncertainty, tone, etc.), and comparison with reference corpus (word, parts of speech and semantic level). Therefore, we create an adequate analytical tool and a financial dictionary to depict the importance of granular financial disclosure for investors to identify correctly the risk-taking behavior and hence make the aggregated effects traceable.

Keywords: financial sentiment, machine learning, information disclosure, risk

Procedia PDF Downloads 83
10965 An Evaluation of the MathMates Program Implemented in Andrew Hamilton Public School as Part of College-Community Initiatives

Authors: Haofei Li

Abstract:

To support academic growth and foster love of learning, MathMates has been introduced for grade 6-8 students at Andrew Hamilton public school in 2022. The program is targeted at students from diverse backgrounds, particularly those underperforming in Pennsylvania System of School Assessment (PSSA) exams. Then, this study aims to evaluate the efficacy of MathMates by comparing student performance on the PSSA test, before and after the intervention. Through a randomized control trial, the study will collect associated costs using the ingredients method and measure the effectiveness for cost-effectiveness analysis. Text messages will be sent to parents/guardians as a reminder of the program and to encourage student participation. The findings of this study will provide valuable insights for funding organizations seeking to understand the impact and costs of math tutoring interventions on student academic achievement, which also emphasizes the importance of the collaborative efforts between higher education and local public schools.

Keywords: mathematics education, mathematics tutoring, college-community initiative, middle schools, Philadelphia public schools, after-school program, PSSA

Procedia PDF Downloads 63
10964 A Development of Science Instructional Model Based on Stem Education Approach to Enhance Scientific Mind and Problem Solving Skills for Primary Students

Authors: Prasita Sooksamran, Wareerat Kaewurai

Abstract:

STEM is an integrated teaching approach promoted by the Ministry of Education in Thailand. STEM Education is an integrated approach to teaching Science, Technology, Engineering, and Mathematics. It has been questioned by Thai teachers on the grounds of how to integrate STEM into the classroom. Therefore, the main objective of this study is to develop a science instructional model based on the STEM approach to enhance scientific mind and problem-solving skills for primary students. This study is participatory action research, and follows the following steps: 1) develop a model 2) seek the advice of experts regarding the teaching model. Developing the instructional model began with the collection and synthesis of information from relevant documents, related research and other sources in order to create prototype instructional model. 2) The examination of the validity and relevance of instructional model by a panel of nine experts. The findings were as follows: 1. The developed instructional model comprised of principles, objective, content, operational procedures and learning evaluation. There were 4 principles: 1) Learning based on the natural curiosity of primary school level children leading to knowledge inquiry, understanding and knowledge construction, 2) Learning based on the interrelation between people and environment, 3) Learning that is based on concrete learning experiences, exploration and the seeking of knowledge, 4) Learning based on the self-construction of knowledge, creativity, innovation and 5) relating their findings to real life and the solving of real-life problems. The objective of this construction model is to enhance scientific mind and problem-solving skills. Children will be evaluated according to their achievements. Lesson content is based on science as a core subject which is integrated with technology and mathematics at grade 6 level according to The Basic Education Core Curriculum 2008 guidelines. The operational procedures consisted of 6 steps: 1) Curiosity 2) Collection of data 3) Collaborative planning 4) Creativity and Innovation 5) Criticism and 6) Communication and Service. The learning evaluation is an authentic assessment based on continuous evaluation of all the material taught. 2. The experts agreed that the Science Instructional Model based on the STEM Education Approach had an excellent level of validity and relevance (4.67 S.D. 0.50).

Keywords: instructional model, STEM education, scientific mind, problem solving

Procedia PDF Downloads 177
10963 Nursing Documentation of Patients' Information at Selected Primary Health Care Facilities in Limpopo Province, South Africa: Implications for Professional Practice

Authors: Maria Sonto Maputle, Rhulani C. Shihundla, Rachel T. Lebese

Abstract:

Background: Patients’ information must be complete and accurately documented in order to foster quality and continuity of care. The multidisciplinary health care members use patients’ documentation to communicate about health status, preventive health services, treatment, planning and delivery of care. The purpose of this study was to determine the practice of nursing documentation of patients’ information at selected Primary Health Care (PHC) facilities in Vhembe District, Limpopo Province, South Africa. Methods: The research approach adopted was qualitative while exploratory and descriptive design was used. The study was conducted at selected PHC facilities. Population included twelve professional nurses. Non-probability purposive sampling method was used to sample professional nurses who were willing to participate in the study. The criteria included participants’ whose daily work and activities, involved creating, keeping and updating nursing documentation of patients’ information. Qualitative data collection was through unstructured in-depth interviews until no new information emerged. Data were analysed through open–coding of, Tesch’s eight steps method. Results: Following data analysis, it was found that professional nurses’ had knowledge deficit related to insufficient training on updates and rendering multiple services daily had negative impact on accurate documentation of patients’ information. Conclusion: The study recommended standardization of registers, books and forms used at PHC facilities, and reorganization of PHC services into open day system.

Keywords: documentation, knowledge, patient care, patient’s information, training

Procedia PDF Downloads 172
10962 Critical Success Factors of Information Technology Projects

Authors: Athar Imtiaz, Abduljalil S. Al-Mudhary, Taha Mirhashemi, Roslina Ibrahim

Abstract:

Information Technology (IT) is being used by almost all organizations throughout the world. However, its success at supporting and improving business is debatable. There is always the risk of IT project failure and studies have proven that a large number of IT projects indeed do fail. There are many components that further the success of IT projects; these have been studied in previous studies. Studies have found the most necessary components for success in software development projects, executive information systems etc. In this study, previous literature that has looked into these success promoting factors have been critically reviewed and analyzed. Fifteen critical Success Factors (CSF) of IT projects were enlisted and examined. These factors can be applied to all IT projects and is not specific to a particular type of IT/IS project. A hypothesis was also generated after the evaluation of the factors.

Keywords: critical success factors, CSF, IT projects, IS projects, software development projects

Procedia PDF Downloads 379
10961 Mental Health Promotion for Children of Mentally Ill Parents in Schools. Assessment and Promotion of Teacher Mental Health Literacy in Order to Promote Child Related Mental Health (Teacher-MHL)

Authors: Dirk Bruland, Paulo Pinheiro, Ullrich Bauer

Abstract:

Introduction: Over 3 million children, about one quarter of all students, experience at least one parent with mental disorder in Germany every year. Children of mentally-ill parents are at considerably higher risk of developing serious mental health problems. The different burden patterns and coping attempts often become manifest in children's school lives. In this context, schools can have an important protective function, but can also create risk potentials. In reference to Jorm, pupil-related teachers’ mental health literacy (Teacher-MHL) includes the ability to recognize change behaviour, the knowledge of risk factors, the implementation of first aid intervention, and seeking professional help (teacher as gatekeeper). Although teachers’ knowledge and increased awareness of this topic is essential, the literature provides little information on the extent of teachers' abilities. As part of a German-wide research consortium on health literacy, this project, launched in March for 3 years, will conduct evidence-based mental health literacy research. The primary objective is to measure Teacher-MHL in the context of pupil-related psychosocial factors at primary and secondary schools (grades 5 & 6), while also focussing on children’s social living conditions. Methods: (1) A systematic literature review in different databases to identify papers with regard to Teacher-MHL (completed). (2) Based on these results, an interview guide was developed. This research step includes a qualitative pre-study to inductively survey the general profiles of teachers (n=24). The evaluation will be presented on the conference. (3) These findings will be translated into a quantitative teacher survey (n=2500) in order to assess the extent of socio-analytical skills of teachers as well as in relation to institutional and individual characteristics. (4) Based on results 1 – 3, developing a training program for teachers. Results: The review highlights a lack of information for Teacher-MHL and their skills, especially related to high-risk-groups like children of mentally ill parents. The literature is limited to a few studies only. According to these, teacher are not good at identifying burdened children and if they identify those children they do not know how to handle the situations in school. They are not sufficiently trained to deal with these children, especially there are great uncertainties in dealing with the teaching situation. Institutional means and resources are missing as well. Such a mismatch can result in insufficient support and use of opportunities for children at risk. First impressions from the interviews confirm these results and allow a greater insight in the everyday school-life according to critical life events in families. Conclusions: For the first time schools will be addressed as a setting where children are especially "accessible" for measures of health promotion. Addressing Teacher-MHL gives reason to expect high effectiveness. Targeting professionals' abilities for dealing with this high-risk-group leads to a discharge for teacher themselves to handle those situations and increases school health promotion. In view of the fact that only 10-30% of such high-risk families accept offers of therapy and assistance, this will be the first primary preventive and health-promoting approach to protect the health of a yet unaffected, but particularly burdened, high-risk group.

Keywords: children of mentally ill parents, health promotion, mental health literacy, school

Procedia PDF Downloads 528
10960 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 116
10959 Exploring the Meaning of Safety in Acute Mental Health Inpatient Units from the Consumer Perspective

Authors: Natalie Cutler, Lorna Moxham, Moira Stephens

Abstract:

Safety is a priority in mental health services, and no more so than in the acute inpatient setting. Mental health service policies and accreditation frameworks commonly approach safety from a risk reduction or elimination perspective leading to service approaches that are arguably more focused on risk than on safety. An exploration what safety means for people who have experienced admission to an acute mental health inpatient unit is currently under way in Sydney, Australia. Using a phenomenographic research approach, this study is seeking to understand the meaning of safety from the perspective of people who use, rather than those who deliver mental health services. Preliminary findings suggest that the meanings of safety for users of mental health services vary from the meanings inherent in the policies and frameworks that inform how mental health services and mental health practice are delivered. This variance has implications for the physical and environmental design of acute mental health inpatient facilities, the policies and practices, and the education and training of mental health staff in particular nurses, who comprise the majority of the mental health workforce. These variances will be presented, along with their implications for the way quality and safety in mental health services are evaluated.

Keywords: acute inpatient, mental health, nursing, phenomenography, recovery, safety

Procedia PDF Downloads 214
10958 Development of a Technology Assessment Model by Patents and Customers' Review Data

Authors: Kisik Song, Sungjoo Lee

Abstract:

Recent years have seen an increasing number of patent disputes due to excessive competition in the global market and a reduced technology life-cycle; this has increased the risk of investment in technology development. While many global companies have started developing a methodology to identify promising technologies and assess for decisions, the existing methodology still has some limitations. Post hoc assessments of the new technology are not being performed, especially to determine whether the suggested technologies turned out to be promising. For example, in existing quantitative patent analysis, a patent’s citation information has served as an important metric for quality assessment, but this analysis cannot be applied to recently registered patents because such information accumulates over time. Therefore, we propose a new technology assessment model that can replace citation information and positively affect technological development based on post hoc analysis of the patents for promising technologies. Additionally, we collect customer reviews on a target technology to extract keywords that show the customers’ needs, and we determine how many keywords are covered in the new technology. Finally, we construct a portfolio (based on a technology assessment from patent information) and a customer-based marketability assessment (based on review data), and we use them to visualize the characteristics of the new technologies.

Keywords: technology assessment, patents, citation information, opinion mining

Procedia PDF Downloads 449
10957 Social Accountability: Persuasion and Debate to Contain Corruption

Authors: A. Lambert-Mogiliansky

Abstract:

In this paper, we investigate the properties of simple rules for reappointment aimed at holding a public official accountable and monitor his activity. The public official allocates budget resources to various activities which results in the delivery of public services to citizens. He has discretion over the use of resource so he can divert some of them for private ends. Because of a liability constraint, zero diversion can never be secured in all states. The optimal reappointment mechanism under complete information is shown to exhibit some leniency thus departing from the zero tolerance principle. Under asymmetric information (about the state), a rule with random verification in a pre-announced subset is shown to be optimal in a class of common rules. Surprisingly, those common rules make little use of hard information about service delivery when available. Similarly, PO's claim about his record is of no value to improve the performance of the examined rules. In contrast requesting that the PO defends his records publicly can be very useful if the service users are given the chance to refute false claims with cheap talk complaints: the first best complete information outcome can be approached in the absence of any observation by the manager of the accountability mechanism.

Keywords: accountability, corruption, persuasion, debate

Procedia PDF Downloads 365
10956 A Case Report on Cognitive-Communication Intervention in Traumatic Brain Injury

Authors: Nikitha Francis, Anjana Hoode, Vinitha George, Jayashree S. Bhat

Abstract:

The interaction between cognition and language, referred as cognitive-communication, is very intricate, involving several mental processes such as perception, memory, attention, lexical retrieval, decision making, motor planning, self-monitoring and knowledge. Cognitive-communication disorders are difficulties in communicative competencies that result from underlying cognitive impairments of attention, memory, organization, information processing, problem solving, and executive functions. Traumatic brain injury (TBI) is an acquired, non - progressive condition, resulting in distinct deficits of cognitive communication abilities such as naming, word-finding, self-monitoring, auditory recognition, attention, perception and memory. Cognitive-communication intervention in TBI is individualized, in order to enhance the person’s ability to process and interpret information for better functioning in their family and community life. The present case report illustrates the cognitive-communicative behaviors and the intervention outcomes of an adult with TBI, who was brought to the Department of Audiology and Speech Language Pathology, with cognitive and communicative disturbances, consequent to road traffic accident. On a detailed assessment, she showed naming deficits along with perseverations and had severe difficulty in recalling the details of the accident, her house address, places she had visited earlier, names of people known to her, as well as the activities she did each day, leading to severe breakdowns in her communicative abilities. She had difficulty in initiating, maintaining and following a conversation. She also lacked orientation to time and place. On administration of the Manipal Manual of Cognitive Linguistic Abilities (MMCLA), she exhibited poor performance on tasks related to visual and auditory perception, short term memory, working memory and executive functions. She attended 20 sessions of cognitive-communication intervention which followed a domain-general, adaptive training paradigm, with tasks relevant to everyday cognitive-communication skills. Compensatory strategies such as maintaining a dairy with reminders of her daily routine, names of people, date, time and place was also recommended. MMCLA was re-administered and her performance in the tasks showed significant improvements. Occurrence of perseverations and word retrieval difficulties reduced. She developed interests to initiate her day-to-day activities at home independently, as well as involve herself in conversations with her family members. Though she lacked awareness about her deficits, she actively involved herself in all the therapy activities. Rehabilitation of moderate to severe head injury patients can be done effectively through a holistic cognitive retraining with a focus on different cognitive-linguistic domains. Selection of goals and activities should have relevance to the functional needs of each individual with TBI, as highlighted in the present case report.

Keywords: cognitive-communication, executive functions, memory, traumatic brain injury

Procedia PDF Downloads 330
10955 Multiresolution Mesh Blending for Surface Detail Reconstruction

Authors: Honorio Salmeron Valdivieso, Andy Keane, David Toal

Abstract:

In the area of mechanical reverse engineering, processes often encounter difficulties capturing small, highly localized surface information. This could be the case if a physical turbine was 3D scanned for lifecycle management or robust design purposes, with interest on eroded areas or scratched coating. The limitation partly is due to insufficient automated frameworks for handling -localized - surface information during the reverse engineering pipeline. We have developed a tool for blending surface patches with arbitrary irregularities into a base body (e.g. a CAD solid). The approach aims to transfer small surface features while preserving their shape and relative placement by using a multi-resolution scheme and rigid deformations. Automating this process enables the inclusion of outsourced surface information in CAD models, including samples prepared in mesh handling software, or raw scan information discarded in the early stages of reverse engineering reconstruction.

Keywords: application lifecycle management, multiresolution deformation, reverse engineering, robust design, surface blending

Procedia PDF Downloads 129
10954 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 222
10953 Supporting Homeless People in Red Deer, Canada

Authors: Cornelius Ehlers, Lisa Harmatiuk, Sharon Rowland, Michelle Shafers

Abstract:

The objective of the Street Connect program is to provide client-centered care for the homeless population within the City of Red Deer. The program aims to provide an extended continuum of care (addiction, mental health, and physical health) for high acuity homeless individuals who are not connected to a service provider and/or community service agency. Street Connect includes both primary and secondary streams of service: Overall, Street Connect has demonstrated its ability to support vulnerable populations within the City of Red Deer, specifically those who are homeless and seeking addiction, mental health, and medical assistance. The results from the data extract and chart audit reflect the complexity and vulnerability of the clients enrolled in the Street Connect program. The clients were predominantly male, with an average age of 41 years. The majority did not have a permanent address, and 65% did not have employment. Substance abuse/addiction issues were common, combined with a history of psychiatric diagnoses and previous mental health hospitalizations. The most utilized drugs were street drugs such as methamphetamine, fentanyl, and other opioids.

Keywords: client-centred care, homelessness, mental health, rural

Procedia PDF Downloads 77