Search results for: personal and sensitive data
27592 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations
Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa
Abstract:
This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy
Procedia PDF Downloads 20427591 The Perspective of Smart Thermoregulation in Personal Protective Equipment
Authors: Alireza Saidi
Abstract:
Aside from injuries due to direct contact with hot or cold substances or objects, exposure to extreme temperatures in the workplace involves physical hazards to workers. On the other hand, a poorly acclimatized worker may have reduced performance and alertness and may, therefore, be more vulnerable to the risk of accidents and injuries. Due to the incompatibility of the standards put in place with certain workplaces and the lack of thermoregulation in many protective equipments, thermal strains remain among the physical risks most present in many work sectors. However, many of these problems can be overcome thanks to the potential of intelligent textile technologies allowing intelligent thermoregulation in protective equipment. Nowadays, technologies such as heating elements, cooling elements are applied in products intended for sport and leisure, and research work has been carried out in the integration of temperature sensors and thermal stress detectors in personal protective equipment. However, the usage of all of these technologies in personal protective equipment remains very marginal. This article presents a portrait of the current state of intelligent thermoregulation systems by carrying out a synthesis of technical developments, which is accompanied by a gap analysis of current developments. Thus, the research work necessary for the adaptation and integration of intelligent thermoregulation systems with personal protective equipment is discussed in order to offer a perspective of future developments.Keywords: personal protective equipment, smart textiles, thermoregulation, thermal strain
Procedia PDF Downloads 11027590 Studying Language of Immediacy and Language of Distance from a Corpus Linguistic Perspective: A Pilot Study of Evaluation Markers in French Television Weather Reports
Authors: Vince Liégeois
Abstract:
Language of immediacy and distance: Within their discourse theory, Koch & Oesterreicher establish a distinction between a language of immediacy and a language of distance. The former refers to those discourses which are oriented more towards a spoken norm, whereas the latter entails discourses oriented towards a written norm, regardless of whether they are realised phonically or graphically. This means that an utterance can be realised phonically but oriented more towards the written language norm (e.g., a scientific presentation or eulogy) or realised graphically but oriented towards a spoken norm (e.g., a scribble or chat messages). Research desiderata: The methodological approach from Koch & Oesterreicher has often been criticised for not providing a corpus-linguistic methodology, which makes it difficult to work with quantitative data or address large text collections within this research paradigm. Consequently, the Koch & Oesterreicher approach has difficulties gaining ground in those research areas which rely more on corpus linguistic research models, like text linguistics and LSP-research. A combinatory approach: Accordingly, we want to establish a combinatory approach with corpus-based linguistic methodology. To this end, we propose to (i) include data about the context of an utterance (e.g., monologicity/dialogicity, familiarity with the speaker) – which were called “conditions of communication” in the original work of Koch & Oesterreicher – and (ii) correlate the linguistic phenomenon at the centre of the inquiry (e.g., evaluation markers) to a group of linguistic phenomena deemed typical for either distance- or immediacy-language. Based on these two parameters, linguistic phenomena and texts could then be mapped on an immediacy-distance continuum. Pilot study: To illustrate the benefits of this approach, we will conduct a pilot study on evaluation phenomena in French television weather reports, a form of domain-sensitive discourse which has often been cited as an example of a “text genre”. Within this text genre, we will look at so-called “evaluation markers,” e.g., fixed strings like bad weather, stifling hot, and “no luck today!”. These evaluation markers help to communicate the coming weather situation towards the lay audience but have not yet been studied within the Koch & Oesterreicher research paradigm. Accordingly, we want to figure out whether said evaluation markers are more typical for those weather reports which tend more towards immediacy or those which tend more towards distance. To this aim, we collected a corpus with different kinds of television weather reports,e.g., as part of the news broadcast, including dialogue. The evaluation markers themselves will be studied according to the explained methodology, by correlating them to (i) metadata about the context and (ii) linguistic phenomena characterising immediacy-language: repetition, deixis (personal, spatial, and temporal), a freer choice of tense and right- /left-dislocation. Results: Our results indicate that evaluation markers are more dominantly present in those weather reports inclining towards immediacy-language. Based on the methodology established above, we have gained more insight into the working of evaluation markers in the domain-sensitive text genre of (television) weather reports. For future research, it will be interesting to determine whether said evaluation markers are also typical for immediacy-language-oriented in other domain-sensitive discourses.Keywords: corpus-based linguistics, evaluation markers, language of immediacy and distance, weather reports
Procedia PDF Downloads 21927589 Quantile Coherence Analysis: Application to Precipitation Data
Authors: Yaeji Lim, Hee-Seok Oh
Abstract:
The coherence analysis measures the linear time-invariant relationship between two data sets and has been studied various fields such as signal processing, engineering, and medical science. However classical coherence analysis tends to be sensitive to outliers and focuses only on mean relationship. In this paper, we generalized cross periodogram to quantile cross periodogram and provide richer inter-relationship between two data sets. This is a general version of Laplace cross periodogram. We prove its asymptotic distribution under the long range process and compare them with ordinary coherence through numerical examples. We also present real data example to confirm the usefulness of quantile coherence analysis.Keywords: coherence, cross periodogram, spectrum, quantile
Procedia PDF Downloads 39027588 Exposure Assessment to Airborne Particulate Matter in Agriculture
Authors: K. Rumchev, S. Gilbey
Abstract:
Airborne particulate matter is a known hazard to human health, with a considerable body of evidence linking agricultural dust exposures to adverse human health effects in exposed populations. It is also known that agricultural workers are exposed to high levels of soil dust and other types of airborne particulate matter within the farming environment. The aim of this study was to examine exposure to agricultural dust among farm workers during the seeding season. Twenty-one wheat-belt farms consented to participate in the study with 30 workers being monitored for dust exposure whilst seeding or undertaking seeding associated tasks. Each farm was visited once and farmers’ were asked to wear a personal air sampler for a 4-hour sampling period. Simultaneous, real-time, tractor cabin air quality monitoring was also undertaken. Data for this study was collected using real-time aerosol dust monitors to determine in-tractor cabin PM exposure to five size fractions (total, PM10, respirable, PM2.5 and PM1), and personal sampling was undertaken to establish individual exposure to inhalable and respirable dust concentrations. The study established a significant difference between personal exposures and simultaneous real-time in-cabin exposures for both inhalable and respirable fractions. No significant difference was shown between in-cabin and personal inhalable dust concentrations during seeding and spraying tasks, although both in-cabin and personal concentrations were two times greater for seeding than spraying. Future research should focus on educating and providing farm owners and workers with more information on adopting safe work practices to minimise harmful exposures to agricultural dust.Keywords: agriculture, air quality, Australia, particulate matter
Procedia PDF Downloads 21727587 The Salespeople's Reactions to Customer Sexual Harassment: A Case Study of Taiwan's Life Insurance Industry
Authors: Yi-Ling Lin, Lu-Ming Tseng
Abstract:
Customer sexual harassment is recognized as a serious problem in the personal selling industry. At a personal level, customer sexual harassment could have very negative impacts on the salespeople's physical and mental health. At the organizational level, customer sexual harassment is destructive in terms of organizational reputation. Therefore, this research takes Taiwan's life insurance salesperson as the research sample and explores the impacts of customer power and perceived behavioral control on the life insurance salespeople's whistleblowing intentions to report quid pro quo and hostile work environment types of customer sexual harassment. This study then investigates how personal factors (such as gender difference) may relate to the intentions. Questionnaires are often used as a data collection instrument in studies on workplace sexual harassment. This study collects data through questionnaire surveys, and the research sample of this research is the full-time life insurance salespeople in Taiwan. The hypotheses are examined by using PLS regression approach. The main results show that the types of customer sexual harassment, customer power, and gender are related to the whistleblowing intentions. To our best knowledge, this is the first empirical study to test the relationships among customer reward power, customer coercive power, perceived behavioral control, and the salespeople's whistleblowing intentions toward customer sexual harassment. The findings may provide some implications for the researchers and official authorities.Keywords: customer sexual harassment, life insurance salespeople, perceived behavioral control, PLS regression
Procedia PDF Downloads 12827586 Algorithm Development of Individual Lumped Parameter Modelling for Blood Circulatory System: An Optimization Study
Authors: Bao Li, Aike Qiao, Gaoyang Li, Youjun Liu
Abstract:
Background: Lumped parameter model (LPM) is a common numerical model for hemodynamic calculation. LPM uses circuit elements to simulate the human blood circulatory system. Physiological indicators and characteristics can be acquired through the model. However, due to the different physiological indicators of each individual, parameters in LPM should be personalized in order for convincing calculated results, which can reflect the individual physiological information. This study aimed to develop an automatic and effective optimization method to personalize the parameters in LPM of the blood circulatory system, which is of great significance to the numerical simulation of individual hemodynamics. Methods: A closed-loop LPM of the human blood circulatory system that is applicable for most persons were established based on the anatomical structures and physiological parameters. The patient-specific physiological data of 5 volunteers were non-invasively collected as personalized objectives of individual LPM. In this study, the blood pressure and flow rate of heart, brain, and limbs were the main concerns. The collected systolic blood pressure, diastolic blood pressure, cardiac output, and heart rate were set as objective data, and the waveforms of carotid artery flow and ankle pressure were set as objective waveforms. Aiming at the collected data and waveforms, sensitivity analysis of each parameter in LPM was conducted to determine the sensitive parameters that have an obvious influence on the objectives. Simulated annealing was adopted to iteratively optimize the sensitive parameters, and the objective function during optimization was the root mean square error between the collected waveforms and data and simulated waveforms and data. Each parameter in LPM was optimized 500 times. Results: In this study, the sensitive parameters in LPM were optimized according to the collected data of 5 individuals. Results show a slight error between collected and simulated data. The average relative root mean square error of all optimization objectives of 5 samples were 2.21%, 3.59%, 4.75%, 4.24%, and 3.56%, respectively. Conclusions: Slight error demonstrated good effects of optimization. The individual modeling algorithm developed in this study can effectively achieve the individualization of LPM for the blood circulatory system. LPM with individual parameters can output the individual physiological indicators after optimization, which are applicable for the numerical simulation of patient-specific hemodynamics.Keywords: blood circulatory system, individual physiological indicators, lumped parameter model, optimization algorithm
Procedia PDF Downloads 13727585 Readiness of Iran’s Insurance Industry Salesforce to Accept Changing to Become Islamic Personal Financial Planners
Authors: Pedram Saadati, Zahra Nazari
Abstract:
Today, the role and importance of financial technology businesses in Iran have increased significantly. Although, in Iran, there is no Islamic or non-Islamic personal financial planning field of study in the universities or educational centers, the profession of personal financial planning is not defined, and there is no software introduced in this regard for advisors or consumers. The largest sales network of financial services in Iran belongs to the insurance industry, and there is an untapped market for international companies in Iran that can contribute to 130 thousand representatives in the insurance industry and 28 million families by providing training and personal financial advisory software. To the best of the author's knowledge, despite the lack of previous internal studies in this field, the present study investigates the level of readiness of the salesforce of the insurance industry to accept this career and its technology. The statistical population of the research is made up of managers, insurance sales representatives, assistants and heads of sales departments of insurance companies. An 18-minute video was prepared that introduced and taught the job of Islamic personal financial planning and explained its difference from its non-Islamic model. This video was provided to the respondents. The data collection tool was a research-made questionnaire. To investigate the factors affecting technology acceptance and job change, independent T descriptive statistics and Pearson correlation were used, and Friedman's test was used to rank the effective factors. The results indicate the mental perception and very positive attitude of the insurance industry activists towards the usefulness of this job and its technology, and the studied sample confirmed the intention of training in this knowledge. Based on research results, the change in the customer's attitude towards the insurance advisor and the possibility of increasing income are considered as the reasons for accepting. However, Restrictions on using investment opportunities due to Islamic financial services laws and the uncertainty of the position of the central insurance in this regard are considered as the most important obstacles.Keywords: fintech, insurance, personal financial planning, wealth management
Procedia PDF Downloads 4927584 Status and Results from EXO-200
Authors: Ryan Maclellan
Abstract:
EXO-200 has provided one of the most sensitive searches for neutrinoless double-beta decay utilizing 175 kg of enriched liquid xenon in an ultra-low background time projection chamber. This detector has demonstrated excellent energy resolution and background rejection capabilities. Using the first two years of data, EXO-200 has set a limit of 1.1x10^25 years at 90% C.L. on the neutrinoless double-beta decay half-life of Xe-136. The experiment has experienced a brief hiatus in data taking during a temporary shutdown of its host facility: the Waste Isolation Pilot Plant. EXO-200 expects to resume data taking in earnest this fall with upgraded detector electronics. Results from the analysis of EXO-200 data and an update on the current status of EXO-200 will be presented.Keywords: double-beta, Majorana, neutrino, neutrinoless
Procedia PDF Downloads 41427583 Autonomic Threat Avoidance and Self-Healing in Database Management System
Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik
Abstract:
Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.Keywords: autonomic computing, self-healing, threat avoidance, security
Procedia PDF Downloads 50427582 Principal Components Analysis of the Causes of High Blood Pressure at Komfo Anokye Teaching Hospital, Ghana
Authors: Joseph K. A. Johnson
Abstract:
Hypertension affects 20 percent of the people within the ages 55 upward in Ghana. Of these, almost one-third are unaware of their condition. Also at the age of 55, more men turned to have hypertension than women. After that age, the condition becomes more prevalent with women. Hypertension is significantly more common in African Americans of both sexes than the racial or ethnic groups. This study was conducted to determine the causes of high blood pressure in Ashanti Region, Ghana. The study employed One Hundred and Seventy (170) respondents. The sample population for the study was all the available respondents at the time of the data collection. The research was conducted using primary data where convenience sampling was used to locate the respondents. A set of questionnaire were used to gather the data for the study. The gathered data was analysed using principal component analysis. The study revealed that, personal description, lifestyle behavior and risk awareness as some of the causes of high blood pressure in Ashanti Region. The study therefore recommend that people must be advice to see to their personal characteristics that may contribute to high blood pressure such as controlling of their temper and how to react perfectly to stressful situations. They must be educated on the factors that may increase the level of their blood pressure such as the essence of seeing a medical doctor before taking in any drug. People must also be made known by the public health officers to those lifestyles behaviour such as smoking and drinking of alcohol which are major contributors of high blood pressure.Keywords: high blood pressure, principal component analysis, hypertension, public health
Procedia PDF Downloads 48527581 Assessing the Pre-Service and In-Service Teachers’ Continuation of Use of Technology After Participation in Professional Development
Authors: Ayoub Kafyulilo, Petra Fisser, Joke Voogt
Abstract:
This study was conducted to assess the continuation of the use of technology in science and mathematics teaching of the pre-service and in-service teachers who attended the professional development programme. It also assessed professional development, personal, institutional, and technological factors contributing to the continuous use of technology in teaching. The study involved 42 teachers, thirteen pre-service teachers, and twenty-nine in-service teachers. A mixed-method research approach was used to collect data for this study. Findings showed that the continuous use of technology in teaching after the termination of the professional development arrangement was high among the pre-service teachers, and differed for the in-service teachers. The regression model showed that knowledge and skills, access to technology and ease of use were strong predictors (R2 = 55.3%) of the teachers’ continuous use of technology after the professional development arrangement. The professional development factor did not have a direct effect on the continuous use of technology, rather had an influence on personal factors (knowledge and skills). In turn, the personal factors had influence on the institutional factors (access to technology) and technological factors (ease of use), which together had an effect on the teachers’ continuous use of technology in teaching.Keywords: technology, professional development, teachers, science and mathematics
Procedia PDF Downloads 16027580 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016
Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto
Abstract:
The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss
Procedia PDF Downloads 14127579 Credibility and Personal Social Media Use of Health Professionals: A Field Study
Authors: Abrar Al-Hasan
Abstract:
Objectives: There is ongoing discourse regarding the potential risks to health professionals' reputations and credibility arising from their personal social media use. However, the specific impacts on professional credibility and the health professional-client relationship remain largely unexplored. This study aims to investigate the type and frequency of the content posted by health professionals on their Instagram accounts and its influence on their credibility and the professional-client relationship. Methodology: In a controlled field study, participants reviewed randomly assigned mock Instagram profiles of health professionals. Mock profiles were constructed according to gender (female/male), social media usage (high/low), and social media richness (high/ low), with richness increasing from posts to stories to reels and personal content type (high /low). Participants then rated the profile owners’ credibility on a visual analog scale. An analysis of variance compared these ratings, and mediation analyses assessed the influence of credibility ratings on participants' willingness to become clients of the mock health professional. Results: Results from 315 participants showed that health professionals with personal Instagram profiles displaying high social media richness were perceived as more credible than those with lower social media richness. Low social media usage is perceived as more credible than high social media usage. Personal content type is perceived as less credible as compared to those with low personal content type. Contributions: These findings provide initial evidence of the impact of health professionals' personal online disclosures on credibility and the health professional-client relationship. Understanding public perceptions of professionalism and credibility is essential for informing e-professionalism guidelines and promoting best practices in social media use among health professionals.Keywords: credibility, consumer behavior, social media, media richness, healthcare professionals
Procedia PDF Downloads 4227578 Personal Characteristics Related to Hasty Behaviour in Korea
Authors: Sun Jin Park, Kyung-Ja Cho
Abstract:
This study focused on characteristics related to hasty behaviour. To investigate the relation between personal characteristics and hasty behaviour, 601 data were collected, 335 males and 256 females answered their own 'social avoidance and distress’, ‘anxiety’, ‘sensation seeking', 'hope', and ' hasty behaviour. And then 591 data were used for the analysis. The factor analysis resulted hasty behaviour consisted of 5 factors, time pressure, isolation, uncomfortable situation, boring condition, and expectation of reward. The result showed anxiety, sensation seeking, and hope related to hasty behaviour. Specifically, anxiety was involved in every hasty behaviour. This result means that psychological tension and worry are related to hasty behaviour in common. 'Social avoidance and distress', 'sensation seeking' and 'hope' influenced on hasty behaviour under time pressure, in isolation, in expectation of rewards respectively. This means that each factor of hasty behaviour has anxiety as its basis, expressed through a varied nature.Keywords: hasty behaviour, social avoidance and distress, anxiety, sensation seeking, hope
Procedia PDF Downloads 32827577 Interior Design Pedagogy in the 21st Century: Personalised Design Process
Authors: Roba Zakariah Shaheen
Abstract:
In the 21st-century Interior, design pedagogy has developed rapidly due to social and economical factors. Socially, this paper presents research findings that shows a significant relationship between educators and students in interior design education. It shows that students’ personal traits, design process, and thinking process are significantly interrelated. Constructively, this paper presented how personal traits can guide educators in the interior design education domain to develop students’ thinking process. In the same time, it demonstrated how students should use their own personal traits to create their own design process. Constructivism was the theory underneath this research, as it supports the grounded theory, which is the methodological approach of this research. Moreover, Mayer’s Briggs Type Indicator strategy was used to investigate the personality traits scientifically, as a psychological strategy that related to cognitive ability. Conclusions from this research strongly recommends that educators and students should utilize their personal traits to foster interior design education.Keywords: interior design, pedagogy, constructivism, grounded theory, personality traits, creativity
Procedia PDF Downloads 20727576 E-Tongue Based on Metallo-Porphyrins for Histamine Evaluation
Authors: A. M. Iordache, S. M. Iordache, V. Barna, M. Elisa, I. C. Vasiliu, C. R. Stefan, I. Chilibon, I. Stamatin, S. Caramizoiu, C. E. A. Grigorescu
Abstract:
The general objective of the presentation is the development of an e-tongue like sensor based on modified screen printed electrode (SPE) structures with a receptor part made of porphyrins/metalloporphyrins chemically bound to graphene (the sensitive assembly) to act as antennas and “capture” the histamine molecules. Using a single, ultra-sensitive electrochemical sensor, we measured the concentration of histamine, a compound which is strongly connected to the level of freshness in foods (the caution level of histamine is 50 ppm, whereas the maximum accepted levels range from 200 ppm to 500 ppm). Our approach for the chemical immobilization of the porphyrins onto the surface of the graphenes was via substitution reaction: a solution of graphene in SOCl2 was heated to 800C for 6 hours. Upon cooling, the metallo-porphyrins were added and ultrasonicated for 4 hours. The solution was then allowed to cool to room temperature and then centrifuged in order to separate the deposit. The sensitive assembly was drop casted onto the carbon SPE and cyclic voltammetry was performed in the presence of histamine. The reaction is quasi-reversible and the sensor showed an oxidation potential for histamine at 600 mV. The results indicate a linear dependence of concentration of histamine as function of intensity. The results are reproducible; however the chemical stability of the sensitive assembly is low.Keywords: histamine, cyclic voltammetry, metallo-porphyrin, food freshness
Procedia PDF Downloads 14127575 The Role of Financial Literacy and Personal Non-Cognitive Attributes in Household Financial Fragility
Authors: Ivana Bulog, Ana Rimac Smiljanić, Sandra Pepur
Abstract:
The financial fragility of households has received increased attention following the recent health crisis, which has created uncertainty and caused increased levels of stress and consequently impaired individual and family well-being. Job losses and/or reduced wages and insecurity increased the number of people that were unable to meet unexpected expenses, which, in many cases, led to increased household debt levels. This presents a threat to the stability of the financial system and the whole economy; therefore, reducing financial fragility and improving financial literacy present challenges for academicians, practitioners, and policymakers. Concerning financial fragility, significant research attention has been devoted to financial knowledge and financial literacy. However, apart from specific knowledge, personal characteristics are of great importance in making financial decisions in the household. Self-efficacy is one of the personal non-cognitive attributes that is a valuable framework for understanding how household financial decisions are made. Thus, this research proposes that individual levels of financial literacy and self-efficacy are related to the indebtedness and financial instability of the household. The primary data were collected using a structured, self-administered online questionnaire, and a snowball sampling method was applied to reach the participants. Preliminary results confirm our assumptions on the influence of financial literacy and self-efficacy on household financial stability.Keywords: financial literacy, self-efficacy, household financial fragility, well-being
Procedia PDF Downloads 8727574 A Comparative Study of Burnout and Coping Strategies between HIV Counselors: Face to Face and Online Counseling Services in Addis Ababa
Authors: Yemisrach Mihertu Amsale
Abstract:
The purpose of this study was to compare burnout and coping strategies between HIV counselors in face to face and online counseling settings in Addis Ababa. The study was mixed approach design that was quantitative and qualitative. For the quantitative data the participants involved in this study included 64 face to face and 47 online HIV counselors in both counseling settings. In addition, 23 participants were involved to offer qualitative data from both counseling settings. For the purpose of gathering the quantitative data, the instruments, namely, demographic questionnaire, Maslach Burnout Inventory and the COPE questionnaire, were used to gather quantitative data. Qualitative data was also gathered in the FGD Guide and Interview Guide. Thus, this study revealed that HIV counselors in online counseling settings scored high on emotional exhaustion, depersonalization and low in personal accomplishment dimensions of burnout as compared to HIV counselors in face to face setting and the difference was statistically significant in emotional exhaustion and personal accomplishment, but there was no a significant difference on depersonalization dimension of burnout between the two groups. In addition, the present study revealed a statistically significant difference on problem focused coping strategy between the two groups and yet for on the emotion focused coping strategy the difference was not statistically significant. Statistically negative correlation was observed between some demographic variables such as age with emotional exhaustion and depersonalization dimensions of burnout; years of experiences and personal accomplishment dimension of burnout. A statistically positive correlation was also observed between average number of clients served per day and emotional exhaustion. Sex was having a statistically positive correlation with coping strategy. Lastly, a significant positive correlation was also observed in the emotional exhaustion dimension of the burnout and the emotional focused coping strategy. Generally, this study has shown that HIV counselors suffer from moderate to high level of burnout. Based on the findings, conclusions were made and recommendations were forwarded.Keywords: counseling, burnout management, psychological, behavioral sciences
Procedia PDF Downloads 30527573 Highly Sensitive Fiber-Optic Curvature Sensor Based on Four Mode Fiber
Authors: Qihang Zeng, Wei Xu, Ying Shen, Changyuan Yu
Abstract:
In this paper, a highly sensitive fiber-optic curvature sensor based on four mode fiber (FMF) is presented and investigated. The proposed sensing structure is constructed by fusing a section of FMF into two standard single mode fibers (SMFs) concatenated with two no core fiber (NCF), i.e., SMF-NCF-FMF-NCF-SMF structure is fabricated. The length of the NCF is very short about 1 millimeter acting as exciting/recoupling the light from/into the core of the SMF, while the FMF is with 3 centimeters long supporting four eigenmodes including LP₀₁, LP₁₁, LP₂₁ and LP₀₂. High core modes in FMF can be effectively stimulated owing to mismatched mode field distribution and the mainly sensing principle is based on modal interferometer spectrum analysis. Different curvatures induce different strains on the FMF such that affecting the modal excitation, resulting spectrum shifts. One can get the curvature value by tracking the wavelength shifting. Experiments have been done to address the sensing performance, which is about 7.8 nm/m⁻¹ within a range of 1.90 m⁻¹~3.18 m⁻¹.Keywords: curvature, four mode fiber, highly sensitive, modal interferometer
Procedia PDF Downloads 19127572 Women Writing Group as a Mean for Personal and Social Change
Authors: Michal Almagor, Rivka Tuval-Mashiach
Abstract:
This presentation will explore the main processes identified in women writing group, as an interdisciplinary field with personal and social effects. It is based on the initial findings of a Ph.D. research focus on the intersection of group processes with the element of writing, in the context of gender. Writing as a therapeutic mean has been recognized and found to be highly effective. Additionally, a substantial amount of research reveals the psychological impact of group processes. However, the combination of writing and groups as a therapeutic tool was hardly investigated; this is the contribution of this research. In the following qualitative-phenomenological study, the experiences of eight women participating in a 10-sessions structured writing group were investigated. We used the meetings transcripts, semi-structured interviews, and the texts to analyze and understand the experience of participating in the group. The two significant findings revealed were spiral intersubjectivity and archaic level of semiotic language. We realized that the content and the process are interwoven; participants are writing, reading and discussing their texts in a group setting that enhanced self-dialogue between the participants and their own narratives and texts, as well as dialogue with others. This process includes working through otherness within and between while discovering and creating a multiplicity of narratives. A movement of increasing shared circles from the personal to the group and to the social-cultural environment was identified, forming what we termed as spiral intersubjectivity. An additional layer of findings was revealed while we listened to the resonance of the group-texts, and discourse; during this process, we could trace the semiotic level in addition to the symbolic one. We were witness to the dominant presence of the body, and primal sensuality, expressed by rhythm, sound and movements, signs of pre-verbal language. Those findings led us to a new understanding of the semiotic function as a way to express the fullness of women experience and the enabling role of writing in reviving what was repressed. The poetic language serves as a bridge between the symbolic and the semiotic. Re-reading the group materials, exposed another layer of expression, an old-new language. This approach suggests a feminine expression of subjective experience with personal and social importance. It is a subversive move, encouraging women to write themselves, as a craft that every woman can use, giving voice to the silent and hidden, and experiencing the power of performing 'my story'. We suggest that women writing group is an efficient, powerful yet welcoming way to raise the awareness of researchers and clinicians, and more importantly of the participants, to the uniqueness of the feminine experience, and to gender-sensitive curative approaches.Keywords: group, intersubjectivity, semiotic, writing
Procedia PDF Downloads 21927571 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases
Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee
Abstract:
Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements
Procedia PDF Downloads 22927570 Barriers of the Development and Implementation of Health Information Systems in Iran
Authors: Abbas Sheikhtaheri, Nasim Hashemi
Abstract:
Health information systems have great benefits for clinical and managerial processes of health care organizations. However, identifying and removing constraints and barriers of implementing and using health information systems before any implementation is essential. Physicians are one of the main users of health information systems, therefore, identifying the causes of their resistance and concerns about the barriers of the implementation of these systems is very important. So the purpose of this study was to determine the barriers of the development and implementation of health information systems in terms of the Iranian physicians’ perspectives. In this study conducted in 8 selected hospitals affiliated to Tehran and Iran Universities of Medical Sciences, Tehran, Iran in 2014, physicians (GPs, residents, interns, specialists) in these hospitals were surveyed. In order to collect data, a research made questionnaire was used (Cronbach’s α = 0.95). The instrument included 25 about organizational (9), personal (4), moral and legal (3) and technical barriers (9). Participants were asked to answer the questions using 5 point scale Likert (completely disagree=1 to completely agree=5). By using a simple random sampling method, 200 physicians (from 600) were invited to study that eventually 163 questionnaires were returned. We used mean score and t-test and ANOVA to analyze the data using SPSS software version 17. 52.1% of respondents were female. The mean age was 30.18 ± 7.29. The work experience years for most of them were between 1 to 5 years (80.4 percent). The most important barriers were organizational ones (3.4 ± 0.89), followed by ethical (3.18 ± 0.98), technical (3.06 ± 0.8) and personal (3.04 ± 1.2). Lack of easy access to a fast Internet (3.67±1.91) and the lack of exchanging information (3.61±1.2) were the most important technical barriers. Among organizational barriers, the lack of efficient planning for the development and implementation systems (3.56±1.32) and was the most important ones. Lack of awareness and knowledge of health care providers about the health information systems features (3.33±1.28) and the lack of physician participation in planning phase (3.27±1.2) as well as concerns regarding the security and confidentiality of health information (3.15 ± 1.31) were the most important personal and ethical barriers, respectively. Women (P = 0.02) and those with less experience (P = 0.002) were more concerned about personal barriers. GPs also were more concerned about technical barriers (P = 0.02). According to the study, technical and ethics barriers were considered as the most important barriers however, lack of awareness in target population is also considered as one of the main barriers. Ignoring issues such as personal and ethical barriers, even if the necessary infrastructure and technical requirements were provided, may result in failure. Therefore, along with the creating infrastructure and resolving organizational barriers, special attention to education and awareness of physicians and providing solution for ethics concerns are necessary.Keywords: barriers, development health information systems, implementation, physicians
Procedia PDF Downloads 34527569 Design of a Standard Weather Data Acquisition Device for the Federal University of Technology, Akure Nigeria
Authors: Isaac Kayode Ogunlade
Abstract:
Data acquisition (DAQ) is the process by which physical phenomena from the real world are transformed into an electrical signal(s) that are measured and converted into a digital format for processing, analysis, and storage by a computer. The DAQ is designed using PIC18F4550 microcontroller, communicating with Personal Computer (PC) through USB (Universal Serial Bus). The research deployed initial knowledge of data acquisition system and embedded system to develop a weather data acquisition device using LM35 sensor to measure weather parameters and the use of Artificial Intelligence(Artificial Neural Network - ANN)and statistical approach(Autoregressive Integrated Moving Average – ARIMA) to predict precipitation (rainfall). The device is placed by a standard device in the Department of Meteorology, Federal University of Technology, Akure (FUTA) to know the performance evaluation of the device. Both devices (standard and designed) were subjected to 180 days with the same atmospheric condition for data mining (temperature, relative humidity, and pressure). The acquired data is trained in MATLAB R2012b environment using ANN, and ARIMAto predict precipitation (rainfall). Root Mean Square Error (RMSE), Mean Absolute Error (MAE), Correction Square (R2), and Mean Percentage Error (MPE) was deplored as standardize evaluation to know the performance of the models in the prediction of precipitation. The results from the working of the developed device show that the device has an efficiency of 96% and is also compatible with Personal Computer (PC) and laptops. The simulation result for acquired data shows that ANN models precipitation (rainfall) prediction for two months (May and June 2017) revealed a disparity error of 1.59%; while ARIMA is 2.63%, respectively. The device will be useful in research, practical laboratories, and industrial environments.Keywords: data acquisition system, design device, weather development, predict precipitation and (FUTA) standard device
Procedia PDF Downloads 9227568 Protecting the Privacy and Trust of VIP Users on Social Network Sites
Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi
Abstract:
There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.Keywords: social network sites, online social network, privacy, trust, security and authentication
Procedia PDF Downloads 38127567 Sharia, Legal Pluralism and Muslim Personal Law in Contemporary India
Authors: K. C. Mujeebu Rahman
Abstract:
Over the years, discussions in India regarding personal law in India have focused on its deficiencies, increasing involvement of the judiciary, and the pursuit of uniformity. However, little attention has been given to understanding how the law functions in a multicultural nation committed to political secularism. This paper addresses this gap by exploring the mahallu system in Malabar, shedding light on the decision-making process within Muslim personal law. It reveals that this process is deeply rooted in everyday micro-politics, sectarian dynamics, social pressure, and emotions. Through an in-depth examination of a triple talaq case, the paper demonstrates how love (or the lack of it), family expectations, and community authority intersect in resolving marital disputes. Instead of a straightforward legal interpretation, this process leads to a complex maze of micro-politics involving local religious factions and authorities. The paper underscores that the non-state quasi-legal institutions within the mahallu system represent a distinct form of legal pluralism characterized by intricate power dynamics at multiple levels. Moreover, it highlights the interplay between what is considered legally valid and what is deemed socially legitimate.Keywords: islamic law, sharia, fatwa, muslim personal law
Procedia PDF Downloads 6527566 Applications of Copper Sensitive Fluorescent Dye to the Studies of the Role of Copper in Cisplatin Resistance in Human Cancer
Authors: Sumayah Mohammed Asiri A., Aviva Levina B., Elizabeth New C., Peter Lay D.
Abstract:
Pt compounds have been among the most successful anticancer drugs in the last 40 years, but the development of resistance to them is an increasing problem. Cellular homeostasis of an essential metal, Cu, is known to be involved in Pt resistance, but mechanisms of this process are poorly understood. We used a novel ratiometric Cu(I)-sensitive fluorescent probeInCCu1 dye to detect Cu(I) in the mitochondria. Total Cu and labile Cu pool measured using AAS and InCCu1 dye in A2780 cells and their corresponding resistant cells A2780-cis.R cells treated with Cu and cisplatin. The main difference between both cell lines in the presence and absence of Cu(II) is that resistant cells have lower total Cu content but higher labile Cu levels than cisplatin-sensitive cells. This means that resistant cells can metabolize and export excess Cu more efficiently. Furthermore, InCCu1 has emerged not only as an indicator of labile cellular Cu levels in the mitochondria but as a potentially versatile multi-organelle probe.Keywords: AAS and ICPMS, A2780 and its resistant cells, ratiometric fluorescent sensors, inCCu1, and total and labile Cu
Procedia PDF Downloads 21427565 Japanese and Europe Legal Frameworks on Data Protection and Cybersecurity: Asymmetries from a Comparative Perspective
Authors: S. Fantin
Abstract:
This study is the result of the legal research on cybersecurity and data protection within the EUNITY (Cybersecurity and Privacy Dialogue between Europe and Japan) project, aimed at fostering the dialogue between the European Union and Japan. Based on the research undertaken therein, the author offers an outline of the main asymmetries in the laws governing such fields in the two regions. The research is a comparative analysis of the two legal frameworks, taking into account specific provisions, ratio legis and policy initiatives. Recent doctrine was taken into account, too, as well as empirical interviews with EU and Japanese stakeholders and project partners. With respect to the protection of personal data, the European Union has recently reformed its legal framework with a package which includes a regulation (General Data Protection Regulation), and a directive (Directive 680 on personal data processing in the law enforcement domain). In turn, the Japanese law under scrutiny for this study has been the Act on Protection of Personal Information. Based on a comparative analysis, some asymmetries arise. The main ones refer to the definition of personal information and the scope of the two frameworks. Furthermore, the rights of the data subjects are differently articulated in the two regions, while the nature of sanctions take two opposite approaches. Regarding the cybersecurity framework, the situation looks similarly misaligned. Japan’s main text of reference is the Basic Cybersecurity Act, while the European Union has a more fragmented legal structure (to name a few, Network and Information Security Directive, Critical Infrastructure Directive and Directive on the Attacks at Information Systems). On an relevant note, unlike a more industry-oriented European approach, the concept of cyber hygiene seems to be neatly embedded in the Japanese legal framework, with a number of provisions that alleviate operators’ liability by turning such a burden into a set of recommendations to be primarily observed by citizens. With respect to the reasons to fill such normative gaps, these are mostly grounded on three basis. Firstly, the cross-border nature of cybercrime brings to consider both magnitude of the issue and its regulatory stance globally. Secondly, empirical findings from the EUNITY project showed how recent data breaches and cyber-attacks had shared implications between Europe and Japan. Thirdly, the geopolitical context is currently going through the direction of bringing the two regions to significant agreements from a trade standpoint, but also from a data protection perspective (with an imminent signature by both parts of a so-called ‘Adequacy Decision’). The research conducted in this study reveals two asymmetric legal frameworks on cyber security and data protection. With a view to the future challenges presented by the strengthening of the collaboration between the two regions and the trans-national fashion of cybercrime, it is urged that solutions are found to fill in such gaps, in order to allow European Union and Japan to wisely increment their partnership.Keywords: cybersecurity, data protection, European Union, Japan
Procedia PDF Downloads 12327564 Developing a Culturally Adapted Family Intervention for Relatives Living with Schizophrenia in Oman
Authors: Aziza Al-Sawafi
Abstract:
Introduction: The evidence of family interventions in schizophrenia is robust primarily in high-income settings. However, they have been adapted to other settings and cultures to improve effectiveness and acceptability. In Oman, there is limited integration of psychosocial interventions in the treatment of schizophrenia. Therefore, the adaptation of family intervention to the Omani culture may facilitate its uptake. Most service users in Oman live with their families outside the healthcare system, and nothing is known about their experience, needs, or resources. Furthermore, understanding caregivers' and mental health professionals' preferences, perceptions, and experience is a fundamental element in the process of intervention development. Therefore, this study aims to develop a culturally sensitive, feasible, and acceptable family intervention for relatives living with schizophrenia in Oman. Method: The Medical Research Council's framework for the evaluation of complex health care interventions provided the conceptual structure for the study. The development phase was carried out, which involved three stages: 1) systematically reviewing the available literature regarding culturally adapted family interventions in the Arab world 2) In-depth interviews with caregivers to explore their experience and perceived needs and preferences regarding intervention 3) A focus group study involving health professionals to explore the acceptability and feasibility of delivering the family intervention in the Omani context. Data synthesis determined the design of the proposed intervention according to the findings obtained from the previous stages. Results: Stage one: The systematic review found limited evidence of culturally-adapted family interventions in the Arab region. However, the cultural adaptation process was comprehensive, and the implementation was reported to be feasible and acceptable. Stage two: The experience of family caregivers illuminated four main themes: burden, stigma, violence, and family needs. Burdens of care included objective and subjective burdens, positive feelings, and coping mechanisms. Caregivers gave their opinion about the content and preference of the intervention from their personal experiences. Stage three: mental health professionals discussed the delivery system of the intervention from a clinical standpoint concerning issues and barriers to implementation. They recommended modifications to the components of the intervention to ensure its acceptability and feasibility in the local setting. Data synthesis was carried out, and the intervention was designed. Conclusion: This study provides evidence of the potential applicability and acceptability of a culturally sensitive family intervention for families of individuals with schizophrenia in Oman. However, more work needs to be done to test the feasibility of the study and overcome the practical challenges.Keywords: cultural-adaptation, family intervention, Oman, schizophrenia
Procedia PDF Downloads 14627563 Investigating Transformative Processes through Personal, social, Professional and Educational Development of Adult Graduates in Second Chance Schools in Greece: a Quantitative and Qualitative Survey throughout the Country
Authors: Christina Kalogirou
Abstract:
The object of this research is to explore the views of Greek Second Chance Schools’ (SCS) graduates regarding their personal, social, professional and educational development after graduation. SCS are addressed to adults who had failed to complete their studies in the nine-year compulsory education. Furthermore, the research focuses on their motives as well as on any possible achievement of transformative processes. The quantitative survey involved in total 426 graduates while in the qualitative survey participated 38 persons, all of whom graduated in the period 2010-2012 from 27 schools throughout the country. The survey was conducted by filling in a structured questionnaire and by carrying out semi-structured interviews. As regards the results, the respondents decided to attend the SCS primarily to acquire knowledge while most of them feel that they managed to meet their goals. Also, graduates recognize that studying in SCS contributed primarily in their social and personal development. In addition, an encouraging fact is that some of the graduates recognize the transformative processes which they experienced during their studies in SCS.Keywords: Adults Education, Motives of Attendance, Personal-Social-Professional-Educational Development, Transformative Processes, Quantitative and Qualitative Survey
Procedia PDF Downloads 283