Search results for: mobile financial services
6291 Impact of U.S. Insurance Reimbursement Policy on Healthcare Business and Entrepreneurship
Authors: Iris Xiaohong Quan, Sharon Qi, Kelly Tianqin Shi
Abstract:
This study focuses on the critical role of insurance policies in a world grappling with increasing mental health challenges, as they significantly influence the dynamics of healthcare businesses and entrepreneurial ventures. The paper utilizes the mental health sector as a case to examine the impact of insurance policies on healthcare service providers, entrepreneurs, and individuals seeking mental health support. This paper addressed the following research questions: To what extent do changes in insurance reimbursement policies affect the accessibility and affordability of mental health services for patients, and how does this impact the overall demand for such services? What are the barriers and opportunities that mental health entrepreneurs face and what strategies and adaptations do mental health businesses employ when navigating the evolving landscape of insurance reimbursement policies? How do changes in insurance reimbursement policies, specifically related to mental health services, influence the financial viability and sustainability of mental health clinics and private practices? Employing a self-designed survey aimed at autism spectrum disorder (ASD) treatment companies, alongside two in-depth case studies and an analysis of pertinent insurance policies and documents, this research aims to elucidate the multifaceted influence of insurance policies on the mental health industry. The findings from this study reveal how insurance policies shape the landscape of mental health businesses and their operations. A total of 821 autism treatment organizations or offices were contacted by telephone between November 1, 2019, and January 31, 2020. About half of the offices (53.33%) were established in the past five years, and 80% were established in the past 15 years. There is a significant increase in the establishment of ABA service centers in the recent two decades as a result of autism insurance reform, the increasing social awareness of ASD, and the redefinition of autism. In addition, almost half of the ABA service providers we surveyed had a patient size ranging from 20 to 50 in the year when the residence state passed the legislation for autism insurance coverage. On average, an ABA service provider works with 5.3 insurance companies. This research find that insurance is the main source of revenue for most ABA service providers. However, our survey reveals that clients’ out of pocket payment has been the second main revenue sources. Despite the changes of regulations and insurance policies in all states, clients still have to pay a fraction of, if not all, the ABA treatment service fees out of pocket. This research shows that some ABA service providers seek federal and government funds and grants to support their services and businesses. Our further analysis with the in-depth case studies and other secondary data also indicate the rise of entrepreneurial startups in the mental health industry. Overall, this research sheds light on both the challenges and opportunities presented by insurance policies in the mental health sector, offering insights into the new industry landscape.Keywords: entrepreneurship, healthcare policy, insurance policy, mental health industry
Procedia PDF Downloads 566290 Financial Capacity, Governance, and Corporate Engagement in Environmental Protection
Authors: Lubica Hikkerova, Jean-Michel Sahut
Abstract:
Environmental protection remains a global challenge but, since 2012, there has been a progressive decline in corporate engagement in environmental protection issues. This study seeks to investigate the role of financial capacity and governance in improving the level of environmental engagement of companies. The regression technique is applied to data on 351 large European companies from the ASSET4-ESG database for the 2007-2015 period. Firstly, the results show that the companies in the sample are fairly engaged in environmental protection, with a strong dispersion representing nearly four times the average. This means that the companies in the sample do not share the same level of engagement in matters of environmental protection, some being more committed than others. Secondly, the results reveal that the financial capacity of the company, as assessed through its indicators, has a significant effect on its level of environmental protection engagement in the present sample. This effect is more positive the higher the profits the company makes, and more negative the more heavily indebted or, the higher the rates of dividends it pays per share. Lastly, the results also show that a better quality of governance plays an important role in the decision to undertake actions leading to environmental protection. More specifically, the degree of management implication in the running of the business, the respect of the rights of the shareholders, the effectiveness of the control exerted by the board of directors, and, to a lesser extent, the independence of the audit committee, are variables which have a positive and significant influence on the level of environmental engagement of companies.Keywords: financial capacity, corporate governance, environmental engagement, stakeholder theory, theory of organizational legitimacy, theory of resources and capabilities
Procedia PDF Downloads 1876289 Clustering Based and Centralized Routing Table Topology of Control Protocol in Mobile Wireless Sensor Networks
Authors: Mbida Mohamed, Ezzati Abdellah
Abstract:
A strong challenge in the wireless sensor networks (WSN) is to save the energy and have a long life time in the network without having a high rate of loss information. However, topology control (TC) protocols are designed in a way that the network is divided and having a standard system of exchange packets between nodes. In this article, we will propose a clustering based and centralized routing table protocol of TC (CBCRT) which delegates a leader node that will encapsulate a single routing table in every cluster nodes. Hence, if a node wants to send packets to the sink, it requests the information's routing table of the current cluster from the node leader in order to root the packet.Keywords: mobile wireless sensor networks, routing, topology of control, protocols
Procedia PDF Downloads 2716288 Co-Creating Value between Public Financial Management Institutions: An Integrated Approach towards Financial Sustainability
Authors: Pascal Horni, Sandro Fuchs
Abstract:
In presence of increasing deficits and public debt among OECD countries, the debate on fiscal disciple and mechanisms to constrain public spending policy heated up and gave rise to the institutionalization of fiscal rules. Considering the notions from political economy literature and the therein advocated axiom of maximization of votes, introduction of institutional mechanisms and rules to govern public spending is likely to be coined by electoral motives. While there exists a series of research concerned with the rise of creative accounting in the presence fiscal rules, implementation of accrual government accounting and its impact on the biting of fiscal rules has to authors’ best knowledge never been explored. This paper serves the illumination of the connection between debt break mechanisms and the adoption of accrual public sector accounting standards such as the IPSAS in the interface of political economy in the Swiss context. By explicitly considering the technical accounting dimension, this paper develops an integrated conceptual view on well-established Public Financial Management (PFM) institutions and elaborates how their interdependencies can co-create value with regard to the contemporary challenge of fiscal sustainability. Derivation of this integrated view follows an explorative approach, taking into account expert interviews with director level staff from cantonal finance administrations and policy documents, as well as literature from both research areas – public sector accounting and political economy.Keywords: accounting, fiscal rules, International Public Sector Accounting Standards (IPSAS), public financial management
Procedia PDF Downloads 1596287 Measurement Tools of the Maturity Model for IT Service Outsourcing in Higher Education Institutions
Authors: Victoriano Valencia García, Luis Usero Aragonés, Eugenio J. Fernández Vicente
Abstract:
Nowadays, the successful implementation of ICTs is vital for almost any kind of organization. Good governance and ICT management are essential for delivering value, managing technological risks, managing resources and performance measurement. In addition, outsourcing is a strategic IT service solution which complements IT services provided internally in organizations. This paper proposes the measurement tools of a new holistic maturity model based on standards ISO/IEC 20000 and ISO/IEC 38500, and the frameworks and best practices of ITIL and COBIT, with a specific focus on IT outsourcing. These measurement tools allow independent validation and practical application in the field of higher education, using a questionnaire, metrics tables, and continuous improvement plan tables as part of the measurement process. Guidelines and standards are proposed in the model for facilitating adaptation to universities and achieving excellence in the outsourcing of IT services.Keywords: IT governance, IT management, IT services, outsourcing, maturity model, measurement tools
Procedia PDF Downloads 5896286 Social Influences on HIV Services Engagement among Sexual Minorities Experiencing Intersectional Stigma and Discrimination during COVID-19 Pandemic in Uganda
Authors: Simon Mwima, Evans Jennifer Mann, Agnes Nzomene, Edson Chipalo, Eusebius Small, Moses Okumu, Bosco Mukuba
Abstract:
Introduction: In Uganda, sexual minorities experience exacerbated intersectional stigma and discrimination that exposes them to elevated HIV infections and impedes access to HIV testing and PrEP with low treatment adherence. We contribute to the lack of information about sexual minorities living with HIV in Uganda by using modified social-ecological theory to explore social influences impacting HIV services engagement. Findings from focused group discussion (FGD) involving 31 sexual minorities, ages 18-25, recruited through urban HIV clinics in Kampala reveal the protective and promotive social influence within the individual and interpersonal relationships (sexual partners and peers). Further, inhibitive social influences were found within family, community, societal, and healthcare settings. During the COVID-19 pandemic, these adolescents strategically used promotive social influences to increase their engagement with HIV care services. Interviews were recorded in English, transcribed verbatim, and analyzed using Dedoose. Conclusions: The findings revealed that young people (identified as sexual minorities) strategically used promotive social influences and supported each other to improve engagement with HIV care in the context of restrictive laws in Uganda during the COVID-19-Pandemic. Future HIV prevention, treatment, and care responses could draw on how peers support each other to navigate the heavily criminalized and stigmatized settings to access healthcare services.Keywords: HIV/AIDS services, intersectional stigma, discrimination, adolescents, sexual minorities, COVID-19 pandemic Uganda
Procedia PDF Downloads 1206285 A Socio-Spatial Analysis of Financialization and the Formation of Oligopolies in Brazilian Basic Education
Authors: Gleyce Assis Da Silva Barbosa
Abstract:
In recent years, we have witnessed a vertiginous growth of large education companies. Daughters of national and world capital, these companies expand both through consolidated physical networks in the form of branches spread across the territory and through institutional networks such as business networks through mergers, acquisitions, creation of new companies and influence. They do this by incorporating small, medium and large schools and universities, teaching systems and other products and services. They are also able to weave their webs directly or indirectly in philanthropic circles, limited partnerships, family businesses and even in public education through various mechanisms of outsourcing, privatization and commercialization of products for the sector. Although the growth of these groups in basic education seems to us a recent phenomenon in peripheral countries such as Brazil, its diffusion is closely linked to higher education conglomerates and other sectors of the economy forming oligopolies, which began to expand in the 1990s with strong state support and through political reforms that redefined its role, transforming it into a fundamental agent in the formation of guidelines to boost the incorporation of neoliberal logic. This expansion occurred through the objectification of education, commodifying it and transforming students into consumer clients. Financial power combined with the neo-liberalization of state public policies allowed the profusion of social exclusion, the increase of individuals without access to basic services, deindustrialization, automation, capital volatility and the indetermination of the economy; in addition, this process causes capital to be valued and devalued at rates never seen before, which together generates various impacts such as the precariousness of work. Understanding the connection between these processes, which engender the economy, allows us to see their consequences in labor relations and in the territory. In this sense, it is necessary to analyze the geographic-economic context and the role of the facilitating agents of this process, which can give us clues about the ongoing transformations and the directions of education in the national and even international scenario since this process is linked to the multiple scales of financial globalization. Therefore, the present research has the general objective of analyzing the socio-spatial impacts of financialization and the formation of oligopolies in Brazilian basic education. For this, the survey of laws, data, and public policies on the subject in question was used as a methodology. As a methodology, the work was based on some data from these companies available on websites for investors. Survey of information from global and national companies that operate in Brazilian basic education. In addition to mapping the expansion of educational oligopolies using public data on the location of schools. With this, the research intends to provide information about the ongoing commodification process in the country. Discuss the consequences of the oligopolization of education, considering the impacts that financialization can bring to teaching work.Keywords: financialization, oligopolies, education, Brazil
Procedia PDF Downloads 646284 Smartphone Addiction and Reaction Time in Geriatric Population
Authors: Anjali N. Shete, G. D. Mahajan, Nanda Somwanshi
Abstract:
Context: Smartphones are the new generation of mobile phones; they have emerged over the last few years. Technology has developed so much that it has become part of our life and mobile phones are one of them. These smartphones are equipped with the capabilities to display photos, play games, watch videos and navigation, etc. The advances have a huge impact on many walks of life. The adoption of new technology has been challenging for the elderly. But, the elder population is also moving towards digitally connected lives. As age advances, there is a decline in the motor and cognitive functions of the brain, and hence the reaction time is affected. The study was undertaken to assess the usefulness of smartphones in improving cognitive functions. Aims and Objectives: The aim of the study was to observe the effects of smartphone addiction on reaction time in elderly population Material and Methods: This is an experimental study. 100 elderly subjects were enrolled in this study randomly from urban areas. They all were using smartphones for several hours a day. They were divided into two groups according to the scores of the mobile phone addiction scale (MPAS). Simple reaction time was estimated by the Ruler drop method. The reaction time was then calculated for each subject in both groups. The data were analyzed using mean, standard deviation, and Pearson correlation test. Results: The mean reaction time in Group A is 0.27+ 0.040 and in Group B is 0.20 + 0.032. The values show a statistically significant change in reaction time. Conclusion: Group A with a high MPAS score has a low reaction time compared to Group B with a low MPAS score. Hence, it can be concluded that the use of smartphones in the elderly is useful, delaying the neurological decline, and smarten the brain.Keywords: smartphones, MPAS, reaction time, elderly population
Procedia PDF Downloads 1766283 An Exploration of Cyberspace Security, Strategy for a New Era
Authors: Laxmi R. Kasaraneni
Abstract:
The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security
Procedia PDF Downloads 2946282 Surveying Adolescent Males in India Regarding Mobile Phone Use and Sexual and Reproductive Health Education
Authors: Rohan M. Dalal, Elena Pirondini, Shanu Somvanshi
Abstract:
Introduction: The current state of reproductive health outcomes in lower-income countries is poor, with inadequate knowledge and culture among adolescent boys. Moreover, boys have traditionally not been a priority target. To explore the opportunity to educate adolescent boys in the developing world regarding accurate reproductive health information, the purpose of this study is to investigate how adolescent boys in the developing world engage and use technology, utilizing cell phones. This electronic survey and video interview study were conducted to determine the feasibility of a mobile phone platform for an educational video game specifically designed for boys that will improve health knowledge, influence behavior, and change health outcomes, namely teen pregnancies. Methods: With the assistance of Plan India, a subsidiary of Plan International, informed consent was obtained from parents of adolescent males who participated in an electronic survey and video interviews via Microsoft Teams. An electronic survey was created with 27 questions, including topics of mobile phone usage, gaming preferences, and sexual and reproductive health, with a sample size of 181 adolescents, ages 11-25, near New Delhi, India. The interview questions were written to explore more in-depth topics after the completion of the electronic survey. Eight boys, aged 15, were interviewed for 40 minutes about gaming and usage of mobile phones as well as sexual and reproductive health. Data/Results. 154 boys and 27 girls completed the survey. They rated their English fluency as relatively high. 97% of boys (149/154) had access to mobile phones. The majority of phones were smartphones (97%, 143/148). 48% (71/149) of boys borrowed cell phones. The most popular phone platform was Samsung (22%, 33/148). 36% (54/148) of adolescent males looked at their phones 1-10 times per day for 1-2 hours. 55% (81/149) of the boys had parental restrictions. 51% (76/148) had 32 GB of storage on their phone. 78% (117/150) of the boys had wifi access. 80% (120/150) of respondents reported ease in downloading apps. 97% (145/150) of male adolescents had social media, including WhatsApp, Facebook, and YouTube. 58% (87/150) played video games. Favorite video games included Free Fire, PubG, and other shooting games. In the video interviews, the boys revealed what made games fun and engaging, including customized avatars, progression to higher levels, realistic interactive platforms, shooting/guns, the ability to perform multiple actions, and a variety of worlds/settings/adventures. Ideas to improve engagement in sexual and reproductive health classes included open discussions in the community, enhanced access to information, and posting on social media. Conclusion: This study involving an electronic survey and video interviews provides an initial foray into understanding mobile phone usage among adolescent males and understanding sexual and reproductive health education in New Delhi, India. The data gathered from this study support using mobile phone platforms, and this will be used to create a serious video game to educate adolescent males about sexual and reproductive health in an attempt to lower the rate of unwanted pregnancies in the world.Keywords: adolescent males, India, mobile phone, sexual and reproductive health
Procedia PDF Downloads 1286281 Comparing Quality of Care in Family Planning Services in Primary Public and Private Health Care Facilities in Ethiopia
Authors: Gizachew Assefa Tessema, Mohammad Afzal Mahmood, Judith Streak Gomersall, Caroline O. Laurence
Abstract:
Introduction: Improving access to quality family planning services is the key to improving health of women and children. However, there is currently little evidence on the quality and scope of family planning services provided by private facilities, and this compares to the services provided in public facilities in Ethiopia. This is important, particularly in determining whether the government should further expand the roles of the private sector in the delivery of family planning facility. Methods: This study used the 2014 Ethiopian Services Provision Assessment Plus (ESPA+) survey dataset for comparing the structural aspects of quality of care in family planning services. The present analysis used a weighted sample of 1093 primary health care facilities (955 public and 138 private). This study employed logistic regression analysis to compare key structural variables between public and private facilities. While taking the structural variables as an outcome for comparison, the facility type (public vs private) were used as the key exposure of interest. Results: When comparing availability of basic amenities (infrastructure), public facilities were less likely to have functional cell phones (AOR=0.12; 95% CI: 0.07-0.21), and water supply (AOR=0.29; 95% CI: 0.15-0.58) than private facilities. However, public facilities were more likely to have staff available 24 hours in the facility (AOR=0.12; 95% CI: 0.07-0.21), providers having family planning related training in the past 24 months (AOR=4.4; 95% CI: 2.51, 7.64) and possessing guidelines/protocols (AOR= 3.1 95% CI: 1.87, 5.24) than private facilities. Moreover, comparing the availability of equipment, public facilities had higher odds of having pelvic model for IUD demonstration (AOR=2.60; 95% CI: 1.35, 5.01) and penile model for condom demonstration (AOR=2.51; 95% CI: 1.32, 4.78) than private facilities. Conclusion: The present study suggests that Ethiopian government needs to provide emphasis towards the private sector in terms of providing family planning guidelines and training on family planning services for their staff. It is also worthwhile for the public health facilities to allocate funding for improving the availability of basic amenities. Implications for policy and/ or practice: This study calls policy makers to design appropriate strategies in providing opportunities for training a health care providers working in private health facility.Keywords: quality of care, family planning, public-private, Ethiopia
Procedia PDF Downloads 3526280 Importance of Ethics in Cloud Security
Authors: Pallavi Malhotra
Abstract:
This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education
Procedia PDF Downloads 3226279 External Sector and Its Impact on Economic Growth of Pakistan (1990-2010)
Authors: Rizwan Fazal
Abstract:
This study investigates the behavior of external sector of Pakistan economy and its impact on economic growth, using quarterly data for the period 1990:01-2010:04. External sector indices used in this study are financial integration, net foreign assets and trade integration. Augmented Ducky fuller confirms that all variables of external sector are non-stationary at level, but at first difference it becomes stationary. The co-integration test suggests one co-integrating variables in the study. The analysis is based on Vector Auto Regression model followed by Vector Error Correction Model. The empirical findings show that financial integration play important role in increasing economic growth in Pakistan economy while trade integration has negative effect on economic growth of Pakistan in the long run. However, the short run confirms that output lag accounts for error correction. The estimated CUSUM and CUSUMQ stability test provide information that the period of the study equation remains stable.Keywords: financial integration, trade integration, net foreign assets, gross domestic product
Procedia PDF Downloads 2706278 Efficient and Timely Mutual Authentication Scheme for RFID Systems
Authors: Hesham A. El Zouka, Mustafa M. Hosni ka
Abstract:
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature
Procedia PDF Downloads 2686277 Prioritizing Ecosystem Services for South-Central Regions of Chile: An Expert-Based Spatial Multi-Criteria Approach
Authors: Yenisleidy Martinez Martinez, Yannay Casas-Ledon, Jo Dewulf
Abstract:
The ecosystem services (ES) concept has contributed to draw attention to the benefits ecosystems generate for people and how necessary natural resources are for human well-being. The identification and prioritization of the ES constitute the first steps to undertake conservation and valuation initiatives on behalf of people. Additionally, mapping the supply of ES is a powerful tool to support decision making regarding the sustainable management of landscape and natural resources. In this context, the present study aimed to identify, prioritize and map the primary ES in Biobio and Nuble regions using a methodology that combines expert judgment, multi-attribute evaluation methods, and Geographic Information Systems (GIS). Firstly, scores about the capacity of different land use/cover types to supply ES and the importance attributed to each service were obtained from experts and stakeholders via an online survey. Afterward, the ES assessment matrix was constructed, and the weighted linear combination (WLC) method was applied to mapping the overall capacity of supply of provisioning, regulating and maintenance, and cultural services. Finally, prioritized ES for the study area were selected and mapped. The results suggest that native forests, wetlands, and water bodies have the highest supply capacities of ES, while urban and industrial areas and bare areas have a very low supply of services. On the other hand, fourteen out of twenty-nine services were selected by experts and stakeholders as the most relevant for the regions. The spatial distribution of ES has shown that the Andean Range and part of the Coastal Range have the highest ES supply capacity, mostly regulation and maintenance and cultural ES. This performance is related to the presence of native forests, water bodies, and wetlands in those zones. This study provides specific information about the most relevant ES in Biobio and Nuble according to the opinion of local stakeholders and the spatial identification of areas with a high capacity to provide services. These findings could be helpful as a reference by planners and policymakers to develop landscape management strategies oriented to preserve the supply of services in both regions.Keywords: ecosystem services, expert judgment, mapping, multi-criteria decision making, prioritization
Procedia PDF Downloads 1256276 Reducing Flood Risk in a Megacity: Using Mobile Application and Value Capture for Flood Risk Prevention and Risk Reduction Financing
Authors: Dedjo Yao Simon, Takahiro Saito, Norikazu Inuzuka, Ikuo Sugiyama
Abstract:
The megacity of Abidjan is a coastal urban area where the number of floods reported and the associated impacts are on a rapid increase due to climate change, an uncontrolled urbanization, a rapid population increase, a lack of flood disaster mitigation and citizens’ awareness. The objective of this research is to reduce in the short and long term period, the human and socio-economic impact of the flood. Hydrological simulation is applied on free of charge global spatial data (digital elevation model, satellite-based rainfall estimate, landuse) to identify the flood-prone area and to map the risk of flood. A direct interview to a sample residents is used to validate the simulation results. Then a mobile application (Flood Locator) is prototyped to disseminate the risk information to the citizen. In addition, a value capture strategy is proposed to mobilize financial resource for disaster risk reduction (DRRf) to reduce the impact of the flood. The town of Cocody in Abidjan is selected as a case study area to implement this research. The mapping of the flood risk reveals that population living in the study area is highly vulnerable. For a 5-year flood, more than 60% of the floodplain is affected by a water depth of at least 0.5 meters; and more than 1000 ha with at least 5000 buildings are directly exposed. The risk becomes higher for a 50 and 100-year floods. Also, the interview reveals that the majority of the citizen are not aware of the risk and severity of flooding in their community. This shortage of information is overcome by the Flood Locator and by an urban flood database we prototype for accumulate flood data. Flood Locator App allows the users to view floodplain and depth on a digital map; the user can activate the GPS sensor of the mobile to visualize his location on the map. Some more important additional features allow the citizen user to capture flood events and damage information that they can send remotely to the database. Also, the disclosure of the risk information could result to a decrement (-14%) of the value of properties locate inside floodplain and an increment (+19%) of the value of property in the suburb area. The tax increment due to the higher tax increment in the safer area should be captured to constitute the DRRf. The fund should be allocated to the reduction of flood risk for the benefit of people living in flood-prone areas. The flood prevention system discusses in this research will minimize in the short and long term the direct damages in the risky area due to effective awareness of citizen and the availability of DRRf. It will also contribute to the growth of the urban area in the safer zone and reduce human settlement in the risky area in the long term. Data accumulated in the urban flood database through the warning app will contribute to regenerate Abidjan towards the more resilient city by means of risk avoidable landuse in the master plan.Keywords: abidjan, database, flood, geospatial techniques, risk communication, smartphone, value capture
Procedia PDF Downloads 2896275 Cultural Boundaries and Mental Health Stigma: A Systemic Review of Interventions to Reduce Opposition of Mental Health Services in Asian American Families
Authors: Tanya L. Patimeteeporn, Murali D. Nair
Abstract:
There is a wide range of literature that suggests the factors that prevent Asian American families from utilizing mental health services. These factors arise from a combination of cultural perceptions of mental illness, and methods of treating them without the use of a mental health professional. Due to the increased awareness of Asian Americans’ stigmatization to mental health, there has been an effort to create culturally competent interventions for Asian American families that would reduce opposition to mental health services. Assessment of the effectiveness of these interventions reveals practices that integrate traditional healing methods with psychoeducation are more likely to promote receptiveness of mental health services by Asian American families. The documentary in this review, demonstrates these traditional healing methods from various ethnic enclaves in Los Angeles. In addition, mental health professionals who provide these interventions to Asian American families need to consider culture-bound syndromes and the various Asian health philosophies and belief systems in order to provide a culturally sensitive holistic treatment for their clients. However, because the literature on these interventions is limited, there is a need for a larger body of evidence to accurately assess the effectiveness of these culturally competent psychoeducation interventions.Keywords: Asian American, cultural boundaries, intervention, mental health stigma, psychoeducation, traditional healing
Procedia PDF Downloads 5466274 Improving the Quantification Model of Internal Control Impact on Banking Risks
Authors: M. Ndaw, G. Mendy, S. Ouya
Abstract:
Risk management in banking sector is a key issue linked to financial system stability and its importance has been elevated by technological developments and emergence of new financial instruments. In this paper, we improve the model previously defined for quantifying internal control impact on banking risks by automatizing the residual criticality estimation step of FMECA. For this, we defined three equations and a maturity coefficient to obtain a mathematical model which is tested on all banking processes and type of risks. The new model allows an optimal assessment of residual criticality and improves the correlation rate that has become 98%.Keywords: risk, control, banking, FMECA, criticality
Procedia PDF Downloads 3306273 A Unified Approach for Digital Forensics Analysis
Authors: Ali Alshumrani, Nathan Clarke, Bogdan Ghite, Stavros Shiaeles
Abstract:
Digital forensics has become an essential tool in the investigation of cyber and computer-assisted crime. Arguably, given the prevalence of technology and the subsequent digital footprints that exist, it could have a significant role across almost all crimes. However, the variety of technology platforms (such as computers, mobiles, Closed-Circuit Television (CCTV), Internet of Things (IoT), databases, drones, cloud computing services), heterogeneity and volume of data, forensic tool capability, and the investigative cost make investigations both technically challenging and prohibitively expensive. Forensic tools also tend to be siloed into specific technologies, e.g., File System Forensic Analysis Tools (FS-FAT) and Network Forensic Analysis Tools (N-FAT), and a good deal of data sources has little to no specialist forensic tools. Increasingly it also becomes essential to compare and correlate evidence across data sources and to do so in an efficient and effective manner enabling an investigator to answer high-level questions of the data in a timely manner without having to trawl through data and perform the correlation manually. This paper proposes a Unified Forensic Analysis Tool (U-FAT), which aims to establish a common language for electronic information and permit multi-source forensic analysis. Core to this approach is the identification and development of forensic analyses that automate complex data correlations, enabling investigators to investigate cases more efficiently. The paper presents a systematic analysis of major crime categories and identifies what forensic analyses could be used. For example, in a child abduction, an investigation team might have evidence from a range of sources including computing devices (mobile phone, PC), CCTV (potentially a large number), ISP records, and mobile network cell tower data, in addition to third party databases such as the National Sex Offender registry and tax records, with the desire to auto-correlate and across sources and visualize in a cognitively effective manner. U-FAT provides a holistic, flexible, and extensible approach to providing digital forensics in technology, application, and data-agnostic manner, providing powerful and automated forensic analysis.Keywords: digital forensics, evidence correlation, heterogeneous data, forensics tool
Procedia PDF Downloads 1946272 Examples of Techniques and Algorithms Used in Wlan Security
Authors: Vahid Bairami Rad
Abstract:
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security
Procedia PDF Downloads 5676271 Innovative Small and Medium Sized Firms: Intangible Investment and Financial Constraints - a Literature Review.
Authors: Eliane Abdo
Abstract:
Small and medium sized firms “SMEs” play essential role in the countries’ economic development mainly in terms of production, employment and equitable distribution of income. For innovative SMEs, the investment in the human capital and in research and development are crucial to survive in a competitive environment. In this paper we perform a literature review to underline the financing difficulties and constraints which innovative SMEs face while investing in intangible assets: not only when defining amount of the investments but also while choosing its financing methods. Literature review revealed that in order to finance their intangible assets, SMEs rely in first on their internal financing: the availability of internal cash flows can then determine their investment’s decision. Moreover SMEs face difficulties to finance their intangibles by financial debts due to the uncertainty of future cash flow and the absence of physical guarantees; they will therefore go for the issuance of new shares as a second choice, since innovative companies have high opportunity of growth that attract new shareholders.Keywords: small and medium sized firms, capital structure, intangible investment, financial constraints
Procedia PDF Downloads 1226270 Privatization and Ensuring Accountability in the Provision of Essential Services: A Case of Water in South Africa
Authors: Odufu Ifakachukwu Clifford
Abstract:
Developing country governments are struggling to meet the basic needs and demands of citizens, especially so for the rural poor. With tightly constrained budgets, these governments have followed the lead of developed countries that have sought to restructure public service delivery through privatization, contracting out, public-private partnerships, and similar reforms. Such reforms in service delivery are generally welcomed when it is believed that private sector partners are better equipped to provide certain services than are governments. With respect to basic and essential services, however, a higher degree of uncertainty and apprehension exists as the focus shifts from simply minimizing the costs of delivering services to broadening access to all citizens. The constitution stipulates that everyone has the right to have access to sufficient food and water. Affordable and/or subsidized water, then, is not a privilege but a basic right of all citizens. Citizens elect political representatives to serve in office, with their sole mandate being to provide for the needs of the citizenry. As governments pass on some amount of responsibility for service delivery to private businesses, these governments must be able to exercise control in order to account to the people for the work done by private partners. This paper examines the legislative and policy frameworks as well as the environment within which PPPs take place in South Africa and the extent to which accountability can be strengthened in this environment. Within the aforementioned backdrop of PPPs and accountability, the constricted focus area of the paper aims to assess the extent to which the provision of clean and safe consumable water in South Africa is sustainable, cost-effective in terms of provision, and affordable to all.Keywords: privatisation, accountability, essential services, government
Procedia PDF Downloads 656269 The Influence of the Institutional Environment in Increasing Wealth: The Case of Women Business Operators in a Rural Setting
Authors: S. Archsana, Vajira Balasuriya
Abstract:
In Trincomalee of Sri Lanka, a post-conflict area, resettlement projects and policy initiatives are taking place to improve the wealth of the rural communities through promoting economic activities by way of encouraging the rural women to opt to commence and operate Micro and Small Scale (MSS) businesses. This study attempts to identify the manner in which the institutional environment could facilitate these MSS businesses owned and operated by women in the rural environment. The respondents of this study are the beneficiaries of the Divi Neguma Development Training Program (DNDTP); a project designed to aid women owned MSS businesses, in Trincomalee district. 96 women business operators, who had obtained financing facilities from the DNDTP, are taken as the sample based on fixed interval random sampling method. The study reveals that primary challenges encountered by 82% of the women business operators are lack of initial capital followed by 71% initial market finding and 35% access to technology. The low level of education and language barriers are the constraints in accessing support agencies/service providers. Institutional support; specifically management and marketing services, have a significant relationship with wealth augmentation. Institutional support at the setting-up stage of businesses are thin whereas terms and conditions of the finance facilities are perceived as ‘too challenging’. Although diversification enhances wealth of the rural women business operators, assistance from the institutional framework to prepare financial reports that are required for business expansion is skinny. The study further reveals that institutional support is very much weak in terms of providing access to new technology and identifying new market networks. A mechanism that could facilitate the institutional framework to support the rural women business operators to access new technology and untapped market segments, and assistance in preparation of legal and financial documentation is recommended.Keywords: business facilitation, institutional support, rural women business operators, wealth augmentation
Procedia PDF Downloads 4376268 Deployment of Beyond 4G Wireless Communication Networks with Carrier Aggregation
Authors: Bahram Khan, Anderson Rocha Ramos, Rui R. Paulo, Fernando J. Velez
Abstract:
With the growing demand for a new blend of applications, the users dependency on the internet is increasing day by day. Mobile internet users are giving more attention to their own experiences, especially in terms of communication reliability, high data rates and service stability on move. This increase in the demand is causing saturation of existing radio frequency bands. To address these challenges, researchers are investigating the best approaches, Carrier Aggregation (CA) is one of the newest innovations, which seems to fulfill the demands of the future spectrum, also CA is one the most important feature for Long Term Evolution - Advanced (LTE-Advanced). For this purpose to get the upcoming International Mobile Telecommunication Advanced (IMT-Advanced) mobile requirements (1 Gb/s peak data rate), the CA scheme is presented by 3GPP, which would sustain a high data rate using widespread frequency bandwidth up to 100 MHz. Technical issues such as aggregation structure, its implementations, deployment scenarios, control signal techniques, and challenges for CA technique in LTE-Advanced, with consideration of backward compatibility, are highlighted in this paper. Also, performance evaluation in macro-cellular scenarios through a simulation approach is presented, which shows the benefits of applying CA, low-complexity multi-band schedulers in service quality, system capacity enhancement and concluded that enhanced multi-band scheduler is less complex than the general multi-band scheduler, which performs better for a cell radius longer than 1800 m (and a PLR threshold of 2%).Keywords: component carrier, carrier aggregation, LTE-advanced, scheduling
Procedia PDF Downloads 1986267 Adopting Cloud-Based Techniques to Reduce Energy Consumption: Toward a Greener Cloud
Authors: Sandesh Achar
Abstract:
The cloud computing industry has set new goals for better service delivery and deployment, so anyone can access services such as computation, application, and storage anytime. Cloud computing promises new possibilities for approaching sustainable solutions to deploy and advance their services in this distributed environment. This work explores energy-efficient approaches and how cloud-based architecture can reduce energy consumption levels amongst enterprises leveraging cloud computing services. Adopting cloud-based networking, database, and server machines provide a comprehensive means of achieving the potential gains in energy efficiency that cloud computing offers. In energy-efficient cloud computing, virtualization is one aspect that can integrate several technologies to achieve consolidation and better resource utilization. Moreover, the Green Cloud Architecture for cloud data centers is discussed in terms of cost, performance, and energy consumption, and appropriate solutions for various application areas are provided.Keywords: greener cloud, cloud computing, energy efficiency, energy consumption, metadata tags, green cloud advisor
Procedia PDF Downloads 846266 Sexual and Reproductive Health through a Screen
Authors: Sohayla Khaled El Fakahany
Abstract:
Cultural and structural limitations and conservative social norms have direct effects on the availability of sources of sexual and reproductive health and rights (SRHR) in the Arab Region. Nevertheless, SRHR advocates, healthcare providers, and organizations have created online spaces like websites, blogs, and social media platforms to increase people’s access and ability to share information, experiences, and services. While these efforts help increase the accessibility to information and services, they also create and reflect inequalities based on limited internet access. Furthermore, these emergent ways of sharing and raising awareness online cannot be seen as a substitute for the urgent need for public healthcare systems and services to address SRHR issues in Arab states. This research aims to analyze the impact of the increasing importance of the role of social media platforms and technologies in the dissemination of SRHR-related information online to the youth as well as the associated inequalities of access. It also seeks to assess the effects and inequalities of the dependence on online platforms, which should be complementary to public and private SRHR services. The theoretical framework adopts Asef Bayat’s concept of social non-movements to analyze how collective mobilization around SRHR issues is exercised in repressive and conservative settings in the Arab region. Using digital ethnography of four prominent digital platforms and a qualitative survey of people aged 18-30 years, the research draws attention to the urgent need for better access to knowledge and services around gender, bodily autonomy, and sexual and reproductive health in the Arab region.Keywords: sexual and reproductive health and rights, social non-movements, digital platforms, Arab region
Procedia PDF Downloads 776265 A Study on Personnel Commitment Factors in Hafes Hospital
Authors: Farzaneh Bayat
Abstract:
Successful and effective presence in regional and global markets along with optimal use of available utilities and proper utilization of new sources for offering desirable services based on customer satisfaction is inevitable. Commitment has a significant role in offering optimal services. Offering high quality job and desirable services to the customers are personnel’s commitment. Thus, Shiraz Chamran Hospital which is affiliated with Shiraz Medical School and is one of the orthopedic poles in southern Iran was studied. This hospital has 750 personnel and physicians which a sample of 200 of them were chosen as the statistic society for a 5 month period from June to November 2009. Main variables in this decision are: responsibility and responsiveness, job security, team work, task autonomy, gradation opportunity, information sharing, payments and commitment. The study approach is descriptive-correlative. With applied and segmental nature of the tests and statistic analysis, the 7 hypotheses were approved with 95% of certainty.Keywords: commitment, information sharing, responsibility and responsiveness, job security, task autonomy
Procedia PDF Downloads 3376264 Analysis of Universal Mobile Telecommunications Service (UMTS) Planning Using High Altitude Platform Station (HAPS)
Authors: Yosika Dian Komala, Uke Kurniawan Usman, Yuyun Siti Rohmah
Abstract:
The enable technology fills up needs of high-speed data service is Universal Mobile Telecommunications Service (UMTS). UMTS has a data rate up to 2Mbps.UMTS terrestrial system has a coverage area about 1-2km. High Altitude Platform Station (HAPS) can be built by a macro cell that is able to serve the wider area. Design method of UMTS using HAPS is planning base on coverage and capacity. The planning method is simulated with 2.8.1 Atoll’s software. Determination of radius of the cell based on the coverage uses free space loss propagation model. While the capacity planning to determine the average cell through put is available with the Offered Bit Quantity (OBQ).Keywords: UMTS, HAPS, coverage planning, capacity planning, signal level, Ec/Io, overlapping zone, throughput
Procedia PDF Downloads 6386263 Disability and Sexuality: A Human Right Approach to Sexual and Reproductive Health of the Hearing-Impaired Adolescents in Developing Countries
Authors: Akanle Florence Foluso
Abstract:
Access to health care and people’s ability to have a responsible, satisfying and safe sexual life is clearly a defined human right of people with hearing impairment and others with disabilities. This paper investigates the extent to which the hearing impaired have a satisfying, safe sexual life and whether their human right in regard to information and education is violated. The study population consists of all hearing-impaired adolescents and young adults aged 10-24 years who are currently enrolled in primary and secondary schools in Nigeria. A sample of 389 hearing-impaired adolescents was selected, and an adapted version of the illustrative questionnaire for interview - survey by John Cleland was used to collect the data. A correlation of 0.80 was obtained at a P<0.05 level of significance. Teachers in the school of the deaf who used sign language were used in the administration of the questionnaire. The data generated were analyzed using Frequency counts. Summary of responses on access to information, education, voluntary testing, counseling and reproductive services. This is to be violated or protected. Findings show that a gap exists in the level of knowledge of SRH services and voluntary counseling because more than half the respondents are not aware of these services in their community. Access to information, education and health services are rights denied to the hearing impaired. So, their rights are violated.Keywords: sexuality, gender, reproductive health, human right
Procedia PDF Downloads 576262 Some Tips for Increasing Online Services Safety
Authors: Mohsen Rezaee
Abstract:
Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.Keywords: firewalls, security, web services, computer science
Procedia PDF Downloads 403