Search results for: healthcare data security
26053 Nursing-Related Barriers to Children’s Pain Management at Selected Hospitals in Ghana: A Descriptive Qualitative Study
Authors: Abigail Kusi Amponsah, Evans Frimpong Kyei, John Bright Agyemang, Hanson Boakye, Joana Kyei-Dompim, Collins Kwadwo Ahoto, Evans Oduro
Abstract:
Staff shortages, deficient knowledge, inappropriate attitudes, demanding workloads, analgesic shortages, and low prioritization of pain management have been identified in earlier studies as the nursing-related barriers to optimal children’s pain management. These studies have mainly been undertaken in developed countries, which have different healthcare dynamics than those in developing countries. The current study, therefore, sought to identify and understand the nursing-related barriers to children’s pain management in the Ghanaian context. A descriptive qualitative study was conducted among 28 purposively sampled nurses working in the pediatric units of five hospitals in the Ashanti region of Ghana. Over the course of three months, participants were interviewed on the barriers which prevented them from optimally managing children’s pain in practice. Recorded interviews were transcribed verbatim and deductively analysed based on a conceptual interest in pain assessment and management-related barriers. NVivo 12 plus software guided data management and analyses. The mean age of participating nurses was 30 years, with majority being females (n =24). Participants had worked in the nursing profession for an average of five years and in the pediatric care settings for an average of two years. The nursing-related barriers identified in the present study included communication difficulties in assessing and evaluating pain management interventions with children who have nonfunctional speech, insufficient training, misconceptions on the experience of pain in children, lack of assessment tools, and insufficient number of nurses to manage the workload and nurses’ inability to prescribe analgesics. The present study revealed some barriers which prevented Ghanaian nurses from optimally managing children’s pain. Nurses should be educated, empowered, and supported with the requisite material resources to effectively manage children’s pain and improve outcomes for families, healthcare systems, and the nation. Future studies should explore the facilitators and barriers from other stakeholders involved in pediatric pain managementKeywords: Nursing-Related Barriers, Children, Pain Management, Ghana
Procedia PDF Downloads 18926052 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations
Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang
Abstract:
Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security
Procedia PDF Downloads 36026051 Efficient Internal Generator Based on Random Selection of an Elliptic Curve
Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche
Abstract:
The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.Keywords: PRNG, security, cryptosystem, ECC
Procedia PDF Downloads 44726050 Mitigating Denial of Service Attacks in Information Centric Networking
Authors: Bander Alzahrani
Abstract:
Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network
Procedia PDF Downloads 19826049 The Need for Sustaining Hope during Communication of Unfavourable News in the Care of Children with Palliative Care Needs: The Experience of Mothers and Health Professionals in Jordan
Authors: Maha Atout, Pippa Hemingway, Jane Seymour
Abstract:
A preliminary systematic review shows that health professionals experience a tension when communicating with the parents and family members of children with life-threatening and life-limiting conditions. On the one hand, they want to promote open and honest communication, while on the other, they are apprehensive about fostering an unrealistic sense of hope. Defining the boundaries between information that might offer reasonable hope versus that which results in false reassurance is challenging. Some healthcare providers worry that instilling a false sense of hope could motivate parents to seek continued aggressive treatment for their child, which in turn might cause the patient further unnecessary suffering. To date, there has been a lack of research in the Middle East regarding how healthcare providers do or should communicate bad news; in particular, the issue of hope in the field of paediatric palliative care has not been researched thoroughly. This study aims to explore, from the perspective of patients’ mothers, physicians, and nurses, the experience of communicating and receiving bad news in the care of children with palliative care needs. Data were collected using a collective qualitative case study approach across three paediatric units in a Jordanian hospital. Two data collection methods were employed: participant observation and semi-structured interviews. The overall number of cases was 15, with a total of 56 interviews with mothers (n=24), physicians (n=12), and nurses (n=20) completed, as well as 197 observational hours logged. The findings demonstrate that mothers wanted their doctors to provide them with hopeful information about the future progression of their child’s illness. Although some mothers asked their doctors to provide them with honest information regarding the condition of their child, they still considered a sense of hope to be essential for coping with caring for their child. According to mothers, hope was critical to treatment as it helped them to stay committed to the treatment and protected them to some extent from the extreme emotional suffering that would occur if they lost hope. The health professionals agreed with the mothers on the importance of hope, so long as it was congruent with the stage and severity of each patient’s disease. The findings of this study conclude that while parents typically insist on knowing all relevant information when their child is diagnosed with a severe illness, they considered hope to be an essential part of life, and they found it very difficult to handle suffering without any glimmer of it. This study finds that using negative terms has extremely adverse effects on the parents’ emotions. Hence, although the mothers asked the doctors to be as honest as they could, they still wanted the physicians to provide them with a positive message by communicating this information in a sensitive manner including hope.Keywords: health professionals, children, communication, hope, information, mothers, palliative care
Procedia PDF Downloads 21826048 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 15226047 The Effect of Artificial Intelligence on the Production of Agricultural Lands and Labor
Authors: Ibrahim Makram Ibrahim Salib
Abstract:
Agriculture plays an essential role in providing food for the world's population. It also offers numerous benefits to countries, including non-food products, transportation, and environmental balance. Precision agriculture, which employs advanced tools to monitor variability and manage inputs, can help achieve these benefits. The increasing demand for food security puts pressure on decision-makers to ensure sufficient food production worldwide. To support sustainable agriculture, unmanned aerial vehicles (UAVs) can be utilized to manage farms and increase yields. This paper aims to provide an understanding of UAV usage and its applications in agriculture. The objective is to review the various applications of UAVs in agriculture. Based on a comprehensive review of existing research, it was found that different sensors provide varying analyses for agriculture applications. Therefore, the purpose of the project must be determined before using UAV technology for better data quality and analysis. In conclusion, identifying a suitable sensor and UAV is crucial to gather accurate data and precise analysis when using UAVs in agriculture.Keywords: agriculture land, agriculture land loss, Kabul city, urban land expansion, urbanization agriculture yield growth, agriculture yield prediction, explorative data analysis, predictive models, regression models drone, precision agriculture, farmer income
Procedia PDF Downloads 7826046 A Cross-Sectional Assessment of Maternal Food Insecurity in Urban Settings
Authors: Theresia F. Mrema, Innocent Semali
Abstract:
Food insecurity to pregnant women seriously impedes efforts to reduce maternal mortality in resource poor countries. This study was carried out to assess determinants food insecurity among pregnant women in urban areas. A cross sectional study design was used to collect data for the period of two weeks. A structured questionnaire with both closed and open ended questions was used to interview a total of 225 randomly selected pregnant women who attend the three randomly selected antenatal care clinics in Temeke Municipal council. The food insecurity was measured using a modified version of the USDA’s core food security module which consists of 15questions. Logistic regression analysis was used to obtain strength of association between dependent and independent variables. Among 225 pregnant women attending antenatal care (ANC) interviewed 55.1% were food insecure. Food insecurity declined with increasing household wealth, it was also significantly low among those with less than three children compared with having more. Low level of food insecurity was associated with having Secondary education (Adjusted OR=0.24; 95%CI, 0.12–0.48), College Education (OR=0.156; 95%CI, 0.05-0.46), paid employment (OR=0.322; 95%CI, 0.11-0.96) and high income (OR=0.031; 95%CI, 0.01–0.07). Also, having head of the household with secondary education (OR=0.51; 95%CI, 0.07-0.32) college education (OR=0.04; 95%CI, 0.01-0.13) and paid employment (OR=0.225; 95%CI, 0.12-0.42). Food insecurity is a significant problem among pregnant women in Temeke Municipal which might significantly affect health of the pregnant woman and foetus due to higher maternal malnutrition which increases risk of miscarriage, maternal and infant mortality, and poor pregnancy outcomes. The study suggests a multi-sectoral approach in order to address this problem.Keywords: food security, nutrition, pregnant women, urban settings
Procedia PDF Downloads 35726045 Usability and Biometric Authentication of Electronic Voting System
Authors: Nighat Ayub, Masood Ahmad
Abstract:
In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.Keywords: e-voting, security, usability, authentication
Procedia PDF Downloads 39626044 Fundamentals and Techniques of Organic Agriculture in Egypt
Authors: Moustafa Odah
Abstract:
Organic Agriculture is a new and sustainable agricultural system that depends on the use of organic materials from within the farm resulting from crop residues and animal husbandry and the cultivation of leguminous crops, away from the use of chemicals in fertilization or pest resistance, which leads to the production of safe, clean and healthy food products with nutritional value high and free of chemicals enhance food security; it is also an agricultural model preserve natural resources by improving the fertility and soil characteristics, and enhance biodiversity and biological cycles; additionally, they preserve the environment from pollution, which makes it play an important role in providing food needs of the present generations and the preservation of the rights of the coming generations to achieve sustainable development.Keywords: organic agriculture, food security and achieving sustainable development, fertilization or pest resistance, crop residues and animal husbandry and the cultivation of leguminous crops
Procedia PDF Downloads 8826043 Similarities and Differences in Values of Young Women and Their Parents: The Effect of Value Transmission and Value Change
Authors: J. Fryt, K. Pietras, T. Smolen
Abstract:
Intergenerational similarities in values may be effect of value transmission within families or socio-cultural trends prevailing at a specific point in time. According to salience hypothesis, salient family values may be transmitted more frequently. On the other hand, many value studies reveal that generational shift from social values (conservation and self-transcendence) to more individualistic values (openness to change and self-enhancement) suggest that value transmission and value change are two different processes. The first aim of our study was to describe similarities and differences in values of young women and their parents. The second aim was to determine which value similarities may be due to transmission within families. Ninety seven Polish women aged 19-25 and both their mothers and fathers filled in the Portrait Value Questionaire. Intergenerational similarities in values between women were found in strong preference for benevolence, universalism and self-direction as well as low preference for power. Similarities between younger women and older men were found in strong preference for universalism and hedonism as well as lower preference for security and tradition. Young women differed from older generation in strong preference for stimulation and achievement as well as low preference for conformity. To identify the origin of intergenerational similarities (whether they are the effect of value transmission within families or not), we used the comparison between correlations of values in family dyads (mother-daughter, father-daughter) and distribution of correlations in random intergenerational dyads (random mother-daughter, random father-daughter) as well as peer dyads (random daughter-daughter). Values representing conservation (security, tradition and conformity) as well as benevolence and power were transmitted in families between women. Achievement, power and security were transmitted between fathers and daughters. Similarities in openness to change (self-direction, stimulation and hedonism) and universalism were not stronger within families than in random intergenerational and peer dyads. Taken together, our findings suggest that despite noticeable generation shift from social to more individualistic values, we can observe transmission of parents’ salient values such as security, tradition, benevolence and achievement.Keywords: value transmission, value change, intergenerational similarities, differences in values
Procedia PDF Downloads 43026042 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security
Authors: Stanislaw Kosmynka
Abstract:
Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat
Procedia PDF Downloads 52726041 Benefits and Drawbacks of Robotic Firefighting
Authors: Mukhtar Ibrahim Bello, Ibrahim U. Aikawa, Abubakar Sadiq Muhammad, Muhammad Baballe Ahmad
Abstract:
These vital signs can be tracked by wearable sensors, which can also be used to assess patients' health. As a result, they can be very beneficial to patients and healthcare professionals in the diagnosis of diseases, particularly when it comes to taking a patient's body temperature in infectious disorders.Keywords: fire out-break, robots, saving, dangerous environments, impacts
Procedia PDF Downloads 9926040 IT and Security Experts' Innovation and Investment Front for IT-Entrepreneurship in Pakistan
Authors: Ahmed Mateen, Zhu Qingsheng, Muhammad Awais, Muhammad Yahya Saeed
Abstract:
This paper targets the rising factor of entrepreneurship innovation, which lacks in Pakistan as compared to the other countries or the regions like China, India, and Malaysia, etc. This is an exploratory and explanatory study. Major aspects have identified as the direction for the policymakers while highlighting the issues in true spirit. IT needs to be considered not only as a technology but also as itself growing as a new community. IT management processes are complex and broad, so generally requires extensive attention to the collective aspects of human variables, capital and technology. In addition, projects tend to have a special set of critical success factors, and if these are processed and given attention, it will improve the chances of successful implementation. This is only possible with state of the art intelligent decision support systems and accumulating IT staff to some extent in decision processes. This paper explores this issue carefully and discusses six issues to observe the implemented strength and possible enhancement.Keywords: security and defense forces, IT-incentives, big IT-players, IT-entrepreneurial-culture
Procedia PDF Downloads 22226039 The Limits of Charity: Advancing a Rights-based Justice Model to Remedy Poverty and Hunger
Authors: Tracy Smith-Carrier
Abstract:
In 1995, the World Health Organization declared that poverty was the biggest killer and the greatest cause of suffering in the world. Income is certainly a key social determinant of health, the lack of which causes innumerable health and mental health conditions. In seeking to provide relief from financial hardship for residents within their populace, states in the Global North have largely turned to the non-profit and charitable sector. The stigma and shame of accessing charity is a significant barrier for many, but what is more problematic is that the embrace of the charitable model has let governments off the hook from responding to their international human rights obligations. Although states are signatories to various human rights treaties and conventions internationally, many of these laws have not been implemented domestically. This presentation explores the limits of the charitable model in addressing poverty in countries of the Global North. Unlike in the ages passed, when poverty was thought to be an individual problem, we now know that poverty is largely systemic in nature. In this presentation, we will identify the structural determinants of poverty, outline why people are reticent to access charitable programs and services and how income security is reproduced through the charitable model, and discuss evidence-informed solutions, such as a basic income guarantee, to move beyond the charitable model in favour of a rights-based justice model. To move beyond charity, we must demand that governments recognize our fundamental human rights and address poverty and hunger using a justice model based on substantive human rights.Keywords: basic income, charity, poverty, income security, hunger, food security, social justice, human rights
Procedia PDF Downloads 11826038 Analysis of the Unmanned Aerial Vehicles’ Incidents and Accidents: The Role of Human Factors
Authors: Jacob J. Shila, Xiaoyu O. Wu
Abstract:
As the applications of unmanned aerial vehicles (UAV) continue to increase across the world, it is critical to understand the factors that contribute to incidents and accidents associated with these systems. Given the variety of daily applications that could utilize the operations of the UAV (e.g., medical, security operations, construction activities, landscape activities), the main discussion has been how to safely incorporate the UAV into the national airspace system. The types of UAV incidents being reported range from near sightings by other pilots to actual collisions with aircraft or UAV. These incidents have the potential to impact the rest of aviation operations in a variety of ways, including human lives, liability costs, and delay costs. One of the largest causes of these incidents cited is the human factor; other causes cited include maintenance, aircraft, and others. This work investigates the key human factors associated with UAV incidents. To that end, the data related to UAV incidents that have occurred in the United States is both reviewed and analyzed to identify key human factors related to UAV incidents. The data utilized in this work is gathered from the Federal Aviation Administration (FAA) drone database. This study adopts the human factor analysis and classification system (HFACS) to identify key human factors that have contributed to some of the UAV failures to date. The uniqueness of this work is the incorporation of UAV incident data from a variety of applications and not just military data. In addition, identifying the specific human factors is crucial towards developing safety operational models and human factor guidelines for the UAV. The findings of these common human factors are also compared to similar studies in other countries to determine whether these factors are common internationally.Keywords: human factors, incidents and accidents, safety, UAS, UAV
Procedia PDF Downloads 24626037 A Systematic Review Of Literature On The Importance Of Cultural Humility In Providing Optimal Palliative Care For All Persons
Authors: Roseanne Sharon Borromeo, Mariana Carvalho, Mariia Karizhenskaia
Abstract:
Healthcare providers need to comprehend cultural diversity for optimal patient-centered care, especially near the end of life. Although a universal method for navigating cultural differences would be ideal, culture’s high complexity makes this strategy impossible. Adding cultural humility, a process of self-reflection to understand personal and systemic biases and humbly acknowledging oneself as a learner when it comes to understanding another's experience leads to a meaningful process in palliative care generating respectful, honest, and trustworthy relationships. This study is a systematic review of the literature on cultural humility in palliative care research and best practices. Race, religion, language, values, and beliefs can affect an individual’s access to palliative care, underscoring the importance of culture in palliative care. Cultural influences affect end-of-life care perceptions, impacting bereavement rituals, decision-making, and attitudes toward death. Cultural factors affecting the delivery of care identified in a scoping review of Canadian literature include cultural competency, cultural sensitivity, and cultural accessibility. As the different parts of the world become exponentially diverse and multicultural, healthcare providers have been encouraged to give culturally competent care at the bedside. Therefore, many organizations have made cultural competence training required to expose professionals to the special needs and vulnerability of diverse populations. Cultural competence is easily standardized, taught, and implemented; however, this theoretically finite form of knowledge can dangerously lead to false assumptions or stereotyping, generating poor communication, loss of bonds and trust, and poor healthcare provider-patient relationship. In contrast, Cultural humility is a dynamic process that includes self-reflection, personal critique, and growth, allowing healthcare providers to respond to these differences with an open mind, curiosity, and awareness that one is never truly a “cultural” expert and requires life-long learning to overcome common biases and ingrained societal influences. Cultural humility concepts include self-awareness and power imbalances. While being culturally competent requires being skilled and knowledgeable in one’s culture, being culturally humble involves the sometimes-uncomfortable position of healthcare providers as students of the patient. Incorporating cultural humility emphasizes the need to approach end-of-life care with openness and responsiveness to various cultural perspectives. Thus, healthcare workers need to embrace lifelong learning in individual beliefs and values on suffering, death, and dying. There have been different approaches to this as well. Some adopt strategies for cultural humility, addressing conflicts and challenges through relational and health system approaches. In practice and research, clinicians and researchers must embrace cultural humility to advance palliative care practices, using qualitative methods to capture culturally nuanced experiences. Cultural diversity significantly impacts patient-centered care, particularly in end-of-life contexts. Cultural factors also shape end-of-life perceptions, impacting rituals, decision-making, and attitudes toward death. Cultural humility encourages openness and acknowledges the limitations of expertise in one’s culture. A consistent self-awareness and a desire to understand patients’ beliefs drive the practice of cultural humility. This dynamic process requires practitioners to learn continuously, fostering empathy and understanding. Cultural humility enhances palliative care, ensuring it resonates genuinely across cultural backgrounds and enriches patient-provider interactions.Keywords: cultural competency, cultural diversity, cultural humility, palliative care, self-awareness
Procedia PDF Downloads 6426036 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'
Authors: Arianna Vedaschi
Abstract:
This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.Keywords: radicalization, free speech, international terrorism, national security
Procedia PDF Downloads 20026035 Socio-Cultural Factors Influencing Adherence to Anti-Retroviral Therapy among HIV Patients in a University Teaching Hospital in South-Western Nigeria
Authors: Okunola Oluseye Ademola
Abstract:
The study investigated various socio-cultural factors influencing adherence to antiretroviral drugs among people living with HIV in a University Teaching Hospital in South-western Nigeria. The objectives are to examine the perception of people living with HIV/AIDS (PLWHA) of antiretroviral therapy (ART) in Obafemi Awolowo University Teaching Hospitals Complex, Ile-Ife, investigate the influence of socio-cultural factors on adherence of PLWHA to treatment regimen in the study area and assess the prevalence of adherence to ART among PLWHA in the study area. It was a cross-sectional where both qualitative and quantitative research methods were adopted. The participants were HIV diagnosed patients attending clinic at the Obafemi Awolowo University Teaching Hospitals Complex in Ile-Ife between the ages of 18 and 60 years. Also three healthcare delivery personnel working in the clinic were interviewed. Out of the 3007 patients receiving treatment, using Fischer’s formula of sampling technique, 336 patients living with HIV/AIDS were selected for the study. These participants had been on antiretroviral drugs for more than six months prior to the study and were selected using simple random sampling technique. Two focus group discussion sessions comprising of 10 male and 10 female living with HIV and currently on ART were conducted. These groups were purposively selected based on their being on ART for more than one year. Also in-depth interviews were conducted among three purposively selected healthcare givers (an experienced nurse, a doctor and a pharmacist) who are working in this clinic. All the participants were interviewed at the clinic on the various clinic days. Data were collected using a structured questionnaire, an interview guide and tape-recorder. The quantitative data were analysed using descriptive and inferential statistics. Content analysis was employed to analyse responses from IDI and FGD sessions. The findings from the study revealed a very positive perception to ART among PLWHA which was about 86.3% while the level of adherence to ART was 89.0% among the respondents. There was a very strong relationship between social and family supports and the degree of adherence to ART in the PLWHA. Nutrition, polygamy, difficulty in financing transportation fare to the clinic, unemployment, drug hawkers, religion, excuse duty from work and waking up very early were highlighted as socio-cultural barriers to adherence to ART. Fear of death, strong family support, religion belief, not seeking alternative treatment, absence of rituals and perceived improved health status were identified as very strong facilitators to adherence. The study concluded that to achieve a very optimal outcome in the management of HIV among PLWHA, various social and cultural contexts should be taken into consideration as this study was able to ascertain the influence of various socio-cultural factors militating and facilitating adherence to ART.Keywords: ART, HIV, PLWHA, socio-cultural
Procedia PDF Downloads 27926034 Effect of One-Period of SEAS Exercises on Some Spinal Biomechanical and Postural Parameters in the Students with Idiopathic Scoliosis
Authors: Zandi Ahmad, Sokhanguei Yahya, Saboonchi Reza
Abstract:
Objective: The new and modern lifestyle, especially in the twenty-first century and lack of movement in spinal structure have made patients and the physicians in the field of health and also other insurance companies in the developed and developing countries worry more than before about the abnormalities of spinal column- this great healthcare problem. The high prevalence of spinal column in all age groups -from children to adults- and in all professions have led the researchers to the idea of giving an opportunity to all those who worry about the dangers threatening the spinal column. Therefore, one of the corrective methods for these patients is using SEAS exercises. Materials and Methods: This study aims at investigating the effect of one-period of SEAS exercises on some spinal biomechanical and postural parameters in the students with idiopathic scoliosis. According to the nature of the study and research objectives as well as the data collection methods, the current research is a semi-empirical survey. The research population is comprised of students with idiopathic scoliosis. A total number of 30 students were selected using available sampling and divided into two groups of control and SEAS exercises. Scoliometer was used for data collection. Descriptive statistics were used to categorize the findings. Kolmogorov-Smirnov statistical models were used to confirm that the distribution of the data is normal and T-test was used for effectiveness. Hypothesis testing was done using SPSS21. Conclusion: Results show that SEAS exercises have a significant effect in Adam’s Test. Therefore, according to the obtained results, SEAS exercises can be used to recover idiopathic scoliosis among the students. Further studies in larger samples and treatment, periods as well as more follow-up investigations appear to be essential to prove these effects.Keywords: SEAS exercises, idiopathic scoliosis, Adam’s test, exercise
Procedia PDF Downloads 29326033 EcoMush: Mapping Sustainable Mushroom Production in Bangladesh
Authors: A. A. Sadia, A. Emdad, E. Hossain
Abstract:
The increasing importance of mushrooms as a source of nutrition, health benefits, and even potential cancer treatment has raised awareness of the impact of climate-sensitive variables on their cultivation. Factors like temperature, relative humidity, air quality, and substrate composition play pivotal roles in shaping mushroom growth, especially in Bangladesh. Oyster mushrooms, a commonly cultivated variety in this region, are particularly vulnerable to climate fluctuations. This research explores the climatic dynamics affecting oyster mushroom cultivation and, presents an approach to address these challenges and provides tangible solutions to fortify the agro-economy, ensure food security, and promote the sustainability of this crucial food source. Using climate and production data, this study evaluates the performance of three clustering algorithms -KMeans, OPTICS, and BIRCH- based on various quality metrics. While each algorithm demonstrates specific strengths, the findings provide insights into their effectiveness for this specific dataset. The results yield essential information, pinpointing the optimal temperature range of 13°C-22°C, the unfavorable temperature threshold of 28°C and above, and the ideal relative humidity range of 75-85% with the suitable production regions in three different seasons: Kharif-1, 2, and Robi. Additionally, a user-friendly web application is developed to support mushroom farmers in making well-informed decisions about their cultivation practices. This platform offers valuable insights into the most advantageous periods for oyster mushroom farming, with the overarching goal of enhancing the efficiency and profitability of mushroom farming.Keywords: climate variability, mushroom cultivation, clustering techniques, food security, sustainability, web-application
Procedia PDF Downloads 7326032 IoT Based Information Processing and Computing
Authors: Mannan Ahmad Rasheed, Sawera Kanwal, Mansoor Ahmad Rasheed
Abstract:
The Internet of Things (IoT) has revolutionized the way we collect and process information, making it possible to gather data from a wide range of connected devices and sensors. This has led to the development of IoT-based information processing and computing systems that are capable of handling large amounts of data in real time. This paper provides a comprehensive overview of the current state of IoT-based information processing and computing, as well as the key challenges and gaps that need to be addressed. This paper discusses the potential benefits of IoT-based information processing and computing, such as improved efficiency, enhanced decision-making, and cost savings. Despite the numerous benefits of IoT-based information processing and computing, several challenges need to be addressed to realize the full potential of these systems. These challenges include security and privacy concerns, interoperability issues, scalability and reliability of IoT devices, and the need for standardization and regulation of IoT technologies. Moreover, this paper identifies several gaps in the current research related to IoT-based information processing and computing. One major gap is the lack of a comprehensive framework for designing and implementing IoT-based information processing and computing systems.Keywords: IoT, computing, information processing, Iot computing
Procedia PDF Downloads 19126031 Machine Learning Approach for Anomaly Detection in the Simulated Iec-60870-5-104 Traffic
Authors: Stepan Grebeniuk, Ersi Hodo, Henri Ruotsalainen, Paul Tavolato
Abstract:
Substation security plays an important role in the power delivery system. During the past years, there has been an increase in number of attacks on automation networks of the substations. In spite of that, there hasn’t been enough focus dedicated to the protection of such networks. Aiming to design a specialized anomaly detection system based on machine learning, in this paper we will discuss the IEC 60870-5-104 protocol that is used for communication between substation and control station and focus on the simulation of the substation traffic. Firstly, we will simulate the communication between substation slave and server. Secondly, we will compare the system's normal behavior and its behavior under the attack, in order to extract the right features which will be needed for building an anomaly detection system. Lastly, based on the features we will suggest the anomaly detection system for the asynchronous protocol IEC 60870-5-104.Keywords: Anomaly detection, IEC-60870-5-104, Machine learning, Man-in-the-Middle attacks, Substation security
Procedia PDF Downloads 37126030 Unique Interprofessional Mental Health Education Model: A Pre/Post Survey
Authors: Michele L. Tilstra, Tiffany J. Peets
Abstract:
Interprofessional collaboration in behavioral healthcare education is increasingly recognized for its value in training students to address diverse client needs. While interprofessional education (IPE) is well-documented in occupational therapy education to address physical health, limited research exists on collaboration with counselors to address mental health concerns and the psychosocial needs of individuals receiving care. Counseling education literature primarily examines the collaboration of counseling students with psychiatrists, psychologists, social workers, and marriage and family therapists. This pretest/posttest survey research study explored changes in attitudes toward interprofessional teams among 56 Master of Occupational Therapy (MOT) (n = 42) and Counseling and Human Development (CHD) (n = 14) students participating in the Counselors and Occupational Therapists Professionally Engaged in the Community (COPE) program. The COPE program was designed to strengthen the behavioral health workforce in high-need and high-demand areas. Students accepted into the COPE program were divided into small MOT/CHD groups to complete multiple interprofessional multicultural learning modules using videos, case studies, and online discussion board posts. The online modules encouraged reflection on various behavioral healthcare roles, benefits of team-based care, cultural humility, current mental health challenges, personal biases, power imbalances, and advocacy for underserved populations. Using the Student Perceptions of Interprofessional Clinical Education- Revision 2 (SPICE-R2) scale, students completed pretest and posttest surveys using a 5-point Likert scale (Strongly Agree = 5 to Strongly Disagree = 1) to evaluate their attitudes toward interprofessional teamwork and collaboration. The SPICE-R2 measured three different factors: interprofessional teamwork and team-based practice (Team), roles/responsibilities for collaborative practice (Roles), and patient outcomes from collaborative practice (Outcomes). The mean total scores for all students improved from 4.25 (pretest) to 4.43 (posttest), Team from 4.66 to 4.58, Roles from 3.88 to 4.30, and Outcomes from 4.08 to 4.36. A paired t-test analysis for the total mean scores resulted in a t-statistic of 2.54, which exceeded both one-tail and two-tail critical values, indicating statistical significance (p = .001). When the factors of the SPICE-R2 were analyzed separately, only the Roles (t Stat=4.08, p =.0001) and Outcomes (t Stat=3.13, p = .002) were statistically significant. The item ‘I understand the roles of other health professionals’ showed the most improvement from a mean score for all students of 3.76 (pretest) to 4.46 (posttest). The significant improvement in students' attitudes toward interprofessional teams suggests that the unique integration of OT and CHD students in the COPE program effectively develops a better understanding of the collaborative roles necessary for holistic client care. These results support the importance of IPE through structured, engaging interprofessional experiences. These experiences are essential for enhancing students' readiness for collaborative practice and align with accreditation standards requiring interprofessional education in OT and CHD programs to prepare practitioners for team-based care. The findings contribute to the growing body of evidence supporting the integration of IPE in behavioral healthcare curricula to improve holistic client care and encourage students to engage in collaborative practice across healthcare settings.Keywords: behavioral healthcare, counseling education, interprofessional education, mental health education, occupational therapy education
Procedia PDF Downloads 4126029 Digital Platform of Crops for Smart Agriculture
Authors: Pascal François Faye, Baye Mor Sall, Bineta Dembele, Jeanne Ana Awa Faye
Abstract:
In agriculture, estimating crop yields is key to improving productivity and decision-making processes such as financial market forecasting and addressing food security issues. The main objective of this paper is to have tools to predict and improve the accuracy of crop yield forecasts using machine learning (ML) algorithms such as CART , KNN and SVM . We developed a mobile app and a web app that uses these algorithms for practical use by farmers. The tests show that our system (collection and deployment architecture, web application and mobile application) is operational and validates empirical knowledge on agro-climatic parameters in addition to proactive decision-making support. The experimental results obtained on the agricultural data, the performance of the ML algorithms are compared using cross-validation in order to identify the most effective ones following the agricultural data. The proposed applications demonstrate that the proposed approach is effective in predicting crop yields and provides timely and accurate responses to farmers for decision support.Keywords: prediction, machine learning, artificial intelligence, digital agriculture
Procedia PDF Downloads 8226028 Self-Government Health Policy Programs as a Form of Implementation of Public Health Tasks in Poland
Authors: T. Holecki, J. Wozniak-Holecka, K. Sobczyk
Abstract:
Development, implementation, and evaluation of the effects of health policy programs, resulting from the identified health needs and health status of residents, is the own task of all local government units in Poland. This is due to the obligation to provide access to healthcare services to all residents and the implementation of tasks in the field of health promotion based on specific legal acts. Until the end of 2016 local governments financed health policy programs only with their own funds. Currently, there are additional resources available from the public health insurance subsidising up to 80% of health policy programs costs in cities with a population under 5 thousand people and up to 40% in bigger cities. Changes in legal provisions do not translate automatically to increased involvement of local government units in the implementation of public health tasks. The main objective of the study was to assess the actual impact of the new legal regulation on financing local health policy programs on the engagement of local administration in this area of public health activity. To achieve this aim, we analyzed difference in the number of local governments developing and implementing health policy programs before and after the new law came into force. The aim of the study was also to estimate the level of expenditures incurred by self-government units and the National Health Fund to cover the costs of health policy programs. In the first stage of the project, legal acts concerning the subject of research and financial data published by the National Health Fund were analyzed. The material for the second, main stage of the study was the detailed financial data obtained from the National Health Fund and data obtained from local government units. The results present the situation in Poland in territorial terms, divided into 16 voivodships.Keywords: health care system, health policy programs, local self-governments, public health
Procedia PDF Downloads 15926027 Using Visualization Techniques to Support Common Clinical Tasks in Clinical Documentation
Authors: Jonah Kenei, Elisha Opiyo
Abstract:
Electronic health records, as a repository of patient information, is nowadays the most commonly used technology to record, store and review patient clinical records and perform other clinical tasks. However, the accurate identification and retrieval of relevant information from clinical records is a difficult task due to the unstructured nature of clinical documents, characterized in particular by a lack of clear structure. Therefore, medical practice is facing a challenge thanks to the rapid growth of health information in electronic health records (EHRs), mostly in narrative text form. As a result, it's becoming important to effectively manage the growing amount of data for a single patient. As a result, there is currently a requirement to visualize electronic health records (EHRs) in a way that aids physicians in clinical tasks and medical decision-making. Leveraging text visualization techniques to unstructured clinical narrative texts is a new area of research that aims to provide better information extraction and retrieval to support clinical decision support in scenarios where data generated continues to grow. Clinical datasets in electronic health records (EHR) offer a lot of potential for training accurate statistical models to classify facets of information which can then be used to improve patient care and outcomes. However, in many clinical note datasets, the unstructured nature of clinical texts is a common problem. This paper examines the very issue of getting raw clinical texts and mapping them into meaningful structures that can support healthcare professionals utilizing narrative texts. Our work is the result of a collaborative design process that was aided by empirical data collected through formal usability testing.Keywords: classification, electronic health records, narrative texts, visualization
Procedia PDF Downloads 11926026 Russian ‘Active Measures’: An Applicable Supporting Tool for Russia`s Foreign Policy Objectives in the 21st Century
Authors: Håkon Riiber
Abstract:
This paper explores the extent to which Russian ‘Active Measures’ play a role in contemporary Russian foreign policy and in what way the legacy of the Soviet Union is still apparent in these practices. The analysis draws on a set of case studies from the 21st century to examine these aspects, showing which ‘Active Measures’ features are old and which are new in the post-Cold War era. The paper highlights that the topic has gained significant academic and political interest in recent years, largely due to the aggressive posture of the Russian Federation on the world stage, exemplified through interventions in Estonia, Georgia, and Ukraine and interference in several democratic elections in the West. However, the paper argues that the long-term impact of these measures may have unintended implications for Russia. While Russia is unlikely to stop using Active Measures, increased awareness of the exploitation of weaknesses, institutions, or other targets may lead to greater security measures and an ability to identify and defend against these activities. The paper contends that Soviet-style ‘Active Measures’ from the Cold War era have been modernized and are now utilized to create an advantageous atmosphere for further exploitation to support contemporary Russian foreign policy. It offers three key points to support this argument: the reenergized legacy of the Cold War era, the use of ‘Active Measures’ in a number of cases in the 21st century, and the applicability of AM to the Russian approach to foreign policy. The analysis reveals that while this is not a new Russian phenomenon, it is still oversimplified and inaccurately understood by the West, which may result in a decreased ability to defend against these activities and limit the unwarranted escalation of the ongoing security situation between the West and Russia. The paper concludes that the legacy of Soviet-era Active Measures continues to influence Russian foreign policy, and modern technological advances have only made them more applicable to the current political climate. Overall, this paper sheds light on the important issue of Russian ‘Active Measures’ and the role they play in contemporary Russian foreign policy. It emphasizes the need for increased awareness, understanding, and security measures to defend against these activities and prevent further escalation of the security situation between the West and Russia.Keywords: Russian espionage, active measures, disinformation, Russian intelligence
Procedia PDF Downloads 10526025 World Agricultural Commodities Prices Dynamics and Volatilities Impacts on Commodities Importation and Food Security in West African Economic and Monetary Union Countries
Authors: Baoubadi Atozou, Koffi Akakpo
Abstract:
Since the decade 2000, the use of foodstuffs such as corn, wheat, and soybeans in biofuel production has been growing sharply in the United States, Canada, and Europe. Thus, prices for these agricultural products are rising in the world market. These cereals are the most important source of calorific energy for West African Economic and Monetary Union (WAEMU) countries members’ population. These countries are highly dependent on imports of most of these products. Thereby, rising prices can have an important impact on import levels and consequently on food security in these countries. This study aims to analyze the interrelationship between the prices of these commodities and their volatilities, and their effects on imports of these agricultural products by each WAEMU ’country member. The Autoregressive Distributed Lag (ARDL) model, the GARCH Multivariate model, and the Granger Causality Test are used in this investigation. The results show that import levels are highly and significantly sensitive to price changes as well as their volatility. In the short term as well as in the long term, there is a significant relationship between the prices of these products. There is a positive relationship in general between price volatility. And these volatilities have negative effects on the level of imports. The market characteristics affect food security in these countries, especially access to food for vulnerable and low-income populations. The policies makers must adopt viable strategies to increase agricultural production and limit their dependence on imports.Keywords: price volatility, import of agricultural products, food safety, WAEMU
Procedia PDF Downloads 19426024 Drug Therapy Problems and Associated Factors among Patients with Heart Failure in the Medical Ward of Arba Minch General Hospital, Ethiopia
Authors: Debalke Dale, Bezabh Geneta, Yohannes Amene, Yordanos Bergene, Mohammed Yimam
Abstract:
Background: A drug therapy problem (DTP) is an event or circumstance that involves drug therapies that actually or potentially interfere with the desired outcome and requires professional judgment to resolve. Heart failure is an emerging worldwide threat whose prevalence and health loss burden constantly increase, especially in the young and in low-to-middle-income countries. There is a lack of population-based incidence and prevalence of heart failure (HF) studies in sub-Saharan African countries, including Ethiopia. Objective: The aim of this study was designed to assess drug therapy problems and associated factors among patients with HF in the medical ward of Arba Minch General Hospital(AGH), Ethiopia, from June 5 to August 20, 2022. Methods: A retrospective cross-sectional study was conducted among 180 patients with HF who were admitted to the medical ward of AGH. Data were collected from patients' cards by using questionnaires. The data were categorized and analyzed by using SPSS version 25.0 software, and data were presented in tables and words based on the nature of the data. Result: Out of the total, 85 (57.6%) were females, and 113 (75.3%) patients were aged over fifty years. Of the 150 study participants, 86 (57.3%) patients had at least one DTP identified, and a total of 116 DTPs were identified, which is 0.77 DTPs per patient. The most common types of DTP were unnecessary drug therapy (32%), followed by the need for additional drug therapy (36%), and dose too low (15%). Patients who used polypharmacy were 5.86 (AOR) times more likely to develop DTPs than those who did not (95% CI = 1.625–16.536, P = 0.005), and patients with more co-morbid conditions developed 3.68 (AOR) times more DTPs than those who had fewer co-morbidities (95% CI = 1.28–10.5, P = 0.015). Conclusion: The results of this study indicated that drug therapy problems were common among medical ward patients with heart failure. These problems are adversely affecting the treatment outcomes of patients, so it requires the special attention of healthcare professionals to optimize them.Keywords: heart failure, drug therapy problems, Arba Minch general hospital, Ethiopia
Procedia PDF Downloads 110