Search results for: online threats
1528 Enhancing Healthcare Data Protection and Security
Authors: Joseph Udofia, Isaac Olufadewa
Abstract:
Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.Keywords: cloud security, healthcare, cybersecurity, policy and standard
Procedia PDF Downloads 901527 Screening for Women with Chorioamnionitis: An Integrative Literature Review
Authors: Allison Herlene Du Plessis, Dalena (R.M.) Van Rooyen, Wilma Ten Ham-Baloyi, Sihaam Jardien-Baboo
Abstract:
Introduction: Women die in pregnancy and childbirth for five main reasons—severe bleeding, infections, unsafe abortions, hypertensive disorders (pre-eclampsia and eclampsia), and medical complications including cardiac disease, diabetes, or HIV/AIDS complicated by pregnancy. In 2015, WHO classified sepsis as the third highest cause for maternal mortalities in the world. Chorioamnionitis is a clinical syndrome of intrauterine infection during any stage of the pregnancy and it refers to ascending bacteria from the vaginal canal up into the uterus, causing infection. While the incidence rates for chorioamnionitis are not well documented, complications related to chorioamnionitis are well documented and midwives still struggle to identify this condition in time due to its complex nature. Few diagnostic methods are available in public health services, due to escalated laboratory costs. Often the affordable biomarkers, such as C-reactive protein CRP, full blood count (FBC) and WBC, have low significance in diagnosing chorioamnionitis. A lack of screening impacts on effective and timeous management of chorioamnionitis, and early identification and management of risks could help to prevent neonatal complications and reduce the subsequent series of morbidities and healthcare costs of infants who are health foci of perinatal infections. Objective: This integrative literature review provides an overview of current best research evidence on the screening of women at risk for chorioamnionitis. Design: An integrative literature review was conducted using a systematic electronic literature search through EBSCOhost, Cochrane Online, Wiley Online, PubMed, Scopus and Google. Guidelines, research studies, and reports in English related to chorioamnionitis from 2008 up until 2020 were included in the study. Findings: After critical appraisal, 31 articles were included. More than one third (67%) of the literature included ranked on the three highest levels of evidence (Level I, II and III). Data extracted regarding screening for chorioamnionitis was synthesized into four themes, namely: screening by clinical signs and symptoms, screening by causative factors of chorioamnionitis, screening of obstetric history, and essential biomarkers to diagnose chorioamnionitis. Key conclusions: There are factors that can be used by midwives to identify women at risk for chorioamnionitis. However, there are a paucity of established sociological, epidemiological and behavioral factors to screen this population. Several biomarkers are available to diagnose chorioamnionitis. Increased Interleukin-6 in amniotic fluid is the better indicator and strongest predictor of histological chorioamnionitis, whereas the available rapid matrix-metalloproteinase-8 test requires further testing. Maternal white blood cells count (WBC) has shown poor selectivity and sensitivity, and C-reactive protein (CRP) thresholds varied among studies and are not ideal for conclusive diagnosis of subclinical chorioamnionitis. Implications for practice: Screening of women at risk for chorioamnionitis by health care providers providing care for pregnant women, including midwives, is important for diagnosis and management before complications arise, particularly in resource-constraint settings.Keywords: chorioamnionitis, guidelines, best evidence, screening, diagnosis, pregnant women
Procedia PDF Downloads 1221526 The Role of Personality Type as Predictor of Trust among Ridesharing Community: Study in Nebengers Community Jakarta
Authors: Firdaus Amri, Ima Sri Rahmani
Abstract:
Traffic jam becomes the main problem among the people in a metropolitan city, especially in Indonesia. Nebengers, as one of ridesharing community in Indonesia, offer solutions against this problem. Nebengers is a social media community that connect people who want to give the ride and who want to ask for the ride. But in reality, Nebengers still have quite problems, especially regarding the safety issue. Practically, in this issue, they (people in Nebengers) only depend on trust between the one who gives the ride and who asks for the ride. Trust is defined as an expectation that partners, including potential partners, have goodwill and benign intent in their dealing with one and another. This paper will examine the role of personality type as predictor of trust among Nebengers community. Hexaco Personality consists of six dimensions (honesty-humility, emotionality, agreeableness, conscientiousness, extraversion, and openness to experience) is used in this research. By using snowball sampling, we took 250 respondents from Nebengers community as participants for this research. They complete questionnaires which are provided in online form. The role of each personality type as a basic analysis to understand trust among Nebengers community will be discussed in this research.Keywords: Nebengers, personality type, ridesharing, trust
Procedia PDF Downloads 3581525 Different Cognitive Processes in Selecting Spatial Demonstratives: A Cross-Linguistic Experimental Survey
Authors: Yusuke Sugaya
Abstract:
Our research conducts a cross-linguistic experimental investigation into the cognitive processes involved in distance judgment necessary for selecting demonstratives in deictic usage. Speakers may consider the addressee's judgment or apply certain criteria for distance judgment when they produce demonstratives. While it can be assumed that there are language and cultural differences, it remains unclear how these differences manifest across languages. This research conducted online experiments involving speakers of six languages—Japanese, Spanish, Irish, English, Italian, and French—in which a wide variety of drawings were presented on a screen, varying conditions from three perspectives: addressee, comparisons, and standard. The results of the experiments revealed various distinct features associated with demonstratives in each language, highlighting differences from a comparative standpoint. For one thing, there was an influence of a specific reference point (i.e., Standard) on the selection in Japanese and Spanish, whereas there was relatively an influence of competitors in English and Italian.Keywords: demonstratives, cross-linguistic experiment, distance judgment, social cognition
Procedia PDF Downloads 501524 On Developing a Core Guideline for English Language Training Programs in Business Settings
Authors: T. Ito, K. Kawaguchi, R. Ohta
Abstract:
The purpose of this study is to provide a guideline to assist globally-minded companies in developing task-based English-language programs for their employees. After conducting an online self-assessment questionnaire comprised of 45 job-related tasks, we analyzed responses received from 3,000 Japanese company employees and developed a checklist that considered three areas: (i) the percentage of those who need to accomplish English-language tasks in their workplace (need for English), (ii) a five-point self-assessment score (task performance level), and (iii) the impact of previous task experience on perceived performance (experience factor). The 45 tasks were graded according to five proficiency levels. Our results helped us to create a core guideline that may assist companies in two ways: first, in helping determine which tasks employees with a certain English proficiency should be able to satisfactorily carry out, and secondly, to quickly prioritize which business-related English skills they would need in future English language programs.Keywords: business settings, can-do statements, English language training programs, self-assessment, task experience
Procedia PDF Downloads 2501523 Supply Chain Resilience Strategies and Their Impact on Supply Chain Sustainability of the Export-oriented Apparel Industry in Sri Lanka
Authors: Anuradha Ranawakage, Nimalashanithi Amarasekara
Abstract:
Supply chain resilience and sustainability have received great attention from both academia and business professionals since last few decades. However, the relationship between supply chain resilience and sustainability has not been empirically tested in the apparel industry, where both concepts play a crucial role. Thus, this study aims to investigate how supply chain resilience strategies (digital connectivity, inventory and reserve capacity, and collaboration) impact the supply chain sustainability of export-oriented apparel manufacturing companies in Sri Lanka. An online questionnaire was used to collect data on the impact of supply chain resilience strategies on the supply chain sustainability of 99 apparel companies operating in Sri Lanka. This research makes a significant contribution to the field of supply chain management by assessing the impact of supply chain resilience strategies on supply chain sustainability in the context of the developing country, Sri Lanka, where economic crises and the pandemic have had a profound impact on the apparel industry. The findings have important theoretical and managerial implications for maintaining congruence between supply chain resilience and supply chain sustainability in the long run.Keywords: supply chain resilience, supply chain sustainability, apparel, supply chain
Procedia PDF Downloads 201522 Exploring Emerging Viruses From a Protected Reserve
Authors: Nemat Sokhandan Bashir
Abstract:
Threats from viruses to agricultural crops could be even larger than the losses caused by the other pathogens because, in many cases, the viral infection is latent but crucial from an epidemic point of view. Wild vegetation can be a source of many viruses that eventually find their destiny in crop plants. Although often asymptomatic in wild plants due to adaptation, they can potentially cause serious losses in crops. Therefore, exploring viruses in wild vegetation is very important. Recently, omics have been quite useful for exploring plant viruses from various plant sources, especially wild vegetation. For instance, we have discovered viruses such as Ambrossia asymptomatic virus I (AAV-1) through the application of metagenomics from Oklahoma Prairie Reserve. Accordingly, extracts from randomly-sampled plants are subjected to high speed and ultracentrifugation to separated virus-like particles (VLP), then nucleic acids in the form of DNA or RNA are extracted from such VLPs by treatment with phenol—chloroform and subsequent precipitation by ethanol. The nucleic acid preparations are separately treated with RNAse or DNAse in order to determine the genome component of VLPs. In the case of RNAs, the complementary cDNAs are synthesized before submitting to DNA sequencing. However, for VLPs with DNA contents, the procedure would be relatively straightforward without making cDNA. Because the length of the nucleic acid content of VPLs can be different, various strategies are employed to achieve sequencing. Techniques similar to so-called "chromosome walking" may be used to achieve sequences of long segments. When the nucleotide sequence data were obtained, they were subjected to BLAST analysis to determine the most related previously reported virus sequences. In one case, we determined that the novel virus was AAV-l because the sequence comparison and analysis revealed that the reads were the closest to the Indian citrus ringspot virus (ICRSV). AAV—l had an RNA genome with 7408 nucleotides in length and contained six open reading frames (ORFs). Based on phylogenies inferred from the replicase and coat protein ORFs of the virus, it was placed in the genus Mandarivirus.Keywords: wild, plant, novel, metagenomics
Procedia PDF Downloads 761521 Petai Chips as an Antioxidant Chips from Indonesia
Authors: R. S. Fisca, Y. R. Elox, L. Umi, U. Z. Luttfia, Kun Harismah
Abstract:
Petai (Parkia speciosa) is a plant indigenous to Southeast Asia. It is consumed either raw or cooked. It has been used in folk medicine to treat diabetes, hypertension, and kidney problems. It contains minerals and vitamins. Petai contains a lot of chemical compounds that are beneficial for health, including antioxidants, Vitamin B6 0,9mg, energy 142 g. cal, 10.4 g protein. 2 g fat, 22 g carbohydrates, 95 mg calcium, phosphorus 115 mg, 1 mg iron, 200 IU of vitamin A, vitamin B1 0.17 mg, 36 mg of vitamin C that can resolve various health problems. These chips are the result of innovation from petai packaged in such a way becomes a tasty snack chips and can be enjoyed by many people to relax and also nutritious for health. In the manufacture of petai chips require several steps of them start by boiling, flating, drying and the last frying. In introducing the products widely we sell petai chips with several methods. Some of these methods include direct sales, delivery order, online/social media, and open some booth at a few places and the car free day in Solo every sunday. Opportunity in selling petai chips is very wide because there is no competitors with similar business. With the innovation of petai chips become healthy snacks can be introduced to the public and can even be exported out of the country as one of the extraordinary snacks from Indonesia.Keywords: antioxidants, chips, healty, petai
Procedia PDF Downloads 5641520 BFDD-S: Big Data Framework to Detect and Mitigate DDoS Attack in SDN Network
Authors: Amirreza Fazely Hamedani, Muzzamil Aziz, Philipp Wieder, Ramin Yahyapour
Abstract:
Software-defined networking in recent years came into the sight of so many network designers as a successor to the traditional networking. Unlike traditional networks where control and data planes engage together within a single device in the network infrastructure such as switches and routers, the two planes are kept separated in software-defined networks (SDNs). All critical decisions about packet routing are made on the network controller, and the data level devices forward the packets based on these decisions. This type of network is vulnerable to DDoS attacks, degrading the overall functioning and performance of the network by continuously injecting the fake flows into it. This increases substantial burden on the controller side, and the result ultimately leads to the inaccessibility of the controller and the lack of network service to the legitimate users. Thus, the protection of this novel network architecture against denial of service attacks is essential. In the world of cybersecurity, attacks and new threats emerge every day. It is essential to have tools capable of managing and analyzing all this new information to detect possible attacks in real-time. These tools should provide a comprehensive solution to automatically detect, predict and prevent abnormalities in the network. Big data encompasses a wide range of studies, but it mainly refers to the massive amounts of structured and unstructured data that organizations deal with on a regular basis. On the other hand, it regards not only the volume of the data; but also that how data-driven information can be used to enhance decision-making processes, security, and the overall efficiency of a business. This paper presents an intelligent big data framework as a solution to handle illegitimate traffic burden on the SDN network created by the numerous DDoS attacks. The framework entails an efficient defence and monitoring mechanism against DDoS attacks by employing the state of the art machine learning techniques.Keywords: apache spark, apache kafka, big data, DDoS attack, machine learning, SDN network
Procedia PDF Downloads 1681519 Tourism Qualification and Academics' Opinions about the Influence of Employability Skills on Graduates' Ability to Secure Jobs in the Tourism Industry
Authors: Nicola Wakelin-Theron
Abstract:
This study focuses on higher education institutions in South Africa, with the view to understanding how tourism as a study discipline has evolved over the years, as well as the influence of employability skills on graduates’ ability to secure jobs in the tourism industry. Indeed, the employability landscape is becoming more complex; hence, it is imperative for higher education institutions to equip students with employability skills while going through their academic programmes and during their transition from higher education to the world of work. Employability – which is regarded as an empowerment mechanism and a key to job security – is a set of achievements which increases the probability for graduates to find and maintain employment. A quantitative research method was used to obtain the necessary information. Data were collected through a web-based, online survey questionnaire directed to academics from various public higher education institutions in South Africa that offer tourism as a qualification. The key findings revealed that academics are of the opinion that there are 5 skills that are influential in obtaining a position within the tourism industry.Keywords: employability, industry skills, tourism industry, tourism qualification
Procedia PDF Downloads 4111518 Relationship Quality, Value Creation Practices and Brand Loyalty in Virtual Communities: Evidence from Facebook Communities
Authors: Zoya Khan, Amina Muzaffar
Abstract:
Social media based brand communities are communities that are developed around a brand. In the highly globalized world of today, Facebook is undoubtedly being regarded and has been widely recognized as a trendy and well-accepted medium of marketing. By means of a Facebook fan page, organizations can effectually create, enhance, and sustain customer-brand relationship. In this article, we explore whether brand communities based on social media (a special type of online brand communities) have positive effects on the main community elements and value creation practices in the communities as well as on brand trust and brand loyalty. A survey was conducted and 201 valid responses were used for analysis. The results of structural equation modeling show that brand communities established on social media have positive effects on value creation practices. Brand use, impression management practices and brand identification has an impact on brand trust and this brand trust then further leads to brand loyalty.Keywords: relationship quality, impression management practices, brand identification, brand trust, brand loyalty
Procedia PDF Downloads 4731517 Personal Identity and Group Identity under Threat following Exclusion: A Study in Singapore and in the Netherlands
Authors: Z. N. Huwaë, E.M. W. Tong, Y. H. M. See
Abstract:
In the present study, the researchers examined whether people from collectivistic cultures perceive a more group identity threat following social exclusion, whereas a more personal identity threat would be the case for those from individualistic cultures. In doing so, they investigated whether threatened identities depend on whether people are excluded by ingroup members (same ethnic background) or outgroup members (another ethnic background), as exclusion studies have shown mixed results when it comes to being excluded by ingroup versus outgroup members. For this purpose, students in Singapore and in the Netherlands participated in an online ball-tossing game (Cyberball) where they were excluded or included by other players with either the same or other ethnicity. Tentative results showed that both Singaporean and Dutch participants reported a more threat to their group identity than to their personal identity following exclusion and this did not depend on who excluded them. These tentative findings suggest that threatened identities following exclusion may not depend on cultural factors or on the source of exclusion.Keywords: cultures, exclusion, experiment, group membership, identities
Procedia PDF Downloads 1161516 Perceptual Learning with Hand-Eye Coordination as an Effective Tool for Managing Amblyopia: A Prospective Study
Authors: Anandkumar S. Purohit
Abstract:
Introduction: Amblyopia is a serious condition resulting in monocular impairment of vision. Although traditional treatment improves vision, we attempted the results of perceptual learning in this study. Methods: The prospective cohort study included all patients with amblyopia who were subjected to perceptual learning. The presenting data on vision, stereopsis, and contrast sensitivity were documented in a pretested online format, and the pre‑ and post‑treatment information was compared using descriptive, cross‑tabulation, and comparative methods on SPSS 22. Results: The cohort consisted of 47 patients (23 females and 24 males) with a mean age of 14.11 ± 7.13 years. A significant improvement was detected in visual acuity after the PL sessions, and the median follow‑up period was 17 days. Stereopsis improved significantly in all age groups. Conclusion: PL with hand-eye coordination is an effective method for managing amblyopia. This approach can improve vision in all age groups.Keywords: amblyopia, perceptual learning, hand-eye coordination, visual acuity, stereopsis, contrast sensitivity, ophthalmology
Procedia PDF Downloads 251515 Digital Preservation: Requirement of 21st Century
Authors: Gaurav Kumar, Shilpa
Abstract:
Digital libraries have been established all over the world to create, maintain and to preserve the digital materials. This paper focuses on operational digital preservation systems specifically in educational organizations in India. It considers the broad range of digital objects including e-journals, technical reports, e-records, project documents, scientific data, etc. This paper describes the main objectives, process and technological issues involved in preservation of digital materials. Digital preservation refers to the various methods of keeping digital materials alive for the future. It includes everything from electronic publications on CD-ROM to Online database and collections of experimental data in digital format maintains the ability to display, retrieve and use digital collections in the face of rapidly changing technological and organizational infrastructures elements. This paper exhibits the importance and objectives of digital preservation. The necessities of preservation are hardware and software technology to interpret the digital documents and discuss various aspects of digital preservation.Keywords: preservation, digital preservation, digital dark age, conservation, archive, repository, document, information technology, hardware, software, organization, machine readable format
Procedia PDF Downloads 4551514 Teaching College Classes with Virtual Reality
Authors: Penn P. Wu
Abstract:
Recent advances in virtual reality (VR) technologies have made it possible for students to experience a virtual on-the-scene or virtual in-person observation of an educational event. In an experimental class, the author uses VR, particularly 360° videos, to virtually engage students in an event, through a wide spectrum of educational resources, such s a virtual “bystander.” Students were able to observe the event as if they were physically on site, although they could not intervene with the scene. The author will describe the adopted equipment, specification, and cost of building them as well as the quality of VR. The author will discuss (a) feasibility, effectiveness, and efficiency of using VR as a supplemental technology to teach college students and criteria and methodologies used by the authors to evaluate them; (b) barriers and issues of technological implementation; and (c) pedagogical practices learned through this experiment. The author also attempts to explore (a) how VR could provide an interactive virtual in-person learning experience; (b) how VR can possibly change traditional college education and online education; (c) how educators and balance six critical factors: cost, time, technology, quality, result, and content.Keywords: learning with VR, virtual experience of learning, virtual in-person learning, virtual reality for education
Procedia PDF Downloads 3061513 The Perceptions of Parents Regarding the Appropriateness of the Early Childhood Financial Literacy Program for Children 3 to 6 Years of Age Presented at an Early Childhood Facility in South Africa: A Case Study
Authors: M. Naude, R. Joubert, A. du Plessis, S. Pelser, M. Trollip
Abstract:
Context: The study focuses on the perceptions of South African parents and teachers regarding a play-based financial literacy program for children aged 3 to 6 years at an early childhood facility. It emphasizes the importance of early interventions in financial education to reduce poverty and inequality. Research Aim: To explore how parental involvement in teaching money management concepts to young children can support financial literacy education both at school and at home. Methodology: A qualitative deductive case study was conducted at a South African early childhood facility involving 90 children, their teachers and their families. Thematic content analysis of online survey responses and focus group discussions with teachers were used to identify patterns and themes related to participants’ perceptions of the financial literacy program. Validity: The study's validity and reproducibility are ensured by the depth and honesty of the data, participant involvement, and the inquirer's objectivity. Reliability aligns with the interpretive paradigm of this study, while transparency in data gathering and analysis enhances its trustworthiness. Credibility is further supported by using two triangulation methods: focus group interviews with teachers and open-ended questionnaires from parents. Findings: Parents reported overall satisfaction with the program and highlighted the development of essential money management skills in their children. They emphasized the collaborative role of home and school environments in fostering financial literacy in early childhood. Teachers reported that communication and interaction with the parents increased and grew. Healthy and positive relationships were established between the teachers and the parents which contributed to the success of the classroom financial literacy program. Theoretical Importance: The study underscores the significance of play-based financial literacy education in early childhood and the critical role of parental involvement in reinforcing money management concepts. It contributes to laying a solid foundation for children's future financial well-being. Data Collection: Data was collected through an online survey administered to parents of children participating in the financial literacy program over a period of 10 weeks. Focus group discussions were utilized with the teachers of each class after the conclusion of the program. Analysis Procedures: Thematic content analysis was applied to the survey responses to identify patterns, themes, and insights related to the participants’ perceptions of the program's effectiveness in teaching money management concepts to young children. Question Addressed: How does parental involvement in teaching money management concepts to young children support financial literacy education in early childhood? Conclusion: The study highlights the positive impact of a play-based financial literacy program for children aged 3 to 6 years and underscores the importance of collaboration between home and school environments in fostering financial literacy skills.Keywords: early childhood, financial literacy, money management, parent involvement, play-based learning, South Africa
Procedia PDF Downloads 131512 Exploring Cybercrimes and Major Security Breaches: Assessing the Broader Fiscal Impact on Nigeria
Authors: Washima Tuleun
Abstract:
Cybercrime is a global concern, and Nigeria is not immune to its effects. This paper investigates the cybercrimes and significant cyber-attacks that have targeted businesses and institutions in Nigeria, examining their various forms and the financial and economic impacts they have on individuals, businesses, and the nation as a whole. As technological advancements rapidly evolve and online services gain widespread adoption, there has been a corresponding rise in cyber-related attacks. These attacks often target personal data, exploit system vulnerabilities, and result in the theft of sensitive information, leading to financial losses, reputational damage, and broader impacts on organizations. The study conducts a thorough review of existing literature, case studies, and statistical data to provide a comprehensive understanding of Nigeria’s cybercrime landscape. Additionally, it assesses the efforts by both the government and the private sector to address these challenges and offers recommendations for more effective strategies to mitigate and reduce their impact.Keywords: cybersecurity, telecommunications engineering, information technology, threat intelligence, vulnerability management, computing
Procedia PDF Downloads 281511 Digital Nudge, Social Proof Nudge and Trust on Brand loyalty
Authors: Mirza Amin Ul Haq
Abstract:
Purpose – the purpose of conducting this research is to check the impact of nudges constructs, whether they create an encouragement factor with consumer brand loyalty and relating of word-of-mouth power have some kind of effect with all independent variables. Desin/Methodology/Approach – this study adopted the four constructs (i.e., Digital Nudge, Social Proof Nudge, Trust, and the mediator Word of Mouth) and explore its effect and connection with Brand Loyalty. A total of 390 respondents were selected for self-administrated questionnaire to obtain the finding of the research. Findings – the impact and cause between the constructs were done through structural equation modeling. The findings show a positive impact of social proof nudge and word of mouth whereas, digital nudge and trust have the weaker influence on the consumer choices when talk about brand loyalty. Originality/Value – Further implication for research and its marketing strategies in the field of clothing industry creating brand loyalty with customer.Keywords: nudge, digital nudge, social proof, online buying, brand loyalty, trust, word of mouth
Procedia PDF Downloads 1081510 Towards a Reinvented Cash Management Function: Mobilising Innovative Advances for Enhanced Performance and Optimised Cost Management: Insights from Large Moroccan Companies in the Casablanca-Settat Region
Authors: Badrane Nohayla, Bamousse Zineb
Abstract:
Financial crises, exchange rate volatility, fluctuations in commodity prices, increased competitive pressures, and environmental issues are all threats that businesses face. In light of these diverse challenges, proactive, agile, and innovative cash management becomes an indispensable financial shield, allowing companies to thrive despite the adverse conditions of the global environment. In the same spirit, uncertainty, turbulence, volatility, and competitiveness continue to disrupt economic environments, compelling companies to swiftly master innovative breakthroughs that provide added value. In such a context, innovation emerges as a catalytic vector for performance, aiming to reduce costs, strengthen growth, and ultimately ensure the sustainability of Moroccan companies in the national arena. Moreover, innovation in treasury management promises to be one of the key pillars of financial stability, enabling companies to navigate the tumultuous waters of a globalized environment. Therefore, the objective of this study is to better understand the impact of innovative treasury management on cost optimization and, by extension, performance improvement. To elucidate this relationship, we conducted an exploratory qualitative study with 20 large Moroccan companies operating in the Casablanca-Settat region. The results highlight that innovation at the heart of treasury management is a guarantee of sustainability against the risks of failure and stands as a true pivot of the performance of Moroccan companies, an important parameter of their financial balance and a catalytic vector of their growth in the national economic landscape. In this regard, the present study aims to explore the extent to which innovation at the core of the treasury function serves as an indispensable tool for boosting performance while optimising costs in large Moroccan companies.Keywords: innovative cash management, artificial intelligence, financial performance, risk management, cost savings
Procedia PDF Downloads 271509 Secure E-Voting Using Blockchain Technology
Authors: Barkha Ramteke, Sonali Ridhorkar
Abstract:
An election is an important event in all countries. Traditional voting has several drawbacks, including the expense of time and effort required for tallying and counting results, the cost of papers, arrangements, and everything else required to complete a voting process. Many countries are now considering online e-voting systems, but the traditional e-voting systems suffer a lack of trust. It is not known if a vote is counted correctly, tampered or not. A lack of transparency means that the voter has no assurance that his or her vote will be counted as they voted in elections. Electronic voting systems are increasingly using blockchain technology as an underlying storage mechanism to make the voting process more transparent and assure data immutability as blockchain technology grows in popularity. The transparent feature, on the other hand, may reveal critical information about applicants because all system users have the same entitlement to their data. Furthermore, because of blockchain's pseudo-anonymity, voters' privacy will be revealed, and third parties involved in the voting process, such as registration institutions, will be able to tamper with data. To overcome these difficulties, we apply Ethereum smart contracts into blockchain-based voting systems.Keywords: blockchain, AMV chain, electronic voting, decentralized
Procedia PDF Downloads 1321508 Installing Cloud Computing Model for E-Businesses in Small Organizations
Authors: Khader Titi
Abstract:
Information technology developments have changed the way how businesses are working. Organizations are required to become visible online and stay connected to take advantages of costs reduction and improved operation of existing resources. The approval and the application areas of the cloud computing has significantly increased since it was presented by Google in 2007. Internet Cloud computing has attracted the IT enterprise attention especially the e-business enterprise. At this time, there is a great issue of environmental costs during the enterprises apply the e- business, but with the coming of cloud computing, most of the problem will be solved. Organizations around the world are facing with the continued budget challenges and increasing in the size of their computational data so, they need to find a way to deliver their services to clients as economically as possible without negotiating the achievement of anticipated outcomes. E- business companies need to provide better services to satisfy their clients. In this research, the researcher proposed a paradigm that use and deploy cloud computing technology environment to be used for e-business in small enterprises. Cloud computing might be a suitable model for implementing e-business and e-commerce architecture to improve efficiency and user satisfaction.Keywords: E-commerce, cloud computing, B2C, SaaS
Procedia PDF Downloads 3161507 The Influence of E-Health Education on Professional Practice: A Qualitative Study
Authors: Sisira Edirippulige, Anthony C. Smith, Sumudu Wickramasinghe, Nigel R. Armfield
Abstract:
Background: E-Health is steadily integrating into modern health services, making significant changes in the way health services are traditionally delivered. To work in this new environment, healthcare workers are required to have new knowledge, skills, and competencies specific to e-Health. The aim of this study was to understand the self-reported perceptions of graduates regarding the influence of an e-Health postgraduate program on their professional careers. Methods: All graduates from 2005 to 2015 were surveyed using an online questionnaire that consisted of a mixture of closed and open-ended questions. Results: The number of participants in the study was 32. Response rate was 62%. Graduates thought that the postgraduate e-Health program had an influence on their professional practice. The majority of the participants mentioned that they had worked in the e-Health field since their graduation. Their professional roles mainly involved implementation of e-Health in health service settings and the use of e-Health in clinical practice. Conclusions: While e-Health may be steadily integrating into modern health services, e-Health specific job opportunities are still relatively limited. E-Health workforce development must be given priority.Keywords: e-health, postgraduate education, clinical practice, curriculum
Procedia PDF Downloads 1601506 Climate Change Adaptation: Methodologies and Tools to Define Resilience Scenarios for Existing Buildings in Mediterranean Urban Areas
Authors: Francesca Nicolosi, Teresa Cosola
Abstract:
Climate changes in Mediterranean areas, such as the increase of average seasonal temperatures, the urban heat island phenomenon, the intensification of solar radiation and the extreme weather threats, cause disruption events, so that climate adaptation has become a pressing issue. Due to the strategic role that the built heritage holds in terms of environmental impact and energy waste and its potentiality, it is necessary to assess the vulnerability and the adaptive capacity of the existing building to climate change, in order to define different mitigation scenarios. The aim of this research work is to define an optimized and integrated methodology for the assessment of resilience levels and adaptation scenarios for existing buildings in Mediterranean urban areas. Moreover, the study of resilience indicators allows us to define building environmental and energy performance in order to identify the design and technological solutions for the improvement of the building and its urban area potentialities. The methodology identifies step-by-step different phases, starting from the detailed study of characteristic elements of urban system: climatic, natural, human, typological and functional components are analyzed in their critical factors and their potential. Through the individuation of the main perturbing factors and the vulnerability degree of the system to the risks linked to climate change, it is possible to define mitigation and adaptation scenarios. They can be different, according to the typological, functional and constructive features of the analyzed system, divided into categories of intervention, and characterized by different analysis levels (from the single building to the urban area). The use of software simulations allows obtaining information on the overall behavior of the building and the urban system, to generate predictive models in the medium and long-term environmental and energy retrofit and to make a comparative study of the mitigation scenarios identified. The studied methodology is validated on a case study.Keywords: climate impact mitigation, energy efficiency, existing building heritage, resilience
Procedia PDF Downloads 2381505 The Application of Dynamic Network Process to Environment Planning Support Systems
Authors: Wann-Ming Wey
Abstract:
In recent years, in addition to face the external threats such as energy shortages and climate change, traffic congestion and environmental pollution have become anxious problems for many cities. Considering private automobile-oriented urban development had produced many negative environmental and social impacts, the transit-oriented development (TOD) has been considered as a sustainable urban model. TOD encourages public transport combined with friendly walking and cycling environment designs, however, non-motorized modes help improving human health, energy saving, and reducing carbon emissions. Due to environmental changes often affect the planners’ decision-making; this research applies dynamic network process (DNP) which includes the time dependent concept to promoting friendly walking and cycling environmental designs as an advanced planning support system for environment improvements. This research aims to discuss what kinds of design strategies can improve a friendly walking and cycling environment under TOD. First of all, we collate and analyze environment designing factors by reviewing the relevant literatures as well as divide into three aspects of “safety”, “convenience”, and “amenity” from fifteen environment designing factors. Furthermore, we utilize fuzzy Delphi Technique (FDT) expert questionnaire to filter out the more important designing criteria for the study case. Finally, we utilized DNP expert questionnaire to obtain the weights changes at different time points for each design criterion. Based on the changing trends of each criterion weight, we are able to develop appropriate designing strategies as the reference for planners to allocate resources in a dynamic environment. In order to illustrate the approach we propose in this research, Taipei city as one example has been used as an empirical study, and the results are in depth analyzed to explain the application of our proposed approach.Keywords: environment planning support systems, walking and cycling, transit-oriented development (TOD), dynamic network process (DNP)
Procedia PDF Downloads 3441504 Design of a New Package for Saffron Using Kansei Engineering
Authors: Sotiris Papantonopoulos, Marianna Bortziou
Abstract:
This study aimed at developing a new package of saffron using emotional design and specifically the Kansei Engineering method. Kansei Engineering is a proactive product development methodology, which aims to improve the product development process and to translate consumers' feelings and image of a product into design elements. A survey was conducted with two major purposes: (1) to determine the target group of saffron use and to collect information about the adequacy of the product’s promotion and the importance of its packaging, (2) to collect the most important properties of a package according to consumers and to evaluate the existing saffron packages according to these properties (benchmarking). The interaction with the general public conducted by the distribution of online questionnaires and personal interviews as well as the statistical analysis of the results were performed using the SPSS software. The results of the survey were used in all stages of Kansei Engineering. Based on the results, a new saffron package was designed by using various designing and image processing software. This improved package is expected to achieve a better promotion and increased sales of the product.Keywords: design, emotional design, Kansei Engineering, packaging, saffron
Procedia PDF Downloads 1571503 The Predictors of Self-Esteem among Business School Students
Authors: Suchitra Pal, Arjun Mitra
Abstract:
Objective: The purpose of this empirical study is to ascertain if gender, personality traits and social support predict the self-esteem amongst business school students. Method: The study was conducted through an online survey administered on 160 business school students of which equal-number of males and females were taken, with controls for education and family income status. The participants were contacted through emails. Data was gathered and statistically analyzed to determine the relationship between the variables. Results: The results showed that gender was not associated with self-esteem. Whilst all the personality and social support factors were found to be significantly inter-correlated with self-esteem, only extraversion, openness to new experiences, conscientiousness, emotional stability and total perceived social support were found to predict self-esteem. Conclusion: The findings were explained in the light of existing conceptualizations in the field of self-concept. Recommendations for early identification and interventions for a population with lower self-esteem levels have been made based on findings of the study. Major implications for researchers and practitioners are discussed.Keywords: self-esteem, personality, social support, gender, self-concept
Procedia PDF Downloads 5011502 Dietary Exposure of Heavy Metals through Cereals Commonly Consumed by Dhaka City Residents
Authors: A. Md. Bayejid Hosen, B. M Zakir Hossain Howlader, C. Yearul Kabir
Abstract:
Contamination of soil and agricultural products by heavy metals resulting from rapid industrial development has caused major concern. Dietary exposure to heavy metals has been associated with toxic and adverse health effects. The main threats to human health from heavy metals are associated with exposure to Pb, Cd and Hg. The aim of this study was to monitor the presence of heavy metals in cereals collected from different wholesale markets of Dhaka City. One hundred and sixty cereal samples were collected and analyzed for determination of heavy metals. Heavy metals were analyzed by inductively coupled plasma mass spectrometry (ICP-MS). A total of six heavy metals– lead, chromium, cadmium, mercury, arsenic and antimony were estimated. The average concentrations of heavy metals in cereals fall within the safe limit established by regulatory organizations except for Pb (152.4 μg/100g) and Hg (15.13 μg/100g) which exceeded the safe limits. BARI gom-26 was the highest source of Pb (304.1 μg/100g) whereas Haski-29 rice variety contained the highest amount of Hg (60.85 μg/100g). Though all the cereal varieties contained approximately same amount of Cr the naizer sail varieties contained huge amount of Cr (171.8 μg/100g). Among all the cereal samples miniket rice varieties contained the least amount of heavy metals. The concentration of Cr (63.24 μg/100g), Cd (5.54 μg/100g) and As (3.26 μg/100g) in all cereals were below the safe limits. The daily intake of heavy metals was determined using the total weight of cereals consumed each day multiplied by the concentrations of heavy metals in cereals. The daily intake was compared with provisional maximum tolerable daily intake set by different regulatory organizations. The daily intake of Cd (23.0 μg), Hg (63.0 μg) and as (13.6 μg) through cereals were below the risk level except for Pb (634.0 μg) and Cr (263.1 μg). As the main meal of average Bangladeshi people is boiled rice served with some sorts of vegetables, our findings indicate that the residents of Dhaka City are at risk from Pb and Cr contamination. Potential health risks from exposure to heavy metals in self-planted cereals need more attention.Keywords: contamination, dietary exposure, heavy metals, human health, ICP-MS
Procedia PDF Downloads 4481501 The Impact of Gamification on Self-Assessment for English Language Learners in Saudi Arabia
Authors: Wala A. Bagunaid, Maram Meccawy, Arwa Allinjawi, Zilal Meccawy
Abstract:
Continuous self-assessment becomes crucial in self-paced online learning environments. Students often depend on themselves to assess their progress; which is considered an essential requirement for any successful learning process. Today’s education institutions face major problems around student motivation and engagement. Thus, personalized e-learning systems aim to help and guide the students. Gamification provides an opportunity to help students for self-assessment and social comparison with other students through attempting to harness the motivational power of games and apply it to the learning environment. Furthermore, Open Social Student Modeling (OSSM) as considered as the latest user modeling technologies is believed to improve students’ self-assessment and to allow them to social comparison with other students. This research integrates OSSM approach and gamification concepts in order to provide self-assessment for English language learners at King Abdulaziz University (KAU). This is achieved through an interactive visual representation of their learning progress.Keywords: e-learning system, gamification, motivation, social comparison, visualization
Procedia PDF Downloads 1501500 A Model of Human Security: A Comparison of Vulnerabilities and Timespace
Authors: Anders Troedsson
Abstract:
For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.Keywords: human security, timespace, vulnerabilities, risk perception
Procedia PDF Downloads 3351499 Climate Change and Health in Policies
Authors: Corinne Kowalski, Lea de Jong, Rainer Sauerborn, Niamh Herlihy, Anneliese Depoux, Jale Tosun
Abstract:
Climate change is considered one of the biggest threats to human health of the 21st century. The link between climate change and health has received relatively little attention in the media, in research and in policy-making. A long term and broad overview of how health is represented in the legislation on climate change is missing in the legislative literature. It is unknown if or how the argument for health is referred in legal clauses addressing climate change, in national and European legislation. Integrating scientific based evidence into policies regarding the impacts of climate change on health could be a key step to inciting the political and societal changes necessary to decelerate global warming. This may also drive the implementation of new strategies to mitigate the consequences on health systems. To provide an overview of this issue, we are analyzing the Global Climate Legislation Database provided by the Grantham Research Institute on Climate Change and the Environment. This institution was established in 2008 at the London School of Economics and Political Science. The database consists of (updated as of 1st January 2015) legislations on climate change in 99 countries around the world. This tool offers relevant information about the state of climate related policies. We will use the database to systematically analyze the 829 identified legislations to identify how health is represented as a relevant aspect of climate change legislation. We are conducting explorative research of national and supranational legislations and anticipate health to be addressed in various forms. The goal is to highlight how often, in what specific terms, which aspects of health or health risks of climate change are mentioned in various legislations. The position and recurrence of the mention of health is also of importance. Data will be extracted with complete quotation of the sentence which mentions health, which will allow for second qualitative stage to analyze which aspects of health are represented and in what context. This study is part of an interdisciplinary project called 4CHealth that confronts results of the research done on scientific, political and press literature to better understand how the knowledge on climate change and health circulates within those different fields and whether and how it is translated to real world change.Keywords: climate change, explorative research, health, policies
Procedia PDF Downloads 363