Search results for: personal and sensitive data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27712

Search results for: personal and sensitive data

27532 Repercussions of Ritual Dances to Personal Adjustment: A Perspicacious Study Among School Children

Authors: Abdul Rahiman Kannam Kulam

Abstract:

Reflecting the concepts of the development of the whole child, it is claimed that, purposeful engagement in physical activities or exercise involved ritual dances has the potential to engender in young people, the purpose of the present study was to analyze school children and their personal adjustment based on Ritual dance participation. For the purpose, two thousand and three hundred school children of Kerala were analyzed. AISS manual of A.K.P Sinha and R.P Singh was used to collect the data for adjustments. The adjustment qualities classifies as excellent, good, average, unsatisfactory and very unsatisfactory. The total performance denotes the state of adjustment based on the classifications. Findings of the study were subjected to percentages and ‘t’ ratio. The study enlightened that, the emotional, social and overall adjustments are better than non-athletes. But the study elucidated that, there is no difference in educational adjustment of school athletes and non athletes among school children.

Keywords: ritual dances, emotional adjustment, Poorakkali, Kolkkali, Margamkali

Procedia PDF Downloads 345
27531 Privacy Preservation Concerns and Information Disclosure on Social Networks: An Ongoing Research

Authors: Aria Teimourzadeh, Marc Favier, Samaneh Kakavand

Abstract:

The emergence of social networks has revolutionized the exchange of information. Every behavior on these platforms contributes to the generation of data known as social network data that are processed, stored and published by the social network service providers. Hence, it is vital to investigate the role of these platforms in user data by considering the privacy measures, especially when we observe the increased number of individuals and organizations engaging with the current virtual platforms without being aware that the data related to their positioning, connections and behavior is uncovered and used by third parties. Performing analytics on social network datasets may result in the disclosure of confidential information about the individuals or organizations which are the members of these virtual environments. Analyzing separate datasets can reveal private information about relationships, interests and more, especially when the datasets are analyzed jointly. Intentional breaches of privacy is the result of such analysis. Addressing these privacy concerns requires an understanding of the nature of data being accumulated and relevant data privacy regulations, as well as motivations for disclosure of personal information on social network platforms. Some significant points about how user's online information is controlled by the influence of social factors and to what extent the users are concerned about future use of their personal information by the organizations, are highlighted in this paper. Firstly, this research presents a short literature review about the structure of a network and concept of privacy in Online Social Networks. Secondly, the factors of user behavior related to privacy protection and self-disclosure on these virtual communities are presented. In other words, we seek to demonstrates the impact of identified variables on user information disclosure that could be taken into account to explain the privacy preservation of individuals on social networking platforms. Thirdly, a few research directions are discussed to address this topic for new researchers.

Keywords: information disclosure, privacy measures, privacy preservation, social network analysis, user experience

Procedia PDF Downloads 281
27530 Towards a Balancing Medical Database by Using the Least Mean Square Algorithm

Authors: Kamel Belammi, Houria Fatrim

Abstract:

imbalanced data set, a problem often found in real world application, can cause seriously negative effect on classification performance of machine learning algorithms. There have been many attempts at dealing with classification of imbalanced data sets. In medical diagnosis classification, we often face the imbalanced number of data samples between the classes in which there are not enough samples in rare classes. In this paper, we proposed a learning method based on a cost sensitive extension of Least Mean Square (LMS) algorithm that penalizes errors of different samples with different weight and some rules of thumb to determine those weights. After the balancing phase, we applythe different classifiers (support vector machine (SVM), k- nearest neighbor (KNN) and multilayer neuronal networks (MNN)) for balanced data set. We have also compared the obtained results before and after balancing method.

Keywords: multilayer neural networks, k- nearest neighbor, support vector machine, imbalanced medical data, least mean square algorithm, diabetes

Procedia PDF Downloads 532
27529 Design On Demand (DoD): Spiral Model of The Lifecycle of Products in The Personal 3D-Printed Products' Market

Authors: Zuk Nechemia Turbovich

Abstract:

This paper introduces DoD, a contextual spiral model that describes the lifecycle of products intended for manufacturing using Personal 3D Printers (P3DP). The study is based on a review of the desktop P3DPs market that shows that the combination of digital connectivity, coupled with the potential ownership of P3DP by home users, is radically changing the form of the product lifecycle, comparatively to familiar lifecycle paradigms. The paper presents the change in the design process, considering the characterization of product types in the P3DP market and the possibility of having a direct dialogue between end-user and product designers. The model, as an updated paradigm, provides a strategic perspective on product design and tools for success, understanding that design is subject to rapid and continuous improvement and that products are subject to repair, update, and customization. The paper will include a review of real cases.

Keywords: lifecycle, mass-customization, personal 3d-printing, user involvement

Procedia PDF Downloads 183
27528 Software Quality Promotion and Improvement through Usage of a PSP Oriented Information System

Authors: Gaoussou Doukoure Abdel Kader, Mnkandla Ernest

Abstract:

This research aims to investigate the usage of a personal software process oriented information system in order to facilitate the promotion of software quality and its improvement in organizations. In this light, at the term of a literature review on software quality and related concepts, the personal software process is discussed, more particularly in terms of software quality. Semi-structured interviews will be conducted with a team of software engineers on the first hand to establish a baseline on their understanding of what quality entails for them. The PSP methodology will then be presented to the engineers in its most basic aspects. The research will then proceed to practical case study where a PSP oriented information system is submitted to engineers for usage throughout their development process. Reports from the PSP information system as well as feedback from the engineers will be used in conjunction with the theoretical foundation to establish a PSP inspired framework for software quality promotion and improvement.

Keywords: information communication technology, personal software process, software quality, process quality, software engineering

Procedia PDF Downloads 494
27527 Gender and Seniority Differences among Service Organizations' Employees: Motivation, Commitment, and Burnout

Authors: K. Michael, G. Yanay-Ventura

Abstract:

Objectives: It is well established that employees are the essence of the organization. Employees' personal characteristics and emotional state may decrease or increase organizational performance. Therefore, organizations should enhance employees' well-being. The present study examined gender and seniority differences in three factors of employees' well-being: motivation, commitment, and burnout. Methods: Participants in this quantitative cross-sectional study were 400 service organization employees aged 19-71 (Mean=29.94; SD=10.25). Regarding gender, 59.7% were women, and regarding seniority, 66.9% were less than two years in the organization. All participants completed questionnaires evaluating motivation, sense of organizational commitment (affective, continuance), and level of burnout (emotional exhaustion, depersonalization, personal accomplishment). Data were analyzed using IBM-SPSS (version 25) through independent-sample t-tests. Results: Women were less motivated and felt less affective commitment toward the organization than men. They also felt more burnout than men in terms of emotional exhaustion and depersonalization. Additionally, employees in lower seniority levels felt less affective commitment toward the organization than employees in higher seniority levels. They also felt more burnout than employees in higher seniority levels in terms of emotional exhaustion, depersonalization, and personal accomplishment. Conclusions: The findings suggest that women and employees in lower seniority levels experience more vulnerable emotions in service organizations. Therefore, strategies for enhancing their well-being are recommended.

Keywords: burnout, gender and seniority differences, motivation, organizational commitment

Procedia PDF Downloads 132
27526 Occupational Health and Safety Implications of Flower Farming on the Local Communities in Central Uganda

Authors: Charles Owenda Omulo

Abstract:

This study examines Occupational Health and Safety implications in flower farms in Central Uganda. An exploratory sequential mixed method design and methodology was employed, with multiple data collection methods, including interviews, focus group discussions, and surveys. The findings show that occupational health and safety issues remain a major problem in flower farms. While the majority of workers agreed that the farms provided them with protective equipment, the data collected from the workers point to either the improper use or ineffectiveness of this equipment. A number of workers reported skin irritations, sore and painful eyes, stiff necks, back pains, and occasional headaches that were presumably argued to have arisen from their work environment. The study also found that farms have been adjusting in an attempt to correct some of these anomalies. These included the use of biological approaches to control pests and diseases and restricting the use of some chemical formulations that are deemed to be harmful to applicators and the environment. Alongside these efforts, the study recommends increased vigilance by the flower farm owners in the provision of personal protective equipment to workers.

Keywords: flower farms, personal protective equipment, agrochemicals, rural communities, occupational health and safety

Procedia PDF Downloads 63
27525 Correlation Analysis between Sensory Processing Sensitivity (SPS), Meares-Irlen Syndrome (MIS) and Dyslexia

Authors: Kaaryn M. Cater

Abstract:

Students with sensory processing sensitivity (SPS), Meares-Irlen Syndrome (MIS) and dyslexia can become overwhelmed and struggle to thrive in traditional tertiary learning environments. An estimated 50% of tertiary students who disclose learning related issues are dyslexic. This study explores the relationship between SPS, MIS and dyslexia. Baseline measures will be analysed to establish any correlation between these three minority methods of information processing. SPS is an innate sensitivity trait found in 15-20% of the population and has been identified in over 100 species of animals. Humans with SPS are referred to as Highly Sensitive People (HSP) and the measure of HSP is a 27 point self-test known as the Highly Sensitive Person Scale (HSPS). A 2016 study conducted by the author established base-line data for HSP students in a tertiary institution in New Zealand. The results of the study showed that all participating HSP students believed the knowledge of SPS to be life-changing and useful in managing life and study, in addition, they believed that all tutors and in-coming students should be given information on SPS. MIS is a visual processing and perception disorder that is found in approximately 10% of the population and has a variety of symptoms including visual fatigue, headaches and nausea. One way to ease some of these symptoms is through the use of colored lenses or overlays. Dyslexia is a complex phonological based information processing variation present in approximately 10% of the population. An estimated 50% of dyslexics are thought to have MIS. The study exploring possible correlations between these minority forms of information processing is due to begin in February 2017. An invitation will be extended to all first year students enrolled in degree programmes across all faculties and schools within the institution. An estimated 900 students will be eligible to participate in the study. Participants will be asked to complete a battery of on-line questionnaires including the Highly Sensitive Person Scale, the International Dyslexia Association adult self-assessment and the adapted Irlen indicator. All three scales have been used extensively in literature and have been validated among many populations. All participants whose score on any (or some) of the three questionnaires suggest a minority method of information processing will receive an invitation to meet with a learning advisor, and given access to counselling services if they choose. Meeting with a learning advisor is not mandatory, and some participants may choose not to receive help. Data will be collected using the Question Pro platform and base-line data will be analysed using correlation and regression analysis to identify relationships and predictors between SPS, MIS and dyslexia. This study forms part of a larger three year longitudinal study and participants will be required to complete questionnaires at annual intervals in subsequent years of the study until completion of (or withdrawal from) their degree. At these data collection points, participants will be questioned on any additional support received relating to their minority method(s) of information processing. Data from this study will be available by April 2017.

Keywords: dyslexia, highly sensitive person (HSP), Meares-Irlen Syndrome (MIS), minority forms of information processing, sensory processing sensitivity (SPS)

Procedia PDF Downloads 245
27524 Keyloggers Prevention with Time-Sensitive Obfuscation

Authors: Chien-Wei Hung, Fu-Hau Hsu, Chuan-Sheng Wang, Chia-Hao Lee

Abstract:

Nowadays, the abuse of keyloggers is one of the most widespread approaches to steal sensitive information. In this paper, we propose an On-Screen Prompts Approach to Keyloggers (OSPAK) and its analysis, which is installed in public computers. OSPAK utilizes a canvas to cue users when their keystrokes are going to be logged or ignored by OSPAK. This approach can protect computers against recoding sensitive inputs, which obfuscates keyloggers with letters inserted among users' keystrokes. It adds a canvas below each password field in a webpage and consists of three parts: two background areas, a hit area and a moving foreground object. Letters at different valid time intervals are combined in accordance with their time interval orders, and valid time intervals are interleaved with invalid time intervals. It utilizes animation to visualize valid time intervals and invalid time intervals, which can be integrated in a webpage as a browser extension. We have tested it against a series of known keyloggers and also performed a study with 95 users to evaluate how easily the tool is used. Experimental results made by volunteers show that OSPAK is a simple approach.

Keywords: authentication, computer security, keylogger, privacy, information leakage

Procedia PDF Downloads 122
27523 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria

Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue

Abstract:

The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.

Keywords: personal variables, students, perception, school security

Procedia PDF Downloads 77
27522 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia

Authors: Rina Arum Prastyanti

Abstract:

Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.

Keywords: mobile commerce, legal protection, consumer, effectiveness

Procedia PDF Downloads 364
27521 Personal Characteristics and Personality Traits as Predictors of Compassion Fatigue among Counselors from Dominican Schools in the Philippines

Authors: Neil Jordan M. Uy, Fe Pelilia V. Hernandez

Abstract:

A counselor is always regarded as a professional who embodies the willingness to help others through the process of counseling. He is knowledgeable and skillful of the different theories, tools, and techniques that are useful in aiding the client to cope with their dilemmas. The negative experiences of the clients that are shared during the counseling session can affect the professional counselor. Compassion fatigue, a professional impairment, is characterized by the decline of one’s productivity and the feeling of anxiety and stress brought about as the counselor empathizes, listens, and cares for others. This descriptive type of research aimed to explore variables that are predictors of compassion fatigue utilizing three research instruments; Demographic Profile Sheet, Professional Quality of Life Scale, and Neo-Pi-R. The 52 respondents of this study were counselors from the different Dominican schools in the Philippines. Generally, the counselors have low level of compassion fatigue across personal characteristics (age, gender, years of service, highest educational attainment, and professional status) and personality traits (extraversion, agreeableness, conscientiousness, openness, and neuroticism). ANOVA validated the findings of this that among the personal characteristics and personality traits, extraversion with f-value of 3.944 and p-value of 0.026, and conscientiousness, with f-value of 4.125 and p-value of 0.022 were found to have significant difference in the level of compassion fatigue. A very significant difference was observed with neuroticism with f-value of 6.878 and p-value 0.002. Among the personal characteristics and personal characteristics, only neuroticism was found to predict compassion fatigue. The computed r2 value of 0.204 using multiple regression analysis suggests that 20.4 percent of compassion fatigue can be predicted by neuroticism. The predicting power of neuroticism can be computed from the regression model Y=0.156x+26.464; where x is the number of neuroticism.

Keywords: big five personality traits, compassion fatigue, counselors, professional quality of life scale

Procedia PDF Downloads 378
27520 Quality of Life of Elderly and Factors Associated in Bharatpur Metropolitan City, Chitwan: A Mixed Method Study

Authors: Rubisha Adhikari, Rajani Shah

Abstract:

Introduction: Aging is a natural, global and inevitable phenomenon every single person has to go through, and nobody can escape the process. One of the emerging challenges to public health is to improve the quality of later years of life as life expectancy continues to increase. Quality of life (QoL) has grown to be a key goal for many public health initiatives. Population aging has become a global phenomenon as they are growing more quickly in emerging nations than they are in industrialized nations, leaving minimal opportunities to regulate the consequences of the demographic shift. Methods: A community-based descriptive analytical approach was used to examine the quality of life and associated factors among elderly people. A mixed method was chosen for the study. For the quantitative data collection, a household survey was conducted using the WHOQOL-OLD tool. In-depth interviews were conducted among twenty participants for qualitative data collection. Data generated through in-depth interviews were transcribed verbatim. In-depth interviews lasted about an hour and were audio recorded. The in-depth interview guide had been developed by the research team and pilot-tested before actual interviews. Results: This study result showed the association between quality of life and socio-demographic variables. Among all the variables under socio-demographic variable of this study, age (ꭓ2=14.445, p=0.001), gender (ꭓ2=14.323, p=<0.001), marital status (ꭓ2=10.816, p=0.001), education status (ꭓ2=23.948, p=<0.001), household income (ꭓ2=13.493, p=0.001), personal income (ꭓ2=14.129, p=0.001), source of personal income (ꭓ2=28.332,p=<0.001), social security allowance (ꭓ2=18.005,p=<0.001), alcohol consumption (ꭓ2=9.397,p=0.002) are significantly associated with quality of life of elderly. In addition, affordability (ꭓ2=12.088, p=0.001), physical activity (ꭓ2=9.314, p=0.002), emotional support (ꭓ2=9.122, p=0.003), and economic support (ꭓ2=8.104, p=0.004) are associated with quality of life of elderly people. Conclusion: In conclusion, this mixed method study provides insight into the attributes of the quality of life of elderly people in Nepal and similar settings. As the geriatric population is growing in full swing, maintaining a high quality of life has become a major challenge. This study showed that determinants such as age, gender, marital status, education status, household income, personal income, source of personal income, social security allowance and alcohol consumption, economic support, emotional support, affordability and physical activity have an association with quality of life of the elderly.

Keywords: ageing, chitwan, elderly, health status, quality of life

Procedia PDF Downloads 68
27519 Mechanism of pH Sensitive Flocculation for Organic Load and Colour Reduction in Landfill Leachate

Authors: Brayan Daniel Riascos Arteaga, Carlos Costa Perez

Abstract:

Landfill leachate has an important fraction of humic substances, mainly humic acids (HAs), which often represent more than half value of COD, specially in liquids proceeded from composting processes of organic fraction of solid wastes. We propose in this article a new method of pH sensitive flocculation for COD and colour reduction in landfill leachate based on the chemical properties of HAs. Landfill leachate with a high content of humic acids can be efficiently treated by pH sensitive flocculation at pH 2.0, reducing COD value in 86.1% and colour in 84.7%. Mechanism of pH sensitive flocculation is based in protonation first of phenolic groups and later of carboxylic acid groups in the HAs molecules, resulting in a reduction of Zeta potential value. For pH over neutrality, carboxylic acid and phenolic groups are ionized and Zeta potential increases in absolute value, maintaining HAs in suspension as colloids and conducting flocculation to be obstructed. Ionized anionic groups (carboxylates) can interact electrostatically with cations abundant in leachate (site binding) aiding to maintain HAs in suspension. Simulation of this situation and ideal visualization of Zeta potential behavior is described in the paper and aggregation of molecules by H-bonds is proposed as the main step in separation of HAs from leachate and reduction of COD value in this complex liquid. CHNS analysis, FT-IR spectrometry and UV–VIS spectrophotometry show chemical elements content in the range of natural and commercial HAs, clear aromaticity and carboxylic acids and phenolic groups presence in the precipitate from landfill leachate

Keywords: landfill leachate, humic acids, COD, chemical treatment, flocculation

Procedia PDF Downloads 71
27518 Human Digital Twin for Personal Conversation Automation Using Supervised Machine Learning Approaches

Authors: Aya Salama

Abstract:

Digital Twin is an emerging research topic that attracted researchers in the last decade. It is used in many fields, such as smart manufacturing and smart healthcare because it saves time and money. It is usually related to other technologies such as Data Mining, Artificial Intelligence, and Machine Learning. However, Human digital twin (HDT), in specific, is still a novel idea that still needs to prove its feasibility. HDT expands the idea of Digital Twin to human beings, which are living beings and different from the inanimate physical entities. The goal of this research was to create a Human digital twin that is responsible for real-time human replies automation by simulating human behavior. For this reason, clustering, supervised classification, topic extraction, and sentiment analysis were studied in this paper. The feasibility of the HDT for personal replies generation on social messaging applications was proved in this work. The overall accuracy of the proposed approach in this paper was 63% which is a very promising result that can open the way for researchers to expand the idea of HDT. This was achieved by using Random Forest for clustering the question data base and matching new questions. K-nearest neighbor was also applied for sentiment analysis.

Keywords: human digital twin, sentiment analysis, topic extraction, supervised machine learning, unsupervised machine learning, classification, clustering

Procedia PDF Downloads 87
27517 Implications of Creating a 3D Vignette as a Reflective Practice for Continuous Professional Development of Foreign Language Teachers

Authors: Samiah H. Ghounaim

Abstract:

The topic of this paper is significant because of the increasing need for intercultural training for foreign language teachers due to the continuous challenges they face in their diverse classrooms. First, the structure of the intercultural training program designed will be briefly described, and the structure of a 3D vignette and its intended purposes will be elaborated on. This was the first stage where the program was designed and implemented on the period of three months with a group of local and expatriate foreign language teachers/practitioners at a university in the Middle East. After that, a set of primary data collected during the first stage of this research on the design and co-construction process of a 3D vignette will be reviewed and analysed in depth. Each practitioner designed a personal incident into a 3D vignette where each dimension of the vignette viewed the same incident from a totally different perspective. Finally, the results and the implications of having participant construct their personal incidents into a 3D vignette as a reflective practice will be discussed in detail as well as possible extensions for the research. This process proved itself to be an effective reflective practice where the participants were stimulated to view their incidents in a different light. Co-constructing one’s own critical incidents –be it a positive experience or not– into a structured 3D vignette encouraged participants to decentralise themselves from the incidents and, thus, creating a personal reflective space where they had the opportunity to see different potential outcomes for each incident, as well as prepare for the reflective discussion of their vignette with their peers. This provides implications for future developments in reflective writing practices and possibilities for educators’ continuous professional development (CPD).

Keywords: 3D vignettes, intercultural competence training, reflective practice, teacher training

Procedia PDF Downloads 108
27516 Empirical Study on the Organizational Role Stress and its Effect on Private and Government Sector Employees

Authors: Rashmi Shahu

Abstract:

This is a comparative study of the Organizational Role Stress among the private and government sector employees. There was no known similar kind of Organizational Role Stress study in the field area i.e. Nagpur city. Hence, in order to understand the ORS level pertaining to the government and private sector employees in various offices it was taken as the subject for this study. The Method used for this study was the incidental sampling method. The Organizational Role Scale containing 50 statements related to the ten different ORS areas was used for observations. All 60 participants were tested. The results of the study show that there was a significant difference in only one area of ORS i.e. Personal Inadequacy for the participants. The employees from the private sector showed higher Personal Inadequacy than the government employees. Rest of the ORS areas showed no significant difference meaning that the employees were well adjusted in the respective areas.

Keywords: organozational role stress, private sector, government sector, personal inadequacy

Procedia PDF Downloads 364
27515 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology

Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar

Abstract:

Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.

Keywords: data privacy, distributed system, federated learning, machine learning

Procedia PDF Downloads 134
27514 Evaluating the Total Costs of a Ransomware-Resilient Architecture for Healthcare Systems

Authors: Sreejith Gopinath, Aspen Olmsted

Abstract:

This paper is based on our previous work that proposed a risk-transference-based architecture for healthcare systems to store sensitive data outside the system boundary, rendering the system unattractive to would-be bad actors. This architecture also allows a compromised system to be abandoned and a new system instance spun up in place to ensure business continuity without paying a ransom or engaging with a bad actor. This paper delves into the details of various attacks we simulated against the prototype system. In the paper, we discuss at length the time and computational costs associated with storing and retrieving data in the prototype system, abandoning a compromised system, and setting up a new instance with existing data. Lastly, we simulate some analytical workloads over the data stored in our specialized data storage system and discuss the time and computational costs associated with running analytics over data in a specialized storage system outside the system boundary. In summary, this paper discusses the total costs of data storage, access, and analytics incurred with the proposed architecture.

Keywords: cybersecurity, healthcare, ransomware, resilience, risk transference

Procedia PDF Downloads 132
27513 A Cross-Cultural Strategy for Managing an Organisation Located in a Diverse-Populated Community

Authors: Tsuu Faith Machingura, Daniel Madzanire, Doreen Nkala

Abstract:

High employment opportunities in various towns in Zimbabwe attracted linguistically-diverse ethnic groups to settle therein. This movement, which largely was economically-induced, concocted diverse-populated communities in towns and in surrounding areas. Service provisions in such domains as education and business need to be diverse-sensitive. Prompted by the prevalence of diversity in present day business organisations, the study sought to suggest a cross-cultural strategy for managing an organisation located in a diverse-populated community. A case study research design was used. A sample of 10 participants consisting of five diverse business owners and five diverse clients was purposively drawn. Document analysis and key informant interviews were used to gather data. The study revealed that organisations that are located in diverse populated communities were shaped by the prevailing ethos. A diverse-sensitive managerial strategy was suggested as a pertinent cross-cultural managerial tool.

Keywords: cross-cultural strategy, linguistic diversity, diverse-populated community, ethnic groups

Procedia PDF Downloads 70
27512 The Significant of Effective Leadership on Management Growth and Survival: A Case Study of Bunato Limited Company, Ring Road Ibadan

Authors: A. S. Adegoke, O. N. Popoola

Abstract:

The central purpose of management in any organization is that of coordinating the efforts of people towards the achievement of its goal. Effective and productive management is the function of leadership. Leadership plays a critical role in helping groups, organizations and societies to achieve their goals. Factors considered to make leadership to be effective are intelligence, social maturity, inner motivation and achievement drives and lastly, human relations attitudes. The factors affecting leadership style and effectiveness were examined. Also, the study examined which of the various leadership style best befits an organization and discussed the ways in which the style was determined. In order to meet the objectives of this study, different types of methods of data gathering were carried out. The methods include data from primary and secondary sources. The primary sources include personal interview, personal observation, and questionnaire while data from secondary sources were derived from various books, journal write up and other documentary records. Data were collected from respondents through questionnaire, and the field research carried out through oral interview to test each of the related hypotheses. From the data analysed it was determined that 45% strongly agreed that leadership traits are inborn not acquired and 28.3% agreed that leadership traits are inborn, while 11.7% and 10% strongly disagreed and disagreed respectively and 5% were undecided. 48.4% strongly agreed, and 43.3% agreed that environmental factors determined the appropriate style of leadership to be employed while 3.3% strongly disagreed, 1.7% disagreed and 3.3% were undecided. From the study, no single style of leadership is appropriate in any situation instead of concentrating on single leadership style; leader can vary approaches depending on forces in the leaders, characteristic of the subordinates, situational forces of the organization, lastly the expectations and behaviour of superior.

Keywords: hypothesis, leadership, management, organization

Procedia PDF Downloads 144
27511 Robustness of MIMO-OFDM Schemes for Future Digital TV to Carrier Frequency Offset

Authors: D. Sankara Reddy, T. Kranthi Kumar, K. Sreevani

Abstract:

This paper investigates the impact of carrier frequency offset (CFO) on the performance of different MIMO-OFDM schemes with high spectral efficiency for next generation of terrestrial digital TV. We show that all studied MIMO-OFDM schemes are sensitive to CFO when it is greater than 1% of intercarrier spacing. We show also that the Alamouti scheme is the most sensitive MIMO scheme to CFO.

Keywords: modulation and multiplexing (MIMO-OFDM), signal processing for transmission carrier frequency offset, future digital TV, imaging and signal processing

Procedia PDF Downloads 487
27510 The Third Level Digital Divide: Millennials and Post-Millennials Online Activities in South Africa

Authors: Ayanda Magida, Brian Armstrong

Abstract:

The study aimed to assess the third level of the digital divide among the millennials and post-millennials in South Africa. The millennials are people born from 1981-to 1996, that is, people between the ages of 25-40 years old and post-millennials are people born from 1997 to date. For the study, only post-millennials born between 1997-2003 were included as they were old enough to consent to participation in the study. Data was collected as part of the Ph.D. project that focuses on the relationship between income inequality, the digital divide, and social cohesion in South Africa. The digital divide has three main levels, namely the first, second and third. The first and second focus on access and usage, respectively. The third-level digital divide can be defined as the differences in the benefits associated with being online. The current paper focuses on the third level: the benefits derived by being online using four domains: economic, educational, social, and personal benefits. The economic benefits include income, employment and finance-related activities; the social benefits include socializing belonging, identity, and informal networks. The personal benefits include personal wellbeing and self-actualization. A total of 763 participants completed the survey, and 61.3% were post-millennials between the ages of 18-24 and s 38.6 % were millennials between 25 and 40. The majority of the respondents were female (62%), male (34%) and nonbinary (1%), respectively. Most of the respondents were black, followed by whites, Indians and colored, respectively. Thus, they represented the status of the demographics of the country. Most of the respondents had access to the internet and smartphone. Most expressed that they use laptops (68%) or mobile (71%) to access the internet and 54 % access the internet using wireless/Wi-Fi. There were no differences between the millennial and post-millennial economic and educational benefits of being online. However, the post-millennials were more inclined to use the internet for social and personal benefits than the millennials. This could be attributed to many factors, such as age. The post-millennials are still discovering themselves and therefore would derive social and personal benefits associated with being online. The findings confirm studies that argue that younger generations derive more benefits from being online than the older generation. Based on the findings, it is evident that the post-millennials are not using the internet or online activities for social networks and socializing but can derive economic benefits such as job looking and education benefits from being online. It can be inferred that there are no significant differences between the two groups, and it seems like the third-level digital divide is not evident among the two groups as they both have been able to derive meaningful benefits from being online. Further studies should focus on the third-level divide between the baby boomers and Generation X.

Keywords: third-level digital divide, millennials, post-millennials, online activities

Procedia PDF Downloads 104
27509 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 233
27508 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 312
27507 The Twin Terminal of Pedestrian Trajectory Based on City Intelligent Model (CIM) 4.0

Authors: Chen Xi, Lao Xuerui, Li Junjie, Jiang Yike, Wang Hanwei, Zeng Zihao

Abstract:

To further promote the development of smart cities, the microscopic "nerve endings" of the City Intelligent Model (CIM) are extended to be more sensitive. In this paper, we develop a pedestrian trajectory twin terminal based on the CIM and CNN technology. It also uses 5G networks, architectural and geoinformatics technologies, convolutional neural networks, combined with deep learning networks for human behaviour recognition models, to provide empirical data such as 'pedestrian flow data and human behavioural characteristics data', and ultimately form spatial performance evaluation criteria and spatial performance warning systems, to make the empirical data accurate and intelligent for prediction and decision making.

Keywords: urban planning, urban governance, CIM, artificial intelligence, convolutional neural network

Procedia PDF Downloads 150
27506 Re-identification Risk and Mitigation in Federated Learning: Human Activity Recognition Use Case

Authors: Besma Khalfoun

Abstract:

In many current Human Activity Recognition (HAR) applications, users' data is frequently shared and centrally stored by third parties, posing a significant privacy risk. This practice makes these entities attractive targets for extracting sensitive information about users, including their identity, health status, and location, thereby directly violating users' privacy. To tackle the issue of centralized data storage, a relatively recent paradigm known as federated learning has emerged. In this approach, users' raw data remains on their smartphones, where they train the HAR model locally. However, users still share updates of their local models originating from raw data. These updates are vulnerable to several attacks designed to extract sensitive information, such as determining whether a data sample is used in the training process, recovering the training data with inversion attacks, or inferring a specific attribute or property from the training data. In this paper, we first introduce PUR-Attack, a parameter-based user re-identification attack developed for HAR applications within a federated learning setting. It involves associating anonymous model updates (i.e., local models' weights or parameters) with the originating user's identity using background knowledge. PUR-Attack relies on a simple yet effective machine learning classifier and produces promising results. Specifically, we have found that by considering the weights of a given layer in a HAR model, we can uniquely re-identify users with an attack success rate of almost 100%. This result holds when considering a small attack training set and various data splitting strategies in the HAR model training. Thus, it is crucial to investigate protection methods to mitigate this privacy threat. Along this path, we propose SAFER, a privacy-preserving mechanism based on adaptive local differential privacy. Before sharing the model updates with the FL server, SAFER adds the optimal noise based on the re-identification risk assessment. Our approach can achieve a promising tradeoff between privacy, in terms of reducing re-identification risk, and utility, in terms of maintaining acceptable accuracy for the HAR model.

Keywords: federated learning, privacy risk assessment, re-identification risk, privacy preserving mechanisms, local differential privacy, human activity recognition

Procedia PDF Downloads 11
27505 Detection of Pharmaceutical Personal Protective Equipment in Video Stream

Authors: Michael Leontiev, Danil Zhilikov, Dmitry Lobanov, Lenar Klimov, Vyacheslav Chertan, Daniel Bobrov, Vladislav Maslov, Vasilii Vologdin, Ksenia Balabaeva

Abstract:

Pharmaceutical manufacturing is a complex process, where each stage requires a high level of safety and sterility. Personal Protective Equipment (PPE) is used for this purpose. Despite all the measures of control, the human factor (improper PPE wearing) causes numerous losses to human health and material property. This research proposes a solid computer vision system for ensuring safety in pharmaceutical laboratories. For this, we have tested a wide range of state-of-the-art object detection methods. Composing previously obtained results in this sphere with our own approach to this problem, we have reached a high accuracy ([email protected]) ranging from 0.77 up to 0.98 in detecting all the elements of a common set of PPE used in pharmaceutical laboratories. Our system is a step towards safe medicine production.

Keywords: sterility and safety in pharmaceutical development, personal protective equipment, computer vision, object detection, monitoring in pharmaceutical development, PPE

Procedia PDF Downloads 87
27504 Analyzing Data Protection in the Era of Big Data under the Framework of Virtual Property Layer Theory

Authors: Xiaochen Mu

Abstract:

Data rights confirmation, as a key legal issue in the development of the digital economy, is undergoing a transition from a traditional rights paradigm to a more complex private-economic paradigm. In this process, data rights confirmation has evolved from a simple claim of rights to a complex structure encompassing multiple dimensions of personality rights and property rights. Current data rights confirmation practices are primarily reflected in two models: holistic rights confirmation and process rights confirmation. The holistic rights confirmation model continues the traditional "one object, one right" theory, while the process rights confirmation model, through contractual relationships in the data processing process, recognizes rights that are more adaptable to the needs of data circulation and value release. In the design of the data property rights system, there is a hierarchical characteristic aimed at decoupling from raw data to data applications through horizontal stratification and vertical staging. This design not only respects the ownership rights of data originators but also, based on the usufructuary rights of enterprises, constructs a corresponding rights system for different stages of data processing activities. The subjects of data property rights include both data originators, such as users, and data producers, such as enterprises, who enjoy different rights at different stages of data processing. The intellectual property rights system, with the mission of incentivizing innovation and promoting the advancement of science, culture, and the arts, provides a complete set of mechanisms for protecting innovative results. However, unlike traditional private property rights, the granting of intellectual property rights is not an end in itself; the purpose of the intellectual property system is to balance the exclusive rights of the rights holders with the prosperity and long-term development of society's public learning and the entire field of science, culture, and the arts. Therefore, the intellectual property granting mechanism provides both protection and limitations for the rights holder. This perfectly aligns with the dual attributes of data. In terms of achieving the protection of data property rights, the granting of intellectual property rights is an important institutional choice that can enhance the effectiveness of the data property exchange mechanism. Although this is not the only path, the granting of data property rights within the framework of the intellectual property rights system helps to establish fundamental legal relationships and rights confirmation mechanisms and is more compatible with the classification and grading system of data. The modernity of the intellectual property rights system allows it to adapt to the needs of big data technology development through special clauses or industry guidelines, thus promoting the comprehensive advancement of data intellectual property rights legislation. This paper analyzes data protection under the virtual property layer theory and two-fold virtual property rights system. Based on the “bundle of right” theory, this paper establishes specific three-level data rights. This paper analyzes the cases: Google v. Vidal-Hall, Halliday v Creation Consumer Finance, Douglas v Hello Limited, Campbell v MGN and Imerman v Tchenquiz. This paper concluded that recognizing property rights over personal data and protecting data under the framework of intellectual property will be beneficial to establish the tort of misuse of personal information.

Keywords: data protection, property rights, intellectual property, Big data

Procedia PDF Downloads 39
27503 DLtrace: Toward Understanding and Testing Deep Learning Information Flow in Deep Learning-Based Android Apps

Authors: Jie Zhang, Qianyu Guo, Tieyi Zhang, Zhiyong Feng, Xiaohong Li

Abstract:

With the widespread popularity of mobile devices and the development of artificial intelligence (AI), deep learning (DL) has been extensively applied in Android apps. Compared with traditional Android apps (traditional apps), deep learning based Android apps (DL-based apps) need to use more third-party application programming interfaces (APIs) to complete complex DL inference tasks. However, existing methods (e.g., FlowDroid) for detecting sensitive information leakage in Android apps cannot be directly used to detect DL-based apps as they are difficult to detect third-party APIs. To solve this problem, we design DLtrace; a new static information flow analysis tool that can effectively recognize third-party APIs. With our proposed trace and detection algorithms, DLtrace can also efficiently detect privacy leaks caused by sensitive APIs in DL-based apps. Moreover, using DLtrace, we summarize the non-sequential characteristics of DL inference tasks in DL-based apps and the specific functionalities provided by DL models for such apps. We propose two formal definitions to deal with the common polymorphism and anonymous inner-class problems in the Android static analyzer. We conducted an empirical assessment with DLtrace on 208 popular DL-based apps in the wild and found that 26.0% of the apps suffered from sensitive information leakage. Furthermore, DLtrace has a more robust performance than FlowDroid in detecting and identifying third-party APIs. The experimental results demonstrate that DLtrace expands FlowDroid in understanding DL-based apps and detecting security issues therein.

Keywords: mobile computing, deep learning apps, sensitive information, static analysis

Procedia PDF Downloads 179