Search results for: privacy concerns
2094 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique
Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam
Abstract:
With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services
Procedia PDF Downloads 1192093 Examples of Techniques and Algorithms Used in Wlan Security
Authors: Vahid Bairami Rad
Abstract:
Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security
Procedia PDF Downloads 5692092 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law
Authors: Sara Vora (Hoxha)
Abstract:
Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection
Procedia PDF Downloads 742091 Challenges and Opportunities for M-Government Implementation in Saudi Arabia
Authors: A. Alssbaiheen, S. Love
Abstract:
Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services.Keywords: awareness, barriers, challenges, government services, mobile government, m-government, opportunities
Procedia PDF Downloads 4632090 Cloud Monitoring and Performance Optimization Ensuring High Availability
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy
Procedia PDF Downloads 602089 Exploring Thai Early Childhood Teachers’ Experience and Concerns regarding Teaching Children with Disabilities in Inclusive Classrooms
Authors: Sunanta Klibthong
Abstract:
In view of the Thailand government policy creating increasing awareness of opportunity for children with special needs, the number of children with disabilities enrolled in kindergartens in Thailand has increased. This study explores early childhood teachers’ experiences and concerns of teaching children with disabilities in inclusive classrooms. The population of the study was private early childhood teachers who teach in inclusive classrooms in Thailand. Quantitative data obtained through a questionnaire were supplemented by early childhood teachers’ interviews to identify key experiences and concerns of the teachers when teaching children with and without disabilities in the same classrooms. The results of this study indicated that many teachers face challenges including lack of professional development opportunities, difficulty identifying the needs of all children and how to use effective strategies to support inclusive practices in their classrooms. Teachers also expressed concern about parents’ lack of willingness to accept children without disabilities studying together with those with disabilities in the same classrooms. Findings from this study can inform program support for parents and professional support needs of teachers in the provision of high-quality inclusive programs for all students.Keywords: the concern, early childhood, experience, inclusive education, Thailand
Procedia PDF Downloads 1662088 A Feminist Approach to the COVID-19 Lockdown Process in Turkey
Authors: Aykut Sigin
Abstract:
In feminist theory, home is usually regarded as an unsafe place for women to be in, as it continually produces inequalities between men and women, favoring the former, and maintains the patriarchal status quo. The second-wave feminists argued that women need to raise their concerns regarding domestic problems and this eventually led to the emergence of the motto 'the personal is political', pointing out to the fact that the domestic problems one woman experienced were essentially the problems of women in general as the patriarchal ideology manifested itself at home. Although this motto was from the late 1960s, it still holds significance today. In the golden era of the Internet, women could use social media to voice their concerns more easily than ever. Following this line of thought, the aim of this study is to analyze the domestic problems of the women in Turkey during the lockdown caused by COVID-19 through social media as they find themselves at home with their fathers, husbands and/or brothers for longer periods of time than ever before. For this purpose, an investigation of the posts shared under '#EvdeKal' ('StayAtHome') was carried out. The results of the study made it clear that women find the lockdown process to be problematic, that they express their domestic concerns rather freely through social media, and that the inequalities caused by the patriarchal ideology persist in the 21st century.Keywords: COVID-19, lockdown, home, feminism
Procedia PDF Downloads 1322087 A Research for Determining Consumers' Tendency to Prefer Eco-Friendly Products within the Scope of Green Marketing Activities
Authors: Haci Halil Baser, Nurullah Ekmekci, Muammer Zerenler
Abstract:
In the age of environmental concerns increasingly becoming more important, consumer attitudes towards environmentally sensitive products attract attention. Threats to the health and the environment are important factors for consumers to tend to eco-friendly practices and products. In this regard, it is seen positive increases in the tendency to consume organic food and recyclable products. Choosing products, selecting manufacturers and sellers have gained more importance because of increasing consumers' environmental concerns. In this case, it is very important for businesses to act eco-friendly approach in marketing. Green marketing has gained importance and became a concept that manufacturers' agenda by environmental understanding. Although the green marketing activities are common worldwide, studies on consumer perceptions and preferences are unsatisfactory in the literature. In this regard, this study aims to investigate the tendency of consumers to prefer eco-friendly products under the green marketing activities. In the frame of this information and the purpose of the study described above, the survey method has been used in the study. The obtained data have been analyzed through SPSS 20.0 software package, hypothesizes have been tested and suggestions have been made.Keywords: eco-friendly product, environmental concerns, green consumption, green marketing
Procedia PDF Downloads 2952086 A Comparative and Doctrinal Analysis towards the Investigation of a Right to Be Forgotten in Hong Kong
Authors: Jojo Y. C. Mo
Abstract:
Memories are good. They remind us of people, places and experiences that we cherish. But memories cannot be changed and there may well be memories that we do not want to remember. This is particularly true in relation to information which causes us embarrassment and humiliation or simply because it is private – we all want to erase or delete such information. This desire to delete is recently recognised by the Court of Justice of the European Union in the 2014 case of Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González in which the court ordered Google to remove links to some information about the complainant which he wished to be removed. This so-called ‘right to be forgotten’ received serious attention and significantly, the European Council and the European Parliament enacted the General Data Protection Regulation (GDPR) to provide a more structured and normative framework for implementation of right to be forgotten across the EU. This development in data protection laws will, undoubtedly, have significant impact on companies and co-operations not just within the EU but outside as well. Hong Kong, being one of the world’s leading financial and commercial center as well as one of the first jurisdictions in Asia to implement a comprehensive piece of data protection legislation, is therefore a jurisdiction that is worth looking into. This article/project aims to investigate the following: a) whether there is a right to be forgotten under the existing Hong Kong data protection legislation b) if not, whether such a provision is necessary and why. This article utilises a comparative methodology based on a study of primary and secondary resources, including scholarly articles, government and law commission reports and working papers and relevant international treaties, constitutional documents, case law and legislation. The author will primarily engage literature and case-law review as well as comparative and doctrinal analyses. The completion of this article will provide privacy researchers with more concrete principles and data to conduct further research on privacy and data protection in Hong Kong and internationally and will provide a basis for policy makers in assessing the rationale and need for a right to be forgotten in Hong Kong.Keywords: privacy, right to be forgotten, data protection, Hong Kong
Procedia PDF Downloads 1892085 Ethics Can Enable Open Source Data Research
Authors: Dragana Calic
Abstract:
The openness, availability and the sheer volume of big data have provided, what some regard as, an invaluable and rich dataset. Researchers, businesses, advertising agencies, medical institutions, to name only a few, collect, share, and analyze this data to enable their processes and decision making. However, there are important ethical considerations associated with the use of big data. The rapidly evolving nature of online technologies has overtaken the many legislative, privacy, and ethical frameworks and principles that exist. For example, should we obtain consent to use people’s online data, and under what circumstances can privacy considerations be overridden? Current guidance on how to appropriately and ethically handle big data is inconsistent. Consequently, this paper focuses on two quite distinct but related ethical considerations that are at the core of the use of big data for research purposes. They include empowering the producers of data and empowering researchers who want to study big data. The first consideration focuses on informed consent which is at the core of empowering producers of data. In this paper, we discuss some of the complexities associated with informed consent and consider studies of producers’ perceptions to inform research ethics guidelines and practice. The second consideration focuses on the researcher. Similarly, we explore studies that focus on researchers’ perceptions and experiences.Keywords: big data, ethics, producers’ perceptions, researchers’ perceptions
Procedia PDF Downloads 2842084 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives
Authors: Nawt Almutairi, Ramzi El-Haddadeh
Abstract:
With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.Keywords: e-service, satisfaction, trust, loyalty
Procedia PDF Downloads 2592083 Mobile Health Apps Can Cause More Harm Due to Health Anxiety Than Good
Authors: Malik Takreem Ahmad, Pablo Lamata, Rasi Mizori
Abstract:
Background: In recent years, mobile health apps have grown in popularity as a means for people to track and manage their health. While there is increasing worry that these applications may potentially contribute to the emergence of health anxiety, they can also help to encourage healthy behaviours and provide access to health information. Objective: The objective of this literature review is to look at available mhealth apps and critically evaluate the compromise between reassurance and anxiety. Methodology: A literature review was carried out to analyse the effects of mhealth apps on the creation of health anxiety within the general population. PubMed and SCOPUS were used to search for relevant articles, and abstracts were screened using inclusion criteria of the terms: mhealth apps; e-Health; healthcare apps; cyberchondria; Health anxiety; illness anxiety disorder. A total of 27 studies were included in the review. Results and discussion: The findings suggest a direct relationship between mobile health app use and health anxiety. The impact of mobile health apps on health anxiety may depend on how they are used - individuals receiving a constant stream of health-related information may trigger unnecessary concern about one's health. The need for more regulation and oversight is identified, which can lead to app quality and safety consistency. There are also concerns about data security and privacy and the resulting "digital gap" for individuals without mobiles or internet access. Conclusion: While health apps can be valuable tools for managing and tracking health, individuals need to use them in a balanced and informed way to avoid increased anxiety.Keywords: mobile health, mhealth apps, cyberchondria, health anxiety
Procedia PDF Downloads 892082 Criminalizing the Transmission of HIV-Lessons for South Africa
Authors: Desiree David
Abstract:
South Africa has one of the highest rates of HIV infection in the world, with a sizable percentage of the population living with HIV. A substantial number of new infections occur as a result of sexual activity. South African courts have awarded civil claims for damages as a result of the transmission of HIV as a result of non-disclosure by the HIV-positive sexual partner, and more recently, the criminal courts have also convicted and sentenced individuals accused of infecting others as a result of sexual activity. This paper will analyse some case law from South African court cases that have dealt with criminal convictions for the transmission of HIV, and the potential for more widespread prosecutions of these cases. It will also address the desirability of this trend in light of the social public health system, as well as human rights concerns surrounding this highly contentious issue. This will be done by considering some applicable provisions of the Bill of Rights such as the right to privacy and equality, as espoused in the Constitution of the Republic of South Africa. The paper further addresses the experience of other jurisdictions such as Canada, Singapore, Lesotho and Uganda, by analyzing case law, and consider the pitfalls of criminalizing a wide spectrum of sexual conduct that could result in the transmission of HIV. The paper concludes with a proposal that the issue of criminalizing the transmission of HIV cannot be addressed by the criminal justice system alone, as to do so could result in harsh consequences for those living with HIV. As such individuals may be burdened with additional responsibilities that could potentially impact on the rights of the individual. This may ultimately result in injustice for those living with HIV.Keywords: criminalization, HIV, human rights, South Africa
Procedia PDF Downloads 3422081 The Effect of Technology on Legal Securities and Privacy Issues
Authors: Nancy Samuel Reyad Farhan
Abstract:
even though international crook law has grown considerably inside the ultimate decades, it still remains fragmented and lacks doctrinal cohesiveness. Its idea is defined within the doctrine as pretty disputable. there is no concrete definition of the term. in the home doctrine, the hassle of crook law troubles that rise up within the worldwide setting, and international troubles that get up in the national crook regulation, is underdeveloped each theoretically and nearly. To the exceptional of writer’s know-how, there aren't any studies describing worldwide elements of crook law in a complete way, taking a more expansive view of the difficulty. This paper provides consequences of a part of the doctoral studies, assignment a theoretical framework of the worldwide crook law. It ambitions at checking out the present terminology on international components of criminal law. It demonstrates differences among the notions of global crook regulation, criminal regulation international and law worldwide crook. It confronts the belief of crook regulation with associated disciplines and indicates their interplay. It specifies the scope of international criminal regulation. It diagnoses the contemporary criminal framework of global components of criminal regulation, referring to each crook law issues that rise up inside the international setting, and international problems that rise up within the context of national criminal law. ultimately, de lege lata postulates had been formulated and route of modifications in global criminal law turned into proposed. The followed studies hypothesis assumed that the belief of international criminal regulation became inconsistent, not understood uniformly, and there has been no conformity as to its location inside the system of regulation, objective and subjective scopes, while the domestic doctrine did not correspond with international requirements and differed from the global doctrine. applied research strategies covered inter alia a dogmatic and legal technique, an analytical technique, a comparative approach, in addition to desk studies.Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures
Procedia PDF Downloads 302080 Digital Innovation and Business Transformation
Authors: Bisola Stella Sonde
Abstract:
Digital innovation has emerged as a pivotal driver of business transformation in the contemporary landscape. This case study research explores the dynamic interplay between digital innovation and the profound metamorphosis of businesses across industries. It delves into the multifaceted dimensions of digital innovation, elucidating its impact on organizational structures, customer experiences, and operational paradigms. The study investigates real-world instances of businesses harnessing digital technologies to enhance their competitiveness, agility, and sustainability. It scrutinizes the strategic adoption of digital platforms, data analytics, artificial intelligence, and emerging technologies as catalysts for transformative change. The cases encompass a diverse spectrum of industries, spanning from traditional enterprises to disruptive startups, offering insights into the universal relevance of digital innovation. Moreover, the research scrutinizes the challenges and opportunities posed by the digital era, shedding light on the intricacies of managing cultural shifts, data privacy, and cybersecurity concerns in the pursuit of innovation. It unveils the strategies that organizations employ to adapt, thrive, and lead in the era of digital disruption. In summary, this case study research underscores the imperative of embracing digital innovation as a cornerstone of business transformation. It offers a comprehensive exploration of the contemporary digital landscape, offering valuable lessons for organizations striving to navigate the ever-evolving terrain of the digital age.Keywords: business transformation, digital innovation, emerging technologies, organizational structures
Procedia PDF Downloads 602079 Freedom of Information and Freedom of Expression
Authors: Amin Pashaye Amiri
Abstract:
Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.Keywords: freedom of information, freedom of expression, human rights, government information
Procedia PDF Downloads 5482078 Integrating a Universal Forensic DNA Database: Anticipated Deterrent Effects
Authors: Karen Fang
Abstract:
Investigative genetic genealogy has attracted much interest in both the field of ethics and the public eye due to its global application in criminal cases. Arguments have been made regarding privacy and informed consent, especially with law enforcement using consumer genetic testing results to convict individuals. In the case of public interest, DNA databases have the strong potential to significantly reduce crime, which in turn leads to safer communities and better futures. With the advancement of genetic technologies, the integration of a universal forensic DNA database in violent crimes, crimes against children, and missing person cases is expected to deter crime while protecting one’s privacy. Rather than collecting whole genomes from the whole population, STR profiles can be used to identify unrelated individuals without compromising personal information such as physical appearance, disease risk, and geographical origin, and additionally, reduce cost and storage space. STR DNA profiling is already used in the forensic science field and going a step further benefits several areas, including the reduction in recidivism, improved criminal court case turnaround time, and just punishment. Furthermore, adding individuals to the database as early as possible prevents young offenders and first-time offenders from participating in criminal activity. It is important to highlight that DNA databases should be inclusive and tightly governed, and the misconception on the use of DNA based on crime television series and other media sources should be addressed. Nonetheless, deterrent effects have been observed in countries like the US and Denmark with DNA databases that consist of serious violent offenders. Fewer crimes were reported, and fewer people were convicted of those crimes- a favorable outcome, not even the death penalty could provide. Currently, there is no better alternative than a universal forensic DNA database made up of STR profiles. It can open doors for investigative genetic genealogy and fostering better communities. Expanding the appropriate use of DNA databases is ethically acceptable and positively impacts the public.Keywords: bioethics, deterrent effects, DNA database, investigative genetic genealogy, privacy, public interest
Procedia PDF Downloads 1492077 Public and Private Spaces Producing Social Connectedness in Traditional Environment: A Study on Old Medina District of Casablanca
Authors: Asmaa Sokrat, Aykut Karaman
Abstract:
Public and private spaces are major components of the morphology of the city. This research aims to study the interactions between public and private domains in terms of urban space in Casablanca. The research focuses on a general vision of a socio-spatial issue. It plans to identify the public, private, and transition (semi-public, semi-private) spaces as the constituent of the urban space. Moreover, the study investigates the link between public and private spaces with the social dimensions. Additionally, the research argues that the public space is a place of social interaction; as a reflection, this interaction is the intersection between urban space and social connectedness. Besides, social interaction can be the key to distinguishing between the public and private spheres. The methodological approach of the research is based on the literature review and field study. The article is targeting a case study on the old Medina of Casablanca, from daily use of the public and private spaces, the urban tissue, and the urban space types. In conclusion, the research exhibits that a public space could influence the privacy of the residents of a local urban area; thus, this privacy is inverted on the social interaction. This social interaction is the link between the urban space and social connectedness. Hence, this equation affects the typology of the private space.Keywords: public sphere, private sphere, social connectedness, old Medina of Casablanca
Procedia PDF Downloads 1382076 Smart Technology Work Practices to Minimize Job Pressure
Authors: Babar Rasheed
Abstract:
The organizations are in continuous effort to increase their yield and to retain their associates, employees. Technology is considered an integral part of attaining apposite work practices, work environment, and employee engagement. Unconsciously, these advanced practices like work from home, personalized intra-network are disturbing employee work-life balance which ultimately increases psychological pressure on employees. The smart work practice is to develop business models and organizational practices with enhanced employee engagement, minimum trouncing of organization resources with persistent revenue and positive addition in global societies. Need of smart work practices comes from increasing employee turnover rate, global economic recession, unnecessary job pressure, increasing contingent workforce and advancement in technologies. Current practices are not enough elastic to tackle global changing work environment and organizational competitions. Current practices are causing many reciprocal problems among employee and organization mechanically. There is conscious understanding among business sectors smart work practices that will deal with new century challenges with addressing the concerns of relevant issues. It is aimed in this paper to endorse customized and smart work practice tools along knowledge framework to manage the growing concerns of employee engagement, use of technology, orgaization concerns and challenges for the business. This includes a Smart Management Information System to address necessary concerns of employees and combine with a framework to extract the best possible ways to allocate companies resources and re-align only required efforts to adopt the best possible strategy for controlling potential risks.Keywords: employees engagement, management information system, psychological pressure, current and future HR practices
Procedia PDF Downloads 1842075 Sustainable Development: Evaluation of an Urban Neighborhood
Authors: Harith Mohammed Benbouali
Abstract:
The concept of sustainable development is becoming increasingly important in our society. The efforts of specialized agencies, cleverly portrayed in the media, allow a widespread environmental awareness. Far from the old environmental movement in the backward-looking nostalgia, the environment is combined with today's progress. Many areas now include these concerns in their efforts, this in order to try to reduce the negative impact of human activities on the environment. The quantitative dimension of development has given way to the quality aspect. However, this feature is not common, and the initial target was abandoned in favor of economic considerations. Specialists in the field of building and construction have constantly sought to further integrate the environmental dimension, creating a seal of high environmental quality buildings. The pursuit of well-being of neighborhood residents and the quality of buildings are also a hot topic in planning. Quality of life is considered so on, since financial concerns dominate to the detriment of the environment and the welfare of the occupants. This work concerns the development of an analytical method based on multiple indicators of objectives across the district. The quantification of indicators related to objectives allows the construction professional, the developer or the community, to quantify and compare different alternatives for development of a neighborhood. This quantification is based on the use of simulation tools and a multi-criteria aggregation.Keywords: sustainable development, environment, district, indicators, multi-criteria analysis, evaluation
Procedia PDF Downloads 3122074 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities
Authors: Nazli Hardy
Abstract:
Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.Keywords: Internet of Things (IoT), authentication, protocols, survey
Procedia PDF Downloads 2992073 Detection of Cyberattacks on the Metaverse Based on First-Order Logic
Authors: Sulaiman Al Amro
Abstract:
There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic
Procedia PDF Downloads 402072 Self-Care and Emotional Wellbeing of Nurses Using Playback Theatre and Expressive Arts
Authors: Radhika Jain
Abstract:
The nursing community in India face unique challenges ranging from lack of adequate career progression, low social status attached to the profession, poor nurse-to-patient ratio leading to heavy workload resulting in stress and burnout, lack of general recognition and the responsibility of often having to deal with the ire of the patients and their families. This study explores how a combination of Playback Theatre and Expressive Arts could be used as a very powerful tool to understand the concerns, and consequently as a self-care tool to bring about the sense of well-being and emotional awareness for the nurses. For the purpose of this study, Playback Theatre was used as an entry tool to understand the thoughts, feelings and concerns. Playback theatre is a unique improvisational form of theatre developed by Jonathan Fox and Jo Salas in 1975, in which audience share their own stories from their lives and the performers play them back through a range of improv techniques such as metaphor, poetry, music and movement. Playback Theatre helped in first warming them up to the idea of sharing and then gave them the confidence of a safe space to collectively go deeper into their emotional experiences. As the next step, structured sessions of Expressive Arts were conducted with the same set of nurses, for them to work on the issues and concerns they have (and which they shared during the Playback performance). These sessions were to enable longer engagements as many of the concerns expressed were related to perceptions and beliefs that have been ingrained over a period of time and hence it needs a longer engagement to be worked on in detail. The Expressive Art sessions helped in this regard. Expressive arts therapy combines psychology and the creative process to promote emotional growth and healing. The study was conducted at two places: one a geriatric centre and the other, a palliative care centre. The study revealed that concerns and challenges would not be identical across the nursing community or across similar types of health care organizations but would be specific to each organization or centre as the circumstances and set-up at each place would be different. At the geriatric centre, stress and burnout emerged as the main concerns while at the palliative care centre, the main concern that came up was around the difficulty the nurses faced in expressing emotions and in communicating their feelings. The objective analysis of the results of the study indicated how longer-term engagements using Expressive Arts as the modality helped the nurses have better awareness of their emotions and helped them develop tools of self-care tools while also tapping into their emotions to express and experience. The process of eliciting the main concerns from the nurses using a Playback Theatre performance and then following that with subsequent sessions of expressive arts helped the nurses in the way nurses approached their job and the reduced level of overwhelm that they felt.Keywords: palliative care, nurses, self-care, expressive arts, playback theatre
Procedia PDF Downloads 1202071 Benefit Sharing of Research Participants in Human Genomic Research: Ethical Concerns and Ramifications
Authors: Tamanda Kamwendo
Abstract:
The concept of benefit sharing has been a prominent global debate in the world, gaining traction in human research ethics. Despite its prevalence, the concept of benefit sharing is not without controversy over its meaning and justification. This is due to the fact that it lacks a broadly accepted definition and many proponents discuss benefit sharing by arguing for its necessity rather than engaging in critical intellectual engagement with technical issues such as what it implies. What is clear in the literature is that the underlying premise of benefit-sharing is that research involving underprivileged and marginalized people is currently unjust and inequitable because these people are denied access to these gains; thus, benefit-sharing arrangements are required for these research projects to be just and equitable. This paper, therefore, investigates the discourses and justifications behind the concept of benefit sharing to human participants, particularly when dealing with human genomics research. Furthermore, considering that benefit sharing is generally viewed as a transaction between research organizations and research participants, it raises ethical concerns concerning the commodification of human material and undermines the sanctity of the human genome. This is predicated on the idea that research sponsors would be compelled to deliver a minimum set of possible benefits to research participants and communities in exchange for their involvement in the study. There is, therefore, need to protect benefit-sharing practices in international health research by developing a governance legal framework. A legal framework of benefit sharing will also dispel the issue of commodification of human material where human genomic research is done.Keywords: benefit sharing, human participants, human genomic research, ethical concerns
Procedia PDF Downloads 762070 Gentrification and Its Impact on Urbanization in India
Authors: Swapnil Vidhate, Anupama Sharma
Abstract:
At present the world is experiencing an extraordinary rate of urbanization. India is also in a major phase of urbanization. Gentrification is being practiced in India much later compared to western countries as a strategy for urban renewal. The urban fabric in Indian context is composed of multiple layers in it. Thus, the process of gentrification has different typologies, views and impacts in Indian context. It is a curative concept to restructure the declined areas of the city. But it has more negative views compared to positive due to the concerns in the process in India. The paper brings out the impacts of gentrification and concerns related with the process in Indian context with a case example of core city.Keywords: urbanization, urban renewal, gentrification, restructure, core city
Procedia PDF Downloads 7522069 Examining Neo-colonialism and Power in Global Surgical Missions: An Historical, Practical and Ethical Analysis
Authors: Alex Knighton, Roba Khundkar, Michael Dunn
Abstract:
Neo-colonialism is defined as the use of economic, political, cultural, or other pressures to control or influence other countries, especially former dependencies, and concerns have been raised about its presence in surgical missions. Surgical missions aim to rectify the huge disparity in surgical access worldwide, but their ethics must be carefully considered. This is especially in light of colonial history which affects international relations and global health today, to ensure that colonial attitudes are not influencing efforts to promote equity. This review examines the history of colonial global health, demonstrating that global health initiatives have consistently been used to benefit those providing them, and then asks whether elements of colonialism are still pervasive in surgical missions today. Data was collected from the literature using specified search terms and snowball searching, as well as from international expert web-based conferences on global surgery ethics. A thematic analysis was then conducted on this data, resulting in the identification of six themes which are identifiable in both past and present global health initiatives. These six themes are power, lack of understanding or respect, feelings of superiority, exploitation, enabling of dependency, and acceptance of poorer standards of care. An ethical analysis follows, concluding that the concerns of power and neo-colonialism in global surgery would be addressed by adopting a framework of procedural justice that promotes a refined governance process in which stakeholders are able to propose and reject decisions that affect them. The paper argues that adopting this model would address concerns of the power disparity in the field directly, as well as promoting an ethical framework to enable the other concerns of power disparity and neo-colonialism identified in the present analysis to be addressed.Keywords: medical ethics, global surgery, global health, neocolonialism, surgical missions
Procedia PDF Downloads 952068 Predatory Pricing at Services Markets: Incentives, Mechanisms, Standards of Proving, and Remedies
Authors: Mykola G. Boichuk
Abstract:
The paper concerns predatory pricing incentives and mechanisms in the markets of services, as well as its anti-competitive effects. As cost estimation at services markets is more complex in comparison to markets of goods, predatory pricing is more difficult to detect in the provision of services. For instance, this is often the case for professional services, which is analyzed in the paper. The special attention is given to employment markets as de-facto main supply markets for professional services markets. Also, the paper concerns such instances as travel agents' services, where predatory pricing may have implications not only on competition but on a wider range of public interest as well. Thus, the paper develops on effective ways to apply competition law rules on predatory pricing to the provision of services.Keywords: employment markets, predatory pricing, services markets, unfair competition
Procedia PDF Downloads 3252067 Quantum Cryptography: Classical Cryptography Algorithms’ Vulnerability State as Quantum Computing Advances
Authors: Tydra Preyear, Victor Clincy
Abstract:
Quantum computing presents many computational advantages over classical computing methods due to the utilization of quantum mechanics. The capability of this computing infrastructure poses threats to standard cryptographic systems such as RSA and AES, which are designed for classical computing environments. This paper discusses the impact that quantum computing has on cryptography, while focusing on the evolution from classical cryptographic concepts to quantum and post-quantum cryptographic concepts. Standard Cryptography is essential for securing data by utilizing encryption and decryption methods, and these methods face vulnerability problems due to the advancement of quantum computing. In order to counter these vulnerabilities, the methods that are proposed are quantum cryptography and post-quantum cryptography. Quantum cryptography uses principles such as the uncertainty principle and photon polarization in order to provide secure data transmission. In addition, the concept of Quantum key distribution is introduced to ensure more secure communication channels by distributing cryptographic keys. There is the emergence of post-quantum cryptography which is used for improving cryptographic algorithms in order to be more secure from attacks by classical and quantum computers. Throughout this exploration, the paper mentions the critical role of the advancement of cryptographic methods to keep data integrity and privacy safe from quantum computing concepts. Future research directions that would be discussed would be more effective cryptographic methods through the advancement of technology.Keywords: quantum computing, quantum cryptography, cryptography, data integrity and privacy
Procedia PDF Downloads 262066 Applications of Internet of Things (IoTs) for Information Resources and Services: Survey of Academic Librarians
Authors: Sultan Aldaihani, Eiman Al-Fadhli
Abstract:
Internet of Things (IoTs) expected to change the future of academic libraries operations. It enables academic libraries to be smart libraries through, for example, the connection of the physical objects with the Internet. The implementation of IoTs will improve library resources and services. Therefore, this research aims to investigate the applications of Internet of Things (IoTs) for information resources and services. Understanding perceptions of academic librarians toward IoTs before adopting of such applications will assist decision-makers in academic libraries in their strategic planning. An online questionnaire was administered to academic librarians at Kuwait University. The findings of this study showed that academic librarians have awareness for the IoTs. They have strongly believed that the IoTs contributes to the development of information resources, services, and understanding of the user's information behavior. Identifying new applications of the IoTs in libraries was the highest possible reason for future adoption. Academic librarians indicated that lack of privacy and data penetration were the greatest problem in their future adoption of IoTs. Academic libraries need to implement the IoTs for enhancing their information resources and services. One important step in the success of future adoption is to conduct awareness and training programs for academic librarians. They also need to maintain higher security and privacy measurements in their implementation for the IoTs. This study will assist academic libraries in accommodating this technology.Keywords: academic libraries, internet of things, information resources, information services
Procedia PDF Downloads 1532065 Power Quality Evaluation of Electrical Distribution Networks
Authors: Mohamed Idris S. Abozaed, Suliman Mohamed Elrajoubi
Abstract:
Researches and concerns in power quality gained significant momentum in the field of power electronics systems over the last two decades globally. This sudden increase in the number of concerns over power quality problems is a result of the huge increase in the use of non-linear loads. In this paper, power quality evaluation of some distribution networks at Misurata - Libya has been done using a power quality and energy analyzer (Fluke 437 Series II). The results of this evaluation are used to minimize the problems of power quality. The analysis shows the main power quality problems that exist and the level of awareness of power quality issues with the aim of generating a start point which can be used as guidelines for researchers and end users in the field of power systems.Keywords: power quality disturbances, power quality evaluation, statistical analysis, electrical distribution networks
Procedia PDF Downloads 533