Search results for: personal and sensitive data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27712

Search results for: personal and sensitive data

27502 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 266
27501 In Defense of Impersonal Obligatoriness

Authors: Peter B. M. Vranas

Abstract:

An important question in moral philosophy is whether whatever is obligatory (i.e., morally required) is personally obligatory, namely obligatory for someone. A positive answer is uncontested in the literature: for example, if it is obligatory for you to keep your promises, it seems that it is obligatory for you you keep your promises. By using conceptual analysis, this paper defends a negative answer: some things are impersonally obligatory, namely obligatory, but not obligatory for anyone. For example, if each of us has promised to vote and thus has an obligation to vote, then it is obligatory that we all vote, but it is not obligatory for anyone that we all vote (because, for example, what is obligatory for you is that you vote, not that we all vote). The paper concludes that there is an important concept of impersonal obligatoriness irreducible to personal obligatoriness.

Keywords: impersonal obligatoriness, ought to be, ought to do, personal obligatoriness

Procedia PDF Downloads 97
27500 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain

Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami

Abstract:

To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.

Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption

Procedia PDF Downloads 136
27499 Blockchain Platform Configuration for MyData Operator in Digital and Connected Health

Authors: Minna Pikkarainen, Yueqiang Xu

Abstract:

The integration of digital technology with existing healthcare processes has been painfully slow, a huge gap exists between the fields of strictly regulated official medical care and the quickly moving field of health and wellness technology. We claim that the promises of preventive healthcare can only be fulfilled when this gap is closed – health care and self-care becomes seamless continuum “correct information, in the correct hands, at the correct time allowing individuals and professionals to make better decisions” what we call connected health approach. Currently, the issues related to security, privacy, consumer consent and data sharing are hindering the implementation of this new paradigm of healthcare. This could be solved by following MyData principles stating that: Individuals should have the right and practical means to manage their data and privacy. MyData infrastructure enables decentralized management of personal data, improves interoperability, makes it easier for companies to comply with tightening data protection regulations, and allows individuals to change service providers without proprietary data lock-ins. This paper tackles today’s unprecedented challenges of enabling and stimulating multiple healthcare data providers and stakeholders to have more active participation in the digital health ecosystem. First, the paper systematically proposes the MyData approach for healthcare and preventive health data ecosystem. In this research, the work is targeted for health and wellness ecosystems. Each ecosystem consists of key actors, such as 1) individual (citizen or professional controlling/using the services) i.e. data subject, 2) services providing personal data (e.g. startups providing data collection apps or data collection devices), 3) health and wellness services utilizing aforementioned data and 4) services authorizing the access to this data under individual’s provided explicit consent. Second, the research extends the existing four archetypes of orchestrator-driven healthcare data business models for the healthcare industry and proposes the fifth type of healthcare data model, the MyData Blockchain Platform. This new architecture is developed by the Action Design Research approach, which is a prominent research methodology in the information system domain. The key novelty of the paper is to expand the health data value chain architecture and design from centralization and pseudo-decentralization to full decentralization, enabled by blockchain, thus the MyData blockchain platform. The study not only broadens the healthcare informatics literature but also contributes to the theoretical development of digital healthcare and blockchain research domains with a systemic approach.

Keywords: blockchain, health data, platform, action design

Procedia PDF Downloads 100
27498 The Twin Terminal of Pedestrian Trajectory Based on City Intelligent Model (CIM) 4.0

Authors: Chen Xi, Liu Xuebing, Lao Xueru, Kuan Sinman, Jiang Yike, Wang Hanwei, Yang Xiaolang, Zhou Junjie, Xie Jinpeng

Abstract:

To further promote the development of smart cities, the microscopic "nerve endings" of the City Intelligent Model (CIM) are extended to be more sensitive. In this paper, we develop a pedestrian trajectory twin terminal based on the CIM and CNN technology. It also uses 5G networks, architectural and geoinformatics technologies, convolutional neural networks, combined with deep learning networks for human behavior recognition models, to provide empirical data such as 'pedestrian flow data and human behavioral characteristics data', and ultimately form spatial performance evaluation criteria and spatial performance warning systems, to make the empirical data accurate and intelligent for prediction and decision making.

Keywords: urban planning, urban governance, CIM, artificial intelligence, sustainable development

Procedia PDF Downloads 419
27497 Exploring Data Leakage in EEG Based Brain-Computer Interfaces: Overfitting Challenges

Authors: Khalida Douibi, Rodrigo Balp, Solène Le Bars

Abstract:

In the medical field, applications related to human experiments are frequently linked to reduced samples size, which makes the training of machine learning models quite sensitive and therefore not very robust nor generalizable. This is notably the case in Brain-Computer Interface (BCI) studies, where the sample size rarely exceeds 20 subjects or a few number of trials. To address this problem, several resampling approaches are often used during the data preparation phase, which is an overly critical step in a data science analysis process. One of the naive approaches that is usually applied by data scientists consists in the transformation of the entire database before the resampling phase. However, this can cause model’ s performance to be incorrectly estimated when making predictions on unseen data. In this paper, we explored the effect of data leakage observed during our BCI experiments for device control through the real-time classification of SSVEPs (Steady State Visually Evoked Potentials). We also studied potential ways to ensure optimal validation of the classifiers during the calibration phase to avoid overfitting. The results show that the scaling step is crucial for some algorithms, and it should be applied after the resampling phase to avoid data leackage and improve results.

Keywords: data leackage, data science, machine learning, SSVEP, BCI, overfitting

Procedia PDF Downloads 153
27496 The Power of Story in Demonstrating the Story of Power

Authors: Marianne Vardalos

Abstract:

Many students are returning to school after years of rich, lived experiences as parents, employees, volunteers, and in various other roles outside the university. While in the workforce or at home raising a family, they have gained authentic, personal observations of the power dynamics referred to as racism, classism, sexism, heteronormativity, and ableism. Encouraging your students to apply their own realities to course material that interrogates power structures and privilege not only facilitates student learning and understanding but also reveals that you, as a teacher, respect the experiences of your students as valuable and valid teaching tools. Though there is general recognition of the pedagogical value of having students share their experiences, facilitating such discussion can be a harrowing challenge for faculty. Additionally, for some students, the classroom can be very strange and too intimidating to share personal stories of injustice or inequality. In larger classroom settings, an attempt to integrate story-telling can turn into a cacophony of emotional testimonials. Not wanting to lose control of the class and feeling unqualified to respond to students' emotional confessions from their past, educators are often tempted to minimize the personal comments of students and avoid altogether an impromptu free-for-all. Knowing how and when to draw on the personal experience of your students involves a systematic plan for eliciting the most useful information at the right time. The trick is to design methods that induce student self-reflection in a way that is relevant to the course material and to then effectively incorporate these methods into lesson plans.

Keywords: pedagogy, story-telling, power and inequality, hierarchies of power

Procedia PDF Downloads 92
27495 A Critical Examination of the Relationship between the Media and the Political Agenda in the Social Deviance Portrayal of Disabled People

Authors: Cara Williams

Abstract:

This paper considers the media’s role in formulating a dominant social deviance paradigm and medicalised portrayal of disabled people and examines how those representations of impairment reinforce the personal tragedy view that underpins the social value given to the category of disability. According to a materialist perspective, the personal tragedy medical model approach condemns disabled people to live an inferior 'life apart', socially excluded and prevented from living as fully participating citizens on an equal basis to non-disabled people. Commonly, disabled people are portrayed as a person who needs to be cured in order to achieve a better 'quality of life'; otherwise stories center on deviance, criminality or scrounger. Media representations have consistently used negative language and images that reinforce the personal tragedy 'deficient' view of disability. The systematic misrepresentation within film, literature, TV and other art forms have validated a process about what it means to be 'normal' and how 'difference' and 'identity' are interpreted. The impact of these stereotyped disabling images for disabled people is a barrier not experienced by many other oppressed minority groups. Applying a materialist analysis, this paper contends that the impact on audience’s perceptions of impaired bodies and minds, and the harmful effects on disabled people can be linked with agenda setting theory - the relationship between the media and the political agenda.

Keywords: media, disabled people, political agenda, personal tragedy

Procedia PDF Downloads 145
27494 Micro Celebrities in Social Media Instagram and Their Personal Influence in Business Perspective

Authors: Yoga Maulana Putra, Herry Hudrasyah

Abstract:

The Internet has now become an important part of human life; it can be accessed through a computer or even a smartphone almost anywhere and anytime. The Internet has created many social media such as Facebook, Twitter, and Instagram. Instagram has been acquired by Facebook in 2012. Since then, Instagram is growing fast. And now, Instagram is transforming from photo-sharing social media into business tools. As the result, some new behavior has been discovered. Some of Instagram user is becoming popular. These people also being called minor celebrity and they are also being used as marketing tools by many companies to influencing or promoting their product or service. This minor celebrity is existing because of their behavior in using Instagram. The company is using the personal influence of the minor celebrity to promoting and influencing their product or service, and the minor celebrity gets paid as much as their rate card. And their rate card based on their followers and insight. This research is using a qualitative method. An interview is being done to 6 minor celebrities from many different categories such as photographer, travel blogger, lifestyle, food blogger, fashion, and healthcare. Theory of reasoned behavior is being used as the grounded theory to discover the reason for their behavior and personal influence to describe their way to influencing people. The result of the interview is most of the minor celebrities is influenced by their friend’s circle in the process of using Instagram. They also had a different way to use their personal influence to affect their followers when the company employs them.

Keywords: humanities and social sciences, Instagram, minor celebrity, social media

Procedia PDF Downloads 166
27493 Dogmatic Analysis of Legal Risks of Using Artificial Intelligence: The European Union and Polish Perspective

Authors: Marianna Iaroslavska

Abstract:

ChatGPT is becoming commonplace. However, only a few people think about the legal risks of using Large Language Model in their daily work. The main dilemmas concern the following areas: who owns the copyright to what somebody creates through ChatGPT; what can OpenAI do with the prompt you enter; can you accidentally infringe on another creator's rights through ChatGPT; what about the protection of the data somebody enters into the chat. This paper will present these and other legal risks of using large language models at work using dogmatic methods and case studies. The paper will present a legal analysis of AI risks against the background of European Union law and Polish law. This analysis will answer questions about how to protect data, how to make sure you do not violate copyright, and what is at stake with the AI Act, which recently came into force in the EU. If your work is related to the EU area, and you use AI in your work, this paper will be a real goldmine for you. The copyright law in force in Poland does not protect your rights to a work that is created with the help of AI. So if you start selling such a work, you may face two main problems. First, someone may steal your work, and you will not be entitled to any protection because work created with AI does not have any legal protection. Second, the AI may have created the work by infringing on another person's copyright, so they will be able to claim damages from you. In addition, the EU's current AI Act imposes a number of additional obligations related to the use of large language models. The AI Act divides artificial intelligence into four risk levels and imposes different requirements depending on the level of risk. The EU regulation is aimed primarily at those developing and marketing artificial intelligence systems in the EU market. In addition to the above obstacles, personal data protection comes into play, which is very strictly regulated in the EU. If you violate personal data by entering information into ChatGPT, you will be liable for violations. When using AI within the EU or in cooperation with entities located in the EU, you have to take into account a lot of risks. This paper will highlight such risks and explain how they can be avoided.

Keywords: EU, AI act, copyright, polish law, LLM

Procedia PDF Downloads 21
27492 Creating Trauma-Sensitive Yoga Programs for University Students With Stress and Anxiety: Lessons From a Program in the United States

Authors: Jessica Gladden

Abstract:

Anxiety remains one of the most common mental health disorders in the United States. Many university students report having a high level of anxiety, with additional life stressors that might include being away from home for the first time, being around unfamiliar people, having new expectations placed on them, and often have financial struggles. Universities have the ability and opportunity to form programs that can involve students with activities that reduce stress and teach coping skills. This research includes one example of using a somatic based group format of yoga to teach these skills and assist students in applying these strategies to their daily lives. This study compared a group of 17 students participating in weekly yoga classes to 34 students who did not attend the program. The students who attended the program reported a larger reduction of anxiety on both the BAI and GAD-7 than the control group, and verbally reported additional benefits in relaxation and coping skills. This presentation will review the results of the program as well as detailing the steps taken in creating a yoga program for university students with stress and anxiety. This will include a discussion on the components of trauma-sensitive yoga and the concerns and strategies to consider when developing a program for students.

Keywords: yoga, trauma-sensitive yoga, anxiety, students

Procedia PDF Downloads 115
27491 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI

Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu

Abstract:

Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.

Keywords: contex-sensitive, CFI, binary analysis, code reuse attack

Procedia PDF Downloads 323
27490 Platform-as-a-Service Sticky Policies for Privacy Classification in the Cloud

Authors: Maha Shamseddine, Amjad Nusayr, Wassim Itani

Abstract:

In this paper, we present a Platform-as-a-Service (PaaS) model for controlling the privacy enforcement mechanisms applied on user data when stored and processed in Cloud data centers. The proposed architecture consists of establishing user configurable ‘sticky’ policies on the Graphical User Interface (GUI) data-bound components during the application development phase to specify the details of privacy enforcement on the contents of these components. Various privacy classification classes on the data components are formally defined to give the user full control on the degree and scope of privacy enforcement including the type of execution containers to process the data in the Cloud. This not only enhances the privacy-awareness of the developed Cloud services, but also results in major savings in performance and energy efficiency due to the fact that the privacy mechanisms are solely applied on sensitive data units and not on all the user content. The proposed design is implemented in a real PaaS cloud computing environment on the Microsoft Azure platform.

Keywords: privacy enforcement, platform-as-a-service privacy awareness, cloud computing privacy

Procedia PDF Downloads 227
27489 Synthesis, Biological Evaluation and Molecular Modeling Studies on Chiral Chloroquine Analogues as Antimalarial Agents

Authors: Srinivasarao Kondaparla, Utsab Debnath, Awakash Soni, Vasantha Rao Dola, Manish Sinha, Kumkum Kumkum Srivastava, Sunil K. Puri, Seturam B. Katti

Abstract:

In a focused exploration, we have designed synthesized and biologically evaluated chiral conjugated new chloroquine (CQ) analogs with substituted piperazines as antimalarial agents. In vitro as well as in vivo studies revealed that compound 7c showed potent activity [for in vitro IC₅₀= 56.98nM (3D7), 97.76nM (K1); for in vivo (up to at the dose of 12.5 mg/kg); SI = 3510] as a new lead of antimalarial agent. Other compounds 6b, 6d, 7d, 7h, 8c, 8d, 9a, and 9c are also showing moderate activity against CQ-sensitive (3D7) strain and superior activity against resistant (K1) strain of P. falciparum. Furthermore, we have carried out docking and 3D-QSAR studies of all in-house data sets (168 molecules) of chiral CQ analogs to explain the structure activity relationships (SAR). Our new findings specified the significance of H-bond interaction with the side chain of heme for biological activity. In addition, the 3D-QSAR study against 3D7 strain indicated the favorable and unfavorable sites of CQ analogs for incorporating steric, hydrophobic and electropositive groups to improve the antimalarial activity.

Keywords: piperazines, CQ-sensitive strain-3D7, in-vitro and in-vivo assay, docking, 3D-QSAR

Procedia PDF Downloads 171
27488 Induced Affectivity and Impact on Creativity: Personal Growth and Perceived Adjustment when Narrating an Intense Emotional Experience

Authors: S. Da Costa, D. Páez, F. Sánchez

Abstract:

We examine the causal role of positive affect on creativity, the association of creativity or innovation in the ideation phase with functional emotional regulation, successful adjustment to stress and dispositional emotional creativity, as well as the predictive role of creativity for positive emotions and social adjustment. The study examines the effects of modification of positive affect on creativity. Participants write three poems, narrate an infatuation episode, answer a scale of personal growth after this episode and perform a creativity task, answer a flow scale after creativity task and fill a dispositional emotional creativity scale. High and low positive effect was induced by asking subjects to write three poems about high and low positive connotation stimuli. In a neutral condition, tasks were performed without previous affect induction. Subjects on the condition of high positive affect report more positive and less negative emotions, more personal growth (effect size r = .24) and their last poem was rated as more original by judges (effect size r = .33). Mediational analysis showed that positive emotions explain the influence of the manipulation on personal growth - positive affect correlates r = .33 to personal growth. The emotional creativity scale correlated to creativity scores of the creative task (r = .14), to the creativity of the narration of the infatuation episode (r = .21). Emotional creativity was also associated, during performing the creativity task, with flow (r = .27) and with affect balance (r = .26). The mediational analysis showed that emotional creativity predicts flow through positive affect. Results suggest that innovation in the phase of ideation is associated with a positive affect balance and satisfactory performance, as well as dispositional emotional creativity is adaptive.

Keywords: affectivity, creativity, induction, innovation, psychological factors

Procedia PDF Downloads 110
27487 Personal Identity and Group Identity under Threat following Exclusion: A Study in Singapore and in the Netherlands

Authors: Z. N. Huwaë, E.M. W. Tong, Y. H. M. See

Abstract:

In the present study, the researchers examined whether people from collectivistic cultures perceive a more group identity threat following social exclusion, whereas a more personal identity threat would be the case for those from individualistic cultures. In doing so, they investigated whether threatened identities depend on whether people are excluded by ingroup members (same ethnic background) or outgroup members (another ethnic background), as exclusion studies have shown mixed results when it comes to being excluded by ingroup versus outgroup members. For this purpose, students in Singapore and in the Netherlands participated in an online ball-tossing game (Cyberball) where they were excluded or included by other players with either the same or other ethnicity. Tentative results showed that both Singaporean and Dutch participants reported a more threat to their group identity than to their personal identity following exclusion and this did not depend on who excluded them. These tentative findings suggest that threatened identities following exclusion may not depend on cultural factors or on the source of exclusion.

Keywords: cultures, exclusion, experiment, group membership, identities

Procedia PDF Downloads 117
27486 Knowledge and Awareness of HIV/AIDS among Male Prisoners in Kuwait

Authors: Saroj Bala Grover, Al Munther Alhasawi, Prem N. Sharma, P. S. N. Menon

Abstract:

Background: Prisoners are considered one of the high-risk populations for the transmission of human immunodeficiency virus (HIV) infection. Targeting this group is one of the strategies to reduce the incidence of acquired immune deficiency syndrome (AIDS) in the community. Subjects and Methods: A cross-sectional study was conducted among male inmates in Kuwait’s prison by administering three sets of questionnaires to assess the level of their knowledge and awareness about the mode of transmission of HIV/AIDS, their risky personal behavior that may lead to HIV infection, and the presence of any negative attitudes and stigmatization towards HIV infected individuals. Results: The study included 123 male inmates, with a mean ± SD age of 30.9 ± 8.4 years. Most participants had good general knowledge (90%) about the mode of transmission of HIV/AIDS, including sharing contaminated syringes, risky personal behaviors such as having unprotected sex and increased number of extramarital relationships (66%), and the avoidance of the regular use of condoms. The younger age group (< 35 years) had more extramarital relationships than those > 35 years (71.4% Vs. 46.4%; p=0.016). There was a perceived attitude of stigmatization among inmates towards HIV-infected persons. Conclusions: This vulnerable group of prisoners, especially young adults, need educational programs to improve knowledge about the transmission of HIV and to correct and change their risky personal behaviors to protect themselves and the community against HIV transmission.

Keywords: HIV/AIDS, Kuwait, prisoners, knowledge, awareness, personal behavior, extramarital relationships, safe sex, discrimination, stigmatization

Procedia PDF Downloads 78
27485 The Social Structuring of Mate Selection: Assortative Marriage Patterns in the Israeli Jewish Population

Authors: Naava Dihi, Jon Anson

Abstract:

Love, so it appears, is not socially blind. We show that partner selection is socially constrained, and the freedom to choose is limited by at least two major factors or capitals: on the one hand, material resources and education, locating the partners on a scale of personal achievement and economic independence. On the other, the partners' ascriptive belonging to particular ethnic, or origin, groups, differentiated by the groups' social prestige, as well as by their culture, history and even physical characteristics. However, the relative importance of achievement and ascriptive factors, as well as the overlap between them, varies from society to society, depending on the society's structure and the factors shaping it. Israeli social structure has been shaped by the waves of new immigrants who arrived over the years. The timing of their arrival, their patterns of physical settlement and their occupational inclusion or exclusion have together created a mosaic of social groups whose principal common feature has been the country of origin from which they arrived. The analysis of marriage patterns helps illuminate the social meanings of the groups and their borders. To the extent that ethnic group membership has meaning for individuals and influences their life choices, the ascriptive factor will gain in importance relative to the achievement factor in their choice of marriage partner. In this research, we examine Jewish Israeli marriage patterns by looking at the marriage choices of 5,041 women aged 15 to 49 who were single at the census in 1983, and who were married at the time of the 1995 census, 12 years later. The database for this study was a file linking respondents from the 1983 and the 1995 censuses. In both cases, 5 percent of household were randomly chosen, so that our sample includes about 4 percent of women in Israel in 1983. We present three basic analyses: (1) Who was still single in 1983, using personal and household data from the 1983 census (binomial model), (2) Who married between 1983 and a1995, using personal and household data from the 1983 census (binomial model), (3) What were the personal characteristics of the womens’ partners in 1995, using data from the 1995 census (loglinear model). We show (i) that material and cultural capital both operate to delay marriage and to increase the probability of remaining single; and (ii) while there is a clear association between ethnic group membership and education, endogamy and homogamy both operate as separate forces which constraint (but do not determine) the choice of marriage partner, and thus both serve to reproduce the current pattern of relationships, as well as identifying patterns of proximity and distance between the different groups.

Keywords: Israel, nuptiality, ascription, achievement

Procedia PDF Downloads 115
27484 Bring Your Own Device Security Model in a Financial Institution of South Africa

Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren

Abstract:

This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.

Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis

Procedia PDF Downloads 31
27483 Traumatic Events, Post-traumatic Symptoms, Personal Resilience, Quality of Life, and Organizational Com Mitment Among Midwives: A Cross-Sectional Study

Authors: Kinneret Segal

Abstract:

The work of a midwife is emotionally challenging, both positively and negatively. Midwives share moments of joy when a baby is welcomed into the world, and also attend difficult events of loss and trauma. The relationship that develops with the maternity is the essence of the midwife's care, and it is a fundamental source of motivation and professional satisfaction. This close relationship with the maternity may be used as a double-edged sword in cases of exposure to traumatic events at birth. Birth problems, exposure to emergencies and traumatic events, and loss can affect the professional quality of life and the Compassion satisfaction of the midwife. It seems that the issue of traumatic experiences in the work of midwives, has not been sufficiently explored. The present study examined the associations between exposure to traumatic events, personal resilience and post-traumatic symptoms, professional quality of life and organizational commitment among midwifery nurses in Israeli hospitals. 131 midwives from three hospitals in the country's center in Israel participated in this study. The data were collected during 2021 using a self-report questionnaire that examined sociodemographic characteristics, the degree of exposure to traumatic events in the delivery room, personal resilience, post-traumatic symptoms, professional quality of life, and organizational commitment. The three most difficult traumatic events for the midwives were death or fear of death of a newborn, death or fear of the death of a mother and a quiet birth. The higher the frequency of exposure to traumatic events, the more numerous and intense the onset of post-trauma symptoms. The more numerous and powerful the post-trauma symptoms, the higher the level of professional burnout and/or compassion fatigue, and the lower the level of compassion satisfaction. High levels of compassion satisfaction and/or low professional burnout were expressed in a heightened sense of organizational commitment. Personal resilience, country of birth, traumatic symptoms and organizational commitment, predicted satisfaction from compassion. Midwives are exposed to traumatic events associated with dissatisfaction and impairment of the professional quality of life that accompanies burnout and compassion fatigue. Exposure to traumatic events leads to the appearance of traumatic symptoms, a decrease in organizational commitment, and psychological and mental well-being. The issue needs to be addressed by implementing training programs, organizational support, and policies to improving well-being and quality of care among midwives.

Keywords: traumatic experirnces, midwives, quality of life, burnout, organizational commitment, personal resilience

Procedia PDF Downloads 87
27482 The Effects of Covid-19 on Oral Health among 19 to 29 Years Old - A Cross-sectional Study in Albania

Authors: Mimoza Canga, Alketa Qafmolla, Vergjini Mulo, Irene Malagnino

Abstract:

Aim: Assessment of oral health in young people aged 18-29 years after the Covid-19 pandemic in Albania. Materials and methods: The present study was conducted at the University of Medicine in Tirana, Albania, from March 2023 to September 2023. This is s cross-sectional study. In our research, 104 students participated, of which 64 were females (61.5%) and 40 were males (38.5%). In the present survey, the participants were divided into four age groups: 18-20, 21-23, 24-26, and 27-29 years old. Majority of the sample (69%) were 18-20 years. Participants were instructed to complete the questionnaire. The study had no dropouts. The current study was conducted in accordance to Helsinki declaration. Statistical analysis was performed using IBM SPSS Statistics Version 23.0, Microsoft Windows Linux, Chicago, IL, USA. Data were analyzed using analysis of variance (ANOVA). P ≤ 0.05 was considered statistically significant. Results: This study reported that 80 (76.9%) of the participants had passed Covid-19, while 24 (23.1%) of them had not passed Covid-19. Based on our data analysis, 70 (67.3%) of the participants had symptoms such as of fever 38°C- 40.5°C and headache. They stated that were treated with Azithromycin 500 mg tablets, Augmentin 625 mg tablets, Vitamin C 1000 mg, Magnesium, and Vitamin D. 40(38.4%) of the participants noticed hypersensitivity in gums (p = 0.004) and sensitive teeth (p = 0.001) after having passed Covid-19 compared to pre-pandemic. Nearly 40 (38.4%) of the participants who passed Covid-19 were treated with painful relievers for the gums and teeth, such as ibuprofen (Advil), used Sensodyne Toothpaste for sensitive teeth and Clove oil. Conclusion: Within the limitations of this study conducted in Albania, can concluded that Covid-19 has a direct impact on oral health.

Keywords: albania, Covid19, cross-sectional study, oral health

Procedia PDF Downloads 96
27481 E4D-MP: Time-Lapse Multiphysics Simulation and Joint Inversion Toolset for Large-Scale Subsurface Imaging

Authors: Zhuanfang Fred Zhang, Tim C. Johnson, Yilin Fang, Chris E. Strickland

Abstract:

A variety of geophysical techniques are available to image the opaque subsurface with little or no contact with the soil. It is common to conduct time-lapse surveys of different types for a given site for improved results of subsurface imaging. Regardless of the chosen survey methods, it is often a challenge to process the massive amount of survey data. The currently available software applications are generally based on the one-dimensional assumption for a desktop personal computer. Hence, they are usually incapable of imaging the three-dimensional (3D) processes/variables in the subsurface of reasonable spatial scales; the maximum amount of data that can be inverted simultaneously is often very small due to the capability limitation of personal computers. Presently, high-performance or integrating software that enables real-time integration of multi-process geophysical methods is needed. E4D-MP enables the integration and inversion of time-lapsed large-scale data surveys from geophysical methods. Using the supercomputing capability and parallel computation algorithm, E4D-MP is capable of processing data across vast spatiotemporal scales and in near real time. The main code and the modules of E4D-MP for inverting individual or combined data sets of time-lapse 3D electrical resistivity, spectral induced polarization, and gravity surveys have been developed and demonstrated for sub-surface imaging. E4D-MP provides capability of imaging the processes (e.g., liquid or gas flow, solute transport, cavity development) and subsurface properties (e.g., rock/soil density, conductivity) critical for successful control of environmental engineering related efforts such as environmental remediation, carbon sequestration, geothermal exploration, and mine land reclamation, among others.

Keywords: gravity survey, high-performance computing, sub-surface monitoring, electrical resistivity tomography

Procedia PDF Downloads 157
27480 A Soft System Methodology Approach to Stakeholder Engagement in Water Sensitive Urban Design

Authors: Lina Lukusa, Ulrike Rivett

Abstract:

Poor water management can increase the extreme pressure already faced by water scarcity. Unless water management is addressed holistically, water quality and quantity will continue to degrade. A holistic approach to water management named Water Sensitive Urban Design (WSUD) has thus been created to facilitate the effective management of water. Traditionally, water management has employed a linear design approach, while WSUD requires a systematic, cyclical approach. In simple terms, WSUD assumes that everything is connected. Hence, it is critical for different stakeholders involved in WSUD to engage and reach a consensus on a solution. However, many stakeholders in WSUD have conflicting interests. Using the soft system methodology (SSM), developed by Peter Checkland, as a problem-solving method, decision-makers can understand this problematic situation from different world views. The SSM addresses ill and complex challenging situations involving human activities in a complex structured scenario. This paper demonstrates how SSM can be applied to understand the complexity of stakeholder engagement in WSUD. The paper concludes that SSM is an adequate solution to understand a complex problem better and then propose efficient solutions.

Keywords: co-design, ICT platform, soft systems methodology, water sensitive urban design

Procedia PDF Downloads 121
27479 The Social Impact of Religion on New Immigrants: A Case Study of Christianity Among Chinese Immigrants in New Zealand

Authors: Ziwen Wang

Abstract:

There are close links between religion and migration. As newcomers to a foreign nation, new immigrants endured many pressures and challenges. Religion can be an important part of a migrant’s personal identity, and religious communities can offer valued connections and relationships. During the migration process, religion can undergo significant changes as migrants travel across geographical and cultural gaps and as they face new opportunities or new constraints. For those migrants who are not religious, during this unsettling time, people might become sensitive to the "sacredness", accepting its guidance, and occasionally contemplating religious conversion. This research examines the role of faith and the church in supporting new Chinese immigrants from the perspective of the social function of Christianity, utilizing Chinese immigrants in New Zealand as a case study. Through participant observation in four Chinese churches and over seventy semi-structured interviews, this research illustrates how religion has provided them with a haven and how the church provides indispensable material, spiritual, and informational resources essential for their adaptation to life in New Zealand.

Keywords: migration and religion, overseas chinese, religious capital, christianity

Procedia PDF Downloads 82
27478 Spontaneous Generation of Wrinkled Patterns on pH-Sensitive Smart-Hydrogel Films

Authors: Carmen M. Gonzalez-Henriquez, Mauricio A. Sarabia-Vallejos, Juan Rodriguez-Hernandez

Abstract:

DMAEMA, as a monomer, has been widely studied and used in several application fields due to their pH-sensitive capacity (tertiary amine protonation), being relevant in the biomedical area as a potential carrier for drugs focused on the treatment of genetic or acquired diseases (efficient gene transfection), among others. Additionally, the inhibition of bacterial growth and, therefore, their antimicrobial activity, can be used as dual-functional antifogging/antimicrobial polymer coatings. According to their interesting physicochemical characteristics and biocompatible properties, DMAEMA was used as a monomer to synthesize a smart pH-sensitive hydrogel, namely poly(HEMA-co-PEGDA575-co-DMAEMA). Thus, different mole ratios (ranging from 5:1:0 to 0:1:5, according to the mole ratio between HEMA, PEGDA, and DEAEMA, respectively) were used in this research. The surface patterns formed via a two-step polymerization (redox- and photo-polymerization) were first chemically studied via 1H-NMR and elemental analysis. Secondly, the samples were morphologically analyzed by using Field-Emission Scanning Electron Microscopy (FE-SEM) and Atomic Force Microscopy (AFM) techniques. Then, a particular relation between HEMA, PEGDA, and DEAEMA (0:1:5) was also characterized at three different pH (5.4, 7.4 and 8.3). The hydrodynamic radius and zeta potential of the micro-hydrogel particles (emulsion) were carried out as a possible control for morphology, exploring the effect that produces hydrogel micelle dimensions in the wavelength, height, and roughness of the wrinkled patterns. Finally, contact angle and cross-hatch adhesion test was carried out for the hydrogels supported on glass using TSM-silanized surfaces in order to measure their mechanical properties.

Keywords: wrinkled patterns, smart pH-sensitive hydrogels, hydrogel micelle diameter, adhesion tests

Procedia PDF Downloads 206
27477 Potential Applications of Biosurfactants from Corn Steep Liquor in Cosmetic

Authors: J. M. Cruz, X. Vecıno, L. Rodrıguez-López, J. M. Dominguez, A. B. Moldes

Abstract:

The cosmetic and personal care industry are the fields where biosurfactants could have more possibilities of success because in this kind of products the replacement of synthetic detergents by natural surfactants will provide an additional added value to the product, at the same time that the harmful effects produced by some synthetic surfactants could be avoided or reduced. Therefore, nowadays, consumers are disposed to pay and additional cost if they obtain more natural products. In this work we provide data about the potential of biosurfactants in the cosmetic and personal care industry. Biosurfactants from corn steep liquor, that is a fermented and condensed stream, have showed good surface-active properties, reducing substantially the surface tension of water. The bacteria that usually growth in corn steep liquor comprises Lactobacillus species, generally recognize as safe. The biosurfactant extracted from CSL consists of a lipopeptide, composed by fatty acids, which can reduce the surface tension of water in more than 30 units. It is a yellow and viscous liquid with a density of 1.053 mg/mL and pH=4. By these properties, they could be introduced in the formulation of cosmetic creams, hair conditioners or shampoos. Moreover this biosurfactant extracted from corn steep liquor, have showed a potent antimicrobial effect on different strains of Streptococcus. Some species of Streptococcus are commonly found weakly living in the human respiratory and genitourinary systems, producing several diseases in humans, including skin diseases. For instance, Streptococcus pyogenes produces many toxins and enzymes that help to stabilize skin infections; probably biosurfactants from corn steep liquor can inhibit the mechanisms of the S. pyogenes enzymes. S. pyogenes is an important cause of pharyngitis, impetigo, cellulitis and necrotizing fasciitis. In this work it was observed that 50 mg/L of biosurfactant extract obtained from corn steep liquor is able to inhibit more than 50% the growth of S. pyogenes. Thus, cosmetic and personal care products, formulated with biosurfactants from corn steep liquor, could have prebiotic properties. The natural biosurfactant presented in this work and obtained from corn milling industry streams, have showed a high potential to provide an interesting and sustainable alternative to those, antibacterial and surfactant ingredients used in cosmetic and personal care manufacture, obtained by chemical synthesis, which can cause irritation, and often only show short time effects.

Keywords: antimicrobial activity, biosurfactants, cosmetic, personal care

Procedia PDF Downloads 257
27476 pH and Thermo-Sensitive Nanogels for Anti-Cancer Therapy

Authors: V. Naga Sravan Kumar Varma, H. G. Shivakumar

Abstract:

The aim of the study was to develop dual sensitive poly (N-isopropylacrylamide-co-acrylic acid) (PNA) nanogels(NGs) and studying its applications for Anti-Cancer therapy. NGs were fabricated by free radical polymerization using different amount of N-isopropylacrylamide and acrylic acid. A study for polymer composition over the effect on LCST in different pH was evaluated by measuring the absorbance at 500nm using UV spectrophotometer. Further selected NG’s were evaluated for change in hydrodynamic diameters in response to pH and temperature. NGs which could sharply respond to low pH value of cancer cells at body temperature were loaded with Fluorouracil (5-FU) using equilibrium swelling method and studied for drug release behaviour in different pH. A significant influence of NGs polymer composition over pH dependent LCST was observed. NGs which were spherical with an average particle size of 268nm at room temperature, shrinked forming an irregular shape when heated above to their respective LCST. 5FU loaded NGs did not intervene any difference in pH depended LCST behaviour of NGs. The in vitro drug release of NGs exhibited a pH and thermo-dependent control release. The cytoxicity study of blank carrier to MCF7 cell line showed no cytotoxicity. The results indicated that PNA NGs could be used as a potential drug carrier for anti-cancer therapy.

Keywords: pH and thermo-sensitive, nanogels, P(NIPAM-co-AAc), anti-cancer, 5-FU

Procedia PDF Downloads 351
27475 A Qualitative Research of Online Fraud Decision-Making Process

Authors: Semire Yekta

Abstract:

Many online retailers set up manual review teams to overcome the limitations of automated online fraud detection systems. This study critically examines the strategies they adapt in their decision-making process to set apart fraudulent individuals from non-fraudulent online shoppers. The study uses a mix method research approach. 32 in-depth interviews have been conducted alongside with participant observation and auto-ethnography. The study found out that all steps of the decision-making process are significantly affected by a level of subjectivity, personal understandings of online fraud, preferences and judgments and not necessarily by objectively identifiable facts. Rather clearly knowing who the fraudulent individuals are, the team members have to predict whether they think the customer might be a fraudster. Common strategies used are relying on the classification and fraud scorings in the automated fraud detection systems, weighing up arguments for and against the customer and making a decision, using cancellation to test customers’ reaction and making use of personal experiences and “the sixth sense”. The interaction in the team also plays a significant role given that some decisions turn into a group discussion. While customer data represent the basis for the decision-making, fraud management teams frequently make use of Google search and Google Maps to find out additional information about the customer and verify whether the customer is the person they claim to be. While this, on the one hand, raises ethical concerns, on the other hand, Google Street View on the address and area of the customer puts customers living in less privileged housing and areas at a higher risk of being classified as fraudsters. Phone validation is used as a final measurement to make decisions for or against the customer when previous strategies and Google Search do not suffice. However, phone validation is also characterized by individuals’ subjectivity, personal views and judgment on customer’s reaction on the phone that results in a final classification as genuine or fraudulent.

Keywords: online fraud, data mining, manual review, social construction

Procedia PDF Downloads 343
27474 Impact of Brand Origin on Brand Loyalty: A Case of Personal Care Products in Pakistan

Authors: Aimen Batool Bint-E-Rashid, Syed Muhammad Dawood Ali Shah, Muhammad Usman Farooq, Mahgul Anwar

Abstract:

As the world is progressing, the needs and demands of the consumer market are also changing. Nowadays the trends of consumer purchase decisions are dependent upon multiple factors. This study aims to identify the influential impact of country of origin over the perception and devotion towards daily personal care products specifically in reference to the knowledge and awareness regarding that particular brand in Pakistan. To corroborate this study, a 30-item brand origin questionnaire has been used with 300 purchase decision makers belonging to different age groups. To illustrate this study, a model has been developed based on brand origin, brand awareness and brand loyalty. Correlation and regression analysis have been used to find out the results which conclude the findings on the perspective of Pakistan’s consumer market as that brand origin has a direct relationship with brand loyalty provided that the consumer has a positive brand awareness. Support for the fact that brand origin impacts brand loyalty through brand awareness has been presented in this study.

Keywords: brand awareness, brand loyalty, brand origin, personal care products, P&G, Unilever

Procedia PDF Downloads 241
27473 The Importance of the Historical Approach in the Linguistic Research

Authors: Zoran Spasovski

Abstract:

The paper shortly discusses the significance and the benefits of the historical approach in the research of languages by presenting examples of it in the fields of phonetics and phonology, lexicology, morphology, syntax, and even in the onomastics (toponomy and anthroponomy). The examples from the field of phonetics/phonology include insights into animal speech and its evolution into human speech, the evolution of the sounds of human speech from vocals to glides and consonants and from velar consonants to palatal, etc., on well-known examples of former researchers. Those from the field of lexicology show shortly the formation of the lexemes and their evolution; the morphology and syntax are explained by examples of the development of grammar and syntax forms, and the importance of the historical approach in the research of place-names and personal names is briefly outlined through examples of place-names and personal names and surnames, and the conclusions that come from it, in different languages.

Keywords: animal speech, glotogenesis, grammar forms, lexicology, place-names, personal names, surnames, syntax categories

Procedia PDF Downloads 85