Search results for: personal and sensitive data
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 26640

Search results for: personal and sensitive data

26550 Tunnel Convergence Monitoring by Distributed Fiber Optics Embedded into Concrete

Authors: R. Farhoud, G. Hermand, S. Delepine-lesoille

Abstract:

Future underground facility of French radioactive waste disposal, named Cigeo, is designed to store intermediate and high level - long-lived French radioactive waste. Intermediate level waste cells are tunnel-like, about 400m length and 65 m² section, equipped with several concrete layers, which can be grouted in situ or composed of tunnel elements pre-grouted. The operating space into cells, to allow putting or removing waste containers, should be monitored for several decades without any maintenance. To provide the required information, design was performed and tested in situ in Andra’s underground laboratory (URL) at 500m under the surface. Based on distributed optic fiber sensors (OFS) and backscattered Brillouin for strain and Raman for temperature interrogation technics, the design consists of 2 loops of OFS, at 2 different radiuses, around the monitored section (Orthoradiale strains) and longitudinally. Strains measured by distributed OFS cables were compared to classical vibrating wire extensometers (VWE) and platinum probes (Pt). The OFS cables were composed of 2 cables sensitive to strains and temperatures and one only for temperatures. All cables were connected, between sensitive part and instruments, to hybrid cables to reduce cost. The connection has been made according to 2 technics: splicing fibers in situ after installation or preparing each fiber with a connector and only plugging them together in situ. Another challenge was installing OFS cables along a tunnel mad in several parts, without interruption along several parts. First success consists of the survival rate of sensors after installation and quality of measurements. Indeed, 100% of OFS cables, intended for long-term monitoring, survived installation. Few new configurations were tested with relative success. Measurements obtained were very promising. Indeed, after 3 years of data, no difference was observed between cables and connection methods of OFS and strains fit well with VWE and Pt placed at the same location. Data, from Brillouin instrument sensitive to strains and temperatures, were compensated with data provided by Raman instrument only sensitive to temperature and into a separated fiber. These results provide confidence in the next steps of the qualification processes which consists of testing several data treatment approach for direct analyses.

Keywords: monitoring, fiber optic, sensor, data treatment

Procedia PDF Downloads 105
26549 Creation of a Care Robot Impact Assessment

Authors: Eduard Fosch-Villaronga

Abstract:

This paper pioneers Care Robot Impact Assessment (CRIA), a methodology used to identify, analyze, mitigate and eliminate the risks posed by the insertion of non-medical personal care robots (PCR) in medical care facilities. Its precedent instruments (Privacy and Surveillance Impact Assessment (PIA and SIA)) fall behind in coping with robots. Indeed, personal care robots change dramatically how care is delivered. The paper presents a specific risk-sector methodology, identifies which robots are under its scope and presents some of the challenges introduced by these robots.

Keywords: ethics, impact assessment, law, personal care robots

Procedia PDF Downloads 543
26548 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance

Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle

Abstract:

Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.

Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model

Procedia PDF Downloads 76
26547 Determination of Metalaxyl Efficacy in Controlling Phytophthora palmivora Infection of Durian Using Bioassay

Authors: Supawadee Phetkhajone, Wisuwat Songnuan

Abstract:

Metalaxyl is one of the most common and effective fungicides used to control Phytophthora palmivora infection in durian (Durio zibethinus L.). The efficacy of metalaxyl residue in durian under greenhouse condition was evaluated using bioassay. Durian seedlings were treated with 2 methods of application, spraying, and soil drenching of metalaxyl, at recommended concentration (1000 mg/L). Mock treated samples were treated with 0.1% Tween20 and water for spraying and soil drenching methods, respectively. The experiment was performed in triplicates. Leaves were detached from treated plants at 0, 1, 7, 15, 20, 30, and 60 days after application, inoculated with metalaxyl-resistant and metalaxyl-sensitive isolates of P. palmivora, and incubated in a high humidity chamber for 5 days at room temperature. Metalaxyl efficacy was determined by measuring the lesion size on metalaxyl treated and mock treated samples. The results showed that metalaxyl can control metalaxyl-sensitive isolate of P. palmivora for at least 30 days after application in both methods of application. The metalaxyl-resistant isolate was not inhibited in all treatments. Leaf samples from spraying method showed larger lesions compared to soil drench method. These results demonstrated that metalaxyl applications, especially soil drenching methods showed high efficacy to control metalaxyl-sensitive isolates of P. palmivora, although it cannot control metalaxyl-resistant isolates of P. palmivora in all treatments. These qualitative data indicate that metalaxyl may suitable to control metalaxyl-sensitive isolates of P. palmivora infection.

Keywords: bioassay, degradation, durian, metalaxyl

Procedia PDF Downloads 98
26546 Personal Knowledge Management: Systematic Review and Future Direction

Authors: Kuribachew Gizaw Tohiye, Monica Garfield

Abstract:

Personal knowledge management is the aspect of knowledge management that relates to the way in which individuals organize and manage their own set of knowledge. While in that respect, there has been research in this area for the past 25 years, it is at present necessary to speculate upon what research has been done and what we have discovered about this arena of knowledge management. In contrast to organizational knowledge management, which focuses on a firm’s profitability and competitiveness, personal knowledge management (PKM) is concerned with the person’s self-effectiveness, competence and success. People are concerned in managing their knowledge in order to become more efficient in a variety of personal and organizational interests. This study presents a systematic review of PKM studies. Articles with PKM concepts are reviewed with the objective of clearly defining PKM, identifying the benefits of PKM, classifying the tools that enable PKM and finding the research gaps to indicate future research directions in the area. Consequently, we have developed a definition of PKM and identified the benefits of PKM, including an understanding of who seeks PKM and for what. Tools enabling PKM are identified and classified under three categories Web 1.0, 2.0 and 3.0 and finally the research gap and future directions are suggested. Research which facilitates collaboration by using semantic technologies is suggested to be studied further to improve PKM effectiveness.

Keywords: personal knowledge management, knowledge management, organizational knowledge management, systematic review

Procedia PDF Downloads 295
26545 Personality Traits of Students Effecting Entrepreneurial Intention

Authors: Muhammad Ali, Aamir Sohail, Umair Malik

Abstract:

Research in entrepreneurship has gained much attention in current academic environment. Youngsters are taking interest to start their own business in spite of risk matter. The objective of the study is to explain how various personality traits (personal attitude, locus of control, instrumental readiness and perceived behavioral control) are affecting entrepreneurial intention of students. The theory of planned behavior supports out study which explains that personal attractiveness, social norms and feasibility are the main factors that affect intentions of an individual. The sample data of 120 is collected from graduating batch of three reputed universities of Islamabad through questionnaires. Our results support the hypothesis that personality traits positively influence the entrepreneurial intention. We conclude from the study that many graduating students are willing to start a new venture, but most of them are likely to do a job in their respective fields. Risk factor also exists in their minds because in our country most people are risk-averse and they do not want to lose their money in case of loss.

Keywords: entrepreneurship, instrumental readiness, locus of control, personal attitude

Procedia PDF Downloads 172
26544 A Quantitative Analysis of the Conservation of Resources, Burnout, and Other Selected Behavioral Variables among Law Enforcement Officers

Authors: Nathan Moran, Robert Hanser, Attapol Kuanliang

Abstract:

The purpose of this study is to determine the relationship between personal and social resources and burnout for police officers. Current conceptualizations of the condition of burnout are challenged as being too phenomenological and ambiguous, and consequently, not given to direct empirical testing. The conservation of resources model is based on the supposition that people strive to retain, protect, and build resources as a means to protect them from the impacts of burnout. The model proposes that the effects of stress (i.e. burnout) can be manifested in personal and professional attitudes and attributes, which can measure burnout using self-reports to provide strong support for the conservation of resources model, in that, personal and professional demands are related to the exhaustion component of burnout, whereas personal and professional resources can be compiled to counteract the negative impact of the burnout condition. Highly similar patterns of burnout resistance factors were witnessed in police officers in two department precincts (N:81). In addition, results confirmed the positive influence of key demographic variables in burnout resistance using the conservation of resources model. Participants in this study are all sheriff’s deputies with a populous county in a Pacific Northwestern state (N = 274). Four instruments will be used in this quantitative study for data collection (a) a series of demographic questions, (b) the Organizational Citizenship Behavior, (c) the PANAS-X Scale (OCB: Watson& Clark, 1994), and (d) The Maslach Burnout Inventory.

Keywords: behavioral, burnout, law enforcement, quantitative

Procedia PDF Downloads 251
26543 The Effect of Prior Characteristic on Perceived Prosocial Content in Media

Authors: Pawit Monkolprasit, Proud Arunrangsiwed

Abstract:

It was important to understand the impact of media in young adolescents. The animated film, Khun Tong Dang the Inspirations (2015), was purposefully created for teaching young children to have a positive personal trait. The current study used this film as the case study. The objective is to understand the relationship between the good characteristic of movie audiences and their perception of the good characteristic of a movie character. One-hundred students from various age ranges responded to quantitative questionnaires. The questions included their age, gender, perception about their own personal traits, perception about their experiences with others, and perception about the bravery, intelligence, and gratefulness of the character. It was found that a good personal trait has a strong relationship with the perception of bravery, intelligence, and gratefulness of the character.

Keywords: impact of media, children, personal trait, prosocial content

Procedia PDF Downloads 267
26542 VR/AR Applications in Personalized Learning

Authors: Andy Wang

Abstract:

Personalized learning refers to an educational approach that tailors instruction to meet the unique needs, interests, and abilities of each learner. This method of learning aims at providing students with a customized learning experience that is more engaging, interactive, and relevant to their personal lives. With generative AI technology, the author has developed a Personal Tutoring Bot (PTB) that supports personalized learning. The author is currently testing PTB in his EE 499 – Microelectronics Metrology course. Virtual Reality (VR) and Augmented Reality (AR) provide interactive and immersive learning environments that can engage student in online learning. This paper presents the rationale of integrating VR/AR tools in PTB and discusses challenges and solutions of incorporating VA/AR into the Personal Tutoring Bot (PTB).

Keywords: personalized learning, online education, hands-on practice, VR/AR tools

Procedia PDF Downloads 36
26541 A Qualitative South African Study on Exploration of the Moral Identity of Nurses

Authors: Yolanda Havenga

Abstract:

Being a competent nurse requires clinical, general, and moral competencies. Moral competence is a culmination of moral perceptions, moral judgment, moral behaviour, and moral identity. Moral identity is the values, images, and fundamental principles held in the collective minds and memories of nurses about what it means to be a ‘good nurse’. It is important to explore and describe South African nurses’ moral identities and excavate the post-colonial counter-narrative to nurses moral identities as a better understanding of these identities will enable means to positively address nurses’ moral behaviours. This study explored the moral identity of nurses within the South African context. A qualitative approach was followed triangulating with phenomenological and narrative designs with the same purposively sampled group of professional nurses. In-depth interviews were conducted until saturation of data occurred about the sampled nurses lived experiences of being a nurse in South Africa. They were probed about their core personal-, social-, and professional values. Data were analysed based on the steps used by Colaizzi. These nurses were then asked to write a narrative telling a personal story that portrayed a significant time in their professional career that defines their identity as a nurse. This data were analysed using a critical narrative approach and findings of the two sets of data were merged. Ethical approval was obtained and approval from all relevant gate keepers. In the findings, themes emerged related to personal, social and professional values, images and fundamental principles of being a nurse within the South African context. The findings of this study will inform a future national study including a representative sample of South African nurses.

Keywords: moral behaviour, moral identity, nurses, qualitative research

Procedia PDF Downloads 255
26540 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations

Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa

Abstract:

This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.

Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy

Procedia PDF Downloads 169
26539 Realization of Sustainable Urban Society by Personal Electric Transporter and Natural Energy

Authors: Yuichi Miyamoto

Abstract:

In regards to the energy sector in the modern period, two points were raised. First is a vast and growing energy demand, and second is an environmental impact associated with it. The enormous consumption of fossil fuel to the mobile unit is leading to its rapid depletion. Nuclear power is not the only problem. A modal shift that utilizes personal transporters and independent power, in order to realize a sustainable society, is very effective. The paper proposes that the world will continue to work on this. Energy of the future society, innovation in battery technology and the use of natural energy is a big key. And it is also necessary in order to save on energy consumption.

Keywords: natural energy, modal shift, personal transportation, battery

Procedia PDF Downloads 377
26538 Tattooing: Personal Markings with Meaning: Themes Uncovered While Making a Video Documentary

Authors: Byrad Yyelland, Robert Bianchi

Abstract:

No longer the secret mark of outlaw bikers, criminals, and sailors, tattooing has become mainstream in much of the world. The current study showcases data gathered for a video documentary on the triangulated relationship connecting tattoos as a form of body modification, cultural norms, and personal meanings. This research has revealed that some religious belief systems, Buddhism in Thailand, is one example, connect tattooing with spirituality in an intimate manner. Buddhist monks provide tattoos using traditional bamboo implements and processes, and they pray over the tattoo, infusing magic into the tattoo and consequently, into the body of the receiver. In contrast, although there is no direct mention of tattooing in the Qur’an, many Islamic scholars argue that permanent tattooing is considered haram—forbidden for Muslims. Only the temporary henna is acceptable. In fact, tattooing is illegal in Qatar. Some Indigenous belief systems in Canada adopt a similar stance on the basis that we were all created by the Creator and as such, we do not have the right to alter what the Creator has made. Still other belief systems such as Spiritism in Brazil and mainstream Christianity in the West are more inclined to regard tattooing as a matter of personal choice. It is practically impossible for any culture to resist the dual impacts of time and globalization. Long term cultural change has resulted in mainstream acceptance of tattooing in the west and increased acceptance in Japan. Short-term cultural change is seen in Qatar where tattoos are on on public display amongst expats and migrant laborers. This tolerance of tattooed individuals was clearly evident with the choice of David Beckham as ambassador for the FIFA World Cup and during the corresponding tourist celebrations. Themes uncovered in this multicultural research also include individual meanings attributed to tattoo imagery and processes, experiences of personal empowerment, devotion to family, personal philosophy, gender identity, and aesthetics.

Keywords: culture, norms, tattooing, spirituality, personal motivations and personal meanings

Procedia PDF Downloads 46
26537 A Study of Shigeru Ban's Environmentally-Sensitive Design Approach

Authors: Duygu Merve Bulut, Fehime Yesim Gurani

Abstract:

The Japanese architect Shigeru Ban has succeeded in bringing a different understanding to the modern architectural design approach with both the material selection and the techniques he used while combining the material with the design. Ban, who reflects his respect to people and nature with his designs, has encouraged that design should be done with economic materials, easily accessible and understandable for everyone. Because of this, Ban has attracted attention and appreciated in the architectural world with his environmentally-sensitive design ideology and humanitarian projects. In order to understand Ban’s environmentally-sensitive design approach, with this article, Ban’s projects which have used natural materials; the projects of Ban’s Japenese Pavilion in Germany, Papertainer Museum in South Korea, Centre Pompidou-Metz in France and Cardboard Cathedral in New Zealand were examined and analyzed. In the following parts, 'paper tube' technology that creates awareness in architectural area, which developed and applied by Ban; has been examined in terms of building material and structure of sustainable space design. As a result of this review, Ban’s approach is evaluated in terms of its contribution to the understanding of sustainable design.

Keywords: ecological design, environmentally-sensitive design, paper tube, Shigeru Ban, sustainability

Procedia PDF Downloads 458
26536 Cooperative Jamming for Implantable Medical Device Security

Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed

Abstract:

Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.

Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing

Procedia PDF Downloads 69
26535 Antioxidant Defence Systems, Lipid Peroxidation, and Photosynthetic Variables in Salt-Sensitive and Salt-Tolerant Soybean Genotypes in Response to Salt Stress

Authors: Faheema Khan

Abstract:

We have investigated the effects of salt stress on the stability of plant growth, water relations, photosynthetic variables, lipid peroxidation and antioxidant system in salt-tolerant (PK-327) and salt-sensitive (PK-471) soybean genotypes. Ten-day-old salt-tolerant and salt-sensitive soybean plants were subjected to 0-150 mM NaCl for 15 days. While the growth of genotype PK-327 was not affected significantly up to 75 mM NaCl treatment, the growth of the PK-471 was reduced significantly beyond 25 mM NaCl treatments. Salt stress caused severe impairments in photosynthetic variables like photosynthetic rate, chlorophyll fluorescence and chlorophyll content, being more pronounced in salt-sensitive genotype than in salt-tolerant.The activities of antioxidant enzymes (superoxide dismutase, catalase, ascorbate peroxidase and glutathione reductase) were higher in PK-327 than in PK-471 at various levels of salt treatments.It is concluded that tolerance capacity of PK-327 against salinity can be associated with the ability of this genotype in keeping an active photosynthetic system and strong antioxidant defence system.

Keywords: salt stress, soybean, antioxidant, photosynthesis

Procedia PDF Downloads 344
26534 Investigating Transformative Practices in the Bangladeshi Classroom

Authors: Rubaiyat Jahan, Nasreen Sultana Mitu

Abstract:

This paper examines the theoretical construct of transformative practices, and reports some evidence of transformative practices from a couple of Bangladeshi English teachers. The idea of transformative practices calls for teachers’ capabilities to invest their intellectual labor in teaching with an assumption that along with the academic advancement of the learners, it aims for the personal transformation for both the learners as well for themselves. Following an ethnographic research approach, data for this study were collected through in-depth interviews, informal talks and classroom observations for a period of one year. In relevance to the English classroom of the Bangladeshi context, from this study, references of transformative practices have been underlined from the participant teachers’ views on English language teaching as well as from their actual practices. According to data of this research, some evidence of transformative practices in the form of critical language awareness and personal theories of practices emerge from the participants’ articulation of the beliefs on teaching; and from the participant teachers’ classroom practices evidence of self-directed acts of teaching, self-directed acts of professional development, and liberatory autonomy have been highlighted as the reflections of transformative practices. The implication of this paper refers to the significance of practicing teachers’ articulation of beliefs and views on teaching along with their orientation to critical pedagogical relations.

Keywords: critical language awareness, personal theories of practice, teacher autonomy, transformative practices

Procedia PDF Downloads 192
26533 Privacy Paradox and the Internet of Medical Things

Authors: Isabell Koinig, Sandra Diehl

Abstract:

In recent years, the health-care context has not been left unaffected by technological developments. In recent years, the Internet of Medical Things (IoMT)has not only led to a collaboration between disease management and advanced care coordination but also to more personalized health care and patient empowerment. With more than 40 % of all health technology being IoMT-related by 2020, questions regarding privacy become more prevalent, even more so during COVID-19when apps allowing for an intensive tracking of people’s whereabouts and their personal contacts cause privacy advocates to protest and revolt. There is a widespread tendency that even though users may express concerns and fears about their privacy, they behave in a manner that appears to contradict their statements by disclosing personal data. In literature, this phenomenon is discussed as a privacy paradox. While there are some studies investigating the privacy paradox in general, there is only scarce research related to the privacy paradox in the health sector and, to the authors’ knowledge, no empirical study investigating young people’s attitudes toward data security when using wearables and health apps. The empirical study presented in this paper tries to reduce this research gap by focusing on the area of digital and mobile health. It sets out to investigate the degree of importance individuals attribute to protecting their privacy and individual privacy protection strategies. Moreover, the question to which degree individuals between the ages of 20 and 30 years are willing to grant commercial parties access to their private data to use digital health services and apps are put to the test. To answer this research question, results from 6 focus groups with 40 participants will be presented. The focus was put on this age segment that has grown up in a digitally immersed environment. Moreover, it is particularly the young generation who is not only interested in health and fitness but also already uses health-supporting apps or gadgets. Approximately one-third of the study participants were students. Subjects were recruited in August and September 2019 by two trained researchers via email and were offered an incentive for their participation. Overall, results indicate that the young generation is well informed about the growing data collection and is quite critical of it; moreover, they possess knowledge of the potential side effects associated with this data collection. Most respondents indicated to cautiously handle their data and consider privacy as highly relevant, utilizing a number of protective strategies to ensure the confidentiality of their information. Their willingness to share information in exchange for services was only moderately pronounced, particularly in the health context, since health data was seen as valuable and sensitive. The majority of respondents indicated to rather miss out on using digital and mobile health offerings in order to maintain their privacy. While this behavior might be an unintended consequence, it is an important piece of information for app developers and medical providers, who have to find a way to find a user base for their products against the background of rising user privacy concerns.

Keywords: digital health, privacy, privacy paradox, IoMT

Procedia PDF Downloads 109
26532 Students’ Academic and Personal Needs: Basis for a Guidance Program

Authors: Susan Marie R. De La Cruz, Bernadette F. De La Cruz, Georgia D. Demavibas

Abstract:

This study determined the top 10 perceived students’ academic needs, personal needs, personal obstacles in achieving their academic goals, are as they need assistance, and their perceived feelings in math, reading and writing. The North Carolina State College, Student Support Services needs assessment survey was used. The respondents were the randomly chosen122Graduate school students. The top 10 academic needs are as follows: need to improve memory, communication skills, study habits, time management skills, career decisions, vocabulary, math skills, test taking skills, reading comprehension, and the need to reduce math anxiety. Top 10 personal needs are as follows: difficulty meeting deadline, difficulty managing money, inadequate computer skills, afraid of failing graduate school, difficulty participating in class/group discussions, absence from school, anxiety during exams, little or no experience with internet, personal counseling needs, and unsure of university academic procedures. Students’ top 10 perceived personal obstacles were as follows: issues surrounding sickness in family, lack of time management, lack of money, feeling tired, fears to speak in class, poor study habits, problems at home, late in class, too shy, and always feeling sick and easily distracted. Students felt need assistance in areas surrounding personal budget, stress management, motivation, anxiety, depressions, leadership development and goals/decision making. It is recommended that enrichment activities be provided to respond to students’ academic and personal needs. Also, Graduate School Guidance Counselor collaborates with other licensed Guidance Counselors in other colleges to have a well-coordinated and effective delivery of services responsive to students’ needs.

Keywords: academic needs, guidance counsellors, guidance service, needs assessment survey, personal needs, student services

Procedia PDF Downloads 305
26531 A Blockchain-Based Privacy-Preserving Physical Delivery System

Authors: Shahin Zanbaghi, Saeed Samet

Abstract:

The internet has transformed the way we shop. Previously, most of our purchases came in the form of shopping trips to a nearby store. Now, it’s as easy as clicking a mouse. But with great convenience comes great responsibility. We have to be constantly vigilant about our personal information. In this work, our proposed approach is to encrypt the information printed on the physical packages, which include personal information in plain text, using a symmetric encryption algorithm; then, we store that encrypted information into a Blockchain network rather than storing them in companies or corporations centralized databases. We present, implement and assess a blockchain-based system using Ethereum smart contracts. We present detailed algorithms that explain the details of our smart contract. We present the security, cost, and performance analysis of the proposed method. Our work indicates that the proposed solution is economically attainable and provides data integrity, security, transparency, and data traceability.

Keywords: blockchain, Ethereum, smart contract, commit-reveal scheme

Procedia PDF Downloads 120
26530 The Effect of Teachers' Personal Values on the Perceptions of the Effective Principal and Student in School

Authors: Alexander Zibenberg, Rima’a Da’As

Abstract:

According to the author’s knowledge, individuals are naturally inclined to classify people as leaders and followers. Individuals utilize cognitive structures or prototypes specifying the traits and abilities that characterize the effective leader (implicit leadership theories) and effective follower in an organization (implicit followership theories). Thus, the present study offers insights into understanding how teachers' personal values (self-enhancement and self-transcendence) explain the preference for styles of effective leader (i.e., principal) and assumptions about the traits and behaviors that characterize effective followers (i.e., student). Beyond the direct effect on perceptions of effective types of leader and follower, the present study argues that values may also interact with organizational and personal contexts in influencing perceptions. Thus authors suggest that teachers' managerial position may moderate the relationships between personal values and perception of the effective leader and follower. Specifically, two key questions are addressed in the present research: (1) Is there a relationship between personal values and perceptions of the effective leader and effective follower? and (2) Are these relationships stable or could they change across different contexts? Two hundred fifty-five Israeli teachers participated in this study, completing questionnaires – about the effective student and effective principal. Results of structural equations modeling (SEM) with maximum likelihood estimation showed: first: the model fit the data well. Second: researchers found a positive relationship between self-enhancement and anti-prototype of the effective principal and anti-prototype of the effective student. The relationship between self-transcendence value and both perceptions were found significant as well. Self-transcendence positively related to the way the teacher perceives the prototype of the effective principal and effective student. Besides, authors found that teachers' managerial position moderates these relationships. The article contributes to the literature both on perceptions and on personal values. Although several earlier studies explored issues of implicit leadership theories and implicit followership theories, personality characteristics (values) have garnered less attention in this matter. This study shows that personal values which are deeply rooted, abstract motivations that guide justify or explain attitudes, norms, opinions and actions explain differences in perception of the effective leader and follower. The results advance the theoretical understanding of the relationship between personal values and individuals’ perceptions in organizations. An additional contribution of this study is the application of the teacher's managerial position to explain a potential boundary condition of the translation of personal values into outcomes. The findings suggest that through the management process in the organization, teachers acquire knowledge and skills which augment their ability (beyond their personal values) to predict perceptions of ideal types of principal and student. The study elucidates the unique role of personal values in understanding an organizational thinking in organization. It seems that personal values might explain the differences in individual preferences of the organizational paradigm (mechanistic vs organic).

Keywords: implicit leadership theories, implicit followership theories, organizational paradigms, personal values

Procedia PDF Downloads 133
26529 Design of a Remote Radiation Sensing Module Based on Portable Gamma Spectrometer

Authors: Young Gil Kim, Hye Min Park, Chan Jong Park, Koan Sik Joo

Abstract:

A personal gamma spectrometer has to be sensitive, pocket-sized, and carriable on the users. To serve these requirements, we developed the SiPM-based portable radiation detectors. The prototype uses a Ce:GAGG scintillator coupled to a silicon photomultiplier and a radio frequency(RF) module to measure gamma-ray, and can be accessed wirelessly or remotely by mobile equipment. The prototype device consumes roughly 4.4W, weighs about 180g (including battery), and measures 5.0 7.0. It is able to achieve 5.8% FWHM energy resolution at 662keV.

Keywords: Ce:GAGG, gamma-ray, radio frequency, silicon photomultiplier

Procedia PDF Downloads 301
26528 Quantile Coherence Analysis: Application to Precipitation Data

Authors: Yaeji Lim, Hee-Seok Oh

Abstract:

The coherence analysis measures the linear time-invariant relationship between two data sets and has been studied various fields such as signal processing, engineering, and medical science. However classical coherence analysis tends to be sensitive to outliers and focuses only on mean relationship. In this paper, we generalized cross periodogram to quantile cross periodogram and provide richer inter-relationship between two data sets. This is a general version of Laplace cross periodogram. We prove its asymptotic distribution under the long range process and compare them with ordinary coherence through numerical examples. We also present real data example to confirm the usefulness of quantile coherence analysis.

Keywords: coherence, cross periodogram, spectrum, quantile

Procedia PDF Downloads 362
26527 The Construct of Personal Choice within Individual Language Shift: A Phenomenological Qualitative Study

Authors: Kira Gulko Morse

Abstract:

Choosing one’s primary language may not be as common as choosing an additional foreign language to study or use during travel. In some instances, however, it becomes a matter of internal personal struggle, as language is tied not only to specific circumstances but also to human background and identity. This phenomenological qualitative study focuses on the factors affecting the decision of a person to undergo a language shift. Specifically, it considers how these factors relate to identity negotiation and expression. The data for the study include the analysis of published autobiographical narratives and personal interviews conducted using the Responsive Interviewing model. While research participants come from a variety of geographical locations and have used different reasons for undergoing their individual language shift, the study identifies a number of common features shared by all the participants. Specifically, while all the participants have been able to maintain their first language to varying degrees of proficiency, they have all completed the shift to establish a primary language different from their first. Additionally, the process of self-identification is found to be directly connected to the phenomenon of language choice for each of the participants. The findings of the study further tie the phenomenon of individual language shift to a more comprehensive issue of individual life choices – ethnic revival, immigration, and inter-cultural marriage among others. The study discusses varying language roles and the data indicate that language shift may occur whether it is a symbolic driving force or a secondary means in fulfilling a set life goal. The concept of language addition is suggested as an alternative to the arbitrariness of language shift. Thus, instead of focusing on subtractive bilingualism or language loss, the emphasis becomes the integration of languages within the individual. The study emphasizes the importance of the construct of personal choice in its connection to individual language shift. It places the focus from society onto an individual and the ability of an individual to make decisions in matters of linguistic identification.

Keywords: choice theory, identity negotiation, language shift, psycholinguistics

Procedia PDF Downloads 101
26526 English Language Teachers' Personal Motivation Influences Their Professional Motivation

Authors: Gulderen Saglam

Abstract:

This study explores the elements of personal motivation which influence professional motivation of in-service English language teachers in Bursa in Turkey. Fifty English language teachers participated in a seminar held on ‘teachers’ motivation’ for the length of six hours in two days, which were organized by the local Ministry of Education. During the seminar, teachers firstly aimed to share cornerstones of their professional motivation. Later, those teachers stated the significance of their personal motivation. Two months’ later, those teachers were given the questionnaire including both closed and open-ended questions involving those two types of motivational acts of teachers. Questionnaire items were tested by Crombah’s Alfa Reliability Statistics. Responses to the questionnaire were analyzed by factor analysis and test of normality. The results were also tested by non-parametric and parametric tests. As a result, it was found that language teachers who were personally motivated reported higher professional motivation of theirs in teaching profession in-service.

Keywords: influencing factor, in-service-teachers, personal motivation, professional motivation, in-service-teachers, influencing factor

Procedia PDF Downloads 254
26525 National Culture, Personal Values, and Supervisors’ Ethical Behavior: Examining a Partial Mediation Model of Merton’s Anomie Theory

Authors: Kristine Tuliao

Abstract:

Although it is of primary concern to ensure that supervisors behave appropriately, research shows that unethical behaviors are prevalent and may cost organizations’ economic and reputational damages. Nevertheless, few studies have considered the roles of the different levels of values in shaping one’s ethicality, and the examination of the possible mediation in the process of their influence has been rarely done. To address this gap, this research employs Merton’s anomie theory in designing a mediation analysis to test the direct impacts of national cultural values on supervisors’ justification of unethical behaviors as well as their indirect impacts through personal values. According to Merton’s writings, individual behaviors are affected by the society’s culture given its role in defining the members’ goals as well as the acceptable methods of attaining those goals. Also, Merton’s framework suggests that individuals develop their personal values depending on the assimilation of their society’s culture. Using data of 9,813 supervisors across 30 countries, results of hierarchical linear modeling (HLM) indicated that national cultural values, specifically assertiveness, performance orientation, in-group collectivism, and humane orientation, positively affect supervisors’ unethical inclination. Some cultural values may encourage unethical tendencies, especially if they urge and pressure individuals to attain purely monetary success. In addition, some of the influence of national cultural values went through personal monetary and non-monetary success values, indicating partial mediation. These findings substantiated the assertions of Merton’s anomie theory that national cultural values influence supervisors’ ethics through their integration with personal values. Given that some of the results contradict Merton’s anomie theory propositions, complementary arguments, such as incomplete assimilation of culture, and the probable impact of job position in perceptions, values, and behaviors, could be the plausible rationale for these outcomes. Consequently, this paper advances the understanding of differences in national and personal values and how these factors impact supervisors’ justification of unethical behaviors. Alongside these contributions, suggestions are presented for the public and organizations to craft policies and procedures that will minimize the tendency of supervisors to commit unethical acts.

Keywords: mediation model, national culture, personal values, supervisors' ethics

Procedia PDF Downloads 174
26524 Urban Growth and Its Impact on Natural Environment: A Geospatial Analysis of North Part of the UAE

Authors: Mohamed Bualhamam

Abstract:

Due to the complex nature of tourism resources of the Northern part of the United Arab Emirates (UAE), the potential of Geographical Information Systems (GIS) and Remote Sensing (RS) in resolving these issues was used. The study was an attempt to use existing GIS data layers to identify sensitive natural environment and archaeological heritage resources that may be threatened by increased urban growth and give some specific recommendations to protect the area. By identifying sensitive natural environment and archaeological heritage resources, public agencies and citizens are in a better position to successfully protect important natural lands and direct growth away from environmentally sensitive areas. The paper concludes that applications of GIS and RS in study of urban growth impact in tourism resources are a strong and effective tool that can aid in tourism planning and decision-making. The study area is one of the fastest growing regions in the country. The increase in population along the region, as well as rapid growth of towns, has increased the threat to natural resources and archeological sites. Satellite remote sensing data have been proven useful in assessing the natural resources and in monitoring the changes. The study used GIS and RS to identify sensitive natural environment and archaeological heritage resources that may be threatened by increased urban growth. The result of GIS analyses shows that the Northern part of the UAE has variety for tourism resources, which can use for future tourism development. Rapid urban development in the form of small towns and different economic activities are showing in different places in the study area. The urban development extended out of old towns and have negative affected of sensitive tourism resources in some areas. Tourism resources for the Northern part of the UAE is a highly complex resources, and thus requires tools that aid in effective decision making to come to terms with the competing economic, social, and environmental demands of sustainable development. The UAE government should prepare a tourism databases and a GIS system, so that planners can be accessed for archaeological heritage information as part of development planning processes. Applications of GIS in urban planning, tourism and recreation planning illustrate that GIS is a strong and effective tool that can aid in tourism planning and decision- making. The power of GIS lies not only in the ability to visualize spatial relationships, but also beyond the space to a holistic view of the world with its many interconnected components and complex relationships. The worst of the damage could have been avoided by recognizing suitable limits and adhering to some simple environmental guidelines and standards will successfully develop tourism in sustainable manner. By identifying sensitive natural environment and archaeological heritage resources of the Northern part of the UAE, public agencies and private citizens are in a better position to successfully protect important natural lands and direct growth away from environmentally sensitive areas.

Keywords: GIS, natural environment, UAE, urban growth

Procedia PDF Downloads 233
26523 Status and Results from EXO-200

Authors: Ryan Maclellan

Abstract:

EXO-200 has provided one of the most sensitive searches for neutrinoless double-beta decay utilizing 175 kg of enriched liquid xenon in an ultra-low background time projection chamber. This detector has demonstrated excellent energy resolution and background rejection capabilities. Using the first two years of data, EXO-200 has set a limit of 1.1x10^25 years at 90% C.L. on the neutrinoless double-beta decay half-life of Xe-136. The experiment has experienced a brief hiatus in data taking during a temporary shutdown of its host facility: the Waste Isolation Pilot Plant. EXO-200 expects to resume data taking in earnest this fall with upgraded detector electronics. Results from the analysis of EXO-200 data and an update on the current status of EXO-200 will be presented.

Keywords: double-beta, Majorana, neutrino, neutrinoless

Procedia PDF Downloads 384
26522 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 200
26521 Autonomic Threat Avoidance and Self-Healing in Database Management System

Authors: Wajahat Munir, Muhammad Haseeb, Adeel Anjum, Basit Raza, Ahmad Kamran Malik

Abstract:

Databases are the key components of the software systems. Due to the exponential growth of data, it is the concern that the data should be accurate and available. The data in databases is vulnerable to internal and external threats, especially when it contains sensitive data like medical or military applications. Whenever the data is changed by malicious intent, data analysis result may lead to disastrous decisions. Autonomic self-healing is molded toward computer system after inspiring from the autonomic system of human body. In order to guarantee the accuracy and availability of data, we propose a technique which on a priority basis, tries to avoid any malicious transaction from execution and in case a malicious transaction affects the system, it heals the system in an isolated mode in such a way that the availability of system would not be compromised. Using this autonomic system, the management cost and time of DBAs can be minimized. In the end, we test our model and present the findings.

Keywords: autonomic computing, self-healing, threat avoidance, security

Procedia PDF Downloads 475