Search results for: personal data management
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31020

Search results for: personal data management

30750 The Capacity Building in the Natural Disaster Management of Thailand

Authors: Eakarat Boonreang

Abstract:

The past two decades, Thailand faced the natural disasters, for instance, Gay typhoon in 1989, tsunami in 2004, and huge flood in 2011. The disaster management in Thailand was improved both structure and mechanism for cope with the natural disaster since 2007. However, the natural disaster management in Thailand has various problems, for examples, cooperation between related an organizations have not unity, inadequate resources, the natural disaster management of public sectors not proactive, people has not awareness the risk of the natural disaster, and communities did not participate in the natural disaster management. Objective of this study is to find the methods for capacity building in the natural disaster management of Thailand. The concept and information about the capacity building and the natural disaster management of Thailand were reviewed and analyzed by classifying and organizing data. The result found that the methods for capacity building in the natural disaster management of Thailand should be consist of 1)link operation and information in the natural disaster management between nation, province, local and community levels, 2)enhance competency and resources of public sectors which relate to the natural disaster management, 3)establish proactive natural disaster management both planning and implementation, 4)decentralize the natural disaster management to local government organizations, 5)construct public awareness in the natural disaster management to community, 6)support Community Based Disaster Risk Management (CBDRM) seriously, and 7)emphasis on participation in the natural disaster management of all stakeholders.

Keywords: capacity building, Community Based Disaster Risk Management (CBDRM), Natural Disaster Management, Thailand

Procedia PDF Downloads 529
30749 Privacy Paradox and the Internet of Medical Things

Authors: Isabell Koinig, Sandra Diehl

Abstract:

In recent years, the health-care context has not been left unaffected by technological developments. In recent years, the Internet of Medical Things (IoMT)has not only led to a collaboration between disease management and advanced care coordination but also to more personalized health care and patient empowerment. With more than 40 % of all health technology being IoMT-related by 2020, questions regarding privacy become more prevalent, even more so during COVID-19when apps allowing for an intensive tracking of people’s whereabouts and their personal contacts cause privacy advocates to protest and revolt. There is a widespread tendency that even though users may express concerns and fears about their privacy, they behave in a manner that appears to contradict their statements by disclosing personal data. In literature, this phenomenon is discussed as a privacy paradox. While there are some studies investigating the privacy paradox in general, there is only scarce research related to the privacy paradox in the health sector and, to the authors’ knowledge, no empirical study investigating young people’s attitudes toward data security when using wearables and health apps. The empirical study presented in this paper tries to reduce this research gap by focusing on the area of digital and mobile health. It sets out to investigate the degree of importance individuals attribute to protecting their privacy and individual privacy protection strategies. Moreover, the question to which degree individuals between the ages of 20 and 30 years are willing to grant commercial parties access to their private data to use digital health services and apps are put to the test. To answer this research question, results from 6 focus groups with 40 participants will be presented. The focus was put on this age segment that has grown up in a digitally immersed environment. Moreover, it is particularly the young generation who is not only interested in health and fitness but also already uses health-supporting apps or gadgets. Approximately one-third of the study participants were students. Subjects were recruited in August and September 2019 by two trained researchers via email and were offered an incentive for their participation. Overall, results indicate that the young generation is well informed about the growing data collection and is quite critical of it; moreover, they possess knowledge of the potential side effects associated with this data collection. Most respondents indicated to cautiously handle their data and consider privacy as highly relevant, utilizing a number of protective strategies to ensure the confidentiality of their information. Their willingness to share information in exchange for services was only moderately pronounced, particularly in the health context, since health data was seen as valuable and sensitive. The majority of respondents indicated to rather miss out on using digital and mobile health offerings in order to maintain their privacy. While this behavior might be an unintended consequence, it is an important piece of information for app developers and medical providers, who have to find a way to find a user base for their products against the background of rising user privacy concerns.

Keywords: digital health, privacy, privacy paradox, IoMT

Procedia PDF Downloads 113
30748 Institutional Superposition, over Management and Coastal Economic Development: Coastal Areas in China

Authors: Mingbao Chen, Mingli Zhao

Abstract:

The coastal zone is the intersection of land and sea system, and also is the connecting zone of the two economic systems of land and sea. In the world, all countries attach great importance to the coastal zone management and the coastal zone economy. In China, the government has developed a number of related coastal management policies and institutional, such as marine functional zoning, main function zoning, integrated coastal zone management, to ensure the sustainable utilization of the coastal zone and promote the development of coastal economic. However, in practice, the effect is not satisfactory. This paper analyses the coastal areas of coastal zone management on coastal economic growth contribution based on coastal areas economic development data with the 2007-2015 in China, which uses the method of the evaluation index system of coastal zone management institutional efficiency. The results show that the coastal zone management institutional objectives are not clear, and the institutional has high repeatability. At the same time, over management of coastal zone leads to low economic efficiency because the government management boundary is blurred.

Keywords: institutional overlap, over management, coastal zone management, coastal zone economy

Procedia PDF Downloads 359
30747 Exploring Perceptions of Non-Energy Benefits and Energy Efficiency Investment in the Malaysian Industrial Sector

Authors: Siti Noor Baiti Binti Mustafa

Abstract:

Energy management studies regarding energy efficiency investments in Malaysia has yet to address the lack of empirical research that examines pro- sustainability behavior of managers in the industrial sector and how it influences energy efficiency investment decision-making. This study adopts the Theory of Planned Behavior (TPB) to examine the relationship between personal attitude, subjective norms, and perceived behavioral control (PBC), the intention of energy efficiency investments, and how perceptions of Non-Energy Benefits (NEB) influence these intentions among managers in the industrial sector in Malaysia. Managers from various sub-sectors in the industrial sector were selected from a sample of companies that are participants of the Government-led program named the Energy Audit Conditional Grant (EACG) that aimed to promote energy efficiency. Data collection was conducted through an online semi-structured, open-ended questionnaire and then later interviewed. The results of this explorative sequential qualitative study showed that perceived behavioral control was a significant predictor of energy efficiency investment intentions as compared to factors such as attitude and subjective norms. The level of awareness and perceptions towards NEB further played a significant factor in influencing energy efficiency investment decision-making as well. Various measures and policy recommendations are provided together with insights on factors that influence decision-makers intention to invest in energy efficiency, whilst new knowledge on NEB perceptions will be useful to enhance the attractiveness of energy-efficient investments.

Keywords: energy efficiency investments, non-energy benefits, theory of planned behavior, personal attitude, subjective norms, perceived behavioral control, Malaysia industrial sector

Procedia PDF Downloads 70
30746 Key Issues in Transfer Stage of BOT Project: Experience from China

Authors: Wang Liguang, Zhang Xueqing

Abstract:

The build-operate-transfer (BOT) project delivery system has provided effective routes to mobilize private sector funds, innovative technologies, management skills and operational efficiencies for public infrastructure development and have been widely used in China during the last 20 years. Many BOT projects in China will be smoothly transferred to the government soon and the transfer stage, which is considered as the last stage, must be studied carefully and handled well to achieve the overall success of BOT projects. There will be many issues faced by both the public sector and private sector in the transfer stage of BOT projects, including project post-assessment, technology and documents transfer, personal training and staff transition, etc. and sometimes additional legislation is needed for future operation and management of facilities. However, most previous studies focused on the bidding, financing, and building and operation stages instead of transfer stage. This research identifies nine key issues in the transfer stage of BOT projects through a comprehensive study on three cases in China, and the expert interview and expert discussion meetings are held to validate the key issues and give detail analysis. A proposed framework of transfer management is prepared based on the experiences derived and lessons drawn from the case studies and expert interview and discussions, which is expected to improve the transfer management of BOT projects in practice.

Keywords: BOT project, key issues, transfer management, transfer stage

Procedia PDF Downloads 223
30745 Detection of Pharmaceutical Personal Protective Equipment in Video Stream

Authors: Michael Leontiev, Danil Zhilikov, Dmitry Lobanov, Lenar Klimov, Vyacheslav Chertan, Daniel Bobrov, Vladislav Maslov, Vasilii Vologdin, Ksenia Balabaeva

Abstract:

Pharmaceutical manufacturing is a complex process, where each stage requires a high level of safety and sterility. Personal Protective Equipment (PPE) is used for this purpose. Despite all the measures of control, the human factor (improper PPE wearing) causes numerous losses to human health and material property. This research proposes a solid computer vision system for ensuring safety in pharmaceutical laboratories. For this, we have tested a wide range of state-of-the-art object detection methods. Composing previously obtained results in this sphere with our own approach to this problem, we have reached a high accuracy ([email protected]) ranging from 0.77 up to 0.98 in detecting all the elements of a common set of PPE used in pharmaceutical laboratories. Our system is a step towards safe medicine production.

Keywords: sterility and safety in pharmaceutical development, personal protective equipment, computer vision, object detection, monitoring in pharmaceutical development, PPE

Procedia PDF Downloads 43
30744 E4D-MP: Time-Lapse Multiphysics Simulation and Joint Inversion Toolset for Large-Scale Subsurface Imaging

Authors: Zhuanfang Fred Zhang, Tim C. Johnson, Yilin Fang, Chris E. Strickland

Abstract:

A variety of geophysical techniques are available to image the opaque subsurface with little or no contact with the soil. It is common to conduct time-lapse surveys of different types for a given site for improved results of subsurface imaging. Regardless of the chosen survey methods, it is often a challenge to process the massive amount of survey data. The currently available software applications are generally based on the one-dimensional assumption for a desktop personal computer. Hence, they are usually incapable of imaging the three-dimensional (3D) processes/variables in the subsurface of reasonable spatial scales; the maximum amount of data that can be inverted simultaneously is often very small due to the capability limitation of personal computers. Presently, high-performance or integrating software that enables real-time integration of multi-process geophysical methods is needed. E4D-MP enables the integration and inversion of time-lapsed large-scale data surveys from geophysical methods. Using the supercomputing capability and parallel computation algorithm, E4D-MP is capable of processing data across vast spatiotemporal scales and in near real time. The main code and the modules of E4D-MP for inverting individual or combined data sets of time-lapse 3D electrical resistivity, spectral induced polarization, and gravity surveys have been developed and demonstrated for sub-surface imaging. E4D-MP provides capability of imaging the processes (e.g., liquid or gas flow, solute transport, cavity development) and subsurface properties (e.g., rock/soil density, conductivity) critical for successful control of environmental engineering related efforts such as environmental remediation, carbon sequestration, geothermal exploration, and mine land reclamation, among others.

Keywords: gravity survey, high-performance computing, sub-surface monitoring, electrical resistivity tomography

Procedia PDF Downloads 127
30743 Development of Muay Thai Competition Management for Promoting Sport Tourism in the next Decade (2015-2024)

Authors: Supasak Ngaoprasertwong

Abstract:

The purpose of this research was to develop a model for Muay Thai competition management for promoting sport tourism in the next decade. Moreover, the model was appropriately initiated for practical use. This study also combined several methodologies, both quantitative research and qualitative research, to entirely cover all aspects of data, especially the tourists’ satisfaction toward Muay Thai competition. The data were collected from 400 tourists watching Muay Thai competition in 4 stadiums to create the model for Muay Thai competition to support the sport tourism in the next decade. Besides, Ethnographic Delphi Futures Research (EDFR) was applied to gather the data from certain experts in boxing industry or having significant role in Muay Thai competition in both public sector and private sector. The first step of data collection was an in-depth interview with 27 experts associated with Muay Thai competition, Muay Thai management, and tourism. The second step and the third step of data collection were conducted to confirm the experts’ opinions toward various elements. When the 3 steps of data collection were completely accomplished, all data were assembled to draft the model. Then the model was proposed to 8 experts to conduct a brainstorming to affirm it. According to the results of quantitative research, it found that the tourists were satisfied with personnel of competition at high level (x=3.87), followed by facilities, services, and safe high level (x=3.67). Furthermore, they were satisfied with operation in competition field at high level (x=3.62).Regarding the qualitative methodology including literature review, theories, concepts and analysis of qualitative research development of the model for Muay Thai competition to promote the sport tourism in the next decade, the findings indicated that there were 2 data sets as follows: The first one was related to Muay Thai competition to encourage the sport tourism and the second one was associated with Muay Thai stadium management to support the sport tourism. After the brain storming, “EE Muay Thai Model” was finally developed for promoting the sport tourism in the next decade (2015-2024).

Keywords: Muay Thai competition management, Muay Thai sport tourism, Muay Thai, Muay Thai for sport tourism management

Procedia PDF Downloads 295
30742 The Social Structuring of Mate Selection: Assortative Marriage Patterns in the Israeli Jewish Population

Authors: Naava Dihi, Jon Anson

Abstract:

Love, so it appears, is not socially blind. We show that partner selection is socially constrained, and the freedom to choose is limited by at least two major factors or capitals: on the one hand, material resources and education, locating the partners on a scale of personal achievement and economic independence. On the other, the partners' ascriptive belonging to particular ethnic, or origin, groups, differentiated by the groups' social prestige, as well as by their culture, history and even physical characteristics. However, the relative importance of achievement and ascriptive factors, as well as the overlap between them, varies from society to society, depending on the society's structure and the factors shaping it. Israeli social structure has been shaped by the waves of new immigrants who arrived over the years. The timing of their arrival, their patterns of physical settlement and their occupational inclusion or exclusion have together created a mosaic of social groups whose principal common feature has been the country of origin from which they arrived. The analysis of marriage patterns helps illuminate the social meanings of the groups and their borders. To the extent that ethnic group membership has meaning for individuals and influences their life choices, the ascriptive factor will gain in importance relative to the achievement factor in their choice of marriage partner. In this research, we examine Jewish Israeli marriage patterns by looking at the marriage choices of 5,041 women aged 15 to 49 who were single at the census in 1983, and who were married at the time of the 1995 census, 12 years later. The database for this study was a file linking respondents from the 1983 and the 1995 censuses. In both cases, 5 percent of household were randomly chosen, so that our sample includes about 4 percent of women in Israel in 1983. We present three basic analyses: (1) Who was still single in 1983, using personal and household data from the 1983 census (binomial model), (2) Who married between 1983 and a1995, using personal and household data from the 1983 census (binomial model), (3) What were the personal characteristics of the womens’ partners in 1995, using data from the 1995 census (loglinear model). We show (i) that material and cultural capital both operate to delay marriage and to increase the probability of remaining single; and (ii) while there is a clear association between ethnic group membership and education, endogamy and homogamy both operate as separate forces which constraint (but do not determine) the choice of marriage partner, and thus both serve to reproduce the current pattern of relationships, as well as identifying patterns of proximity and distance between the different groups.

Keywords: Israel, nuptiality, ascription, achievement

Procedia PDF Downloads 91
30741 In Defense of Impersonal Obligatoriness

Authors: Peter B. M. Vranas

Abstract:

An important question in moral philosophy is whether whatever is obligatory (i.e., morally required) is personally obligatory, namely obligatory for someone. A positive answer is uncontested in the literature: for example, if it is obligatory for you to keep your promises, it seems that it is obligatory for you you keep your promises. By using conceptual analysis, this paper defends a negative answer: some things are impersonally obligatory, namely obligatory, but not obligatory for anyone. For example, if each of us has promised to vote and thus has an obligation to vote, then it is obligatory that we all vote, but it is not obligatory for anyone that we all vote (because, for example, what is obligatory for you is that you vote, not that we all vote). The paper concludes that there is an important concept of impersonal obligatoriness irreducible to personal obligatoriness.

Keywords: impersonal obligatoriness, ought to be, ought to do, personal obligatoriness

Procedia PDF Downloads 73
30740 A Landscape of Research Data Repositories in Re3data.org Registry: A Case Study of Indian Repositories

Authors: Prashant Shrivastava

Abstract:

The purpose of this study is to explore re3dat.org registry to identify research data repositories registration workflow process. Further objective is to depict a graph for present development of research data repositories in India. Preliminarily with an approach to understand re3data.org registry framework and schema design then further proceed to explore the status of research data repositories of India in re3data.org registry. Research data repositories are getting wider relevance due to e-research concepts. Now available registry re3data.org is a good tool for users and researchers to identify appropriate research data repositories as per their research requirements. In Indian environment, a compatible National Research Data Policy is the need of the time to boost the management of research data. Registry for Research Data Repositories is a crucial tool to discover specific information in specific domain. Also, Research Data Repositories in India have not been studied. Re3data.org registry and status of Indian research data repositories both discussed in this study.

Keywords: research data, research data repositories, research data registry, re3data.org

Procedia PDF Downloads 299
30739 Energy Management System and Interactive Functions of Smart Plug for Smart Home

Authors: Win Thandar Soe, Innocent Mpawenimana, Mathieu Di Fazio, Cécile Belleudy, Aung Ze Ya

Abstract:

Intelligent electronic equipment and automation network is the brain of high-tech energy management systems in critical role of smart homes dominance. Smart home is a technology integration for greater comfort, autonomy, reduced cost, and energy saving as well. These services can be provided to home owners for managing their home appliances locally or remotely and consequently allow them to automate intelligently and responsibly their consumption by individual or collective control systems. In this study, three smart plugs are described and one of them tested on typical household appliances. This article proposes to collect the data from the wireless technology and to extract some smart data for energy management system. This smart data is to quantify for three kinds of load: intermittent load, phantom load and continuous load. Phantom load is a waste power that is one of unnoticed power of each appliance while connected or disconnected to the main. Intermittent load and continuous load take in to consideration the power and using time of home appliances. By analysing the classification of loads, this smart data will be provided to reduce the communication of wireless sensor network for energy management system.

Keywords: energy management, load profile, smart plug, wireless sensor network

Procedia PDF Downloads 249
30738 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 77
30737 Structure of the Working Time of Nurses in Emergency Departments in Polish Hospitals

Authors: Jadwiga Klukow, Anna Ksykiewicz-Dorota

Abstract:

An analysis of the distribution of nurses’ working time constitutes vital information for the management in planning employment. The objective of the study was to analyze the distribution of nurses’ working time in an emergency department. The study was conducted in an emergency department of a teaching hospital in Lublin, in Southeast Poland. The catalogue of activities performed by nurses was compiled by means of continuous observation. Identified activities were classified into four groups: Direct care, indirect care, coordination of work in the department and personal activities. Distribution of nurses’ working time was determined by work sampling observation (Tippett) at random intervals. The research project was approved by the Research Ethics Committee by the Medical University of Lublin (Protocol 0254/113/2010). On average, nurses spent 31% of their working time on direct care, 47% on indirect care, 12% on coordinating work in the department and 10% on personal activities. The most frequently performed direct care tasks were diagnostic activities – 29.23% and treatment-related activities – 27.69%. The study has provided information on the complexity of performed activities and utilization of nurses’ working time. Enhancing the effectiveness of nursing actions requires working out a strategy for improved management of the time nurses spent at work. Increasing the involvement of auxiliary staff and optimizing communication processes within the team may lead to reduction of the time devoted to indirect care for the benefit of direct care.

Keywords: emergency nurses, nursing care, workload, work sampling

Procedia PDF Downloads 307
30736 Developing an IT Management Policy: A Proposal

Authors: Robert Gilliland

Abstract:

In any organization, a potential issue can arise and become a problem when management deviates from the standard norms set in the system development process of an IT system and the policies that pertain to it. In these instances, cybersecurity is a big challenge that organizations have to face in safeguarding the data that they generate and use. When a new idea, task, or process begins, specific standards must be followed, along with the policies and procedures that ensure the safeguard of data in the information system within the company. A good IT Strategy and Policy should have individuals who are in charge of overseeing the design, development, implementation, and auditing of these policies. Auditors are people who check to make sure that the issue conforms with the plan that is in place. Management has the ability through the role of the manager to potentially abuse power is given and to direct specific ideas, events, projects, and outcomes that are contrary to the vision or goals of the company.

Keywords: strategic policy, policy management, new policy, strategic planning

Procedia PDF Downloads 107
30735 Addressing Supply Chain Data Risk with Data Security Assurance

Authors: Anna Fowler

Abstract:

When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.

Keywords: security by design, data security architecture, cybersecurity framework, data security assurance

Procedia PDF Downloads 62
30734 Assessment of Potential Chemical Exposure to Betamethasone Valerate and Clobetasol Propionate in Pharmaceutical Manufacturing Laboratories

Authors: Nadeen Felemban, Hamsa Banjer, Rabaah Jaafari

Abstract:

One of the most common hazards in the pharmaceutical industry is the chemical hazard, which can cause harm or develop occupational health diseases/illnesses due to chronic exposures to hazardous substances. Therefore, a chemical agent management system is required, including hazard identification, risk assessment, controls for specific hazards and inspections, to keep your workplace healthy and safe. However, routine management monitoring is also required to verify the effectiveness of the control measures. Moreover, Betamethasone Valerate and Clobetasol Propionate are some of the APIs (Active Pharmaceutical Ingredients) with highly hazardous classification-Occupational Hazard Category (OHC 4), which requires a full containment (ECA-D) during handling to avoid chemical exposure. According to Safety Data Sheet, those chemicals are reproductive toxicants (reprotoxicant H360D), which may affect female workers’ health and cause fatal damage to an unborn child, or impair fertility. In this study, qualitative (chemical Risk assessment-qCRA) was conducted to assess the chemical exposure during handling of Betamethasone Valerate and Clobetasol Propionate in pharmaceutical laboratories. The outcomes of qCRA identified that there is a risk of potential chemical exposure (risk rating 8 Amber risk). Therefore, immediate actions were taken to ensure interim controls (according to the Hierarchy of controls) are in place and in use to minimize the risk of chemical exposure. No open handlings should be done out of the Steroid Glove Box Isolator (SGB) with the required Personal Protective Equipment (PPEs). The PPEs include coverall, nitrile hand gloves, safety shoes and powered air-purifying respirators (PAPR). Furthermore, a quantitative assessment (personal air sampling) was conducted to verify the effectiveness of the engineering controls (SGB Isolator) and to confirm if there is chemical exposure, as indicated earlier by qCRA. Three personal air samples were collected using an air sampling pump and filter (IOM2 filters, 25mm glass fiber media). The collected samples were analyzed by HPLC in the BV lab, and the measured concentrations were reported in (ug/m3) with reference to Occupation Exposure Limits, 8hr OELs (8hr TWA) for each analytic. The analytical results are needed in 8hr TWA (8hr Time-weighted Average) to be analyzed using Bayesian statistics (IHDataAnalyst). The results of the Bayesian Likelihood Graph indicate (category 0), which means Exposures are de "minimus," trivial, or non-existent Employees have little to no exposure. Also, these results indicate that the 3 samplings are representative samplings with very low variations (SD=0.0014). In conclusion, the engineering controls were effective in protecting the operators from such exposure. However, routine chemical monitoring is required every 3 years unless there is a change in the processor type of chemicals. Also, frequent management monitoring (daily, weekly, and monthly) is required to ensure the control measures are in place and in use. Furthermore, a Similar Exposure Group (SEG) was identified in this activity and included in the annual health surveillance for health monitoring.

Keywords: occupational health and safety, risk assessment, chemical exposure, hierarchy of control, reproductive

Procedia PDF Downloads 153
30733 Effectiveness of New Digital Tools on Implementing Quality Management System: An Exploratory Study of French Companies

Authors: Takwa Belwakess

Abstract:

With the wave of the digitization that invades the modern world, communication tools took their place in the world of business. As for organizations, being part of the digital era necessarily involves an evolution of the management style, mainly in processes management, knowing also as quality management system (QMS). For more than 50 years quality management standards have been adopted by organizations to prove their operational and financial performances. We believe that achieving a high-level of communication can lead to better quality management and greater customer satisfaction, which is essential to make sure long-term competitiveness. In this paper, a questionnaire survey was developed to investigate the use of collaboration tools such as Content Management System and Social Networks. Data from more than 100 companies based in France was analyzed, the results show that adopting new digital communication tools while applying quality management practices over a reasonable period, contributed to delivering a better implementation of the QMS for a better business performance.

Keywords: communication tools, content management system, digital, effectiveness, French companies, quality management system, quality management practices, social networks

Procedia PDF Downloads 239
30732 Efficacy of Knowledge Management Practices in Selected Public Libraries in the Province of Kwazulu-Natal, South Africa

Authors: Petros Dlamini, Bethiweli Malambo, Maggie Masenya

Abstract:

Knowledge management practices are very important in public libraries, especial in the era of the information society. The success of public libraries depends on the recognition and application of knowledge management practices. The study investigates the value and challenges of knowledge management practices in public libraries. Three research objectives informed the study: to identify knowledge management practices in public libraries, understand the value of knowledge management practices in public libraries, and determine the factors hampering knowledge management practices in public libraries. The study was informed by the interpretivism research paradigm, which is associated with qualitative studies. In that light, the study collected data from eight librarians and or library heads, who were purposively selected from public libraries. The study adopted a social anthropological approach, which thoroughly evaluated each participant's response. Data was collected from the respondents through telephonic semi-structured interviews and assessed accordingly. Furthermore, the study used the latest content concept for data interpretation. The chosen data analysis method allowed the study to achieve its main purpose with concrete and valid information. The study's findings showed that all six (100%) selected public libraries apply knowledge management practices. The findings of the study revealed that public libraries have knowledge sharing as the main knowledge management practice. It was noted that public libraries employ many practices, but each library employed its practices of choice depending on their knowledge management practices structure. The findings further showed that knowledge management practices in public libraries are employed through meetings, training, information sessions, and awareness, to mention a few. The findings revealed that knowledge management practices make the libraries usable. Furthermore, it has been asserted that knowledge management practices in public libraries meet users’ needs and expectations and equip them with skills. It was discovered that all participating public libraries from Umkhanyakude district municipality valued their knowledge management practices as the pillar and foundation of services. Noticeably, knowledge management practices improve users ‘standard of living and build an information society. The findings of the study showed that librarians should be responsible for the value of knowledge management practices as they are qualified personnel. The results also showed that 83.35% of public libraries had factors hampering knowledge management practices. The factors are not limited to shortage of funds, resources and space, and political interference. Several suggestions were made to improve knowledge management practices in public libraries. These suggestions include improving the library budget, increasing libraries’ building sizes, and conducting more staff training.

Keywords: knowledge management, knowledge management practices, storage, dissemination

Procedia PDF Downloads 61
30731 Interdependence of Vocational Skills and Employability Skills: Example of an Industrial Training Centre in Central India

Authors: Mahesh Vishwakarma, Sadhana Vishwakarma

Abstract:

Vocational education includes all kind of education which can help students to acquire skills related to a certain profession, art, or activity so that they are able to exercise that profession, art or activity after acquiring such qualification. However, in this global economy of the modern world, job seekers are expected to have certain soft skills over and above the technical knowledge and skills acquired in their areas of expertise. These soft skills include but not limited to interpersonal communication, understanding, personal attributes, problem-solving, working in team, quick adaptability to the workplace environment, and other. Not only the hands-on, job-related skills, and competencies are now being sought by the employers, but also a complex of attitudinal dispositions and affective traits are being looked by them in their prospective employees. This study was performed to identify the employability skills of technical students from an Industrial Training Centre (ITC) in central India. It also aimed to convey a message to the students currently on the role, that for them to remain relevant in the job market, they would need to constantly adapt to changes and evolving requirements in the work environment, including the use of updated technologies. Five hypotheses were formulated and tested on the employability skills of students as a function of gender, trade, work experience, personal attributes, and IT skills. Data were gathered with the help of center’s training officers who approached 200 recently graduated students from the center and administered the instrument to students. All 200 respondents returned the completed instrument. The instrument used for the study consisted of 2 sections; demographic details and employability skills. To measure the employability skills of the trainees, the instrument was developed by referring to the several instruments developed by the past researchers for similar studies. The 1st section of the instrument of demographic details recorded age, gender, trade, year of passing, interviews faced, and employment status of the respondents. The 2nd section of the instrument on employability skills was categorized into seven specific skills: basic vocational skills; personal attributes; imagination skills; optimal management of resources; information-technology skills; interpersonal skills; adapting to new technologies. The reliability and validity of the instrument were checked. The findings revealed valuable information on the relationship and interdependence of vocational education and employability skills of students in the central Indian scenario. The findings revealed a valuable information on supplementing the existing vocational education programs with few soft skills and competencies so as to develop a superior workforce much better equipped to face the job market. The findings of the study can be used as an example by the management of government and private industrial training centers operating in the other parts of the Asian region. Future research can be undertaken on a greater population base from different geographical regions and backgrounds for an enhanced outcome.

Keywords: employability skills, vocational education, industrial training centers, students

Procedia PDF Downloads 112
30730 The Power of Story in Demonstrating the Story of Power

Authors: Marianne Vardalos

Abstract:

Many students are returning to school after years of rich, lived experiences as parents, employees, volunteers, and in various other roles outside the university. While in the workforce or at home raising a family, they have gained authentic, personal observations of the power dynamics referred to as racism, classism, sexism, heteronormativity, and ableism. Encouraging your students to apply their own realities to course material that interrogates power structures and privilege not only facilitates student learning and understanding but also reveals that you, as a teacher, respect the experiences of your students as valuable and valid teaching tools. Though there is general recognition of the pedagogical value of having students share their experiences, facilitating such discussion can be a harrowing challenge for faculty. Additionally, for some students, the classroom can be very strange and too intimidating to share personal stories of injustice or inequality. In larger classroom settings, an attempt to integrate story-telling can turn into a cacophony of emotional testimonials. Not wanting to lose control of the class and feeling unqualified to respond to students' emotional confessions from their past, educators are often tempted to minimize the personal comments of students and avoid altogether an impromptu free-for-all. Knowing how and when to draw on the personal experience of your students involves a systematic plan for eliciting the most useful information at the right time. The trick is to design methods that induce student self-reflection in a way that is relevant to the course material and to then effectively incorporate these methods into lesson plans.

Keywords: pedagogy, story-telling, power and inequality, hierarchies of power

Procedia PDF Downloads 73
30729 A Critical Examination of the Relationship between the Media and the Political Agenda in the Social Deviance Portrayal of Disabled People

Authors: Cara Williams

Abstract:

This paper considers the media’s role in formulating a dominant social deviance paradigm and medicalised portrayal of disabled people and examines how those representations of impairment reinforce the personal tragedy view that underpins the social value given to the category of disability. According to a materialist perspective, the personal tragedy medical model approach condemns disabled people to live an inferior 'life apart', socially excluded and prevented from living as fully participating citizens on an equal basis to non-disabled people. Commonly, disabled people are portrayed as a person who needs to be cured in order to achieve a better 'quality of life'; otherwise stories center on deviance, criminality or scrounger. Media representations have consistently used negative language and images that reinforce the personal tragedy 'deficient' view of disability. The systematic misrepresentation within film, literature, TV and other art forms have validated a process about what it means to be 'normal' and how 'difference' and 'identity' are interpreted. The impact of these stereotyped disabling images for disabled people is a barrier not experienced by many other oppressed minority groups. Applying a materialist analysis, this paper contends that the impact on audience’s perceptions of impaired bodies and minds, and the harmful effects on disabled people can be linked with agenda setting theory - the relationship between the media and the political agenda.

Keywords: media, disabled people, political agenda, personal tragedy

Procedia PDF Downloads 118
30728 Micro Celebrities in Social Media Instagram and Their Personal Influence in Business Perspective

Authors: Yoga Maulana Putra, Herry Hudrasyah

Abstract:

The Internet has now become an important part of human life; it can be accessed through a computer or even a smartphone almost anywhere and anytime. The Internet has created many social media such as Facebook, Twitter, and Instagram. Instagram has been acquired by Facebook in 2012. Since then, Instagram is growing fast. And now, Instagram is transforming from photo-sharing social media into business tools. As the result, some new behavior has been discovered. Some of Instagram user is becoming popular. These people also being called minor celebrity and they are also being used as marketing tools by many companies to influencing or promoting their product or service. This minor celebrity is existing because of their behavior in using Instagram. The company is using the personal influence of the minor celebrity to promoting and influencing their product or service, and the minor celebrity gets paid as much as their rate card. And their rate card based on their followers and insight. This research is using a qualitative method. An interview is being done to 6 minor celebrities from many different categories such as photographer, travel blogger, lifestyle, food blogger, fashion, and healthcare. Theory of reasoned behavior is being used as the grounded theory to discover the reason for their behavior and personal influence to describe their way to influencing people. The result of the interview is most of the minor celebrities is influenced by their friend’s circle in the process of using Instagram. They also had a different way to use their personal influence to affect their followers when the company employs them.

Keywords: humanities and social sciences, Instagram, minor celebrity, social media

Procedia PDF Downloads 142
30727 Traumatic Events, Post-traumatic Symptoms, Personal Resilience, Quality of Life, and Organizational Com Mitment Among Midwives: A Cross-Sectional Study

Authors: Kinneret Segal

Abstract:

The work of a midwife is emotionally challenging, both positively and negatively. Midwives share moments of joy when a baby is welcomed into the world, and also attend difficult events of loss and trauma. The relationship that develops with the maternity is the essence of the midwife's care, and it is a fundamental source of motivation and professional satisfaction. This close relationship with the maternity may be used as a double-edged sword in cases of exposure to traumatic events at birth. Birth problems, exposure to emergencies and traumatic events, and loss can affect the professional quality of life and the Compassion satisfaction of the midwife. It seems that the issue of traumatic experiences in the work of midwives, has not been sufficiently explored. The present study examined the associations between exposure to traumatic events, personal resilience and post-traumatic symptoms, professional quality of life and organizational commitment among midwifery nurses in Israeli hospitals. 131 midwives from three hospitals in the country's center in Israel participated in this study. The data were collected during 2021 using a self-report questionnaire that examined sociodemographic characteristics, the degree of exposure to traumatic events in the delivery room, personal resilience, post-traumatic symptoms, professional quality of life, and organizational commitment. The three most difficult traumatic events for the midwives were death or fear of death of a newborn, death or fear of the death of a mother and a quiet birth. The higher the frequency of exposure to traumatic events, the more numerous and intense the onset of post-trauma symptoms. The more numerous and powerful the post-trauma symptoms, the higher the level of professional burnout and/or compassion fatigue, and the lower the level of compassion satisfaction. High levels of compassion satisfaction and/or low professional burnout were expressed in a heightened sense of organizational commitment. Personal resilience, country of birth, traumatic symptoms and organizational commitment, predicted satisfaction from compassion. Midwives are exposed to traumatic events associated with dissatisfaction and impairment of the professional quality of life that accompanies burnout and compassion fatigue. Exposure to traumatic events leads to the appearance of traumatic symptoms, a decrease in organizational commitment, and psychological and mental well-being. The issue needs to be addressed by implementing training programs, organizational support, and policies to improving well-being and quality of care among midwives.

Keywords: traumatic experirnces, midwives, quality of life, burnout, organizational commitment, personal resilience

Procedia PDF Downloads 67
30726 Knowledge Engineering Based Smart Healthcare Solution

Authors: Rhaed Khiati, Muhammad Hanif

Abstract:

In the past decade, smart healthcare systems have been on an ascendant drift, especially with the evolution of hospitals and their increasing reliance on bioinformatics and software specializing in healthcare. Doctors have become reliant on technology more than ever, something that in the past would have been looked down upon, as technology has become imperative in reducing overall costs and improving the quality of patient care. With patient-doctor interactions becoming more necessary and more complicated than ever, systems must be developed while taking into account costs, patient comfort, and patient data, among other things. In this work, we proposed a smart hospital bed, which mixes the complexity and big data usage of traditional healthcare systems with the comfort found in soft beds while taking certain concerns like data confidentiality, security, and maintaining SLA agreements, etc. into account. This research work potentially provides users, namely patients and doctors, with a seamless interaction with to their respective nurses, as well as faster access to up-to-date personal data, including prescriptions and severity of the condition in contrast to the previous research in the area where there is lack of consideration of such provisions.

Keywords: big data, smart healthcare, distributed systems, bioinformatics

Procedia PDF Downloads 168
30725 Proposal to Increase the Efficiency, Reliability and Safety of the Centre of Data Collection Management and Their Evaluation Using Cluster Solutions

Authors: Martin Juhas, Bohuslava Juhasova, Igor Halenar, Andrej Elias

Abstract:

This article deals with the possibility of increasing efficiency, reliability and safety of the system for teledosimetric data collection management and their evaluation as a part of complex study for activity “Research of data collection, their measurement and evaluation with mobile and autonomous units” within project “Research of monitoring and evaluation of non-standard conditions in the area of nuclear power plants”. Possible weaknesses in existing system are identified. A study of available cluster solutions with possibility of their deploying to analysed system is presented.

Keywords: teledosimetric data, efficiency, reliability, safety, cluster solution

Procedia PDF Downloads 489
30724 Induced Affectivity and Impact on Creativity: Personal Growth and Perceived Adjustment when Narrating an Intense Emotional Experience

Authors: S. Da Costa, D. Páez, F. Sánchez

Abstract:

We examine the causal role of positive affect on creativity, the association of creativity or innovation in the ideation phase with functional emotional regulation, successful adjustment to stress and dispositional emotional creativity, as well as the predictive role of creativity for positive emotions and social adjustment. The study examines the effects of modification of positive affect on creativity. Participants write three poems, narrate an infatuation episode, answer a scale of personal growth after this episode and perform a creativity task, answer a flow scale after creativity task and fill a dispositional emotional creativity scale. High and low positive effect was induced by asking subjects to write three poems about high and low positive connotation stimuli. In a neutral condition, tasks were performed without previous affect induction. Subjects on the condition of high positive affect report more positive and less negative emotions, more personal growth (effect size r = .24) and their last poem was rated as more original by judges (effect size r = .33). Mediational analysis showed that positive emotions explain the influence of the manipulation on personal growth - positive affect correlates r = .33 to personal growth. The emotional creativity scale correlated to creativity scores of the creative task (r = .14), to the creativity of the narration of the infatuation episode (r = .21). Emotional creativity was also associated, during performing the creativity task, with flow (r = .27) and with affect balance (r = .26). The mediational analysis showed that emotional creativity predicts flow through positive affect. Results suggest that innovation in the phase of ideation is associated with a positive affect balance and satisfactory performance, as well as dispositional emotional creativity is adaptive.

Keywords: affectivity, creativity, induction, innovation, psychological factors

Procedia PDF Downloads 83
30723 Personal Identity and Group Identity under Threat following Exclusion: A Study in Singapore and in the Netherlands

Authors: Z. N. Huwaë, E.M. W. Tong, Y. H. M. See

Abstract:

In the present study, the researchers examined whether people from collectivistic cultures perceive a more group identity threat following social exclusion, whereas a more personal identity threat would be the case for those from individualistic cultures. In doing so, they investigated whether threatened identities depend on whether people are excluded by ingroup members (same ethnic background) or outgroup members (another ethnic background), as exclusion studies have shown mixed results when it comes to being excluded by ingroup versus outgroup members. For this purpose, students in Singapore and in the Netherlands participated in an online ball-tossing game (Cyberball) where they were excluded or included by other players with either the same or other ethnicity. Tentative results showed that both Singaporean and Dutch participants reported a more threat to their group identity than to their personal identity following exclusion and this did not depend on who excluded them. These tentative findings suggest that threatened identities following exclusion may not depend on cultural factors or on the source of exclusion.

Keywords: cultures, exclusion, experiment, group membership, identities

Procedia PDF Downloads 92
30722 Interoperable Platform for Internet of Things at Home Applications

Authors: Fabiano Amorim Vaz, Camila Gonzaga de Araujo

Abstract:

With the growing number of personal devices such as smartphones, tablets, smart watches, among others, in addition to recent devices designed for IoT, it is observed that residential environment has potential to generate important information about our daily lives. Therefore, this work is focused on showing and evaluating a system that integrates all these technologies considering the context of a smart house. To achieve this, we define an architecture capable of supporting the amount of data generated and consumed at a residence and, mainly, the variety of this data presents. We organize it in a particular cloud containing information about robots, recreational vehicles, weather, in addition to data from the house, such as lighting, energy, security, among others. The proposed architecture can be extrapolated to various scenarios and applications. Through the core of this work, we can define new functionality for residences integrating them with more resources.

Keywords: cloud computing, IoT, robotics, smart house

Procedia PDF Downloads 349
30721 Biorisk Management Education for Undergraduates Studying Clinical Microbiology at University in Japan

Authors: Shuji Fujimoto, Fumiko Kojima, Mika Shigematsu

Abstract:

Biorisk management (Biosafety/Biosecurity) is required for anyone working in a clinical laboratory (including medical/clinical research laboratories) where infectious agents and potentially hazardous biological materials are examined/stored. Proper education and training based on international standards of biorisk management should be provided not only as a part of laboratory safety program in work place but also as a part of introductory training at educational institutions for continuity and to elevate overall baseline of the biorisk management. We reported results of the pilot study of biorisk management education for graduate students majored in laboratory diagnostics previously. However, postgraduate education is still late in their profession and the participants’ interview also revealed importance and demands of earlier biorisk management education for undergraduates. The aim of this study is to identify the need for biosafety/biosecurity education and training program which is designed for undergraduate students who are entering the profession in clinical microbiology. We modified the previous program to include more basic topics and explanations (risk management, principles of safe clinical lab practices, personal protective equipment, disinfection, disposal of biological substances) and provided incorporating in the routine educational system for faculty of medical sciences in Kyushu University. The results of the pre and post examinations showed that the knowledge of the students on biorisk control had developed effectively as a proof of effectiveness of the program even in the undergraduate students. Our study indicates that administrating the basic biorisk management program in the earlier stage of learning will add positive impact to the understanding of biosafety to the health professional education.

Keywords: biorisk management, biosafety, biosecurity, clinical microbiology, education for undergraduates

Procedia PDF Downloads 196