Search results for: personal data protection
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 27008

Search results for: personal data protection

26918 The Personal Characteristics of Nurse Managers and the Personal and Professional Factors That Affect Them

Authors: Handan Alan, Ulkü Baykal

Abstract:

Personal characteristics help people understand and recognize both themselves and other people. They are also known to have direct effects on managerial behaviors. Managers’ personalities indicate how they think, perceive reality and relate to others, and affect their decision-making and problem-solving methods. This descriptive study aims to determine the personal characteristics of nurse managers and the personal and professional factors that affect them since sufficient data does not exist on personal characteristics despite the focus on the leadership and managerial characteristics in nursing. The study population consisted of nurses working in administrative positions at hospitals affiliated with the public hospitals union, research and practice hospitals affiliated with universities and private hospitals in cities in the Marmara Region. The study sample consisted of nurse managers working in the hospitals that permitted conducting the study (excluding private branch hospitals). The data were collected after obtaining the approval of the Clinical Research Ethics Committee of Çanakkale Onsekiz Mart University (Approval date: 1.7.2015, Decision No: 2015-01) and written official permissions from the administrations of the hospitals included in the study. The data analysis was carried out using means and standard deviations (SD) as descriptive statistics, one-way analysis of variance for inter-group comparisons and the independent samples t-test for paired group comparisons. A significance threshold of p < 0.05 was used to evaluate the findings. The data were collected using the Five Factor Personality Inventory. The study included 900 nurse managers, who obtained the highest mean score on the conscientiousness dimension (X=4.22 ±0.35). This dimension was followed by their mean scores on the agreeableness (X=4.06±0.40), intelligence (X=4.05±0.37), extroversion (X=3.50±0.43), and emotional instability (X=2.07±0.53) dimensions. Statistically significant differences were found between the independent variables of age, gender, marital status, education level, work institution, professional experience, institutional experience, managerial experience, administrative position, work unit and managerial education when compared using the five factor personality inventory (p < 0.05). In conclusion, the nurse managers described themselves having high conscientiousness. Statistically significant differences were found between the five factor personality inventory mean scores and their personal and professional characteristics.

Keywords: nurse manager, personality, personal characteristics, professional characteristics

Procedia PDF Downloads 221
26917 Towards the Management of Cybersecurity Threats in Organisations

Authors: O. A. Ajigini, E. N. Mwim

Abstract:

Cybersecurity is the protection of computers, programs, networks, and data from attack, damage, unauthorised, unintended access, change, or destruction. Organisations collect, process and store their confidential and sensitive information on computers and transmit this data across networks to other computers. Moreover, the advent of internet technologies has led to various cyberattacks resulting in dangerous consequences for organisations. Therefore, with the increase in the volume and sophistication of cyberattacks, there is a need to develop models and make recommendations for the management of cybersecurity threats in organisations. This paper reports on various threats that cause malicious damage to organisations in cyberspace and provides measures on how these threats can be eliminated or reduced. The paper explores various aspects of protection measures against cybersecurity threats such as handling of sensitive data, network security, protection of information assets and cybersecurity awareness. The paper posits a model and recommendations on how to manage cybersecurity threats in organisations effectively. The model and the recommendations can then be utilised by organisations to manage the threats affecting their cyberspace. The paper provides valuable information to assist organisations in managing their cybersecurity threats and hence protect their computers, programs, networks and data in cyberspace. The paper aims to assist organisations to protect their information assets and data from cyberthreats as part of the contributions toward community engagement.

Keywords: confidential information, cyberattacks, cybersecurity, cyberspace, sensitive information

Procedia PDF Downloads 221
26916 Reviewing Privacy Preserving Distributed Data Mining

Authors: Sajjad Baghernezhad, Saeideh Baghernezhad

Abstract:

Nowadays considering human involved in increasing data development some methods such as data mining to extract science are unavoidable. One of the discussions of data mining is inherent distribution of the data usually the bases creating or receiving such data belong to corporate or non-corporate persons and do not give their information freely to others. Yet there is no guarantee to enable someone to mine special data without entering in the owner’s privacy. Sending data and then gathering them by each vertical or horizontal software depends on the type of their preserving type and also executed to improve data privacy. In this study it was attempted to compare comprehensively preserving data methods; also general methods such as random data, coding and strong and weak points of each one are examined.

Keywords: data mining, distributed data mining, privacy protection, privacy preserving

Procedia PDF Downloads 489
26915 The Importance of Fire Safety in Egypt

Authors: Omar Shakra

Abstract:

This paper contains a huge number of benefits that we can use it in several places and times in fire safety protection in the Middle East especially in Egypt . People here in Egypt did not consider the safety and fire protection as important as it is. But on the other hand, its very important for them to contain the fire systems and safety in every facility, the companies , hospitals , police stations , and even the super markets must use the fire system. It makes the facility safe to the visitors while they are using it.From my point of view as the owner Fire Safety Company called Deluge Egypt , i can say that not all of the companies use the fire system protection according to the high cost they prefer to build their company without the protection, and this is make the building totally unsafe to be used from the visitors or client.So, i am looking for new methods and technology to invest in Egypt, and this is through attending this Conference and let the audiences know more about the services i provide and [to let them know about the importance of the Fire Safety in Egypt. The Objectives of my research 1- The system that i used in my Company. 2- The benefits of the Fire System Protection. 3-The importance of the Fire System and safety. 4-The use of the new Technologies. 5-The hardships that i found while having new deals with new clients.

Keywords: fire, system, protection, fire hydrants, security, alarms

Procedia PDF Downloads 64
26914 The Role of Organizational Culture, Work Discipline, and Employee Motivation towards Employees Performance at Personal Care and Cosmetic Department Flammable PT XYZ Cosmetics

Authors: Novawiguna Kemalasari, Ahmad Badawi Saluy

Abstract:

This research is a planned activity to find an objective answer to PT XYZ problem through scientific procedure. In this study, It was used quantitative research methods by using samples taken from a department selected by researchers. This study aims to analyze the influence of organizational culture, work discipline and work motivation on employee performance of Personal Care & Cosmetic Department (PCC) Flammable PT XYZ. This research was conducted at PT XYZ Personal Care & Cosmetic Department (PCC) Flammable involving 82 employees as respondents, the data were obtained by using questionnaires filled in self-rating by respondents. The data were analyzed by multiple linear regression model processed by using SPSS version 22. The result of research showed that organizational culture variable, work discipline and work motivation had significant effect to employee performance.

Keywords: organizational culture, work discipline, employee motivation, employees performance

Procedia PDF Downloads 216
26913 Survivable IP over WDM Network Design Based on 1 ⊕ 1 Network Coding

Authors: Nihed Bahria El Asghar, Imen Jouili, Mounir Frikha

Abstract:

Inter-datacenter transport network is very bandwidth and delay demanding. The data transferred over such a network is also highly QoS-exigent mostly because a huge volume of data should be transported transparently with regard to the application user. To avoid the data transfer failure, a backup path should be reserved. No re-routing delay should be observed. A dedicated 1+1 protection is however not applicable in inter-datacenter transport network because of the huge spare capacity. In this context, we propose a survivable virtual network with minimal backup based on network coding (1 ⊕ 1) and solve it using a modified Dijkstra-based heuristic.

Keywords: network coding, dedicated protection, spare capacity, inter-datacenters transport network

Procedia PDF Downloads 419
26912 Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier

Abstract:

This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.

Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection

Procedia PDF Downloads 459
26911 Adopting the Community Health Workers Master List Registry for Community Health Workforce in Kenya

Authors: Gikunda Aloise, Mjema Saida, Barasa Herbert, Wanyungu John, Kimani Maureen

Abstract:

Background: Community Health Workforce (CHW) is health care providers at the community level (Level 1) and serves as a bridge between the community and the formal healthcare system. This human resource has enormous potential to extend healthcare services and ensures that the vulnerable, marginalized, and hard-to-reach populations have access to quality healthcare services at the community and primary health facility levels. However, these cadres are neither recognized, remunerated, nor in most instances, registered in a master list. Management and supervision of CHWs is not easy if their individual demographics, training capacity and incentives is not well documented through a centralized registry. Description: In February 2022, Amref supported the Kenya Ministry of Health in developing a community health workforce database called Community Health Workers Master List Registry (CHWML), which is hosted in Kenya Health Information System (KHIS) tracker. CHW registration exercise was through a sensitization meeting conducted by the County Community Health Focal Person for the Sub-County Community Health Focal Person and Community Health Assistants who uploaded information on individual demographics, training undertaken and incentives received by CHVs. Care was taken to ensure compliance with Kenyan laws on the availability and use of personal data as prescribed by the Data Protection Act, 2019 (DPA). Results and lessons learnt: By June 2022, 80,825 CHWs had been registered in the system; 78,174 (96%) CHVs and 2,636 (4%) CHAs. 25,235 (31%) are male, 55,505 (68%) are female & 85 (1%) are transgender. 39,979. (49%) had secondary education and 2500 (3%) had no formal education. Only 27 641 (34%) received a monthly stipend. 68,436 CHVs (85%) had undergone basic training. However, there is a need to validate the data to align with the current situation in the counties. Conclusions/Next steps: The use of CHWML will unlock opportunities for building more resilient and sustainable health systems and inform financial planning, resource allocation, capacity development, and quality service delivery. The MOH will update the CHWML guidelines in adherence to the data protection act which will inform standard procedures for maintaining, updating the registry and integrate Community Health Workforce registry with the HRH system.

Keywords: community health registry, community health volunteers (CHVs), community health workers masters list (CHWML), data protection act

Procedia PDF Downloads 91
26910 Blockchain Platform Configuration for MyData Operator in Digital and Connected Health

Authors: Minna Pikkarainen, Yueqiang Xu

Abstract:

The integration of digital technology with existing healthcare processes has been painfully slow, a huge gap exists between the fields of strictly regulated official medical care and the quickly moving field of health and wellness technology. We claim that the promises of preventive healthcare can only be fulfilled when this gap is closed – health care and self-care becomes seamless continuum “correct information, in the correct hands, at the correct time allowing individuals and professionals to make better decisions” what we call connected health approach. Currently, the issues related to security, privacy, consumer consent and data sharing are hindering the implementation of this new paradigm of healthcare. This could be solved by following MyData principles stating that: Individuals should have the right and practical means to manage their data and privacy. MyData infrastructure enables decentralized management of personal data, improves interoperability, makes it easier for companies to comply with tightening data protection regulations, and allows individuals to change service providers without proprietary data lock-ins. This paper tackles today’s unprecedented challenges of enabling and stimulating multiple healthcare data providers and stakeholders to have more active participation in the digital health ecosystem. First, the paper systematically proposes the MyData approach for healthcare and preventive health data ecosystem. In this research, the work is targeted for health and wellness ecosystems. Each ecosystem consists of key actors, such as 1) individual (citizen or professional controlling/using the services) i.e. data subject, 2) services providing personal data (e.g. startups providing data collection apps or data collection devices), 3) health and wellness services utilizing aforementioned data and 4) services authorizing the access to this data under individual’s provided explicit consent. Second, the research extends the existing four archetypes of orchestrator-driven healthcare data business models for the healthcare industry and proposes the fifth type of healthcare data model, the MyData Blockchain Platform. This new architecture is developed by the Action Design Research approach, which is a prominent research methodology in the information system domain. The key novelty of the paper is to expand the health data value chain architecture and design from centralization and pseudo-decentralization to full decentralization, enabled by blockchain, thus the MyData blockchain platform. The study not only broadens the healthcare informatics literature but also contributes to the theoretical development of digital healthcare and blockchain research domains with a systemic approach.

Keywords: blockchain, health data, platform, action design

Procedia PDF Downloads 69
26909 Mechanisms Underlying Comprehension of Visualized Personal Health Information: An Eye Tracking Study

Authors: Da Tao, Mingfu Qin, Wenkai Li, Tieyan Wang

Abstract:

While the use of electronic personal health portals has gained increasing popularity in the healthcare industry, users usually experience difficulty in comprehending and correctly responding to personal health information, partly due to inappropriate or poor presentation of the information. The way personal health information is visualized may affect how users perceive and assess their personal health information. This study was conducted to examine the effects of information visualization format and visualization mode on the comprehension and perceptions of personal health information among personal health information users with eye tracking techniques. A two-factor within-subjects experimental design was employed, where participants were instructed to complete a series of personal health information comprehension tasks under varied types of visualization mode (i.e., whether the information visualization is static or dynamic) and three visualization formats (i.e., bar graph, instrument-like graph, and text-only format). Data on a set of measures, including comprehension performance, perceptions, and eye movement indicators, were collected during the task completion in the experiment. Repeated measure analysis of variance analyses (RM-ANOVAs) was used for data analysis. The results showed that while the visualization format yielded no effects on comprehension performance, it significantly affected users’ perceptions (such as perceived ease of use and satisfaction). The two graphic visualizations yielded significantly higher favorable scores on subjective evaluations than that of the text format. While visualization mode showed no effects on users’ perception measures, it significantly affected users' comprehension performance in that dynamic visualization significantly reduced users' information search time. Both visualization format and visualization mode had significant main effects on eye movement behaviors, and their interaction effects were also significant. While the bar graph format and text format had similar time to first fixation across dynamic and static visualizations, instrument-like graph format had a larger time to first fixation for dynamic visualization than for static visualization. The two graphic visualization formats yielded shorter total fixation duration compared with the text-only format, indicating their ability to improve information comprehension efficiency. The results suggest that dynamic visualization can improve efficiency in comprehending important health information, and graphic visualization formats were favored more by users. The findings are helpful in the underlying comprehension mechanism of visualized personal health information and provide important implications for optimal design and visualization of personal health information.

Keywords: eye tracking, information comprehension, personal health information, visualization

Procedia PDF Downloads 73
26908 A Mixed-method Study of Psychological Empowerment in Child Protection Practitioners

Authors: Amy Bromley

Abstract:

Child protection practitioners are a vital part of systems designed to protect children from abuse and neglect. Reforms in Anglo-American systems have shown a trend towards compliance-culture that reduces practitioner autonomy and empowerment, increasing staff turnover and negatively impacting outcomes for children. This explanatory mixed-methods study examined psychological empowerment in a national sample of child protection practitioners in Australia (n=109) using the Psychological Empowerment Instrument followed by semi-structured interviews (n=19). The results show that practitioners experience the sub-dimensions of psychological empowerment differently, perceiving themselves to have high levels of competence and satisfaction in their work but limited opportunities for self-determination and low levels of impact on decision-making in their organizations. The qualitative data revealed that practitioners do not trust systemic reforms and have experienced them as ineffective, politically driven, and bureaucratic. The increased compliance demanded from these reforms has left practitioners feeling that their expertise is not valued, leading many to leave their organizations. The practitioners who remain employed in child protection identified their use of advocacy, curiosity, and child-centered values as ways of protecting their psychological empowerment. The findings highlight the ways psychological empowerment can be promoted within child protection systems, improving staff retention and building expertise.

Keywords: child protection, implementation, psychological empowerment, systems theory

Procedia PDF Downloads 154
26907 Rural Tourism Planning from the Perspective of Water Resource Protection and Regional Integration: Taking Villages along Tongji Lake as an Example

Authors: Pianpian Zhang, Qingping Luo

Abstract:

Currently, there is a great tendency that more and more villages in China are trying to increase income by development of tourism. Especially in Zhejiang Province, 'Beautiful Rural Construction' provides an excellent opportunity for the development of tourism. In this context, development orientation, transportation routes and tourism service facilities are analyzed under the perspective of water resources protection and regional integration based on the development tourism industry of the six villages in Pujiang County, Zhejiang Province as a research object. In the program, the biggest issue is the contradiction between the ecological protection of the water and the development of economy. How to deal with the relationship between protection and development is the key to the design of this case. Furthermore, the six villages are regarded as a whole, connecting to each other by the system of five-path and the landscape along the lake. Every village has its own features, but cannot develop without one another. The article is actively exploring for suggestions and countermeasures to promote the development premised on protection and based on a regional view.

Keywords: development, integration, protection, rural tourism

Procedia PDF Downloads 335
26906 Bangladeshi English Teachers’ Understanding of Teacher Autonomy

Authors: Rubaiyat Jahan

Abstract:

This paper reports some findings of a study on the issues related to teacher autonomy in the Bangladeshi school contexts, and data of this research was collected from fourteen practicing English teachers of Bangladesh through semi structured interviews. The theoretical underpinning of teacher autonomy, on an apparent note, focuses on the behavioral aspects of teacher autonomy hence emphasizing mostly on the teachers’ capacity for self-directed acts of teaching and self-directed acts of professional development. Yet, a contemporary literature survey of teacher autonomy seems to be concerned more on the political interpretations of teacher autonomy. Thus, autonomous teachers are expected to generate their personal theories of teaching from their practices. The idea of personal theories of practice upholds the view that along with the teaching, teachers need to engage themselves in various classroom based research with a view to theorising from their practices. The findings of this research indicate enormous evidence of behavioral aspects of teacher autonomy. As the data of this research suggests, the participant teachers’ understanding of classroom situations, their reflections on the situational realities and opting for classroom decisions on the basis of those realizations are some good examples of teacher autonomy. Also, a few teachers’ stated teaching practices seem to reflect, though in a subtle way, their effort of outlining context embedded personal theories of teaching. This paper has got one significant pedagogical implication for the teacher education. Any teacher education must promote the conditions and capabilities for the present and prospective teachers for the role of theorisers in addition to develop their professional, procedural, and personal knowledge base.

Keywords: personal theories of practice, self-directed acts of professional development, self-directed acts of teaching, teacher autonomy

Procedia PDF Downloads 314
26905 The Various Legal Dimensions of Genomic Data

Authors: Amy Gooden

Abstract:

When human genomic data is considered, this is often done through only one dimension of the law, or the interplay between the various dimensions is not considered, thus providing an incomplete picture of the legal framework. This research considers and analyzes the various dimensions in South African law applicable to genomic sequence data – including property rights, personality rights, and intellectual property rights. The effective use of personal genomic sequence data requires the acknowledgement and harmonization of the rights applicable to such data.

Keywords: artificial intelligence, data, law, genomics, rights

Procedia PDF Downloads 113
26904 Recognition and Protection of Indigenous Society in Indonesia

Authors: Triyanto, Rima Vien Permata Hartanto

Abstract:

Indonesia is a legal state. The consequence of this status is the recognition and protection of the existence of indigenous peoples. This paper aims to describe the dynamics of legal recognition and protection for indigenous peoples within the framework of Indonesian law. This paper is library research based on literature. The result states that although the constitution has normatively recognized the existence of indigenous peoples and their traditional rights, in reality, not all rights were recognized and protected. The protection and recognition for indigenous people need to be strengthened.

Keywords: indigenous peoples, customary law, state law, state of law

Procedia PDF Downloads 295
26903 Youth Intelligent Personal Decision Aid

Authors: Norfiza Ibrahim, Norshuhada Shiratuddin, Siti Mahfuzah Sarif

Abstract:

Decision-making system is used to facilitate people in making the right choice for their important daily activities. For the youth, proper guidance in making important decisions is needed. Their skills in decision-making aid decisions will indirectly affect their future. For that reason, this study focuses on the intelligent aspects in the development of intelligent decision support application. The aid apparently integrates Personality Traits (PT) and Multiple Intelligence (MI) data in development of a computerized personal decision aid for youth named as Youth Personal Decision Aid (Youth PDA). This study is concerned with the aid’s helpfulness based on the hybrid intelligent process. There are four main items involved which are reliability, decision making effort, confidence, as well as decision process awareness. Survey method was applied to the actual user of this system, namely the school and the Institute of Higher Education (IPT)’s students. An establish instrument was used to evaluate the study. The results of the analysis and findings in the assessment indicates a high mean value of the four dimensions in helping Youth PDA to be accepted as a useful tool for the youth in decision-making.

Keywords: decision support, multiple intelligent, personality traits, youth personal decision aid

Procedia PDF Downloads 605
26902 Analysis on the Copyright Protection Dilemma of Webcast in 'Internet Plus' Era

Authors: Yi Yang

Abstract:

In the era of 'Internet plus', the rapid development of webcast has posed new challenges to the intellectual property law. Meanwhile, traditional copyright protection has also exposed the existing theoretical imbalance in webcast. Through the analysis of the outstanding problems in the copyright protection of the network live broadcast, this paper points out that the main causes of the problems are the unclear nature of the copyright of the network live broadcast, the copyright protection system of the game network live broadcast has not yet been constructed, and the copyright infringement of the pan entertainment live broadcast is mostly, and so on. Based on the current practice, this paper puts forward the specific thinking of the protection path of online live broadcast copyright. First of all, to provide a reasonable judicial solution for a large number of online live copyright cases, we need to integrate the right scope and regulatory behavior of broadcasting right and information network communication right. Secondly, in order to protect the rights of network anchors, the webcast should be regarded as works. Thirdly, in order to protect the copyright of webcast and prevent the infringement of copyright by webcast, the webcast platform will be used as an intermediary to provide solutions for solving the judicial dilemma. In the era of 'Internet plus', it is a theoretical attempt to explore the protection and method of copyright protection on webcast, which has positive guiding significance for judicial practice.

Keywords: 'Internet Plus' era, webcast, copyright, protection dilemma

Procedia PDF Downloads 86
26901 Infringement of Patent Rights with Doctrine of Equivalent for Turkey

Authors: Duru Helin Ozaner

Abstract:

Due to the doctrine of equivalent, the words in the claims' sentences are insufficient for the protection area provided by the patent registration. While this situation widens the boundaries of the protection area, it also obscures the boundaries of the protected area of patents. In addition, it creates distrust for third parties. Therefore, the doctrine of equivalent aims to establish a balance between the rights of patent owners and the legal security of third parties. The current legal system of Turkey has been tried to be created as a parallel judicial system to the widely applied regulations. Therefore, the regulations regarding the protection provided by patents in the current Turkish legal system are similar to many countries. However, infringement through equivalent is common by third parties. This study, it is aimed to explain that the protection provided by the patent is not only limited to the words of the claims but also the wide-ranging protection provided by the claims for the doctrine of equivalence. This study is important to determine the limits of the protection provided by the patent right holder and to indicate the importance of the equivalent elements of the protection granted to the patent right holder.

Keywords: patent, infringement, intellectual property, the doctrine of equivalent

Procedia PDF Downloads 185
26900 Applying Different Stenography Techniques in Cloud Computing Technology to Improve Cloud Data Privacy and Security Issues

Authors: Muhammad Muhammad Suleiman

Abstract:

Cloud Computing is a versatile concept that refers to a service that allows users to outsource their data without having to worry about local storage issues. However, the most pressing issues to be addressed are maintaining a secure and reliable data repository rather than relying on untrustworthy service providers. In this study, we look at how stenography approaches and collaboration with Digital Watermarking can greatly improve the system's effectiveness and data security when used for Cloud Computing. The main requirement of such frameworks, where data is transferred or exchanged between servers and users, is safe data management in cloud environments. Steganography is the cloud is among the most effective methods for safe communication. Steganography is a method of writing coded messages in such a way that only the sender and recipient can safely interpret and display the information hidden in the communication channel. This study presents a new text steganography method for hiding a loaded hidden English text file in a cover English text file to ensure data protection in cloud computing. Data protection, data hiding capability, and time were all improved using the proposed technique.

Keywords: cloud computing, steganography, information hiding, cloud storage, security

Procedia PDF Downloads 161
26899 Property Rights and Trade Specialization

Authors: Sarma Binti Aralas

Abstract:

The relationship between property rights and trade specialization is examined for developing and developed countries using panel data analysis. Property rights is measured using the international property rights index while trade specialization is measured using the comparative advantage index. Cross country differences in property rights are hypothesized to lead to differences in trade specialization. Based on the argument that a weak protection of natural resources implies greater trade in resource-intensive goods, developing countries with less defined property rights are hypothesized to have a comparative advantage in resource-based exports while countries with more defined property rights will not have an advantage in resource-intensive goods. Evidence suggests that developing countries with weaker environmental protection index but are rich in natural resources do specialize in the trade of resource-intensive goods. The finding suggests that institutional frameworks to increase the stringency of environmental protection of resources may be needed to diversify exports away from the trade of resource-intensive goods.

Keywords: environmental protection, panel data, renewable resources, trade specialization

Procedia PDF Downloads 421
26898 Metaverse in Future Personal Healthcare Industry: From Telemedicine to Telepresence

Authors: Mohammed Saeed Jawad

Abstract:

Metaverse involves the convergence of three major technologies trends of AI, VR, and AR. Together these three technologies can provide an entirely new channel for delivering healthcare with great potential to lower costs and improve patient outcomes on a larger scale. Telepresence is the technology that allows people to be together even if they are physically apart. Medical doctors can be symbolic as interactive avatars developed to have smart conversations and medical recommendations for patients at the different stages of the treatment. Medical digital assets such as Medical IoT for real-time remote healthcare monitoring as well as the symbolic doctors’ avatars as well as the hospital and clinical physical constructions and layout can be immersed in extended realities 3D metaverse environments where doctors, nurses, and patients can interact and socialized with the related digital assets that facilitate the data analytics of the sensed and collected personal medical data with visualized interaction of the digital twin of the patient’s body as well as the medical doctors' smart conversation and consultation or even in a guided remote-surgery operation.

Keywords: personal healthcare, metaverse, telemedicine, telepresence, avatar, medical consultation, remote-surgery

Procedia PDF Downloads 103
26897 Factors Influencing Walking in Bandar Baru Bangi, Malaysia

Authors: Zeinab Aliyas

Abstract:

Walking is known as the most common type of physical activity that helps mental and physical health of people. In the recent years, promoting walking activity in neighborhood areas and cities become as one of the important issues in terms of sustainable cities. Therefore the study aimed to investigate the influence of fear of crime and personal barriers as social and personal factor respectively on neighborhood walking. 464 questionnaires in Bandar Baru Bangi in Malaysia was distributed to collect data, and finally, 424 questionnaires were qualified to be used in the study. The Smart-PLS was used to analyze the data. The findings of the study revealed that individual barriers and fear of crime both have significant influence on the level of walking behavior in the neighborhood area. It was found that fear of crime has higher influence on walking behavior in comparison to individual factors. The finding of this study can help urban researcher and planner to know the significant influence of crime safety and individual attitudes on the level of walking activity.

Keywords: fear of crime, neighborhood walking, personal barriers, residential neighborhood

Procedia PDF Downloads 153
26896 Realising the Socio-Economic Rights of Refugees Under Human Rights Law: A Case Study of South Africa

Authors: Taguekou Kenfack Alexie

Abstract:

For a long time, refugee protection has constituted one of the main concerns of the international community as a whole and for the South African government in particular.The focus of this paper is on the challenges refugees face in accessing their rights in South Africa. In particular, it analyses the legal framework for the protection of the socio economic rights of refugees under international law, regional and domestic law and the extent to which the rights have been realized. The main hypothesis of the study centered on the fact that the social protection of refugees in South Africa is in conformity with international standards. To test this hypothesis, the qualitative research method was applied. Refugee related legal instruments were analyzed as well as academic publications, organizational reports and internet sources. The data analyzed revealed that there has been enormous progress in meeting international standards in the areas of education, emergency relief and assistance, protection of women and refugee children. The results also indicated that much remain to be desired in such areas as nutrition, shelter, health care, freedom of movement and very importantly, employment and social security. The paper also seeks to address the obstacles which prevent the proper treatment of refugees and to make recommendations as how the South African government can better regulate the treatment of refugees living in its territory.Recommendations include the amendment of the legal instruments that provide the normative framework for protection and improvement of protection policies to reflect the changing dynamics.

Keywords: international community, refugee, socioeconomic rights, social protection

Procedia PDF Downloads 256
26895 The Consequences of Complaint Offenses against Copyright Protection

Authors: Chryssantus Kastowo, Theresia Anita Christiani, Anny Retnowati

Abstract:

Copyright infringement as a form of infringement does not always mean causing harm to the creator. This can be proven with so many copyright violations in society and there is no significant law enforcement effort when compared with the violations that occurred. Copyright law as a form of appreciation from the state to the creator becomes counter productive if there is omission of violations. The problem raised in this article is how is the model of copyright regulation in accordance with the purpose of the law of copyright protection. This article is based on normative legal research focusing on secondary data. The analysis used is a conceptual approach. The analysis shows that the regulation of copyright emphasizes as a subjective right that is wholly within the author's power. This perspective will affect the claim of rights by the creator or allow violations. The creator is obliged to maintain the overall performance of copyright protection, especially in the event of a violation.

Keywords: copyright, enforcement, law, violation

Procedia PDF Downloads 109
26894 Financial Capacity, Governance, and Corporate Engagement in Environmental Protection

Authors: Lubica Hikkerova, Jean-Michel Sahut

Abstract:

Environmental protection remains a global challenge but, since 2012, there has been a progressive decline in corporate engagement in environmental protection issues. This study seeks to investigate the role of financial capacity and governance in improving the level of environmental engagement of companies. The regression technique is applied to data on 351 large European companies from the ASSET4-ESG database for the 2007-2015 period. Firstly, the results show that the companies in the sample are fairly engaged in environmental protection, with a strong dispersion representing nearly four times the average. This means that the companies in the sample do not share the same level of engagement in matters of environmental protection, some being more committed than others. Secondly, the results reveal that the financial capacity of the company, as assessed through its indicators, has a significant effect on its level of environmental protection engagement in the present sample. This effect is more positive the higher the profits the company makes, and more negative the more heavily indebted or, the higher the rates of dividends it pays per share. Lastly, the results also show that a better quality of governance plays an important role in the decision to undertake actions leading to environmental protection. More specifically, the degree of management implication in the running of the business, the respect of the rights of the shareholders, the effectiveness of the control exerted by the board of directors, and, to a lesser extent, the independence of the audit committee, are variables which have a positive and significant influence on the level of environmental engagement of companies.

Keywords: financial capacity, corporate governance, environmental engagement, stakeholder theory, theory of organizational legitimacy, theory of resources and capabilities

Procedia PDF Downloads 164
26893 Existential Anguish and Its Influence on Personal Growth

Authors: Lavanya Mohan, Suneha Sethi

Abstract:

This paper seeks to study the concept of existential anguish and its relation to personal growth. Generally, existential anguish is taken to be an all-pervading negative feeling arising from an individual’s knowledge of their absolute freedom. However, this paper investigates the possible positive impact of this sense of anguish, such as its role in commencing an individual’s journey towards authentic living, characterized by an internal locus of will, and acceptance of absolute freedom. This journey towards authentic living is what is referred to as personal growth, in this paper, in the context of existential philosophy. The work of four prominent existentialists has been used to elucidate existential anguish. A human’s scope for personal growth in the existential framework has been compared to that in the teleological framework of religion. In the latter, individuals must abide by the moral code of an external authority and work towards a pre-ordained purpose of life. This is illustrated by the examination of Hinduism, Christianity, and Islam. To test people’s levels of existential anguish, religiosity, and personal growth, a survey using an originally constructed questionnaire has been undertaken. Simple and partial correlation analyses have been used to ascertain the relationships between these three variables. Contrary to the hypothesis, the results indicate that existential anguish has a detrimental effect on personal growth, while religiosity does not affect it at all. Through their responses, it was also evident that the respondents do not adhere to teleological concepts of morality, despite a belief in God. This study has further scope in determining how variations in sample demography may influence the relationship of existential anguish with personal growth.

Keywords: existential anguish, existentialism, personal growth, religiosity, teleology

Procedia PDF Downloads 170
26892 Meaning and Cultivating Factors of Mindfulness as Experienced by Thai Females Who Practice Dhamma

Authors: Sukjai Charoensuk, Penphan Pitaksongkram, Michael Christopher

Abstract:

Preliminary evidences supported the effectiveness of mindfulness-based interventions in reducing symptoms associated with a variety of medical and psychological conditions. However, the measurements of mindfulness are questionable since they have not been developed based-on Buddhist experiences. The purpose of this qualitative study was to describe meaning and cultivating factors of mindfulness as experienced by Thai females who practice Dhamma. Participants were purposively selected to include 2 groups of Thai females who practice Dhamma. The first group consisted of 6 female Buddhist monks, and the second group consisted of 7 female who practice Dhamma without ordaining. Data were collected using in-depth interview. The instruments used were demographic data questionnaire and guideline for in-depth interview developed by researchers. Content analysis was employed to analyze the data. The results revealed that Thai women who practice Dhamma described their experience in 2 themes, which were meaning and cultivating factors of mindfulness. The meaning composed of 4 categories; 1) Being Present, 2) Self-awareness, 3) Contemplation, and 4) Neutral. The cultivating factors of mindfulness composed of 2 categories; In-personal factors and Ex-personal factors. The In-personal cultivating factors included 4 sub-categories; Faith and Love, the Five Precepts, Sound body, and Practice. The Ex-personal cultivating factors included 2 sub-categories; Serenity, and Learning. These findings increase understanding about meaning of mindfulness and its cultivating factors. These could be used as a guideline to promote mental health and develop nursing interventions using mindfulness based, as well as, develop the instrument for assessing mindfulness in Thai context.

Keywords: cultivating factor, meaning of mindfulness, practice Dhamma, Thai women

Procedia PDF Downloads 321
26891 Challenges of New Technologies in the Field of Criminal Law: The Protection of the Right to Privacy in the Spanish Penal Code

Authors: Deborah Garcia-Magna

Abstract:

The use of new technologies has become widespread in the last decade, giving rise to various risks associated with the transfer of personal data and the publication of sensitive material on social media. There are already several supranational instruments that seek to protect the citizens involved in this growing traffic of personal information and, especially, the most vulnerable people, such as minors, who are also the ones who make the most intense use of these new means of communication. In this sense, the configuration of the concept of privacy as a legal right has necessarily been influenced by these new social uses and supranational instruments. The researcher considers correct the decision to introduce sexting as a new criminal behaviour in the Penal Code in 2015, but questions the concrete manner in which it has been made. To this end, an updated review of the various options that our legal system already offered is made, assessing whether these legal options adequately addressed the new social needs and guidelines from jurisprudence and other supranational instruments. Some important issues emerge as to whether the principles of fragmentarity and subsidiarity may be violated since the new article 197.7 of the Spanish Penal Code could refer to very varied behaviours and protect not only particularly vulnerable persons. In this sense, the research focuses on issues such as the concept of 'seriousness' of the infringement of privacy, the possible reckless conduct of the victim, who hang over its own private material to third parties, the affection to other legal rights such as freedom and sexual indemnity, the possible problems of concurrent offences, etc.

Keywords: criminal law reform, ECHR jurisprudence, right to privacy, sexting

Procedia PDF Downloads 171
26890 Stuck Down in the Mess of Aisles: Need of a Practical Consumer Welfare Policy Framework in Sri Lanka with Special Reference to Japan

Authors: E. N. R. de Silva

Abstract:

The main purpose of this research is to set a policy framework for establishing a legal, institutional and social infrastructure that enhances the welfare, health, safety and economic interest of the consumers in Sri Lanka. It will help to develop an approach to continuously and successfully advocate for a consumer protection legal reform agenda and also it is significant as it gives directions to create national consumer protection associations in Sri Lanka. The methodology adopted for this research is purely a qualitative approach and it is generally and specifically categorized. Generally, part of this research looked at the existing laws, regulations and how effective they are in order to protect consumers. It will analyze the consumer protection framework and specially, consumer protection enhanced by the public organizations in Japan. This research offers a model with methods and legal instruments to enforce advocacy group to enhance consumer welfare, also brings out reforms to be made in the national legal framework on consumer welfare.

Keywords: consumer protection association, consumer protection law, consumer welfare, legal framework

Procedia PDF Downloads 328
26889 A Recombinant Group a Streptococcus (GAS-2W) Strain Elicits Protective Immunity in Mice through Induction of an IFN-γ Dependent Humoral Response

Authors: Shiva Emami, Jenny Persson, Bengt Johansson Lindbom

Abstract:

Group A streptococcus (GAS) is a prevalent human pathogen, causing a wide range of infections and diseases. One of the most well-known virulence factors in GAS is M protein, a surface protein that facilitates bacterial invasion. In this study, we used a recombinant GAS strain (GAS-2W) expressing M protein containing a hyper immunogenic peptide (2W). Mice were immunized three times with heat-killed-GAS subcutaneously at three weeks intervals. Three weeks post last immunization, mice were challenged intraperitoneally with a lethal dose of live GAS. In order to investigate the impact of IFN-ƴ and antibodies in protection against GAS infection, we used a mouse model knock-out for IFN-ƴ (IFN-ƴ KO). We observed immunization with GAS-2W strain can increase protection against GAS infection in mice compared with the original GAS strain. Higher levels of antibodies against M1 protein were measured in GAS-2W-immunized mice. There was also a significant increase in IgG2c response in mice immunized with GAS2W. By using IFN-ƴ KO mice, we showed that not a high level of total IgG, but IgG2c was correlated with protection through the i.p challenge. It also emphasizes the importance of IFN-ƴ cytokine to combat GAS by isotype switching to IgG2c (which is opsonic for phagocytosis). Our data indicate the crucial role of IFN-ƴ in the protective immune response that, together with IgG2c, can induce protection against GAS.

Keywords: Group A streptococcus, IgG2c, IFN-γ, protection

Procedia PDF Downloads 62