Search results for: personal information data transimission
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30759

Search results for: personal information data transimission

30699 “I” on the Web: Social Penetration Theory Revised

Authors: Dr. Dionysis Panos Dpt. Communication, Internet Studies Cyprus University of Technology

Abstract:

The widespread use of New Media and particularly Social Media, through fixed or mobile devices, has changed in a staggering way our perception about what is “intimate" and "safe" and what is not, in interpersonal communication and social relationships. The distribution of self and identity-related information in communication now evolves under new and different conditions and contexts. Consequently, this new framework forces us to rethink processes and mechanisms, such as what "exposure" means in interpersonal communication contexts, how the distinction between the "private" and the "public" nature of information is being negotiated online, how the "audiences" we interact with are understood and constructed. Drawing from an interdisciplinary perspective that combines sociology, communication psychology, media theory, new media and social networks research, as well as from the empirical findings of a longitudinal comparative research, this work proposes an integrative model for comprehending mechanisms of personal information management in interpersonal communication, which can be applied to both types of online (Computer-Mediated) and offline (Face-To-Face) communication. The presentation is based on conclusions drawn from a longitudinal qualitative research study with 458 new media users from 24 countries for almost over a decade. Some of these main conclusions include: (1) There is a clear and evidenced shift in users’ perception about the degree of "security" and "familiarity" of the Web, between the pre- and the post- Web 2.0 era. The role of Social Media in this shift was catalytic. (2) Basic Web 2.0 applications changed dramatically the nature of the Internet itself, transforming it from a place reserved for “elite users / technical knowledge keepers" into a place of "open sociability” for anyone. (3) Web 2.0 and Social Media brought about a significant change in the concept of “audience” we address in interpersonal communication. The previous "general and unknown audience" of personal home pages, converted into an "individual & personal" audience chosen by the user under various criteria. (4) The way we negotiate the nature of 'private' and 'public' of the Personal Information, has changed in a fundamental way. (5) The different features of the mediated environment of online communication and the critical changes occurred since the Web 2.0 advance, lead to the need of reconsideration and updating the theoretical models and analysis tools we use in our effort to comprehend the mechanisms of interpersonal communication and personal information management. Therefore, is proposed here a new model for understanding the way interpersonal communication evolves, based on a revision of social penetration theory.

Keywords: new media, interpersonal communication, social penetration theory, communication exposure, private information, public information

Procedia PDF Downloads 341
30698 The Personal Characteristics of Nurse Managers and the Personal and Professional Factors That Affect Them

Authors: Handan Alan, Ulkü Baykal

Abstract:

Personal characteristics help people understand and recognize both themselves and other people. They are also known to have direct effects on managerial behaviors. Managers’ personalities indicate how they think, perceive reality and relate to others, and affect their decision-making and problem-solving methods. This descriptive study aims to determine the personal characteristics of nurse managers and the personal and professional factors that affect them since sufficient data does not exist on personal characteristics despite the focus on the leadership and managerial characteristics in nursing. The study population consisted of nurses working in administrative positions at hospitals affiliated with the public hospitals union, research and practice hospitals affiliated with universities and private hospitals in cities in the Marmara Region. The study sample consisted of nurse managers working in the hospitals that permitted conducting the study (excluding private branch hospitals). The data were collected after obtaining the approval of the Clinical Research Ethics Committee of Çanakkale Onsekiz Mart University (Approval date: 1.7.2015, Decision No: 2015-01) and written official permissions from the administrations of the hospitals included in the study. The data analysis was carried out using means and standard deviations (SD) as descriptive statistics, one-way analysis of variance for inter-group comparisons and the independent samples t-test for paired group comparisons. A significance threshold of p < 0.05 was used to evaluate the findings. The data were collected using the Five Factor Personality Inventory. The study included 900 nurse managers, who obtained the highest mean score on the conscientiousness dimension (X=4.22 ±0.35). This dimension was followed by their mean scores on the agreeableness (X=4.06±0.40), intelligence (X=4.05±0.37), extroversion (X=3.50±0.43), and emotional instability (X=2.07±0.53) dimensions. Statistically significant differences were found between the independent variables of age, gender, marital status, education level, work institution, professional experience, institutional experience, managerial experience, administrative position, work unit and managerial education when compared using the five factor personality inventory (p < 0.05). In conclusion, the nurse managers described themselves having high conscientiousness. Statistically significant differences were found between the five factor personality inventory mean scores and their personal and professional characteristics.

Keywords: nurse manager, personality, personal characteristics, professional characteristics

Procedia PDF Downloads 223
30697 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance

Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle

Abstract:

Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.

Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model

Procedia PDF Downloads 77
30696 The Role of Organizational Culture, Work Discipline, and Employee Motivation towards Employees Performance at Personal Care and Cosmetic Department Flammable PT XYZ Cosmetics

Authors: Novawiguna Kemalasari, Ahmad Badawi Saluy

Abstract:

This research is a planned activity to find an objective answer to PT XYZ problem through scientific procedure. In this study, It was used quantitative research methods by using samples taken from a department selected by researchers. This study aims to analyze the influence of organizational culture, work discipline and work motivation on employee performance of Personal Care & Cosmetic Department (PCC) Flammable PT XYZ. This research was conducted at PT XYZ Personal Care & Cosmetic Department (PCC) Flammable involving 82 employees as respondents, the data were obtained by using questionnaires filled in self-rating by respondents. The data were analyzed by multiple linear regression model processed by using SPSS version 22. The result of research showed that organizational culture variable, work discipline and work motivation had significant effect to employee performance.

Keywords: organizational culture, work discipline, employee motivation, employees performance

Procedia PDF Downloads 217
30695 Implementation of an IoT Sensor Data Collection and Analysis Library

Authors: Jihyun Song, Kyeongjoo Kim, Minsoo Lee

Abstract:

Due to the development of information technology and wireless Internet technology, various data are being generated in various fields. These data are advantageous in that they provide real-time information to the users themselves. However, when the data are accumulated and analyzed, more various information can be extracted. In addition, development and dissemination of boards such as Arduino and Raspberry Pie have made it possible to easily test various sensors, and it is possible to collect sensor data directly by using database application tools such as MySQL. These directly collected data can be used for various research and can be useful as data for data mining. However, there are many difficulties in using the board to collect data, and there are many difficulties in using it when the user is not a computer programmer, or when using it for the first time. Even if data are collected, lack of expert knowledge or experience may cause difficulties in data analysis and visualization. In this paper, we aim to construct a library for sensor data collection and analysis to overcome these problems.

Keywords: clustering, data mining, DBSCAN, k-means, k-medoids, sensor data

Procedia PDF Downloads 347
30694 The Relationship Between Artificial Intelligence, Data Science, and Privacy

Authors: M. Naidoo

Abstract:

Artificial intelligence often requires large amounts of good quality data. Within important fields, such as healthcare, the training of AI systems predominately relies on health and personal data; however, the usage of this data is complicated by various layers of law and ethics that seek to protect individuals’ privacy rights. This research seeks to establish the challenges AI and data sciences pose to (i) informational rights, (ii) privacy rights, and (iii) data protection. To solve some of the issues presented, various methods are suggested, such as embedding values in technological development, proper balancing of rights and interests, and others.

Keywords: artificial intelligence, data science, law, policy

Procedia PDF Downloads 83
30693 The Anti-Cyber and Information Technology Crimes Law on Information Access and Dissemination by Egyptian Journalists

Authors: Miral Sabry AlAshry

Abstract:

The main objective of the study is to investigate the effectiveness of Egyptian Journalists through the Anti-Cyber and Information Technology Crimes Law, as well as its implications for journalistic practice and the implications for press freedom in Egypt. Questionnaires were undertaken with 192 journalists representing four official newspapers, and in-depth interviews were held with 15 journalists. The study used an Authoritarian theory as a theoretical framework. The study revealed that the government placed restrictions on journalists by using the law to oppress them.

Keywords: anti-cyber and information technology crimes law, media legislation, personal information, Egyptian constitution

Procedia PDF Downloads 344
30692 Exposure Assessment to Airborne Particulate Matter in Agriculture

Authors: K. Rumchev, S. Gilbey

Abstract:

Airborne particulate matter is a known hazard to human health, with a considerable body of evidence linking agricultural dust exposures to adverse human health effects in exposed populations. It is also known that agricultural workers are exposed to high levels of soil dust and other types of airborne particulate matter within the farming environment. The aim of this study was to examine exposure to agricultural dust among farm workers during the seeding season. Twenty-one wheat-belt farms consented to participate in the study with 30 workers being monitored for dust exposure whilst seeding or undertaking seeding associated tasks. Each farm was visited once and farmers’ were asked to wear a personal air sampler for a 4-hour sampling period. Simultaneous, real-time, tractor cabin air quality monitoring was also undertaken. Data for this study was collected using real-time aerosol dust monitors to determine in-tractor cabin PM exposure to five size fractions (total, PM10, respirable, PM2.5 and PM1), and personal sampling was undertaken to establish individual exposure to inhalable and respirable dust concentrations. The study established a significant difference between personal exposures and simultaneous real-time in-cabin exposures for both inhalable and respirable fractions. No significant difference was shown between in-cabin and personal inhalable dust concentrations during seeding and spraying tasks, although both in-cabin and personal concentrations were two times greater for seeding than spraying. Future research should focus on educating and providing farm owners and workers with more information on adopting safe work practices to minimise harmful exposures to agricultural dust.

Keywords: agriculture, air quality, Australia, particulate matter

Procedia PDF Downloads 193
30691 Heterogeneous Reactions to Digital Opportunities: A Field Study

Authors: Bangaly Kaba

Abstract:

In the global information society, the importance of the Internet cannot be overemphasized. Africa needs access to the powerful information and communication tools of the Internet in order to obtain the resources and efficiency essential for sustainable development. Unfortunately, in 2013, the data from Internetworldstats showed only 15% of African populations have access to Internet. This relative low Internet penetration rate signals a problem that may threaten the economic development, governmental efficiency, and ultimately the global competitiveness of African countries. Many initiatives were undertaken to bring the benefits of the global information revolution to the people of Africa, through connection to the Internet and other Global Information Infrastructure technologies. The purpose is to understand differences between socio-economically advantaged and disadvantaged internet users. From that, we will determine what prevents disadvantaged groups from benefiting from Internet usage. Data were collected through a survey from Internet users in Ivory Coast. The results reveal that Personal network exposure, Self-efficacy and Availability are the key drivers of continued use intention for the socio-economically disadvantaged group. The theoretical and practical implications are also described.

Keywords: digital inequality, internet, integrative model, socio-economically advantaged and disadvantaged, use continuance, Africa

Procedia PDF Downloads 451
30690 Self-Efficacy Perceptions of Pre-Service Art and Music Teachers towards the Use of Information and Communication Technologies

Authors: Agah Tugrul Korucu

Abstract:

Information and communication technologies have become an important part of our daily lives with significant investments in technology in the 21st century. Individuals are more willing to design and implement computer-related activities, and they are the main component of computer self-efficacy and self-efficacy related to the fact that the increase in information technology, with operations in parallel with these activities more successful. The Self-efficacy level is a significant factor which determines how individuals act in events, situations and difficult processes. It is observed that individuals with higher self-efficacy perception of computers who encounter problems related to computer use overcome them more easily. Therefore, this study aimed to examine self-efficacy perceptions of pre-service art and music teachers towards the use of information and communication technologies in terms of different variables. Research group consists of 60 pre-service teachers who are studying at Necmettin Erbakan University Ahmet Keleşoğlu Faculty of Education Art and Music department. As data collection tool of the study; “personal information form” developed by the researcher and used to collect demographic data and "the perception scale related to self-efficacy of informational technology" are used. The scale is 5-point Likert-type scale. It consists of 27 items. The Kaiser-Meyer-Olkin (KMO) sample compliance value is found 0.959. The Cronbach alpha reliability coefficient of the scale is found to be 0.97. computer-based statistical software package (SPSS 21.0) is used in order to analyze the data collected by data collection tools; descriptive statistics, t-test, analysis of variance are used as statistical techniques.

Keywords: self-efficacy perceptions, teacher candidate, information and communication technologies, art teacher

Procedia PDF Downloads 295
30689 The Study of Security Techniques on Information System for Decision Making

Authors: Tejinder Singh

Abstract:

Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.

Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data

Procedia PDF Downloads 272
30688 Decision Support System for Tourism in Northern Part of Thailand

Authors: Katejarinporn Chaiya, Thawit Janbanklong

Abstract:

The purposes of this study were to design and find users’ satisfaction after using the decision support system for tourism in the Northern part of Thailand, which can provide tourists with touristic information and plan their personal voyage. Such information can be retrieved systematically based on personal budget and provinces. The samples of this study were five experts and users: 30 "white collars" in Bangkok. This decision support system was designed via ASP.NET. Its database was developed by using MySQL, for administrators to effectively manage the database. The application outcome revealed that the innovation works properly as sought in objectives. Specialists and white collars in Bangkok have evaluated the decision support system; the result was satisfactorily positive.

Keywords: decision Support System, ASP.NET, MySQL, white collars

Procedia PDF Downloads 330
30687 The Role Of Data Gathering In NGOs

Authors: Hussaini Garba Mohammed

Abstract:

Background/Significance: The lack of data gathering is affecting NGOs world-wide in general to have good data information about educational and health related issues among communities in any country and around the world. For example, HIV/AIDS smoking (Tuberculosis diseases) and COVID-19 virus carriers is becoming a serious public health problem, especially among old men and women. But there is no full details data survey assessment from communities, villages, and rural area in some countries to show the percentage of victims and patients, especial with this world COVID-19 virus among the people. These data are essential to inform programming targets, strategies, and priorities in getting good information about data gathering in any society.

Keywords: reliable information, data assessment, data mining, data communication

Procedia PDF Downloads 156
30686 Bangladeshi English Teachers’ Understanding of Teacher Autonomy

Authors: Rubaiyat Jahan

Abstract:

This paper reports some findings of a study on the issues related to teacher autonomy in the Bangladeshi school contexts, and data of this research was collected from fourteen practicing English teachers of Bangladesh through semi structured interviews. The theoretical underpinning of teacher autonomy, on an apparent note, focuses on the behavioral aspects of teacher autonomy hence emphasizing mostly on the teachers’ capacity for self-directed acts of teaching and self-directed acts of professional development. Yet, a contemporary literature survey of teacher autonomy seems to be concerned more on the political interpretations of teacher autonomy. Thus, autonomous teachers are expected to generate their personal theories of teaching from their practices. The idea of personal theories of practice upholds the view that along with the teaching, teachers need to engage themselves in various classroom based research with a view to theorising from their practices. The findings of this research indicate enormous evidence of behavioral aspects of teacher autonomy. As the data of this research suggests, the participant teachers’ understanding of classroom situations, their reflections on the situational realities and opting for classroom decisions on the basis of those realizations are some good examples of teacher autonomy. Also, a few teachers’ stated teaching practices seem to reflect, though in a subtle way, their effort of outlining context embedded personal theories of teaching. This paper has got one significant pedagogical implication for the teacher education. Any teacher education must promote the conditions and capabilities for the present and prospective teachers for the role of theorisers in addition to develop their professional, procedural, and personal knowledge base.

Keywords: personal theories of practice, self-directed acts of professional development, self-directed acts of teaching, teacher autonomy

Procedia PDF Downloads 314
30685 The Various Legal Dimensions of Genomic Data

Authors: Amy Gooden

Abstract:

When human genomic data is considered, this is often done through only one dimension of the law, or the interplay between the various dimensions is not considered, thus providing an incomplete picture of the legal framework. This research considers and analyzes the various dimensions in South African law applicable to genomic sequence data – including property rights, personality rights, and intellectual property rights. The effective use of personal genomic sequence data requires the acknowledgement and harmonization of the rights applicable to such data.

Keywords: artificial intelligence, data, law, genomics, rights

Procedia PDF Downloads 113
30684 The Service Appraisal of Soldiers of the Army of the Czech Republic in the Context of Personal Expenses

Authors: Tereza Dolečková

Abstract:

Following article provides the comparison of international norms and standards formulating personal expenses, and then it illustrates the national concept of personal expenses of the Ministry of Defence. Then a new salary system of soldiers and the importance of the service appraisal in the context of personal expenses of the Ministry of Defence are explained. The first part of the article includes formulation of the approach to the definition of personal expenses within the international norms and standards and also within the Ministry of Defence of the Czech Republic. The structure of employees of the Ministry of Defence of the Czech Republic in years 2012 – 2014 and the amount of military expenses and the share of salary expenses of the Ministry of total expenses of the Ministry are clarified there, also the comparison of the amount of military expenses in chosen member states of the North Atlantic Treaty Organization is done. The salary system of professional soldiers in connection with the amendment of the Act No. 221/1999 Coll. on Professional Soldiers is clarified in the second part of this article. The amendment significantly regulates the salary items of soldiers but changes are also in the service appraisal of soldiers which reflects one of seven salary items of soldiers – the performance bonus. The aim of this article is to clarify different approach to define personal expenses with emphasis on the Ministry of Defence of the Czech Republic which overlaps to the service appraisal of soldiers of the Army of the Czech Republic and their salary system in connection with personal expenses of the Ministry of Defence of the Czech Republic. The efficient and objective system of the service appraisal and the use of its results are connected to the principles of the career advancement; only the best soldiers can advance in the system of the service careers to higher positions. That is why it is necessary to improve the service appraisal so it would provide the maximum information about the performance of a soldier and it would also motivate the soldier in his development. The attention should be paid to the service appraisal of the soldiers of the Army of the Czech Republic to achieve as much objectivity as possible.

Keywords: career, human resource management and development, personal expenses, salary system of soldiers, service appraisal of soldiers, the Army of the Czech Republic

Procedia PDF Downloads 220
30683 Youth Intelligent Personal Decision Aid

Authors: Norfiza Ibrahim, Norshuhada Shiratuddin, Siti Mahfuzah Sarif

Abstract:

Decision-making system is used to facilitate people in making the right choice for their important daily activities. For the youth, proper guidance in making important decisions is needed. Their skills in decision-making aid decisions will indirectly affect their future. For that reason, this study focuses on the intelligent aspects in the development of intelligent decision support application. The aid apparently integrates Personality Traits (PT) and Multiple Intelligence (MI) data in development of a computerized personal decision aid for youth named as Youth Personal Decision Aid (Youth PDA). This study is concerned with the aid’s helpfulness based on the hybrid intelligent process. There are four main items involved which are reliability, decision making effort, confidence, as well as decision process awareness. Survey method was applied to the actual user of this system, namely the school and the Institute of Higher Education (IPT)’s students. An establish instrument was used to evaluate the study. The results of the analysis and findings in the assessment indicates a high mean value of the four dimensions in helping Youth PDA to be accepted as a useful tool for the youth in decision-making.

Keywords: decision support, multiple intelligent, personality traits, youth personal decision aid

Procedia PDF Downloads 606
30682 Experimental Study on Floating Breakwater Anchored by Piles

Authors: Yessi Nirwana Kurniadi, Nira Yunita Permata

Abstract:

Coastline is vulnerable to coastal erosion which damage infrastructure and buildings. Floating breakwaters are applied in order to minimize material cost but still can reduce wave height. In this paper, we investigated floating breakwater anchored by piles based on experimental study in the laboratory with model scale 1:8. Two type of floating model were tested with several combination wave height, wave period and surface water elevation to determined transmission coefficient. This experimental study proved that floating breakwater with piles can prevent wave height up to 27 cm. The physical model shows that ratio of depth to wave length is less than 0.6 and ratio of model width to wave length is less than 0.3. It is confirmed that if those ratio are less than those value, the transmission coefficient is 0.5. The result also showed that the first type model of floating breakwater can reduce wave height by 60.4 % while the second one can reduce up to 55.56 %.

Keywords: floating breakwater, experimental study, pile, transimission coefficient

Procedia PDF Downloads 505
30681 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation

Procedia PDF Downloads 302
30680 Metaverse in Future Personal Healthcare Industry: From Telemedicine to Telepresence

Authors: Mohammed Saeed Jawad

Abstract:

Metaverse involves the convergence of three major technologies trends of AI, VR, and AR. Together these three technologies can provide an entirely new channel for delivering healthcare with great potential to lower costs and improve patient outcomes on a larger scale. Telepresence is the technology that allows people to be together even if they are physically apart. Medical doctors can be symbolic as interactive avatars developed to have smart conversations and medical recommendations for patients at the different stages of the treatment. Medical digital assets such as Medical IoT for real-time remote healthcare monitoring as well as the symbolic doctors’ avatars as well as the hospital and clinical physical constructions and layout can be immersed in extended realities 3D metaverse environments where doctors, nurses, and patients can interact and socialized with the related digital assets that facilitate the data analytics of the sensed and collected personal medical data with visualized interaction of the digital twin of the patient’s body as well as the medical doctors' smart conversation and consultation or even in a guided remote-surgery operation.

Keywords: personal healthcare, metaverse, telemedicine, telepresence, avatar, medical consultation, remote-surgery

Procedia PDF Downloads 106
30679 Factors Influencing Walking in Bandar Baru Bangi, Malaysia

Authors: Zeinab Aliyas

Abstract:

Walking is known as the most common type of physical activity that helps mental and physical health of people. In the recent years, promoting walking activity in neighborhood areas and cities become as one of the important issues in terms of sustainable cities. Therefore the study aimed to investigate the influence of fear of crime and personal barriers as social and personal factor respectively on neighborhood walking. 464 questionnaires in Bandar Baru Bangi in Malaysia was distributed to collect data, and finally, 424 questionnaires were qualified to be used in the study. The Smart-PLS was used to analyze the data. The findings of the study revealed that individual barriers and fear of crime both have significant influence on the level of walking behavior in the neighborhood area. It was found that fear of crime has higher influence on walking behavior in comparison to individual factors. The finding of this study can help urban researcher and planner to know the significant influence of crime safety and individual attitudes on the level of walking activity.

Keywords: fear of crime, neighborhood walking, personal barriers, residential neighborhood

Procedia PDF Downloads 154
30678 Existential Anguish and Its Influence on Personal Growth

Authors: Lavanya Mohan, Suneha Sethi

Abstract:

This paper seeks to study the concept of existential anguish and its relation to personal growth. Generally, existential anguish is taken to be an all-pervading negative feeling arising from an individual’s knowledge of their absolute freedom. However, this paper investigates the possible positive impact of this sense of anguish, such as its role in commencing an individual’s journey towards authentic living, characterized by an internal locus of will, and acceptance of absolute freedom. This journey towards authentic living is what is referred to as personal growth, in this paper, in the context of existential philosophy. The work of four prominent existentialists has been used to elucidate existential anguish. A human’s scope for personal growth in the existential framework has been compared to that in the teleological framework of religion. In the latter, individuals must abide by the moral code of an external authority and work towards a pre-ordained purpose of life. This is illustrated by the examination of Hinduism, Christianity, and Islam. To test people’s levels of existential anguish, religiosity, and personal growth, a survey using an originally constructed questionnaire has been undertaken. Simple and partial correlation analyses have been used to ascertain the relationships between these three variables. Contrary to the hypothesis, the results indicate that existential anguish has a detrimental effect on personal growth, while religiosity does not affect it at all. Through their responses, it was also evident that the respondents do not adhere to teleological concepts of morality, despite a belief in God. This study has further scope in determining how variations in sample demography may influence the relationship of existential anguish with personal growth.

Keywords: existential anguish, existentialism, personal growth, religiosity, teleology

Procedia PDF Downloads 170
30677 Blockchain Platform Configuration for MyData Operator in Digital and Connected Health

Authors: Minna Pikkarainen, Yueqiang Xu

Abstract:

The integration of digital technology with existing healthcare processes has been painfully slow, a huge gap exists between the fields of strictly regulated official medical care and the quickly moving field of health and wellness technology. We claim that the promises of preventive healthcare can only be fulfilled when this gap is closed – health care and self-care becomes seamless continuum “correct information, in the correct hands, at the correct time allowing individuals and professionals to make better decisions” what we call connected health approach. Currently, the issues related to security, privacy, consumer consent and data sharing are hindering the implementation of this new paradigm of healthcare. This could be solved by following MyData principles stating that: Individuals should have the right and practical means to manage their data and privacy. MyData infrastructure enables decentralized management of personal data, improves interoperability, makes it easier for companies to comply with tightening data protection regulations, and allows individuals to change service providers without proprietary data lock-ins. This paper tackles today’s unprecedented challenges of enabling and stimulating multiple healthcare data providers and stakeholders to have more active participation in the digital health ecosystem. First, the paper systematically proposes the MyData approach for healthcare and preventive health data ecosystem. In this research, the work is targeted for health and wellness ecosystems. Each ecosystem consists of key actors, such as 1) individual (citizen or professional controlling/using the services) i.e. data subject, 2) services providing personal data (e.g. startups providing data collection apps or data collection devices), 3) health and wellness services utilizing aforementioned data and 4) services authorizing the access to this data under individual’s provided explicit consent. Second, the research extends the existing four archetypes of orchestrator-driven healthcare data business models for the healthcare industry and proposes the fifth type of healthcare data model, the MyData Blockchain Platform. This new architecture is developed by the Action Design Research approach, which is a prominent research methodology in the information system domain. The key novelty of the paper is to expand the health data value chain architecture and design from centralization and pseudo-decentralization to full decentralization, enabled by blockchain, thus the MyData blockchain platform. The study not only broadens the healthcare informatics literature but also contributes to the theoretical development of digital healthcare and blockchain research domains with a systemic approach.

Keywords: blockchain, health data, platform, action design

Procedia PDF Downloads 72
30676 Meaning and Cultivating Factors of Mindfulness as Experienced by Thai Females Who Practice Dhamma

Authors: Sukjai Charoensuk, Penphan Pitaksongkram, Michael Christopher

Abstract:

Preliminary evidences supported the effectiveness of mindfulness-based interventions in reducing symptoms associated with a variety of medical and psychological conditions. However, the measurements of mindfulness are questionable since they have not been developed based-on Buddhist experiences. The purpose of this qualitative study was to describe meaning and cultivating factors of mindfulness as experienced by Thai females who practice Dhamma. Participants were purposively selected to include 2 groups of Thai females who practice Dhamma. The first group consisted of 6 female Buddhist monks, and the second group consisted of 7 female who practice Dhamma without ordaining. Data were collected using in-depth interview. The instruments used were demographic data questionnaire and guideline for in-depth interview developed by researchers. Content analysis was employed to analyze the data. The results revealed that Thai women who practice Dhamma described their experience in 2 themes, which were meaning and cultivating factors of mindfulness. The meaning composed of 4 categories; 1) Being Present, 2) Self-awareness, 3) Contemplation, and 4) Neutral. The cultivating factors of mindfulness composed of 2 categories; In-personal factors and Ex-personal factors. The In-personal cultivating factors included 4 sub-categories; Faith and Love, the Five Precepts, Sound body, and Practice. The Ex-personal cultivating factors included 2 sub-categories; Serenity, and Learning. These findings increase understanding about meaning of mindfulness and its cultivating factors. These could be used as a guideline to promote mental health and develop nursing interventions using mindfulness based, as well as, develop the instrument for assessing mindfulness in Thai context.

Keywords: cultivating factor, meaning of mindfulness, practice Dhamma, Thai women

Procedia PDF Downloads 323
30675 Design of Knowledge Management System with Geographic Information System

Authors: Angga Hidayah Ramadhan, Luciana Andrawina, M. Azani Hasibuan

Abstract:

Data will be as a core of the decision if it has a good treatment or process, which is process that data into information, and information into knowledge to make a wisdom or decision. Today, many companies have not realize it include XYZ University Admission Directorate as executor of National Admission called Seleksi Masuk Bersama (SMB) that during the time, the workers only uses their feeling to make a decision. Whereas if it done, then that company can analyze the data to make a right decision to get a pin sales from student candidate or registrant that follow SMB as many as possible. Therefore, needs Knowledge Management System (KMS) with Geographic Information System (GIS) use 5C4C that can process that company data becomes more useful and can help make decisions. This information system can process data into information based on the pin sold data with 5C (Contextualized, Categorize, Calculation, Correction, Condensed) and convert information into knowledge with 4C (Comparing, Consequence, Connection, Conversation) that has been several steps until these data can be useful to make easier to take a decision or wisdom, resolve problems, communicate, and quicker to learn to the employees have not experience and also for ease of viewing/visualization based on spatial data that equipped with GIS functionality that can be used to indicate events in each province with indicator that facilitate in this system. The system also have a function to save the tacit on the system then to be proceed into explicit in expert system based on the problems that will be found from the consequences of information. With the system each team can make a decision with same ways, structured, and the important is based on the actual event/data.

Keywords: 5C4C, data, information, knowledge

Procedia PDF Downloads 430
30674 Information Extraction Based on Search Engine Results

Authors: Mohammed R. Elkobaisi, Abdelsalam Maatuk

Abstract:

The search engines are the large scale information retrieval tools from the Web that are currently freely available to all. This paper explains how to convert the raw resulted number of search engines into useful information. This represents a new method for data gathering comparing with traditional methods. When a query is submitted for a multiple numbers of keywords, this take a long time and effort, hence we develop a user interface program to automatic search by taking multi-keywords at the same time and leave this program to collect wanted data automatically. The collected raw data is processed using mathematical and statistical theories to eliminate unwanted data and converting it to usable data.

Keywords: search engines, information extraction, agent system

Procedia PDF Downloads 399
30673 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 518
30672 Human Dignity as a Source and Limitation of Personal Autonomy

Authors: Jan Podkowik

Abstract:

The article discusses issues of mutual relationships of human dignity and personal autonomy. According to constitutions of many countries and international human rights law, human dignity is a fundamental and inviolable value. It is the source of all freedoms and rights, including personal autonomy. Human dignity, as an inherent, inalienable and non-gradable value comprising an attribute of all people, justifies freedom of action according to one's will and following one's vision of good life. On the other hand, human dignity imposes immanent restrictions to personal autonomy regarding decisions on commercialization of the one’s body, etc. It points to the paradox of dignity – the source of freedom and conditions (basic) of its limitations. The paper shows the theoretical concept of human dignity as an objective value among legal systems, determining the boundaries of legal protection of personal autonomy. It is not, therefore, the relevant perception of human dignity and freedom as opposite values. Reference point has been made the normative provisions of the Polish Constitution and the European Convention on Human Rights and Fundamental Freedoms as well as judgments of constitutional courts.

Keywords: autonomy, constitution, human dignity, human rights

Procedia PDF Downloads 268
30671 A Study of Tourists Satisfaction and Behavior Strategies Case Study: International Tourists in Chatuchak Weekend Market

Authors: Weera Weerasophon

Abstract:

The purpose of this research was to study Tourists’s satisfaction strategies case of Tourists who attended and shopped in Chatuchak weekend market (Bangkok) in order to improve service operation of Chatuchak weekend market to serve tourists’ need to impress them. The researcher used the marketing mix as a main factor that affect to tourist satisfaction. This research was emphasized as quantitative research as 400 of questionnaires were used for collecting the data from international tourists around Chatuchak weekend market that questionnaires divided in to 3 parts as a personal information part, satisfaction of marketing/services and facilities and suggestion part. After collecting all the data that would be processed in statistic program of SPSS to use for analyze the data later on. The result is described that most of international tourists satisfied Chatuchak weekend market in the level of 4 as more satisfaction for example friendly staff, Chatuchak information, price of product, facilities and service by the way, the environment of Chatuchak weekend market is the most satisfaction level.

Keywords: Chatuchak, satisfaction, Thailand tourism, marketing mix, tourists

Procedia PDF Downloads 339
30670 Using Photo-Elicitation to Explore the Cosmology of Personal Training

Authors: John Gray, Andy Smith, Hazel James

Abstract:

With the introduction of projects such as GP referral and other medical exercise schemes, there has been a shift in the cosmology underpinning exercise leadership. That is, the knowledge base of exercise leaders, specifically personal trainers, has moved from a cosmology based on aesthetic and physical fitness demands to one requiring interaction with the dominant biomedical model underpinning contemporary medicine. In line with this shift research has demonstrated that personal trainer education has aligned itself to a biotechnological model. However, whilst there is a need to examine exercise as medicine, and consider the role of personal trainers as prescribers of these interventions, the possible issues surrounding the growing medicalization of the exercise cosmology have not been explored. Using a phenomenological methodology, and the novel approach of photo-elicitation, this research examined the practices of successful personal trainers. The findings highlight that a growing focus on an iatro-biological based scientific process of exercise prescription may prove problematical. Through the development of a model of practitioner-based knowledge, it is argued there is a possible growing disconnection between the theoretical basis of exercise science and the working cosmology of exercise practitioners.

Keywords: biomedicine, cosmology, personal training, photo-elicitation

Procedia PDF Downloads 345