Search results for: privacy concerns
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2139

Search results for: privacy concerns

1989 Comparison of Psychological Well-Being, Hope, and Health Concern in Leukemia Patients before and After Receiving Stem Cells

Authors: Tahereh Yavari, Sara Norozi Far

Abstract:

The aim of this study was to compare psychological well-being, hope, and health concerns in leukemia patients before and after receiving stem cells. The statistical population of the present study was made up of leukemia patients in Tehran, and the research sample was among the patients referred to the Bone Marrow Transplant Center of Shariati Hospital in Tehran, and they were placed in two experimental and control groups (15 people in each group), which were selected by purposive sampling method. In order to collect the data for the research, three psychological well-being questionnaires were used by Riff (2002), Schneider's Hope Scale (SHS), and Schneider's Health Concern Questionnaire (HCQ). In order to analyze the data in this research, according to the "pre-test-post-test design with a control group," covariance analysis was used. Based on the research findings, it was concluded that receiving stem cells increases hope and psychological well-being in leukemia patients and significantly reduces health concerns.

Keywords: psychological well-being, hope, health concerns, blood cancer, stem cells

Procedia PDF Downloads 62
1988 Evolving Jurisprudence of Rape Laws in India: A Study of Last One Decade

Authors: Drutika Upadhyay

Abstract:

Rape is one of the most heinous crimes committed against the body of a woman violating her privacy and dignity. The Right to Privacy and the Right to Live with Dignity constitute the very essence of the Right to Life and Personal Liberty, a Fundamental Right guaranteed under Article 21 of the Indian Constitution. The study is conducted with the primary objective of analyzing the efficacy of rape laws in India. The study begins by explaining the origin, meaning, and kinds of rape recognised under Indian jurisprudence. Further, it explains various statutory and penal provisions relating to rape and the loopholes in such provisions. It focuses on the procedure followed during investigation and trial and also aims at developing an understanding of the rights of the victim and the sentence in cases of rape. The study also throws some light upon the amendments made to the criminal law and the recommendations of the Law Commission of India to meet the demands of the changing criminal justice delivery system. The outcome of the study suggests that the laws relating to rape have proved to be a major failure owing to the lack of proper implementation. Also, the lack of education among the masses leads to gender biasness, which is the ultimate cause for the commission of such crime. At last, the author concludes that the present criminal law system of the country contains various lacunae that need to be filled in so as to make the criminal justice system more stringent. Further, the scope of the definition of ‘rape’ needs to be widened in order to include such other acts of non-consensual and sexual nature that are currently not included in the definition. The author has adopted a non-doctrinal and analytical approach and relied upon the secondary sources of data for the purpose of the study. The scope of the study is limited to the crime committed against women.

Keywords: amendment, criminal law, fundamental right, personal liberty, privacy, rape

Procedia PDF Downloads 105
1987 An Observation of Patient-Professional Communication in the Cambodian Dental Setting

Authors: Christina Tran, Lu Khoo, Andrea Waylen

Abstract:

Introduction: The evolution of the dental consultation from paternalism to partnership has been well documented in developed Western countries. Great emphasis is now placed on the importance of empowering patients to make decisions regarding their care, obtaining informed consent, and maintaining patient privacy and confidentiality. With the majority of communication occurring non-verbally, clinicians often adopt behaviours which suggest an approachable and positive attitude. However, evidence indicates that in Asia, a paternalistic model may be favored in medicine. The power imbalance occurring in doctor-patient relationships worldwide may be exacerbated by various factors in Southeast Asia: the strong hierarchical culture, and the large education gap between doctor and patient. Further insight into this matter can be gained by observing patient-dentist communication in Cambodia. The dentist:population ratio in Cambodia is approximately 1:33,000, with rural areas remaining extremely underserviced. We have carried out an observational study of communication in a voluntary dental clinic in Cambodia with the aim of describing whether the patient-dentist relationship follows a paternalistic or patient-centred model. Method: Over a period of two weeks, two clinicians provided dental care as part of a voluntary program in two Cambodian settings: a temporary, rural clinic and a permanent clinic in Phnom Penh. The clinicians independently recorded their experiences in diaries, making observations on the verbal and non-verbal communication between patients and staff. General observations such as the clinic environment were also made. The diaries were then compared and analyzed using a thematic approach. Results: The overall themes that emerged were regarding the clinic environment, verbal communication, and non-verbal communication. Regarding the clinic environment, the rural clinic was arranged in order to easily direct patients from one dentist to another, with little emphasis on continuous patient care. There was also little consideration for patient privacy: patients were often treated in the presence of many observers, including other waiting patients. However, the permanent clinic was structured to allow greater patient privacy, with continuous patient care occurring throughout the appointment. Regarding verbal communication, there was a strongly paternalistic approach to gaining consent and giving instruction. Patients rarely asked questions regarding their treatment, with dentists doing little to encourage patient involvement. Non-verbal communication between patients and dentists was generally paternalistic, with the dentist often addressing the supine patient from above. Patients often avoided making eye-contact, which may have indicated discomfort or lack of engagement. Both adult and paediatric patients rarely raised verbal concerns regarding pain during treatment, despite displaying non-verbal signs of experiencing pain. Anxious paediatric patients were sometimes managed with physical restraint by their mothers to facilitate treatment. Conclusion: Patient-professional communication in the Cambodian dental setting was observed to be generally paternalistic in nature, although more patient-centred aspects were observed in the established, urban setting. However, it should be noted that these observations are subjective in nature, and that the patients’ actual perceptions of their communication experience were unexplored. Further observations in variety of dental settings in Cambodia are needed before any definitive conclusions can be made.

Keywords: patient-dentist communication, paternalism, patient-centered, non-verbal communication

Procedia PDF Downloads 95
1986 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 273
1985 Assessment the Manner of Obtaining Hierarchies and Privacy of Traditional Houses Entrance in Providing a Safe Place-Case Study: Traditional Houses in Shiraz

Authors: Zahra A. Barzegar, Maryam B. Golboo

Abstract:

In this paper, the manner of obtaining hierarchies and privacy entry of traditional houses in providing a safe place in the city of Shiraz will be evaluated by qualitative–descriptive methods and 6 old houses are the case study. The houses of Shiraz, as the houses in other cities in Iran are a response to climate and physical features. The old part of Shiraz has a compressed and dense texture in which the houses are in narrow and tight alleys. In this regard, the principles of traditional house entrance design have been introduced. The results show that every house has a private entrance. Direction of the entry of most houses is toward the south and with a turn to the South-East side. Entrance to yard path in all the cases is not straight, and this had been done by using 90 degrees rotates of the corridor leading to the yard. Vestibule provides a private place for the house and entrance stairway to the rooftop is located inside it.

Keywords: entrance, components of entrance, hierarchy, frontage, Shiraz houses

Procedia PDF Downloads 284
1984 High-Value Health System for All: Technologies for Promoting Health Education and Awareness

Authors: M. P. Sebastian

Abstract:

Health for all is considered as a sign of well-being and inclusive growth. New healthcare technologies are contributing to the quality of human lives by promoting health education and awareness, leading to the prevention, early diagnosis and treatment of the symptoms of diseases. Healthcare technologies have now migrated from the medical and institutionalized settings to the home and everyday life. This paper explores these new technologies and investigates how they contribute to health education and awareness, promoting the objective of high-value health system for all. The methodology used for the research is literature review. The paper also discusses the opportunities and challenges with futuristic healthcare technologies. The combined advances in genomics medicine, wearables and the IoT with enhanced data collection in electronic health record (EHR) systems, environmental sensors, and mobile device applications can contribute in a big way to high-value health system for all. The promise by these technologies includes reduced total cost of healthcare, reduced incidence of medical diagnosis errors, and reduced treatment variability. The major barriers to adoption include concerns with security, privacy, and integrity of healthcare data, regulation and compliance issues, service reliability, interoperability and portability of data, and user friendliness and convenience of these technologies.

Keywords: big data, education, healthcare, information communication technologies (ICT), patients, technologies

Procedia PDF Downloads 174
1983 Understanding Racial Disparate Treatment of Juvenile Interpersonal Violent Offenders in the Juvenile Justice System Using Focal Concerns Theory

Authors: Suzanne Overstreet-Juenke

Abstract:

Disproportionate minority contact (DMC) is a salient issue that has been found at every stage of the decision-making process in the juvenile justice system. Existing research indicates that DMC influences adjudication for drug, property, and personal crimes. Because intimate partner violence (IPV) is a major public health problem and global concern, the current study examines DMC at adjudication among youth charged for crimes of interpersonal violence. This research uses administrative, Court Designated Worker (CDW) data collected from 2014 to 2016. The results are contextualized using Steffensmeier’s version of focal concerns theory of judicial decision-making. This study assesses race and two seriousness of offense measures to establish whether a link exists between race and adjudication. The results of the study is similar to prior research on the topic. These results are discussed in terms of policy implications, limitations, and future research.

Keywords: race, disproportionate minority contact, focal concerns theory, juvenile

Procedia PDF Downloads 43
1982 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 442
1981 Implications of Circular Economy on Users Data Privacy: A Case Study on Android Smartphones Second-Hand Market

Authors: Mariia Khramova, Sergio Martinez, Duc Nguyen

Abstract:

Modern electronic devices, particularly smartphones, are characterised by extremely high environmental footprint and short product lifecycle. Every year manufacturers release new models with even more superior performance, which pushes the customers towards new purchases. As a result, millions of devices are being accumulated in the urban mine. To tackle these challenges the concept of circular economy has been introduced to promote repair, reuse and recycle of electronics. In this case, electronic devices, that previously ended up in landfills or households, are getting the second life, therefore, reducing the demand for new raw materials. Smartphone reuse is gradually gaining wider adoption partly due to the price increase of flagship models, consequently, boosting circular economy implementation. However, along with reuse of communication device, circular economy approach needs to ensure the data of the previous user have not been 'reused' together with a device. This is especially important since modern smartphones are comparable with computers in terms of performance and amount of data stored. These data vary from pictures, videos, call logs to social security numbers, passport and credit card details, from personal information to corporate confidential data. To assess how well the data privacy requirements are followed on smartphones second-hand market, a sample of 100 Android smartphones has been purchased from IT Asset Disposition (ITAD) facilities responsible for data erasure and resell. Although devices should not have stored any user data by the time they leave ITAD, it has been possible to retrieve the data from 19% of the sample. Applied techniques varied from manual device inspection to sophisticated equipment and tools. These findings indicate significant barrier in implementation of circular economy and a limitation of smartphone reuse. Therefore, in order to motivate the users to donate or sell their old devices and make electronic use more sustainable, data privacy on second-hand smartphone market should be significantly improved. Presented research has been carried out in the framework of sustainablySMART project, which is part of Horizon 2020 EU Framework Programme for Research and Innovation.

Keywords: android, circular economy, data privacy, second-hand phones

Procedia PDF Downloads 108
1980 Blockchain in Saudi E-Government: A Systematic Literature Review

Authors: Haitham Assiri, Priyadarsi Nanda

Abstract:

The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.

Keywords: blockchain, data integrity, e-government, security threats

Procedia PDF Downloads 215
1979 Mobile Systems: History, Technology, and Future

Authors: Shivendra Pratap Singh, Rishabh Sharma

Abstract:

The widespread adoption of mobile technology in recent years has revolutionized the way we communicate and access information. The evolution of mobile systems has been rapid and impactful, shaping our lives and changing the way we live and work. However, despite its significant influence, the history and development of mobile technology are not well understood by the general public. This research paper aims to examine the history, technology and future of mobile systems, exploring their evolution from early mobile phones to the latest smartphones and beyond. The study will analyze the technological advancements and innovations that have shaped the mobile industry, from the introduction of mobile internet and multimedia capabilities to the integration of artificial intelligence and 5G networks. Additionally, the paper will also address the challenges and opportunities facing the future of mobile technology, such as privacy concerns, battery life, and the increasing demand for high-speed internet. Finally, the paper will also provide insights into potential future developments and innovations in the mobile sector, such as foldable phones, wearable technology, and the Internet of Things (IoT). The purpose of this research paper is to provide a comprehensive overview of the history, technology, and future of mobile systems, shedding light on their impact on society and the challenges and opportunities that lie ahead.

Keywords: mobile technology, artificial intelligence, networking, iot, technological advancements, smartphones

Procedia PDF Downloads 56
1978 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 267
1977 Exploring Thai Early Childhood Teachers’ Experience and Concerns regarding Teaching Children with Disabilities in Inclusive Classrooms

Authors: Sunanta Klibthong

Abstract:

In view of the Thailand government policy creating increasing awareness of opportunity for children with special needs, the number of children with disabilities enrolled in kindergartens in Thailand has increased. This study explores early childhood teachers’ experiences and concerns of teaching children with disabilities in inclusive classrooms. The population of the study was private early childhood teachers who teach in inclusive classrooms in Thailand. Quantitative data obtained through a questionnaire were supplemented by early childhood teachers’ interviews to identify key experiences and concerns of the teachers when teaching children with and without disabilities in the same classrooms. The results of this study indicated that many teachers face challenges including lack of professional development opportunities, difficulty identifying the needs of all children and how to use effective strategies to support inclusive practices in their classrooms. Teachers also expressed concern about parents’ lack of willingness to accept children without disabilities studying together with those with disabilities in the same classrooms. Findings from this study can inform program support for parents and professional support needs of teachers in the provision of high-quality inclusive programs for all students.

Keywords: the concern, early childhood, experience, inclusive education, Thailand

Procedia PDF Downloads 145
1976 A Feminist Approach to the COVID-19 Lockdown Process in Turkey

Authors: Aykut Sigin

Abstract:

In feminist theory, home is usually regarded as an unsafe place for women to be in, as it continually produces inequalities between men and women, favoring the former, and maintains the patriarchal status quo. The second-wave feminists argued that women need to raise their concerns regarding domestic problems and this eventually led to the emergence of the motto 'the personal is political', pointing out to the fact that the domestic problems one woman experienced were essentially the problems of women in general as the patriarchal ideology manifested itself at home. Although this motto was from the late 1960s, it still holds significance today. In the golden era of the Internet, women could use social media to voice their concerns more easily than ever. Following this line of thought, the aim of this study is to analyze the domestic problems of the women in Turkey during the lockdown caused by COVID-19 through social media as they find themselves at home with their fathers, husbands and/or brothers for longer periods of time than ever before. For this purpose, an investigation of the posts shared under '#EvdeKal' ('StayAtHome') was carried out. The results of the study made it clear that women find the lockdown process to be problematic, that they express their domestic concerns rather freely through social media, and that the inequalities caused by the patriarchal ideology persist in the 21st century.

Keywords: COVID-19, lockdown, home, feminism

Procedia PDF Downloads 97
1975 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique

Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam

Abstract:

With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.

Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services

Procedia PDF Downloads 84
1974 A Research for Determining Consumers' Tendency to Prefer Eco-Friendly Products within the Scope of Green Marketing Activities

Authors: Haci Halil Baser, Nurullah Ekmekci, Muammer Zerenler

Abstract:

In the age of environmental concerns increasingly becoming more important, consumer attitudes towards environmentally sensitive products attract attention. Threats to the health and the environment are important factors for consumers to tend to eco-friendly practices and products. In this regard, it is seen positive increases in the tendency to consume organic food and recyclable products. Choosing products, selecting manufacturers and sellers have gained more importance because of increasing consumers' environmental concerns. In this case, it is very important for businesses to act eco-friendly approach in marketing. Green marketing has gained importance and became a concept that manufacturers' agenda by environmental understanding. Although the green marketing activities are common worldwide, studies on consumer perceptions and preferences are unsatisfactory in the literature. In this regard, this study aims to investigate the tendency of consumers to prefer eco-friendly products under the green marketing activities. In the frame of this information and the purpose of the study described above, the survey method has been used in the study. The obtained data have been analyzed through SPSS 20.0 software package, hypothesizes have been tested and suggestions have been made.

Keywords: eco-friendly product, environmental concerns, green consumption, green marketing

Procedia PDF Downloads 267
1973 Challenges and Opportunities for M-Government Implementation in Saudi Arabia

Authors: A. Alssbaiheen, S. Love

Abstract:

Mobile government (m-government) is one of the promising technologies for developing the governance of developing countries. While developing countries often have less advanced internet infrastructure compared to the developed world, mobile phone penetration is very high in the Gulf Cooperation Council (GCC) countries and mobile internet use offers a means to transcend traditional logistical barriers to accessing government services. The study explores the challenges and opportunities of the mobile government in Saudi Arabia. Semi-structured interviews were conducted with a diverse cohort of Saudi mobile users. A total of 77 semi-structured interviews were collected and subsequently analysed using open, axial, and selective coding. The participants’ responses revealed that many opportunities exist for the development of m-government in Saudi Arabia, including high popular awareness of government initiatives in e-government, and willingness to use such services, largely due to the time-saving and convenience aspects it offers compared with traditional bureaucratic services. However, numerous barriers were identified, including the low quality and speed of the internet, service customization, and concerns about privacy data security. It was also felt that in addition to infrastructure challenges, the traditional bureaucratic attitude of government department would itself hinder the effective deployment and utilization of m-government services.

Keywords: awareness, barriers, challenges, government services, mobile government, m-government, opportunities

Procedia PDF Downloads 438
1972 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 533
1971 The Web of Injustice: Untangling Violations of Personality Rights in European International Private Law

Authors: Sara Vora (Hoxha)

Abstract:

Defamation, invasion of privacy, and cyberbullying have all increased in tandem with the growth of the internet. European international private law may struggle to deal with such transgressions if they occur in many jurisdictions. The current study examines how effectively the legal system of European international private law addresses abuses of personality rights in cyberspace. The study starts by discussing how established legal frameworks are being threatened by online personality rights abuses. The article then looks into the rules and regulations of European international private law that are in place to handle overseas lawsuits. This article examines the different elements that courts evaluate when deciding which law to use in a particular case, focusing on the concepts of jurisdiction, choice of law, and recognition and execution of foreign judgements. Next, the research analyses the function of the European Union in preventing and punishing online personality rights abuses. Key pieces of law that control the collecting and processing of personal data on the Internet, including the General Data Protection Regulation (GDPR) and the e-Commerce Directive, are discussed. In addition, this article investigates how the ECtHR handles cases involving the infringement of personal freedoms, including privacy and speech. The article finishes with an assessment of how well the legal framework of European international private law protects individuals' right to privacy online. It draws attention to problems with the present legal structure, such as the inability to enforce international judgements, the inconsistency between national laws, and the necessity for stronger measures to safeguard people' rights online. This paper concludes that while European international private law provides a useful framework for dealing with violations of personality rights online, further harmonisation and stronger enforcement mechanisms are necessary to effectively protect individuals' rights in the digital age.

Keywords: European international private law, personality rights, internet, jurisdiction, cross-border disputes, data protection

Procedia PDF Downloads 44
1970 Mobile Health Apps Can Cause More Harm Due to Health Anxiety Than Good

Authors: Malik Takreem Ahmad, Pablo Lamata, Rasi Mizori

Abstract:

Background: In recent years, mobile health apps have grown in popularity as a means for people to track and manage their health. While there is increasing worry that these applications may potentially contribute to the emergence of health anxiety, they can also help to encourage healthy behaviours and provide access to health information. Objective: The objective of this literature review is to look at available mhealth apps and critically evaluate the compromise between reassurance and anxiety. Methodology: A literature review was carried out to analyse the effects of mhealth apps on the creation of health anxiety within the general population. PubMed and SCOPUS were used to search for relevant articles, and abstracts were screened using inclusion criteria of the terms: mhealth apps; e-Health; healthcare apps; cyberchondria; Health anxiety; illness anxiety disorder. A total of 27 studies were included in the review. Results and discussion: The findings suggest a direct relationship between mobile health app use and health anxiety. The impact of mobile health apps on health anxiety may depend on how they are used - individuals receiving a constant stream of health-related information may trigger unnecessary concern about one's health. The need for more regulation and oversight is identified, which can lead to app quality and safety consistency. There are also concerns about data security and privacy and the resulting "digital gap" for individuals without mobiles or internet access. Conclusion: While health apps can be valuable tools for managing and tracking health, individuals need to use them in a balanced and informed way to avoid increased anxiety.

Keywords: mobile health, mhealth apps, cyberchondria, health anxiety

Procedia PDF Downloads 57
1969 Cloud Monitoring and Performance Optimization Ensuring High Availability

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy

Procedia PDF Downloads 29
1968 Criminalizing the Transmission of HIV-Lessons for South Africa

Authors: Desiree David

Abstract:

South Africa has one of the highest rates of HIV infection in the world, with a sizable percentage of the population living with HIV. A substantial number of new infections occur as a result of sexual activity. South African courts have awarded civil claims for damages as a result of the transmission of HIV as a result of non-disclosure by the HIV-positive sexual partner, and more recently, the criminal courts have also convicted and sentenced individuals accused of infecting others as a result of sexual activity. This paper will analyse some case law from South African court cases that have dealt with criminal convictions for the transmission of HIV, and the potential for more widespread prosecutions of these cases. It will also address the desirability of this trend in light of the social public health system, as well as human rights concerns surrounding this highly contentious issue. This will be done by considering some applicable provisions of the Bill of Rights such as the right to privacy and equality, as espoused in the Constitution of the Republic of South Africa. The paper further addresses the experience of other jurisdictions such as Canada, Singapore, Lesotho and Uganda, by analyzing case law, and consider the pitfalls of criminalizing a wide spectrum of sexual conduct that could result in the transmission of HIV. The paper concludes with a proposal that the issue of criminalizing the transmission of HIV cannot be addressed by the criminal justice system alone, as to do so could result in harsh consequences for those living with HIV. As such individuals may be burdened with additional responsibilities that could potentially impact on the rights of the individual. This may ultimately result in injustice for those living with HIV.

Keywords: criminalization, HIV, human rights, South Africa

Procedia PDF Downloads 313
1967 A Comparative and Doctrinal Analysis towards the Investigation of a Right to Be Forgotten in Hong Kong

Authors: Jojo Y. C. Mo

Abstract:

Memories are good. They remind us of people, places and experiences that we cherish. But memories cannot be changed and there may well be memories that we do not want to remember. This is particularly true in relation to information which causes us embarrassment and humiliation or simply because it is private – we all want to erase or delete such information. This desire to delete is recently recognised by the Court of Justice of the European Union in the 2014 case of Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González in which the court ordered Google to remove links to some information about the complainant which he wished to be removed. This so-called ‘right to be forgotten’ received serious attention and significantly, the European Council and the European Parliament enacted the General Data Protection Regulation (GDPR) to provide a more structured and normative framework for implementation of right to be forgotten across the EU. This development in data protection laws will, undoubtedly, have significant impact on companies and co-operations not just within the EU but outside as well. Hong Kong, being one of the world’s leading financial and commercial center as well as one of the first jurisdictions in Asia to implement a comprehensive piece of data protection legislation, is therefore a jurisdiction that is worth looking into. This article/project aims to investigate the following: a) whether there is a right to be forgotten under the existing Hong Kong data protection legislation b) if not, whether such a provision is necessary and why. This article utilises a comparative methodology based on a study of primary and secondary resources, including scholarly articles, government and law commission reports and working papers and relevant international treaties, constitutional documents, case law and legislation. The author will primarily engage literature and case-law review as well as comparative and doctrinal analyses. The completion of this article will provide privacy researchers with more concrete principles and data to conduct further research on privacy and data protection in Hong Kong and internationally and will provide a basis for policy makers in assessing the rationale and need for a right to be forgotten in Hong Kong.

Keywords: privacy, right to be forgotten, data protection, Hong Kong

Procedia PDF Downloads 161
1966 Ethics Can Enable Open Source Data Research

Authors: Dragana Calic

Abstract:

The openness, availability and the sheer volume of big data have provided, what some regard as, an invaluable and rich dataset. Researchers, businesses, advertising agencies, medical institutions, to name only a few, collect, share, and analyze this data to enable their processes and decision making. However, there are important ethical considerations associated with the use of big data. The rapidly evolving nature of online technologies has overtaken the many legislative, privacy, and ethical frameworks and principles that exist. For example, should we obtain consent to use people’s online data, and under what circumstances can privacy considerations be overridden? Current guidance on how to appropriately and ethically handle big data is inconsistent. Consequently, this paper focuses on two quite distinct but related ethical considerations that are at the core of the use of big data for research purposes. They include empowering the producers of data and empowering researchers who want to study big data. The first consideration focuses on informed consent which is at the core of empowering producers of data. In this paper, we discuss some of the complexities associated with informed consent and consider studies of producers’ perceptions to inform research ethics guidelines and practice. The second consideration focuses on the researcher. Similarly, we explore studies that focus on researchers’ perceptions and experiences.

Keywords: big data, ethics, producers’ perceptions, researchers’ perceptions

Procedia PDF Downloads 262
1965 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives

Authors: Nawt Almutairi, Ramzi El-Haddadeh

Abstract:

With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.

Keywords: e-service, satisfaction, trust, loyalty

Procedia PDF Downloads 225
1964 Smart Technology Work Practices to Minimize Job Pressure

Authors: Babar Rasheed

Abstract:

The organizations are in continuous effort to increase their yield and to retain their associates, employees. Technology is considered an integral part of attaining apposite work practices, work environment, and employee engagement. Unconsciously, these advanced practices like work from home, personalized intra-network are disturbing employee work-life balance which ultimately increases psychological pressure on employees. The smart work practice is to develop business models and organizational practices with enhanced employee engagement, minimum trouncing of organization resources with persistent revenue and positive addition in global societies. Need of smart work practices comes from increasing employee turnover rate, global economic recession, unnecessary job pressure, increasing contingent workforce and advancement in technologies. Current practices are not enough elastic to tackle global changing work environment and organizational competitions. Current practices are causing many reciprocal problems among employee and organization mechanically. There is conscious understanding among business sectors smart work practices that will deal with new century challenges with addressing the concerns of relevant issues. It is aimed in this paper to endorse customized and smart work practice tools along knowledge framework to manage the growing concerns of employee engagement, use of technology, orgaization concerns and challenges for the business. This includes a Smart Management Information System to address necessary concerns of employees and combine with a framework to extract the best possible ways to allocate companies resources and re-align only required efforts to adopt the best possible strategy for controlling potential risks.

Keywords: employees engagement, management information system, psychological pressure, current and future HR practices

Procedia PDF Downloads 157
1963 Sustainable Development: Evaluation of an Urban Neighborhood

Authors: Harith Mohammed Benbouali

Abstract:

The concept of sustainable development is becoming increasingly important in our society. The efforts of specialized agencies, cleverly portrayed in the media, allow a widespread environmental awareness. Far from the old environmental movement in the backward-looking nostalgia, the environment is combined with today's progress. Many areas now include these concerns in their efforts, this in order to try to reduce the negative impact of human activities on the environment. The quantitative dimension of development has given way to the quality aspect. However, this feature is not common, and the initial target was abandoned in favor of economic considerations. Specialists in the field of building and construction have constantly sought to further integrate the environmental dimension, creating a seal of high environmental quality buildings. The pursuit of well-being of neighborhood residents and the quality of buildings are also a hot topic in planning. Quality of life is considered so on, since financial concerns dominate to the detriment of the environment and the welfare of the occupants. This work concerns the development of an analytical method based on multiple indicators of objectives across the district. The quantification of indicators related to objectives allows the construction professional, the developer or the community, to quantify and compare different alternatives for development of a neighborhood. This quantification is based on the use of simulation tools and a multi-criteria aggregation.

Keywords: sustainable development, environment, district, indicators, multi-criteria analysis, evaluation

Procedia PDF Downloads 284
1962 Digital Innovation and Business Transformation

Authors: Bisola Stella Sonde

Abstract:

Digital innovation has emerged as a pivotal driver of business transformation in the contemporary landscape. This case study research explores the dynamic interplay between digital innovation and the profound metamorphosis of businesses across industries. It delves into the multifaceted dimensions of digital innovation, elucidating its impact on organizational structures, customer experiences, and operational paradigms. The study investigates real-world instances of businesses harnessing digital technologies to enhance their competitiveness, agility, and sustainability. It scrutinizes the strategic adoption of digital platforms, data analytics, artificial intelligence, and emerging technologies as catalysts for transformative change. The cases encompass a diverse spectrum of industries, spanning from traditional enterprises to disruptive startups, offering insights into the universal relevance of digital innovation. Moreover, the research scrutinizes the challenges and opportunities posed by the digital era, shedding light on the intricacies of managing cultural shifts, data privacy, and cybersecurity concerns in the pursuit of innovation. It unveils the strategies that organizations employ to adapt, thrive, and lead in the era of digital disruption. In summary, this case study research underscores the imperative of embracing digital innovation as a cornerstone of business transformation. It offers a comprehensive exploration of the contemporary digital landscape, offering valuable lessons for organizations striving to navigate the ever-evolving terrain of the digital age.

Keywords: business transformation, digital innovation, emerging technologies, organizational structures

Procedia PDF Downloads 30
1961 Self-Care and Emotional Wellbeing of Nurses Using Playback Theatre and Expressive Arts

Authors: Radhika Jain

Abstract:

The nursing community in India face unique challenges ranging from lack of adequate career progression, low social status attached to the profession, poor nurse-to-patient ratio leading to heavy workload resulting in stress and burnout, lack of general recognition and the responsibility of often having to deal with the ire of the patients and their families. This study explores how a combination of Playback Theatre and Expressive Arts could be used as a very powerful tool to understand the concerns, and consequently as a self-care tool to bring about the sense of well-being and emotional awareness for the nurses. For the purpose of this study, Playback Theatre was used as an entry tool to understand the thoughts, feelings and concerns. Playback theatre is a unique improvisational form of theatre developed by Jonathan Fox and Jo Salas in 1975, in which audience share their own stories from their lives and the performers play them back through a range of improv techniques such as metaphor, poetry, music and movement. Playback Theatre helped in first warming them up to the idea of sharing and then gave them the confidence of a safe space to collectively go deeper into their emotional experiences. As the next step, structured sessions of Expressive Arts were conducted with the same set of nurses, for them to work on the issues and concerns they have (and which they shared during the Playback performance). These sessions were to enable longer engagements as many of the concerns expressed were related to perceptions and beliefs that have been ingrained over a period of time and hence it needs a longer engagement to be worked on in detail. The Expressive Art sessions helped in this regard. Expressive arts therapy combines psychology and the creative process to promote emotional growth and healing. The study was conducted at two places: one a geriatric centre and the other, a palliative care centre. The study revealed that concerns and challenges would not be identical across the nursing community or across similar types of health care organizations but would be specific to each organization or centre as the circumstances and set-up at each place would be different. At the geriatric centre, stress and burnout emerged as the main concerns while at the palliative care centre, the main concern that came up was around the difficulty the nurses faced in expressing emotions and in communicating their feelings. The objective analysis of the results of the study indicated how longer-term engagements using Expressive Arts as the modality helped the nurses have better awareness of their emotions and helped them develop tools of self-care tools while also tapping into their emotions to express and experience. The process of eliciting the main concerns from the nurses using a Playback Theatre performance and then following that with subsequent sessions of expressive arts helped the nurses in the way nurses approached their job and the reduced level of overwhelm that they felt.

Keywords: palliative care, nurses, self-care, expressive arts, playback theatre

Procedia PDF Downloads 91
1960 Benefit Sharing of Research Participants in Human Genomic Research: Ethical Concerns and Ramifications

Authors: Tamanda Kamwendo

Abstract:

The concept of benefit sharing has been a prominent global debate in the world, gaining traction in human research ethics. Despite its prevalence, the concept of benefit sharing is not without controversy over its meaning and justification. This is due to the fact that it lacks a broadly accepted definition and many proponents discuss benefit sharing by arguing for its necessity rather than engaging in critical intellectual engagement with technical issues such as what it implies. What is clear in the literature is that the underlying premise of benefit-sharing is that research involving underprivileged and marginalized people is currently unjust and inequitable because these people are denied access to these gains; thus, benefit-sharing arrangements are required for these research projects to be just and equitable. This paper, therefore, investigates the discourses and justifications behind the concept of benefit sharing to human participants, particularly when dealing with human genomics research. Furthermore, considering that benefit sharing is generally viewed as a transaction between research organizations and research participants, it raises ethical concerns concerning the commodification of human material and undermines the sanctity of the human genome. This is predicated on the idea that research sponsors would be compelled to deliver a minimum set of possible benefits to research participants and communities in exchange for their involvement in the study. There is, therefore, need to protect benefit-sharing practices in international health research by developing a governance legal framework. A legal framework of benefit sharing will also dispel the issue of commodification of human material where human genomic research is done.

Keywords: benefit sharing, human participants, human genomic research, ethical concerns

Procedia PDF Downloads 42