Search results for: privacy enhancing technologies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5529

Search results for: privacy enhancing technologies

5409 Impact of New Media Technologies to News, Social Interactions, and Traditional Media

Authors: Ademola Bamgbose

Abstract:

The new media revolution, which encompasses a wide variety of new media technologies like blogs, social networking, visual worlds, wikis, have had a great influence on communications, traditional media and across other disciplines. This paper gives a review of the impact of new media technologies on the news, social interactions and traditional media in developing and developed countries. The study points to the fact that there is a significant impact of new media technologies on the news, social interactions and the traditional media in developing and developed countries, albeit both positively and negatively. Social interactions have been significantly affected, as well as in news production and reporting. It is reiterated that despite the pervasiveness of new media technologies, it would not bring to a total decline of traditional media. This paper contributes to the theoretical framework on the new media and will help to assess the extent of the impact of the new media in different locations.

Keywords: communication, media, news, new media technologies, social interactions, traditional media

Procedia PDF Downloads 240
5408 Soil Remediation Technologies towards Green Remediation Strategies

Authors: G. Petruzzelli, F. Pedron, M. Grifoni, M. Barbafieri, I. Rosellini, B. Pezzarossa

Abstract:

As a result of diverse industrial activities, pollution from numerous contaminant affects both groundwater and soils. Many contaminated sites have been discovered in industrialized countries and their remediation is a priority in environmental legislations. The aim of this paper is to provide the evolution of remediation from consolidated invasive technologies to environmental friendly green strategies. Many clean-up technologies have been used. Nowadays the technologies selection is no longer exclusively based on eliminating the source of pollution, but the aim of remediation includes also the recovery of soil quality. “Green remediation”, a strategy based on “soft technologies”, appears the key to tackle the issue of remediation of contaminated sites with the greatest attention to environmental quality, including the preservation of soil functionality.

Keywords: bioremediation, Green Remediation, phytoremediation, remediation technologies, soil

Procedia PDF Downloads 201
5407 Utilizing IoT for Waste Collection: A Review of Technologies for Eco-Friendly Waste Management

Authors: Fatemehsadat Mousaviabarbekouh

Abstract:

Population growth and changing consumption patterns have led to waste management becoming a significant global challenge. With projections indicating that nearly 67% of the Earth's population will live in megacities by 2050, there is a pressing need for smart solutions to address citizens' demands. Waste collection, facilitated by the Internet of Things (IoT), offers an efficient and cost-effective approach. This study aims to review the utilization of IoT for waste collection and explore technologies that promote eco-friendly waste management. The research focuses on information and communication technologies (ICTs), including spatial, identification, acquisition, and data communication technologies. Additionally, the study examines various energy harvesting technologies to further reduce costs. The findings indicate that the application of these technologies can lead to significant cost savings, energy efficiency, and ultimately reshape the future of waste management.

Keywords: waste collection, IoT, smart cities, eco-friendly, information and communication technologies, energy harvesting

Procedia PDF Downloads 69
5406 Investigating the Use of Advanced Manufacturing Technologies in the Assembly Type Manufacturing Companies in Trinidad and Tobago

Authors: Nadine Sangster, Akil James, Rondell Duke, Aaron Ameerali, Terrence Lalla

Abstract:

The market place of the 21st century is evolving into one of merging national markets, fragmented consumer markets, and rapidly changing product technologies. The use of new technologies has become vital to the manufacturing industry for their survival and sustainability. This work focused on the assembly type industry in a small developing country and aimed at identifying the use of advanced manufacturing technologies and their impact on this sector of the manufacturing industry. It was found that some technologies were being used and that they had improved the effectiveness of those companies but there was still quite a bit of room for improvements. Some of the recommendations included benchmarking against international standards, the adoption of a “made in TT” campaign and the effective utilisation of the technologies to improve manufacturing effectiveness and thus improve competitive advantages and strategies.

Keywords: advanced manufacturing technology, Trinidad and Tobago, manufacturing, industrial engineering

Procedia PDF Downloads 463
5405 An Empirical Investigation of the Challenges of Secure Edge Computing Adoption in Organizations

Authors: Hailye Tekleselassie

Abstract:

Edge computing is a spread computing outline that transports initiative applications closer to data sources such as IoT devices or local edge servers, and possible happenstances would skull the action of new technologies. However, this investigation was attained to investigation the consciousness of technology and communications organization workers and computer users who support the service cloud. Surveys were used to achieve these objectives. Surveys were intended to attain these aims, and it is the functional using survey. Enquiries about confidence are also a key question. Problems like data privacy, integrity, and availability are the factors affecting the company’s acceptance of the service cloud.

Keywords: IoT, data, security, edge computing

Procedia PDF Downloads 59
5404 The Forensic Swing of Things: The Current Legal and Technical Challenges of IoT Forensics

Authors: Pantaleon Lutta, Mohamed Sedky, Mohamed Hassan

Abstract:

The inability of organizations to put in place management control measures for Internet of Things (IoT) complexities persists to be a risk concern. Policy makers have been left to scamper in finding measures to combat these security and privacy concerns. IoT forensics is a cumbersome process as there is no standardization of the IoT products, no or limited historical data are stored on the devices. This paper highlights why IoT forensics is a unique adventure and brought out the legal challenges encountered in the investigation process. A quadrant model is presented to study the conflicting aspects in IoT forensics. The model analyses the effectiveness of forensic investigation process versus the admissibility of the evidence integrity; taking into account the user privacy and the providers’ compliance with the laws and regulations. Our analysis concludes that a semi-automated forensic process using machine learning, could eliminate the human factor from the profiling and surveillance processes, and hence resolves the issues of data protection (privacy and confidentiality).

Keywords: cloud forensics, data protection Laws, GDPR, IoT forensics, machine Learning

Procedia PDF Downloads 122
5403 Proposal Method of Prediction of the Early Stages of Dementia Using IoT and Magnet Sensors

Authors: João Filipe Papel, Tatsuji Munaka

Abstract:

With society's aging and the number of elderly with dementia rising, researchers have been actively studying how to support the elderly in the early stages of dementia with the objective of allowing them to have a better life quality and as much as possible independence. To make this possible, most researchers in this field are using the Internet Of Things to monitor the elderly activities and assist them in performing them. The most common sensor used to monitor the elderly activities is the Camera sensor due to its easy installation and configuration. The other commonly used sensor is the sound sensor. However, we need to consider privacy when using these sensors. This research aims to develop a system capable of predicting the early stages of dementia based on monitoring and controlling the elderly activities of daily living. To make this system possible, some issues need to be addressed. First, the issue related to elderly privacy when trying to detect their Activities of Daily Living. Privacy when performing detection and monitoring Activities of Daily Living it's a serious concern. One of the purposes of this research is to achieve this detection and monitoring without putting the privacy of the elderly at risk. To make this possible, the study focuses on using an approach based on using Magnet Sensors to collect binary data. The second is to use the data collected by monitoring Activities of Daily Living to predict the early stages of Dementia. To make this possible, the research team suggests developing a proprietary ontology combined with both data-driven and knowledge-driven.

Keywords: dementia, activity recognition, magnet sensors, ontology, data driven and knowledge driven, IoT, activities of daily living

Procedia PDF Downloads 69
5402 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey

Authors: Tolga Yazıcı

Abstract:

As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.

Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey

Procedia PDF Downloads 314
5401 Self-Organizing Maps for Credit Card Fraud Detection

Authors: ChunYi Peng, Wei Hsuan CHeng, Shyh Kuang Ueng

Abstract:

This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.

Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies

Procedia PDF Downloads 19
5400 Self-Organizing Maps for Credit Card Fraud Detection and Visualization

Authors: Peng, Chun-Yi, Chen, Wei-Hsuan, Ueng, Shyh-Kuang

Abstract:

This study focuses on the application of self-organizing maps (SOM) technology in analyzing credit card transaction data, aiming to enhance the accuracy and efficiency of fraud detection. Som, as an artificial neural network, is particularly suited for pattern recognition and data classification, making it highly effective for the complex and variable nature of credit card transaction data. By analyzing transaction characteristics with SOM, the research identifies abnormal transaction patterns that could indicate potentially fraudulent activities. Moreover, this study has developed a specialized visualization tool to intuitively present the relationships between SOM analysis outcomes and transaction data, aiding financial institution personnel in quickly identifying and responding to potential fraud, thereby reducing financial losses. Additionally, the research explores the integration of SOM technology with composite intelligent system technologies (including finite state machines, fuzzy logic, and decision trees) to further improve fraud detection accuracy. This multimodal approach provides a comprehensive perspective for identifying and understanding various types of fraud within credit card transactions. In summary, by integrating SOM technology with visualization tools and composite intelligent system technologies, this research offers a more effective method of fraud detection for the financial industry, not only enhancing detection accuracy but also deepening the overall understanding of fraudulent activities.

Keywords: self-organizing map technology, fraud detection, information visualization, data analysis, composite intelligent system technologies, decision support technologies

Procedia PDF Downloads 22
5399 Empowering Minority Students Through the use of Critical Educational Technologies: Latinos in the United States

Authors: Oscar Guerra

Abstract:

Educational technologies have great potential as tools for student empowerment, particularly for members of a marginalized population such as immigrant Latino children in the American public education system. It is not merely a matter of access to the necessary technological devices; rather, it is development and implementation under a critical lens that may prompt a positive change.

Keywords: education, critical technologies, minorities, higher education

Procedia PDF Downloads 282
5398 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities

Authors: Eugenio Ferrer Santiago

Abstract:

The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.

Keywords: data privacy, data protection, urban planning, research ethics

Procedia PDF Downloads 26
5397 Use of Integrated Knowledge Networks to Increase Innovation in Nanotechnology Research and Development

Authors: R. Byler

Abstract:

Innovation, particularly in technology development, is a crucial aspect of nanotechnology R&D and, although several approaches to effective innovation management exist, organizational structures that promote knowledge exchange have been found to be most effect in supporting new and emerging technologies. This paper discusses Integrated Knowledge Networks (IKNs) and evaluates its use within nanotechnology R&D to increase technology innovation. Specifically, this paper reviews the role of IKNs in bolstering national and international nanotechnology development and in enhancing nanotechnology innovation. Both physical and virtual IKNs, particularly IT-based network platforms for community-based innovation, offer strategies for enhanced technology innovation, interdisciplinary cooperation, and enterprise development. Effectively creating and managing technology R&D networks can facilitate successful knowledge exchange, enhanced innovation, commercialization, and technology transfer. As such, IKNs are crucial to technology development processes and, thus, in increasing the quality and access to new, innovative nanoscience and technologies worldwide.

Keywords: community-based innovation, integrated knowledge networks, nanotechnology, technology innovation

Procedia PDF Downloads 375
5396 Resolving Increased Water-Cut in South and East Kuwait Areas through Water Knock-Out Facility Project

Authors: Sunaitan Al Mutairi, Kumar Vallatharasu, Batool Ismaeel

Abstract:

The Water Knock-Out (WKO) facility project is to handle the undesirable impact of the increasing water production rate in South and East Kuwait (S&EK) areas and break the emulsions and ensure sufficient separation of water at the new upstream facility, to reduce the load on the existing separation equipment in the Gathering Centers (GC). As the existing separation equipment in the Gathering Centers are not efficient to separate the emulsions, the Compact Electrostatic Coalescer (CEC) and Vessel Internal Electrostatic Coalescer (VIEC) technologies have been selected for enhancing the liquid-liquid separation by using the alternating voltage/frequency on electrical fields, to handle the increasing water-cut in S&EK. In the Compact Electrostatic Coalescer (CEC) technology method, the CEC equipment is installed downstream of the inlet separator externally, whereas in the Vessel Internal Electrostatic Coalescer (VIEC) technology method, the VIEC is built inside the treater vessel, downstream of the inlet separator with advanced internals for implementing electrocoalescence of water particles and hence enhancing liquids separation. The CEC and VIEC technologies used in the Water Knockout Facility project has the ability to resolve the increasing water cut in the S&EK area and able to enhance the liquid-liquid separation in the WKO facility separation equipment. In addition, the WKO facility is minimizing the load on the existing Gathering Center’s separation equipment, by tackling the high water-cut wells, upstream of each GC. The required performances at the outlet of the WKO facility are Oil in Water 100ppmv, Water in Oil 15% volume, liquid carryover in gas 0.1 US gal/MMSCFD, for the water cut ranging from 37.5 to 75% volume. The WKO facility project is used to sustain, support and maintain Greater Burgan production at 1.7 Million Barrels of Oil Per Day (MMBOPD), by handling the increasing water production rate.

Keywords: emulsion, increasing water-cut, production, separation equipment

Procedia PDF Downloads 203
5395 Quantum Technologies, the Practical Challenges to It, and Ideas to Build an Inclusive Quantum Platform, Shoonya Ecosystem (Zero-Point Energy)

Authors: Partha Pratim Kalita

Abstract:

As sound can be converted to light, light can also be deduced to sound. There are technologies to convert light to sound, but there are not many technologies related to the field where sound can be converted to a distinct vibrational sequence of light. Like the laws under which the principles of sound work, there are principles for the light to become quantum in nature. Thus, as we move from sound to the subtler aspects of light, we are moving from 3D to 5D. Either we will be making technologies of 3D in today’s world, or we will be really interested in making technologies of the 5D, depends on our understanding of how quantum 5D works. Right now, the entire world is talking about quantum, which is about the nature and behavior of subatomic particles, which is 5D. In practice, they are using metals and machines based on atomic structures. If we talk of quantum without taking note of the technologies of 5D and beyond, we will only be reinterpreting relative theories in the name of quantum. This paper, therefore, will explore the possibilities of moving towards quantum in its real essence with the Shoonya ecosystem (zero-point energy). In this context, the author shall highlight certain working models developed by him, which are currently in discussion with the Indian government.

Keywords: quantum mechanics, quantum technologies, healthcare, shoonya ecosystem, energy, human consciousness

Procedia PDF Downloads 160
5394 Jurisdictional Issues between Competition Law and Data Protection Law in Protection of Privacy of Online Consumers

Authors: Pankhudi Khandelwal

Abstract:

The revenue models of digital giants such as Facebook and Google, use targeted advertising for revenues. Such a model requires huge amounts of consumer data. While the data protection law deals with the protection of personal data, however, this data is acquired by the companies on the basis of consent, performance of a contract, or legitimate interests. This paper analyses the role that competition law can play in evading these loopholes for the protection of data and privacy of online consumers. Digital markets have certain distinctive features such as network effects and feedback loop, which gives incumbents of these markets a first-mover advantage. This creates a situation where the winner takes it all, thus creating entry barriers and concentration in the market. It has been also seen that this dominant position is then used by the undertakings for leveraging in other markets. This can be harmful to the consumers in form of less privacy, less choice, and stifling innovation, as seen in the cases of Facebook Cambridge Analytica, Google Shopping, and Google Android. Therefore, the article aims to provide a legal framework wherein the data protection law and competition law can come together to provide a balance in regulating digital markets. The issue has become more relevant in light of the Facebook decision by German competition authority, where it was held that Facebook had abused its dominant position by not complying with data protection rules, which constituted an exploitative practice. The paper looks into the jurisdictional boundaries that the data protection and competition authorities can work from and suggests ex ante regulation through data protection law and ex post regulation through competition law. It further suggests a change in the consumer welfare standard where harm to privacy should be considered as an indicator of low quality.

Keywords: data protection, dominance, ex ante regulation, ex post regulation

Procedia PDF Downloads 135
5393 Dismantling the School-to-Prison Pipeline through Technology: A Literature Review

Authors: Yusra A. Ibrahim

Abstract:

Educational efforts to address the school-to-prison pipeline (STPP) and retain students in school require equipping teachers with evidence-based approaches to handle social-emotional behavior (SEB) needs. One aspect of these efforts involves training teachers to utilize effective and current technologies, thereby reducing SEB challenges faced by students with disabilities in their classrooms. This literature review examines eight studies conducted within the past 10 years (from 2013 to 2023) that focus on enhancing SEB needs of students with disabilities using technology. The review reveals that autism spectrum disorder (ASD), emotional behavioral disorder (EBD), and attention deficit and hyperactivity disorder (ADHD) are the predominant disabilities studied through technology interventions. Additionally, it highlights that these studies focused on examining the effectiveness of technologies in reducing disruptive behaviors, increasing on-task behaviors, reducing anxiety, and promoting social skills.

Keywords: school-to-prison pipeline, technology, evidence-based practices, EBD

Procedia PDF Downloads 25
5392 The Impact of Cryptocurrency Classification on Money Laundering: Analyzing the Preferences of Criminals for Stable Coins, Utility Coins, and Privacy Tokens

Authors: Mohamed Saad, Huda Ismail

Abstract:

The purpose of this research is to examine the impact of cryptocurrency classification on money laundering crimes and to analyze how the preferences of criminals differ according to the type of digital currency used. Specifically, we aim to explore the roles of stablecoins, utility coins, and privacy tokens in facilitating or hindering money laundering activities and to identify the key factors that influence the choices of criminals in using these cryptocurrencies. To achieve our research objectives, we used a dataset for the most highly traded cryptocurrencies (32 currencies) that were published on the coin market cap for 2022. In addition to conducting a comprehensive review of the existing literature on cryptocurrency and money laundering, with a focus on stablecoins, utility coins, and privacy tokens, Furthermore, we conducted several Multivariate analyses. Our study reveals that the classification of cryptocurrency plays a significant role in money laundering activities, as criminals tend to prefer certain types of digital currencies over others, depending on their specific needs and goals. Specifically, we found that stablecoins are more commonly used in money laundering due to their relatively stable value and low volatility, which makes them less risky to hold and transfer. Utility coins, on the other hand, are less frequently used in money laundering due to their lack of anonymity and limited liquidity. Finally, privacy tokens, such as Monero and Zcash, are increasingly becoming a preferred choice among criminals due to their high degree of privacy and untraceability. In summary, our study highlights the importance of understanding the nuances of cryptocurrency classification in the context of money laundering and provides insights into the preferences of criminals in using digital currencies for illegal activities. Based on our findings, our recommendation to the policymakers is to address the potential misuse of cryptocurrencies for money laundering. By implementing measures to regulate stable coins, strengthening cross-border cooperation, fostering public-private partnerships, and increasing cooperation, policymakers can help prevent and detect money laundering activities involving digital currencies.

Keywords: crime, cryptocurrency, money laundering, tokens.

Procedia PDF Downloads 61
5391 A Study of Key Technologies for the Realization of Smart Grid and Its Research Situation in Pakistan and Abroad

Authors: Arjmand Khaliq, Pemra Sohaib

Abstract:

In this paper smart grid technologies which converts conventional grid into smart grid has been discussed. Integration of advanced technologies including two way communication, advanced control system, sensors, smart metering system and other provide opportunity to make conventional grid a intelligent and automatic system which is named as smart grid. This paper gives the concept of smart grid and functional characteristics of smart grid technology, summed up the research progress in Pakistan and abroad and the significance of developing smart grid. Based on the analysis of the smart grid, smart grid technologies will result a reliable and energy efficient power system in the future. On the other hand smart grid technologies have been reviewed in this paper highlighting the key technologies of smart grid, and points out the problems and challenges in the realization of smart grid.

Keywords: energy, power system reliability, power system monitoring and control, sensor, smart grid, two-way communication

Procedia PDF Downloads 366
5390 An Evaluation Model for Enhancing Flexibility in Production Systems through Additive Manufacturing

Authors: Angela Luft, Sebastian Bremen, Nicolae Balc

Abstract:

Additive manufacturing processes have entered large parts of the industry and their range of application have progressed and grown significantly in the course of time. A major advantage of additive manufacturing is the innate flexibility of the machines. This corelates with the ongoing demand of creating highly flexible production environments. However, the potential of additive manufacturing technologies to enhance the flexibility of production systems has not yet been truly considered and quantified in a systematic way. In order to determine the potential of additive manufacturing technologies with regards to the strategic flexibility design in production systems, an integrated evaluation model has been developed, that allows for the simultaneous consideration of both conventional as well as additive production resources. With the described model, an operational scope of action can be identified and quantified in terms of mix and volume flexibility, process complexity, and machine capacity that goes beyond the current cost-oriented approaches and offers a much broader and more holistic view on the potential of additive manufacturing. A respective evaluation model is presented this paper.

Keywords: additive manufacturing, capacity planning, production systems, strategic production planning, flexibility enhancement

Procedia PDF Downloads 124
5389 Approach for an Integrative Technology Assessment Method Combining Product Design and Manufacturing Process

Authors: G. Schuh, S. Woelk, D. Schraknepper, A. Such

Abstract:

The systematic evaluation of manufacturing technologies with regard to the potential for product designing constitutes a major challenge. Until now, conventional evaluation methods primarily consider the costs of manufacturing technologies. Thus, the potential of manufacturing technologies for achieving additional product design features is not completely captured. To compensate this deficit, final evaluations of new technologies are mainly intuitive in practice. Therefore, an additional evaluation dimension is needed which takes the potential of manufacturing technologies for specific realizable product designs into account. In this paper, we present the approach of an evaluation method for selecting manufacturing technologies with regard to their potential for product designing. This research is done within the Fraunhofer innovation cluster »AdaM« (Adaptive Manufacturing) which targets the development of resource efficient and adaptive manufacturing technology processes for complex turbo machinery components.

Keywords: manufacturing, product design, production, technology assessment, technology management

Procedia PDF Downloads 508
5388 The Technophobia among Older Adults in China

Authors: Erhong Sun, Xuchun Ye

Abstract:

Technophobia, namely the fear or dislike of modern advanced technologies, plays a central role in age-related digital divides and is considered a new risk factor for older adults, which can affect the daily lives of people through low adherence to digital living. Indeed, there is considerable heterogeneity in the group of older adults who feel technophobia. Therefore, the aim of this study was to identify different technophobia typologies of older people and to examine their associations with the subjective age factor. A sample of 704 retired elderly over the age of 55 was recruited in China. Technophobia and subjective age were assessed with a questionnaire, respectively. Latent profile analysis was used to identify technophobia subgroups, using three dimensions including techno-anxiety, techno-paranoia, and privacy concerns as indicators. The association between the identified technophobia subgroups and subjective age was explored. In summary, four different technophobia typologies were identified among older adults in China. Combined with an investigation of personal background characteristics and subjective age, it draws a more nuanced image of the technophobia phenome among older adults in China. First, not all older adults suffer from technophobia, with about half of the elderly subjects belonging to the profiles of “Low-technophobia” and “Medium-technophobia.” Second, privacy concern plays an important role in the classification of technophobia among older adults. Third, subjective age might be a protective factor for technophobia in older adults. Although the causal direction between identified technophobia typologies and subjective age remains uncertain, our suggests that future interventions should better focus on subjective age by breaking the age stereotype of technology to reduce the negative effect of technophobia on older. Future development of this research will involve extensive investigation of the detailed impact of technophobia in senior populations, measurement of the negative outcomes, as well as formulation of innovative educational and clinical pathways.

Keywords: technophobia, older adults, latent profile analysis, subjective age

Procedia PDF Downloads 45
5387 Blockchain for IoT Security and Privacy in Healthcare Sector

Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab

Abstract:

The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.

Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data

Procedia PDF Downloads 142
5386 Smartphones in the (Class) Room in Pandemic and Post-pandemic Times: a Study in an Ecological Perspective

Authors: Junia Braga, Antonio carlos Martins, Marcos Racilan

Abstract:

Drawing on the ecological approach, this paper reports a qualitative study that aims to understand how mobile technologies were integrated during the pandemic in the context of language teaching and the use of these technologies in post-pandemic times. Seventy-six teachers answered a questionnaire about their experiences. The findings show how the network with peers scaffolded this experience and played a crucial role in their appropriation of those technologies. They also suggest that this network may have contributed to the normalisation of digital technology use.

Keywords: ecological perspective, language teaching, mobile technologies, teacher education

Procedia PDF Downloads 71
5385 A Study of New Window Typology for Palestinian Residential Building for More Sustainable Building

Authors: Nisreen Ardda

Abstract:

Fenestrations are one of the main building envelope elements that play an important role in home social-ecological l factors. They play a vital role in providing natural lighting and ventilation, visual, thermal, and acoustical comfort, and also provide weather-tightness, privacy, a feeling of openness. In most home buildings, fenestrations are controlled manually by the occupants, which significantly impacts occupants' comfort and energy use. Culture plays a central role in the Palestinians window operation behavior. Improved windows design that provides the desired privacy while maintaining the appropriate function of fenestration (natural lighting, thermal comfort, and visual openness) is becoming a necessity. Therefore, this paper proposes a window typology to achieve the social and environmental factors in residential buildings in the West Bank. The window typology and reference building were designed in Rivet 2021, and natural ventilation was carried out in Design Builder 4.3.0.039. The results showed that the proposed typology provides the desired privacy and the feeling of openness without compromising natural ventilation as the existing window did.

Keywords: window design, passive design, sustainable built environment, building material

Procedia PDF Downloads 161
5384 The Environmental Impact of Wireless Technologies in Nigeria: An Overview of the IoT and 5G Network

Authors: Powei Happiness Kerry

Abstract:

Introducing wireless technologies in Nigeria have improved the quality of lives of Nigerians, however, not everyone sees it in that light. The paper on the environmental impact of wireless technologies in Nigeria summarizes the scholarly views on the impact of wireless technologies on the environment, beaming its searchlight on 5G and internet of things in Nigeria while also exploring the theory of the Technology Acceptance Model (TAM). The study used a qualitative research method to gather important data from relevant sources and contextually draws inference from the derived data. The study concludes that the Federal Government of Nigeria, before agreeing to any latest development in the world of wireless technologies, should weigh the implications and deliberate extensively with all stalk holders putting into consideration the confirmation it will receive from the National Assembly.  

Keywords: Internet of Things, radiofrequency, electromagnetic radiation, information and communications technology, ICT, 5G

Procedia PDF Downloads 102
5383 Isolation Preserving Medical Conclusion Hold Structure via C5 Algorithm

Authors: Swati Kishor Zode, Rahul Ambekar

Abstract:

Data mining is the extraction of fascinating examples on the other hand information from enormous measure of information and choice is made as indicated by the applicable information extracted. As of late, with the dangerous advancement in internet, stockpiling of information and handling procedures, privacy preservation has been one of the major (higher) concerns in data mining. Various techniques and methods have been produced for protection saving data mining. In the situation of Clinical Decision Support System, the choice is to be made on the premise of the data separated from the remote servers by means of Internet to diagnose the patient. In this paper, the fundamental thought is to build the precision of Decision Support System for multiple diseases for different maladies and in addition protect persistent information while correspondence between Clinician side (Client side) also, the Server side. A privacy preserving protocol for clinical decision support network is proposed so that patients information dependably stay scrambled amid diagnose prepare by looking after the accuracy. To enhance the precision of Decision Support System for various malady C5.0 classifiers and to save security, a Homomorphism encryption algorithm Paillier cryptosystem is being utilized.

Keywords: classification, homomorphic encryption, clinical decision support, privacy

Procedia PDF Downloads 309
5382 Smart Interior Design: A Revolution in Modern Living

Authors: Fatemeh Modirzare

Abstract:

Smart interior design represents a transformative approach to creating living spaces that integrate technology seamlessly into our daily lives, enhancing comfort, convenience, and sustainability. This paper explores the concept of smart interior design, its principles, benefits, challenges, and future prospects. It also highlights various examples and applications of smart interior design to illustrate its potential in shaping the way we live and interact with our surroundings. In an increasingly digitized world, the boundaries between technology and interior design are blurring. Smart interior design, also known as intelligent or connected interior design, involves the incorporation of advanced technologies and automation systems into residential and commercial spaces. This innovative approach aims to make living environments more efficient, comfortable, and adaptable while promoting sustainability and user well-being. Smart interior design seamlessly integrates technology into the aesthetics and functionality of a space, ensuring that devices and systems do not disrupt the overall design. Sustainable materials, energy-efficient systems, and eco-friendly practices are central to smart interior design, reducing environmental impact. Spaces are designed to be adaptable, allowing for reconfiguration to suit changing needs and preferences. Smart homes and spaces offer greater comfort through features like automated climate control, adjustable lighting, and customizable ambiance. Smart interior design can significantly reduce energy consumption through optimized heating, cooling, and lighting systems. Smart interior design integrates security systems, fire detection, and emergency response mechanisms for enhanced safety. Sustainable materials, energy-efficient appliances, and waste reduction practices contribute to a greener living environment. Implementing smart interior design can be expensive, particularly when retrofitting existing spaces with smart technologies. The increased connectivity raises concerns about data privacy and cybersecurity, requiring robust measures to protect user information. Rapid advancements in technology may lead to obsolescence, necessitating updates and replacements. Users must be familiar with smart systems to fully benefit from them, requiring education and ongoing support. Residential spaces incorporate features like voice-activated assistants, automated lighting, and energy management systems. Intelligent office design enhances productivity and employee well-being through smart lighting, climate control, and meeting room booking systems. Hospitals and healthcare facilities use smart interior design for patient monitoring, wayfinding, and energy conservation. Smart retail design includes interactive displays, personalized shopping experiences, and inventory management systems. The future of smart interior design holds exciting possibilities, including AI-powered design tools that create personalized spaces based on user preferences. Smart interior design will increasingly prioritize factors that improve physical and mental health, such as air quality monitoring and mood-enhancing lighting. Smart interior design is revolutionizing the way we interact with our living and working spaces. By embracing technology, sustainability, and user-centric design principles, smart interior design offers numerous benefits, from increased comfort and convenience to energy efficiency and sustainability. Despite challenges, the future holds tremendous potential for further innovation in this field, promising a more connected, efficient, and harmonious way of living and working.

Keywords: smart interior design, home automation, sustainable living spaces, technological integration, user-centric design

Procedia PDF Downloads 37
5381 A Paradigm Shift in Energy Policy and Use: Exergy and Hybrid Renewable Energy Technologies

Authors: Adavbiele Airewe Stephen

Abstract:

Sustainable energy use is exploiting energy resources within acceptable levels of global resource depletion without destroying the ecological balance of an area. In the context of sustainability, the rush to quell the energy crisis of the fossil fuels of the 1970's by embarking on nuclear energy technology has now been seen as a disaster. In the circumstance, action (policy) suggested in this study to avoid future occurrence is exergy maximization/entropy generation minimization and the use is renewable energy technologies that are hybrid based. Thirty-two (32) selected hybrid renewable energy technologies were assessed with respect to their energetic efficiencies and entropy generation. The results indicated that determining which of the hybrid technologies is the most efficient process and sustainable is a matter of defining efficiency and knowing which of them possesses the minimum entropy generation.

Keywords: entropy, exergy, hybrid renewable energy technologies, sustainability

Procedia PDF Downloads 409
5380 Future of Electric Power Generation Technologies: Environmental and Economic Comparison

Authors: Abdulrahman A. Bahaddad, Mohammed Beshir

Abstract:

The objective of this paper is to demonstrate and describe eight different types of power generation technologies and to understand the history and future trends of each technology. In addition, a comparative analysis between these technologies will be presented with respect to their cost analysis and associated performance.

Keywords: conventional power generation, economic analysis, environmental impact, renewable energy power generation

Procedia PDF Downloads 98