Search results for: privacy issues
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5236

Search results for: privacy issues

5146 Development of a Secured Telemedical System Using Biometric Feature

Authors: O. Iyare, A. H. Afolayan, O. T. Oluwadare, B. K. Alese

Abstract:

Access to advanced medical services has been one of the medical challenges faced by our present society especially in distant geographical locations which may be inaccessible. Then the need for telemedicine arises through which live videos of a doctor can be streamed to a patient located anywhere in the world at any time. Patients’ medical records contain very sensitive information which should not be made accessible to unauthorized people in order to protect privacy, integrity and confidentiality. This research work focuses on a more robust security measure which is biometric (fingerprint) as a form of access control to data of patients by the medical specialist/practitioner.

Keywords: biometrics, telemedicine, privacy, patient information

Procedia PDF Downloads 265
5145 Bitcoin, Blockchain and Smart Contract: Attacks and Mitigations

Authors: Mohamed Rasslan, Doaa Abdelrahman, Mahmoud M. Nasreldin, Ghada Farouk, Heba K. Aslan

Abstract:

Blockchain is a distributed database that endorses transparency while bitcoin is a decentralized cryptocurrency (electronic cash) that endorses anonymity and is powered by blockchain technology. Smart contracts are programs that are stored on a blockchain. Smart contracts are executed when predetermined conditions are fulfilled. Smart contracts automate the agreement execution in order to make sure that all participants immediate-synchronism of the outcome-certainty, without any intermediary's involvement or time loss. Currently, the Bitcoin market worth billions of dollars. Bitcoin could be transferred from one purchaser to another without the need for an intermediary bank. Network nodes through cryptography verify bitcoin transactions, which are registered in a public-book called “blockchain”. Bitcoin could be replaced by other coins, merchandise, and services. Rapid growing of the bitcoin market-value, encourages its counterparts to make use of its weaknesses and exploit vulnerabilities for profit. Moreover, it motivates scientists to define known vulnerabilities, offer countermeasures, and predict future threats. In his paper, we study blockchain technology and bitcoin from the attacker’s point of view. Furthermore, mitigations for the attacks are suggested, and contemporary security solutions are discussed. Finally, research methods that achieve strict security and privacy protocol are elaborated.

Keywords: Cryptocurrencies, Blockchain, Bitcoin, Smart Contracts, Peer-to-Peer Network, Security Issues, Privacy Techniques

Procedia PDF Downloads 49
5144 A Review of Encryption Algorithms Used in Cloud Computing

Authors: Derick M. Rakgoale, Topside E. Mathonsi, Vusumuzi Malele

Abstract:

Cloud computing offers distributed online and on-demand computational services from anywhere in the world. Cloud computing services have grown immensely over the past years, especially in the past year due to the Coronavirus pandemic. Cloud computing has changed the working environment and introduced work from work phenomenon, which enabled the adoption of technologies to fulfill the new workings, including cloud services offerings. The increased cloud computing adoption has come with new challenges regarding data privacy and its integrity in the cloud environment. Previously advanced encryption algorithms failed to reduce the memory space required for cloud computing performance, thus increasing the computational cost. This paper reviews the existing encryption algorithms used in cloud computing. In the future, artificial neural networks (ANN) algorithm design will be presented as a security solution to ensure data integrity, confidentiality, privacy, and availability of user data in cloud computing. Moreover, MATLAB will be used to evaluate the proposed solution, and simulation results will be presented.

Keywords: cloud computing, data integrity, confidentiality, privacy, availability

Procedia PDF Downloads 87
5143 Ethically Integrating Robots to Assist Elders and Patients with Dementia

Authors: Suresh Lokiah

Abstract:

The emerging trend of integrating robots into elderly care, particularly for assisting patients with dementia, holds the potential to greatly transform the sector. Assisted living facilities, which house a significant number of elderly individuals and dementia patients, constantly strive to engage their residents in stimulating activities. However, due to staffing shortages, they often rely on volunteers to introduce new activities. Despite the availability of social interaction, these residents, frequently overlooked in society, are in desperate need of additional support. Robots designed for elder care are categorized based on their design and functionality. These categories include companion robots, telepresence robots, health monitoring robots, and rehab robots. However, the integration of such robots raises significant ethical concerns, notably regarding privacy, autonomy, and the risk of dehumanization. Privacy issues arise as these robots may need to continually monitor patient activities. There is also a risk of patients becoming overly dependent on these robots, potentially undermining their autonomy. Furthermore, the replacement of human touch with robotic interaction may lead to the dehumanization of care. This paper delves into the ethical considerations of incorporating robotic assistance in eldercare. It proposes a series of guidelines and strategies to ensure the ethical deployment of these robots. These guidelines suggest involving patients in the design and development process of the robots and emphasize the critical need for human oversight to respect the dignity and rights of the elderly and dementia patients. The paper also recommends implementing robust privacy measures, including secure data transmission and data anonymization. In conclusion, this paper offers a thorough examination of the ethical implications of using robotic assistance in elder care. It provides a strategic roadmap to ensure this technology is utilized ethically, thereby maximizing its potential benefits and minimizing any potential harm.

Keywords: human-robot interaction, robots for eldercare, ethics, health, dementia

Procedia PDF Downloads 43
5142 Fair Federated Learning in Wireless Communications

Authors: Shayan Mohajer Hamidi

Abstract:

Federated Learning (FL) has emerged as a promising paradigm for training machine learning models on distributed data without the need for centralized data aggregation. In the realm of wireless communications, FL has the potential to leverage the vast amounts of data generated by wireless devices to improve model performance and enable intelligent applications. However, the fairness aspect of FL in wireless communications remains largely unexplored. This abstract presents an idea for fair federated learning in wireless communications, addressing the challenges of imbalanced data distribution, privacy preservation, and resource allocation. Firstly, the proposed approach aims to tackle the issue of imbalanced data distribution in wireless networks. In typical FL scenarios, the distribution of data across wireless devices can be highly skewed, resulting in unfair model updates. To address this, we propose a weighted aggregation strategy that assigns higher importance to devices with fewer samples during the aggregation process. By incorporating fairness-aware weighting mechanisms, the proposed approach ensures that each participating device's contribution is proportional to its data distribution, thereby mitigating the impact of data imbalance on model performance. Secondly, privacy preservation is a critical concern in federated learning, especially in wireless communications where sensitive user data is involved. The proposed approach incorporates privacy-enhancing techniques, such as differential privacy, to protect user privacy during the model training process. By adding carefully calibrated noise to the gradient updates, the proposed approach ensures that the privacy of individual devices is preserved without compromising the overall model accuracy. Moreover, the approach considers the heterogeneity of devices in terms of computational capabilities and energy constraints, allowing devices to adaptively adjust the level of privacy preservation to strike a balance between privacy and utility. Thirdly, efficient resource allocation is crucial for federated learning in wireless communications, as devices operate under limited bandwidth, energy, and computational resources. The proposed approach leverages optimization techniques to allocate resources effectively among the participating devices, considering factors such as data quality, network conditions, and device capabilities. By intelligently distributing the computational load, communication bandwidth, and energy consumption, the proposed approach minimizes resource wastage and ensures a fair and efficient FL process in wireless networks. To evaluate the performance of the proposed fair federated learning approach, extensive simulations and experiments will be conducted. The experiments will involve a diverse set of wireless devices, ranging from smartphones to Internet of Things (IoT) devices, operating in various scenarios with different data distributions and network conditions. The evaluation metrics will include model accuracy, fairness measures, privacy preservation, and resource utilization. The expected outcomes of this research include improved model performance, fair allocation of resources, enhanced privacy preservation, and a better understanding of the challenges and solutions for fair federated learning in wireless communications. The proposed approach has the potential to revolutionize wireless communication systems by enabling intelligent applications while addressing fairness concerns and preserving user privacy.

Keywords: federated learning, wireless communications, fairness, imbalanced data, privacy preservation, resource allocation, differential privacy, optimization

Procedia PDF Downloads 45
5141 The Role of Online Social Networks in Social Movements: Social Polarization and Violations against Social Unity and Privacy of Individuals in Turkey

Authors: Tolga Yazıcı

Abstract:

As a matter of the fact that online social networks like Twitter, Facebook and MySpace have experienced an extensive growth in recent years. Social media offers individuals with a tool for communicating and interacting with one another. These social networks enable people to stay in touch with other people and express themselves. This process makes the users of online social networks active creators of content rather than being only consumers of traditional media. That’s why millions of people show strong desire to learn the methods and tools of digital content production and necessary communication skills. However, the booming interest in communication and interaction through online social networks and high level of eagerness to invent and implement the ways to participate in content production raise some privacy and security concerns. This presentation aims to open the assumed revolutionary, democratic and liberating nature of the online social media up for discussion by reviewing some recent political developments in Turkey. Firstly, the role of Internet and online social networks in mobilizing collective movements through social interactions and communications will be questioned. Secondly, some cases from Gezi and Okmeydanı Protests and also December 17-25 period will be presented in order to illustrate misinformation and manipulation in social media and violation of individual privacy through online social networks in order to damage social unity and stability contradictory to democratic nature of online social networking.

Keywords: online social media networks, democratic participation, social movements, social polarization, privacy of individuals, Turkey

Procedia PDF Downloads 314
5140 Human Factors Issues and Measures in Advanced NPPs

Authors: Jun Su Ha

Abstract:

Various advanced technologies will be adopted in Advanced Control Rooms (ACRs) of advanced Nuclear Power Plants (NPPs), which is thought to increase operators’ performance. However, potential human factors issues coupled with digital technologies might be troublesome. Human factors issues in ACRs are identified and strategies (or countermeasures) for evaluating and analyzing each of issues are addressed in this study.

Keywords: advanced control room, human factor issues, human performance, human error, nuclear power plant

Procedia PDF Downloads 436
5139 Data Protection, Data Privacy, Research Ethics in Policy Process Towards Effective Urban Planning Practice for Smart Cities

Authors: Eugenio Ferrer Santiago

Abstract:

The growing complexities of the modern world on high-end gadgets, software applications, scams, identity theft, and Artificial Intelligence (AI) make the “uninformed” the weak and vulnerable to be victims of cybercrimes. Artificial Intelligence is not a new thing in our daily lives; the principles of database management, logical programming, and garbage in and garbage out are all connected to AI. The Philippines had in place legal safeguards against the abuse of cyberspace, but self-regulation of key industry players and self-protection by individuals are primordial to attain the success of these initiatives. Data protection, Data Privacy, and Research Ethics must work hand in hand during the policy process in the course of urban planning practice in different environments. This paper focuses on the interconnection of data protection, data privacy, and research ethics in coming up with clear-cut policies against perpetrators in the urban planning professional practice relevant in sustainable communities and smart cities. This paper shall use expository methodology under qualitative research using secondary data from related literature, interviews/blogs, and the World Wide Web resources. The claims and recommendations of this paper will help policymakers and implementers in the policy cycle. This paper shall contribute to the body of knowledge as a simple treatise and communication channel to the reading community and future researchers to validate the claims and start an intellectual discourse for better knowledge generation for the good of all in the near future.

Keywords: data privacy, data protection, urban planning, research ethics

Procedia PDF Downloads 26
5138 Cloud Computing: Major Issues and Solutions

Authors: S. Adhirai Subramaniyam, Paramjit Singh

Abstract:

This paper presents major issues in cloud computing. The paper describes different cloud computing deployment models and cloud service models available in the field of cloud computing. The paper then concentrates on various issues in the field. The issues such as cloud compatibility, compliance of the cloud, standardizing cloud technology, monitoring while on the cloud and cloud security are described. The paper suggests solutions for these issues and concludes that hybrid cloud infrastructure is a real boon for organizations.

Keywords: cloud, cloud computing, mobile cloud computing, private cloud, public cloud, hybrid cloud, SAAS, PAAS, IAAS, cloud security

Procedia PDF Downloads 309
5137 The Impact of Cryptocurrency Classification on Money Laundering: Analyzing the Preferences of Criminals for Stable Coins, Utility Coins, and Privacy Tokens

Authors: Mohamed Saad, Huda Ismail

Abstract:

The purpose of this research is to examine the impact of cryptocurrency classification on money laundering crimes and to analyze how the preferences of criminals differ according to the type of digital currency used. Specifically, we aim to explore the roles of stablecoins, utility coins, and privacy tokens in facilitating or hindering money laundering activities and to identify the key factors that influence the choices of criminals in using these cryptocurrencies. To achieve our research objectives, we used a dataset for the most highly traded cryptocurrencies (32 currencies) that were published on the coin market cap for 2022. In addition to conducting a comprehensive review of the existing literature on cryptocurrency and money laundering, with a focus on stablecoins, utility coins, and privacy tokens, Furthermore, we conducted several Multivariate analyses. Our study reveals that the classification of cryptocurrency plays a significant role in money laundering activities, as criminals tend to prefer certain types of digital currencies over others, depending on their specific needs and goals. Specifically, we found that stablecoins are more commonly used in money laundering due to their relatively stable value and low volatility, which makes them less risky to hold and transfer. Utility coins, on the other hand, are less frequently used in money laundering due to their lack of anonymity and limited liquidity. Finally, privacy tokens, such as Monero and Zcash, are increasingly becoming a preferred choice among criminals due to their high degree of privacy and untraceability. In summary, our study highlights the importance of understanding the nuances of cryptocurrency classification in the context of money laundering and provides insights into the preferences of criminals in using digital currencies for illegal activities. Based on our findings, our recommendation to the policymakers is to address the potential misuse of cryptocurrencies for money laundering. By implementing measures to regulate stable coins, strengthening cross-border cooperation, fostering public-private partnerships, and increasing cooperation, policymakers can help prevent and detect money laundering activities involving digital currencies.

Keywords: crime, cryptocurrency, money laundering, tokens.

Procedia PDF Downloads 60
5136 Analysis of Threats in Interoperability of Medical Devices

Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar

Abstract:

Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.

Keywords: interoperability, threats, attacks, medical devices

Procedia PDF Downloads 304
5135 Nordic Study on Public Acceptance of Drones

Authors: Virpi Oksman

Abstract:

Drones are new phenomenon in public spaces. Adoption of this kind of new technologies requires public acceptance. Drones and other unmanned aerial systems may have various impacts on people’s living environments, and the public is exposed to possible disadvantages of drones. Public acceptance may be expressed as positive or negative attitude by majority of the citizens towards the new technology or service or as rapid adoption of it in everyday life. In various parts of the globe, in cities and in rural areas, drones as emerging technologies are perceived quite differently. Public acceptance studies of drones have been conducted mostly in highly urbanized environments like in Singapore and in European cities. This paper presents results of a Nordic survey study (N=1000) conducted in Sweden and in Finland. The survey aims at understanding the level of acceptance of different uses of drones in public spaces and the main concerns and benefits related to emerging UAM technologies. The study shows that even though the general attitude towards drones is quite positive, privacy and safety, and noise levels are the main concerns by Nordic citizens. Also, for what purpose and by whom the drones are operated affects the acceptability significantly. The study concludes, that there is need for regulations that safeguard public interests. In addition, considering privacy in design, and quiet environmentally friendly drones support public acceptance of drones.

Keywords: public acceptance, privacy, safety, survey

Procedia PDF Downloads 141
5134 A Study of New Window Typology for Palestinian Residential Building for More Sustainable Building

Authors: Nisreen Ardda

Abstract:

Fenestrations are one of the main building envelope elements that play an important role in home social-ecological l factors. They play a vital role in providing natural lighting and ventilation, visual, thermal, and acoustical comfort, and also provide weather-tightness, privacy, a feeling of openness. In most home buildings, fenestrations are controlled manually by the occupants, which significantly impacts occupants' comfort and energy use. Culture plays a central role in the Palestinians window operation behavior. Improved windows design that provides the desired privacy while maintaining the appropriate function of fenestration (natural lighting, thermal comfort, and visual openness) is becoming a necessity. Therefore, this paper proposes a window typology to achieve the social and environmental factors in residential buildings in the West Bank. The window typology and reference building were designed in Rivet 2021, and natural ventilation was carried out in Design Builder 4.3.0.039. The results showed that the proposed typology provides the desired privacy and the feeling of openness without compromising natural ventilation as the existing window did.

Keywords: window design, passive design, sustainable built environment, building material

Procedia PDF Downloads 161
5133 Issue Reorganization Using the Measure of Relevance

Authors: William Wong Xiu Shun, Yoonjin Hyun, Mingyu Kim, Seongi Choi, Namgyu Kim

Abstract:

Recently, the demand of extracting the R&D keywords from the issues and using them in retrieving R&D information is increasing rapidly. But it is hard to identify the related issues or to distinguish them. Although the similarity between the issues cannot be identified, but with the R&D lexicon, the issues that always shared the same R&D keywords can be determined. In details, the R&D keywords that associated with particular issue is implied the key technology elements that needed to solve the problem of the particular issue. Furthermore, the related issues that sharing the same R&D keywords can be showed in a more systematic way through the issue clustering constructed from the perspective of R&D. Thus, sharing of the R&D result and reusable of the R&D technology can be facilitated. Indirectly, the redundancy of investment on the same R&D can be reduce as the R&D information can be shared between those corresponding issues and reusability of the related R&D can be improved. Therefore, a methodology of constructing an issue clustering from the perspective of common R&D keywords is proposed to satisfy the demands mentioned.

Keywords: clustering, social network analysis, text mining, topic analysis

Procedia PDF Downloads 549
5132 Isolation Preserving Medical Conclusion Hold Structure via C5 Algorithm

Authors: Swati Kishor Zode, Rahul Ambekar

Abstract:

Data mining is the extraction of fascinating examples on the other hand information from enormous measure of information and choice is made as indicated by the applicable information extracted. As of late, with the dangerous advancement in internet, stockpiling of information and handling procedures, privacy preservation has been one of the major (higher) concerns in data mining. Various techniques and methods have been produced for protection saving data mining. In the situation of Clinical Decision Support System, the choice is to be made on the premise of the data separated from the remote servers by means of Internet to diagnose the patient. In this paper, the fundamental thought is to build the precision of Decision Support System for multiple diseases for different maladies and in addition protect persistent information while correspondence between Clinician side (Client side) also, the Server side. A privacy preserving protocol for clinical decision support network is proposed so that patients information dependably stay scrambled amid diagnose prepare by looking after the accuracy. To enhance the precision of Decision Support System for various malady C5.0 classifiers and to save security, a Homomorphism encryption algorithm Paillier cryptosystem is being utilized.

Keywords: classification, homomorphic encryption, clinical decision support, privacy

Procedia PDF Downloads 309
5131 The Admissibility of Evidence Obtained in Contravention of the Right to Privacy in a Criminal Trial: A Comparative Study of Poland and Germany

Authors: Konstancja Syller

Abstract:

International law and European regulations remain hardly silent about the admissibility of evidence obtained illegally in a criminal trial. However, Article 6 of the European Convention on Human Rights guarantees the right to a fair trial, it does not normalise a proceeding status of specified sources or means of proof outright. Therefore, it is the preserve of national legislation and national law enforcement authorities to decide on this matter. In most countries, especially in Germany and Poland, a rather complex normative approach to the issue of proof obtained in violation of the right to privacy is evident, which pursues in practise to many interpretive doubts. In Germany the jurisprudence has a significant impact within the range of the matter mentioned above. The Constitutional Court and the Supreme Court of Germany protect the right to privacy quite firmly - they ruled on inadmissibility of obtaining a proof in the form of a diary or a journal as a protection measure of constitutional guaranteed right. At the same time, however, the Supreme Court is not very convinced with reference to the issue of whether materials collected as a result of an inspection, call recordings or listening to the premises, which were carried out in breach of law, can be used in a criminal trial. Generally speaking, German courts indicate a crucial importance of the principle of Truth and the principle of proportionality, which both enable a judgement to be made as to the possibility of using an evidence obtained unlawfully. Comparing, in Poland there is almost no jurisprudence of the Constitutional Tribunal relating directly to the issue of illegal evidence. It is somehow surprising, considering the doctrinal analysis of the admissibility of using such proof in a criminal trial is performed in relation to standards resulted from the Constitution. Moreover, a crucial de lega lata legal provision, which enables allowing a proof obtained in infringement of the provisions in respect of criminal proceedings or through a forbidden act, is widely criticised within the legal profession ant therefore many courts give it their own interpretation at odds with legislator’s intentions. The comparison of two civil law legal systems’ standards regarding to the admissibility of an evidence obtained in contravention of the right to privacy in a criminal trial, taking also into account EU legislation and judicature, is the conclusive aim of this article.

Keywords: criminal trial, evidence, Germany, right to privacy, Poland

Procedia PDF Downloads 130
5130 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad

Abstract:

This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.

Keywords: unified theory of acceptance and use of technology (UTAUT) model, UTAUT2 model, smart national identity card (SNIC), health information application, privacy calculus model (PCM)

Procedia PDF Downloads 434
5129 A Comparative Study of Public and Private School Adolescent Girls on the Issues of Menstrual Hygiene and the Management Issues

Authors: Ashok Pandey, Rajan Adhikari

Abstract:

Introduction: Menstruation is part of the female reproductive cycle that starts when girls become sexually mature at the time of puberty. It is a phenomenon unique to the females. During a menstrual period, a woman bleeds from her uterus via the vagina. For decades, in many countries, academic school ‘type,’ private or public, as a predictor of or factor in future academic success has been researched and debated. MATERIAL AND METHODS: The comparative study was carried out with adolescent girls studying in both public and private schools of Kathmandu valley. A total of 100 girls participated in the survey, and out of them 21 participated in the FGD and 5 in the in- depth interview. Quantitative data from the survey was analyzed using SPSS 16.0 software. Informed verbal consent with the respective head of school and the respondents were taken before data collection. Results:The age of the respondents ranges from 11 to 18 years, with mean age of menarche being 12.37 years in both school adolescent girls. 70 percent of the public school adolescent girls and 72 percent of the private school adolescent girls are feeling upset and tension during menarche. There is a statistically significant difference on take rest during the period and good hygienic practice during menstruation of public/private school, at α=0. 05 level of significance. There is a statistically significant difference on overall score of practice during menstruation between public and private adolescent girls. Conclusion: Private schools children are more knowledgeable and maintain hygiene as compere to public school even though, it can be said that among the adolescent school girls both in public and private school, menstrual knowledge and perceptions are poor and practices often not optimal for proper hygiene. Often ignored issues of privacy affect the hygienic practices and daily lives.

Keywords: Comparison, Menstruation, Private school, Public School

Procedia PDF Downloads 403
5128 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 91
5127 The Ethical and Social Implications of Using AI in Healthcare: A Literature Review

Authors: Deepak Singh

Abstract:

AI technology is rapidly being integrated into the healthcare system, bringing many ethical and social implications. This literature review examines the various aspects of this phenomenon, focusing on the ethical considerations of using AI in healthcare, such as how it might affect patient autonomy, privacy, and doctor-patient relationships. Furthermore, the review considers the potential social implications of AI in Healthcare, such as the potential for automation to reduce the availability of healthcare jobs and the potential to widen existing health inequalities. The literature suggests potential benefits and drawbacks to using AI in healthcare, and it is essential to consider the ethical and social implications before implementation. It is concluded that more research is needed to understand the full implications of using AI in healthcare and that ethical regulations must be in place to ensure patient safety and the technology's responsible use.

Keywords: AI, healthcare, telemedicine, telehealth, ethics, security, privacy, patient, rights, safety

Procedia PDF Downloads 102
5126 Security of Internet of Things: Challenges, Requirements and Future Directions

Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi

Abstract:

The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.

Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture

Procedia PDF Downloads 342
5125 Projection of Health Issues in Contemporary Indian Cinema: A Study on Selected Bollywood Movies

Authors: Sananda Mukherjee, Nandini Lakshmikantha

Abstract:

Films are considered as the most influential form of mass media. To attract audience films are made on various themes and issues which are assumed to have an impact on the behavioural pattern of the society. Among the various issues that have been bothering Indian society, health is primary. Thus it is important and interesting to study how health is being projected in Bollywood which is largely considered by the world as Indian cinema. This study tries to focus its attention on some select popular movies made in the recent decade and will try to analyse its content and significance of the same with the contemporary Indian society. It is evident that some of the movies made projecting health issues have earned good box office revenues, but have they been successful in making the public understand the significance of health issues they have been trying to project, is an interesting area to understand.

Keywords: box office, health issues, Indian cinema, social awareness

Procedia PDF Downloads 181
5124 Computer-Aided Depression Screening: A Literature Review on Optimal Methodologies for Mental Health Screening

Authors: Michelle Nighswander

Abstract:

Suicide can be a tragic response to mental illness. It is difficult for people to disclose or discuss suicidal impulses. The stigma surrounding mental health can create a reluctance to seek help for mental illness. Patients may feel pressure to exhibit a socially desirable demeanor rather than reveal these issues, especially if they sense their healthcare provider is pressed for time or does not have an extensive history with their provider. Overcoming these barriers can be challenging. Although there are several validated depression and suicide risk instruments, varying processes used to administer these tools may impact the truthfulness of the responses. A literature review was conducted to find evidence of the impact of the environment on the accuracy of depression screening. Many investigations do not describe the environment and fewer studies use a comparison design. However, three studies demonstrated that computerized self-reporting might be more likely to elicit truthful and accurate responses due to increased privacy when responding compared to a face-to-face interview. These studies showed patients reported positive reactions to computerized screening for other stigmatizing health conditions such as alcohol use during pregnancy. Computerized self-screening for depression offers the possibility of more privacy and patient reflection, which could then send a targeted message of risk to the healthcare provider. This could potentially increase the accuracy while also increasing time efficiency for the clinic. Considering the persistent effects of mental health stigma, how these screening questions are posed can impact patients’ responses. This literature review analyzes trends in depression screening methodologies, the impact of setting on the results and how this may assist in overcoming one barrier caused by stigma.

Keywords: computerized self-report, depression, mental health stigma, suicide risk

Procedia PDF Downloads 103
5123 Emerging Issues in Early Childhood Care and Development in Nigeria

Authors: Evelyn Fabian

Abstract:

The focus of this discussion centres on the emerging issues in Early Childhood Care and development in Nigeria. Early childhood care is the bedrock of Nigeria’s educational system. However, there are critical issues that had not been addressed and it is frustrating the entire educational process. Thus, this paper will show the inter-connectedness between these issues such as poor funding, trained skillful teachers that would supervise the learning process of the kids, unconducive learning environment and lack of relevant facilities. For a clear grasp of these issues, the researcher visited 36 early childhood centres distributed across the 36 spates of Nigeria. The findings which were expressed in simple percentages revealed a near total absence or government neglect of these critical areas. The findings equally showed a misplaced priority in the government allocation of funds to early child care education and development. The study concludes that this mismatch in the training of these categories of pupils, government should expedite action in addressing these emerging issues in early childhood care and development in Nigeria.

Keywords: early childhood, ECCE, education, emerging issues

Procedia PDF Downloads 496
5122 Smart City Solutions for Enhancing the Cultural and Historic Value of Urban Heritage Sites

Authors: Farnoosh Faal

Abstract:

The trend among smart cities is to incorporate technological advancements to better manage and protect their cultural heritage sites. This study investigates how smart city solutions can improve the cultural and historical significance of urban heritage sites and assesses present practices and potential for the future. The paper delves into the literature to examine how smart city technologies can be utilized to increase knowledge and respect for cultural heritage, as well as promote sustainable tourism and economic growth. The article reviews various instances of smart city initiatives across different regions of the world, pinpointing innovative tactics and best practices in improving the cultural and historical worth of urban heritage sites. Additionally, it analyzes the difficulties and limitations associated with implementing these solutions, including community involvement, privacy concerns, and data management issues. The conclusions drawn from this paper propose that smart city solutions offer a substantial opportunity to augment the cultural and historical value of urban heritage sites. By effectively integrating technology into heritage management, there can be greater comprehension and admiration for cultural heritage, enhanced visitor experience, and support for sustainable tourism. However, to fully exploit the potential of smart city solutions in this context, it is crucial to prioritize community engagement and participation, as well as ensure that data management practices are transparent, responsible, and respectful of privacy. In summary, this paper offers guidance and advice to policymakers, urban planners, and heritage management professionals who want to increase the cultural and historical significance of urban heritage sites through the application of smart city solutions. It emphasizes the significance of creating comprehensive and cooperative strategies, as well as ensuring that efforts to preserve heritage are sustainable, fair, and efficient.

Keywords: smart city, Urban heritage, sustainable tourism, heritage preservation

Procedia PDF Downloads 62
5121 Secure Transfer of Medical Images Using Hybrid Encryption

Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad

Abstract:

In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation

Procedia PDF Downloads 407
5120 Big Data Strategy for Telco: Network Transformation

Authors: F. Amin, S. Feizi

Abstract:

Big data has the potential to improve the quality of services; enable infrastructure that businesses depend on to adapt continually and efficiently; improve the performance of employees; help organizations better understand customers; and reduce liability risks. Analytics and marketing models of fixed and mobile operators are falling short in combating churn and declining revenue per user. Big Data presents new method to reverse the way and improve profitability. The benefits of Big Data and next-generation network, however, are more exorbitant than improved customer relationship management. Next generation of networks are in a prime position to monetize rich supplies of customer information—while being mindful of legal and privacy issues. As data assets are transformed into new revenue streams will become integral to high performance.

Keywords: big data, next generation networks, network transformation, strategy

Procedia PDF Downloads 330
5119 Chest Pain as a Predictor for Heart Issues in Geriatrics

Authors: Leila Kargar, Homa Abri, Golsa Safai

Abstract:

The occurrence of chest pain among geriatrics could be considered as a predictor of heart issues. There is a need for attention to this pain among this population. This review paper has tried to collect the recent data with attention to the chest pain among geriatrics. This review paper has focused on specific keywords, including chest pain, heart issues, and geriatrics, among published papers from 2015 till 2020. To collect data for this purpose, Scopus, Web of Sciences, and PubMed were used. After inserting related papers to the Endnote, an independent researcher checked the abstract, and papers with unclear methods or non-English language were excluded. Finally, 7-papers were included in this review paper. The findings of those papers showed that chest pain could be a predictor for heart issues, and also, there is a direct relationship between chest pain and heart issues among geriatrics. So, early detection and an accurate decision could be helpful to prevent heart issues in this population.

Keywords: pain, heart issue, geriatrics, health

Procedia PDF Downloads 186
5118 Comparative Analysis of Identity Semiotics in Iran’s Modern and Traditional House Design

Authors: Maryam Ghasemi

Abstract:

One of the most significant components that provide comfort and protection is having a shelter called a house. Even if components and regions are changed or restored to meet new functions, the house's identity must be preserved. In the contemporary era, houses are increasingly being built regardless of cultural identity. This misunderstanding caused a sense of unease. This study analyses archaic and modern architecture to find semiotic areas and qualities in the latter, using the former as a reference. This study's technique used an exploratory assessment of architectural components from both periods. The Abbasid residence and the Ekbatan architectural complex were used as case studies. The identity of Iranian architecture does not correlate with current buildings. The other part is privacy, which is a missing link between traditional and modern Iranian architecture because it is directly related to the identities of homes based on the cultures of their residents.

Keywords: housing, traditional, contemporary, privacy, semiotic

Procedia PDF Downloads 76
5117 Determining Importance Level of Factors Affecting Selection of Online Shopping Website with AHP: A Research on Young Consumers

Authors: Nurullah Ekmekci, Omer Akkaya, Vural Cagliyan

Abstract:

Increased use of the Internet has resulted in the emergence of a new retail types called online shopping or electronic retail (e-retail). The rapid growth of the Internet has enabled customers to search information about the product and buy these products or services from e-retailers. Although this new form of shopping has grown in a remarkable way because of offering easiness to people, it is not an easy task to capture the success by distinguishing from competitors in this environment which millions of players takes place. For the success, e-retailers should determine the factors which the customers take notice while they are buying from e-retailers. This paper aims to identify the factors that provide preferability for the online shopping websites and the importance levels of these factors. These main criteria which have taken notice are Customer Service Performance (CSP), Website Performance (WSP), Criteria Related to Product (CRP), Ease of Payment (EP), Security/Privacy (SP), Ease of Return (ER), Delivery Service Performance (DSP) and Order Fulfillment Performance (OFP). It has benefited from Analytic Hierarchy Process to determine the priority of the criteria. Based on analysis, Security/Privacy (SP) criteria seems to be most important criterion with 22 % weight. Companies should attach importance to the security and privacy for making their online website more preferable among the online shoppers.

Keywords: AHP (analytical hierarchy process), multi-criteria decision making, online shopping, shopping

Procedia PDF Downloads 215