Search results for: privacy issues
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5236

Search results for: privacy issues

5026 Addressing Oral Sensory Issues and Possible Remediation in Children with Autism Spectrum Disorders: Illustrated with a Case Study

Authors: A. K. Aswathy, Asha Manoharan, Arya Manoharan

Abstract:

The purpose of this study are to define the nature of oral sensory issues in children with autism spectrum disorder (ASD), identify important components of the assessment and treatment of this issues specific to this population, and delineate specific therapeutic techniques designed to improve assessment and treatment within therapeutic settings. Literature review and case example is used to define the predominant nature of the oral sensory issues that are experienced by some children on the autism spectrum. Characteristics of this complex disorder that can have an impact on feeding skill and behavior are also identified. These factors are then integrated to create assessment and intervention techniques that can be used in conjunction with traditional feeding approaches to facilitate improvements in eating as well as reducing oral apraxic component in this unique population. The complex nature of ASD and its many influences on feeding skills and behavior create the need for modification to both assessment and treatment approaches. Additional research is needed to create therapeutic protocols that can be used by speech-language pathologists to effectively assess and treat feeding and oro motor apraxic difficulties that are commonly encountered in children with ASD.

Keywords: autism, assessment, feeding, intervention, oral sensory issues, oral apraxia

Procedia PDF Downloads 281
5025 Technology for Enhancing the Learning and Teaching Experience in Higher Education

Authors: Sara M. Ismael, Ali H. Al-Badi

Abstract:

The rapid development and growth of technology has changed the method of obtaining information for educators and learners. Technology has created a new world of collaboration and communication among people. Incorporating new technology into the teaching process can enhance learning outcomes. Billions of individuals across the world are now connected together, and are cooperating and contributing their knowledge and intelligence. Time is no longer wasted in waiting until the teacher is ready to share information as learners can go online and get it immediately. The objectives of this paper are to understand the reasons why changes in teaching and learning methods are necessary, to find ways of improving them, and to investigate the challenges that present themselves in the adoption of new ICT tools in higher education institutes. To achieve these objectives two primary research methods were used: questionnaires, which were distributed among students at higher educational institutes and multiple interviews with faculty members (teachers) from different colleges and universities, which were conducted to find out why teaching and learning methodology should change. The findings show that both learners and educators agree that educational technology plays a significant role in enhancing instructors’ teaching style and students’ overall learning experience; however, time constraints, privacy issues, and not being provided with enough up-to-date technology do create some challenges.

Keywords: e-books, educational technology, educators, e-learning, learners, social media, Web 2.0, LMS

Procedia PDF Downloads 244
5024 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 393
5023 The Regulation of Reputational Information in the Sharing Economy

Authors: Emre Bayamlıoğlu

Abstract:

This paper aims to provide an account of the legal and the regulative aspects of the algorithmic reputation systems with a special emphasis on the sharing economy (i.e., Uber, Airbnb, Lyft) business model. The first section starts with an analysis of the legal and commercial nature of the tripartite relationship among the parties, namely, the host platform, individual sharers/service providers and the consumers/users. The section further examines to what extent an algorithmic system of reputational information could serve as an alternative to legal regulation. Shortcomings are explained and analyzed with specific examples from Airbnb Platform which is a pioneering success in the sharing economy. The following section focuses on the issue of governance and control of the reputational information. The section first analyzes the legal consequences of algorithmic filtering systems to detect undesired comments and how a delicate balance could be struck between the competing interests such as freedom of speech, privacy and the integrity of the commercial reputation. The third section deals with the problem of manipulation by users. Indeed many sharing economy businesses employ certain techniques of data mining and natural language processing to verify consistency of the feedback. Software agents referred as "bots" are employed by the users to "produce" fake reputation values. Such automated techniques are deceptive with significant negative effects for undermining the trust upon which the reputational system is built. The third section is devoted to explore the concerns with regard to data mobility, data ownership, and the privacy. Reputational information provided by the consumers in the form of textual comment may be regarded as a writing which is eligible to copyright protection. Algorithmic reputational systems also contain personal data pertaining both the individual entrepreneurs and the consumers. The final section starts with an overview of the notion of reputation as a communitarian and collective form of referential trust and further provides an evaluation of the above legal arguments from the perspective of public interest in the integrity of reputational information. The paper concludes with certain guidelines and design principles for algorithmic reputation systems, to address the above raised legal implications.

Keywords: sharing economy, design principles of algorithmic regulation, reputational systems, personal data protection, privacy

Procedia PDF Downloads 440
5022 Regulation on the Protection of Personal Data Versus Quality Data Assurance in the Healthcare System Case Report

Authors: Elizabeta Krstić Vukelja

Abstract:

Digitization of personal data is a consequence of the development of information and communication technologies that create a new work environment with many advantages and challenges, but also potential threats to privacy and personal data protection. Regulation (EU) 2016/679 of the European Parliament and of the Council is becoming a law and obligation that should address the issues of personal data protection and information security. The existence of the Regulation leads to the conclusion that national legislation in the field of virtual environment, protection of the rights of EU citizens and processing of their personal data is insufficiently effective. In the health system, special emphasis is placed on the processing of special categories of personal data, such as health data. The healthcare industry is recognized as a particularly sensitive area in which a large amount of medical data is processed, the digitization of which enables quick access and quick identification of the health insured. The protection of the individual requires quality IT solutions that guarantee the technical protection of personal categories. However, the real problems are the technical and human nature and the spatial limitations of the application of the Regulation. Some conclusions will be drawn by analyzing the implementation of the basic principles of the Regulation on the example of the Croatian health care system and comparing it with similar activities in other EU member states.

Keywords: regulation, healthcare system, personal dana protection, quality data assurance

Procedia PDF Downloads 4
5021 The Effect of Accounting Quality on Contribution-In-Kind Valuation

Authors: Catherine Heyjung Sonu

Abstract:

This paper examines the effect of accounting quality on the process in which stock price is determined by focusing on contribution-in-kind valuations using Korean setting. In Korea, a number of chaebol firms have transformed into holding company system starting in 2003. With an attempt to gain as much voting right, management sold shares of subsidiaries to purchase shares of the holding company. In so doing, management of these firms received share issues for the contribution in kind that has been made to obtain additional shares of the holding company. The price of these share issues against contribution in kind is allowed to be discounted up to 30%. Using this interesting setting in Korea, this paper examines whether accounting quality affects the extent of the discount applied to the share issues. If the accounting quality of the firm for which the management is receiving share issues is poor, the extent of discount is likely to be high. The extent of discount is likely lower for firms with superior accounting quality. Using 24 cases, we find that, on average, the extent of discount is larger for share issues in which the accounting quality, proxied by the absolute value of discretionary accruals, is poor. This paper provides insight by examining the effect of accounting quality on the stock market. It sheds light on the intersection between finance and accounting research and should be of interest to researchers and practitioners.

Keywords: Accounting quality, Contribution-in-kind, discount, holding company

Procedia PDF Downloads 166
5020 Issues in Implementation of Vertical Greenery System on Existing Government Building in Malaysia

Authors: Jamilah Halina Abdul Halim, Norsiah Hassan, Azlina Aziz, Norhayati Mat Wajid, Mohd Saipul Asrafi

Abstract:

There are various types of vertical greenery system (VGS) in Malaysia, but none is installed at government buildings, although the government is looking into energy efficient building design. This is due to lack of technical information that focus on the maintenance and care, issues, and challenges face by vertical greenery system under tropical climate conditions. This research aim to identify issues in implementation of vertical greenery system on existing government building in Malaysia. The methodology used are literature reviews (desktop study), observation on sites, and case studies. Initial findings indicates that design and maintenance issues of vertical greenery system are the main challenges faced mainly by designer, especially those who involved in decision-making process. It can be concluded that orientation, openings, maintenance, performance, longevity, structural load, access, wind resistance, design failure, system failure, and lack of maintenance foresight are the main factors that need to be considered. These factors should be holistically aligned towards the economic cost, effective time, and quality design in implementation of vertical greenery system on existing government building. A comprehensive implementation of vertical greenery system will lead to greater sustainable investment for government buildings and responsive action to climate change.

Keywords: issues, government building, maintenance, vertical greenery system

Procedia PDF Downloads 58
5019 An Empirical Analysis of Euthanasia Issues in Taiwan

Authors: Wen-Shai Hung

Abstract:

This paper examines the factors influencing euthanasia issues in Taiwan. The data used is from the 2015 Survey Research on Attitudes towards the Death Penalty and Related Values in Taiwan, which focused on knowledge, attitudes towards the death penalty, and the concepts of social, political, and law values. The sample ages are from 21 to 94. The method used is probit modelling for examining the influences on euthanasia issues in Taiwan. The main empirical results find that older people, persons with higher educational attainment, those who favour abolition of the death penalty and do not oppose divorce, abortion, same-sex relationships, and putting down homeless’ cats or dogs are more likely to approve of the use of euthanasia to end their lives. In contrast, Mainlanders, people who support the death penalty and favour long-term prison sentences are less likely to support the use of euthanasia.

Keywords: euthanasia, homosexual, death penalty, and probit model

Procedia PDF Downloads 350
5018 Ads on Social Issues: A Tool for Improving Critical Thinking Skills in a Foreign Language Classroom

Authors: Fonseca Jully, Chia Maribel, Rodríguez Ilba

Abstract:

This paper is a qualitative research report. A group of students form a public university in a small town in Colombia participated in this study which aimed at describing to what extend the use of social ads, published on the internet, helped to develop their critical thinking skills. Students’ productions, field notes, video recordings and direct observation were the instruments and techniques used by the researches in order to gather the data which was analyzed under the principles of grounded theory and triangulation. The implementation of social ads into the classroom evidenced a noticeable improvement in students’ ability to interpret and argue social issues, as well as, their self-improvement in oral and written production in English, as a foreign language.

Keywords: Ads, critical argumentation, critical thinking, social issues

Procedia PDF Downloads 307
5017 Gender and Older People: Reframing Gender Analysis through Lifecycle Lens

Authors: Supriya Akerkar

Abstract:

The UN Decade on Healthy Ageing (2021-2030) provides a new opportunity to address ageing and gender issues in different societies. The concept of gender has been used to unpack and analyse the power and constructions of gender relations in different societies. Such analysis has been employed and used to inform policy and practices of governments and non-governmental organisations to further gender equalities in their work. Yet, experiences of older women and men are often left out of such mainstream gender analysis, marginalising their existence and issues. This paper argues that new critical analytical tools are needed to capture the realities and issues of interest to older women and men. In particular, it argues that gender analysis needs to integrate analytical concepts of ageing and lifecycle approach in its framework. The paper develops such a framework by critical interrogation of the gender analysis tools that are currently applied for framing gender issues in international development and humanitarian work. Informed by the realities and experiences of older women and men, developed through a synthesis of available literature, the paper will develop a new framework for gender analysis that can be used by governments and non-government organisations in their work to further gender justice across the life cycle.

Keywords: ageing, gender, older people, social inclusion

Procedia PDF Downloads 203
5016 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 72
5015 Mechanism to Optimize Landing Distance in Order to Minimize Tyre Wear during Braking

Authors: H. V. H. De Soysa, N. D. Hiripitiya, H. S. U. Thrimavithana, B. R. Epitawala, K. A. D. D. Kuruppu, D. J. K. Lokupathirage

Abstract:

This research was based on developing a mechanism in order to optimize the landing distance. Short distance braking and long distance braking may cause several issues for the aircraft including tyre wearing. The worst case occurs with short distance landing. The issues related to short distance landing were identified after conducting interviews with pilots, aeronautical engineers and technicians. A model was constructed in order to optimize the landing distance. The device started to function at the point where the main wheels of the aircraft touchdown the runway. It was found that implementing this device to the aircraft benefits to optimize the landing distance. This could lead to rectifying several issues occurred due to improper braking distances.

Keywords: aircraft, mechanism, optimize landing distance, runway

Procedia PDF Downloads 288
5014 Harnessing the Power of Artificial Intelligence: Advancements and Ethical Considerations in Psychological and Behavioral Sciences

Authors: Nayer Mofidtabatabaei

Abstract:

Advancements in artificial intelligence (AI) have transformed various fields, including psychology and behavioral sciences. This paper explores the diverse ways in which AI is applied to enhance research, diagnosis, therapy, and understanding of human behavior and mental health. We discuss the potential benefits and challenges associated with AI in these fields, emphasizing the ethical considerations and the need for collaboration between AI researchers and psychological and behavioral science experts. Artificial Intelligence (AI) has gained prominence in recent years, revolutionizing multiple industries, including healthcare, finance, and entertainment. One area where AI holds significant promise is the field of psychology and behavioral sciences. AI applications in this domain range from improving the accuracy of diagnosis and treatment to understanding complex human behavior patterns. This paper aims to provide an overview of the various AI applications in psychological and behavioral sciences, highlighting their potential impact, challenges, and ethical considerations. Mental Health Diagnosis AI-driven tools, such as natural language processing and sentiment analysis, can analyze large datasets of text and speech to detect signs of mental health issues. For example, chatbots and virtual therapists can provide initial assessments and support to individuals suffering from anxiety or depression. Autism Spectrum Disorder (ASD) Diagnosis AI algorithms can assist in early ASD diagnosis by analyzing video and audio recordings of children's behavior. These tools help identify subtle behavioral markers, enabling earlier intervention and treatment. Personalized Therapy AI-based therapy platforms use personalized algorithms to adapt therapeutic interventions based on an individual's progress and needs. These platforms can provide continuous support and resources for patients, making therapy more accessible and effective. Virtual Reality Therapy Virtual reality (VR) combined with AI can create immersive therapeutic environments for treating phobias, PTSD, and social anxiety. AI algorithms can adapt VR scenarios in real-time to suit the patient's progress and comfort level. Data Analysis AI aids researchers in processing vast amounts of data, including survey responses, brain imaging, and genetic information. Privacy Concerns Collecting and analyzing personal data for AI applications in psychology and behavioral sciences raise significant privacy concerns. Researchers must ensure the ethical use and protection of sensitive information. Bias and Fairness AI algorithms can inherit biases present in training data, potentially leading to biased assessments or recommendations. Efforts to mitigate bias and ensure fairness in AI applications are crucial. Transparency and Accountability AI-driven decisions in psychology and behavioral sciences should be transparent and subject to accountability. Patients and practitioners should understand how AI algorithms operate and make decisions. AI applications in psychological and behavioral sciences have the potential to transform the field by enhancing diagnosis, therapy, and research. However, these advancements come with ethical challenges that require careful consideration. Collaboration between AI researchers and psychological and behavioral science experts is essential to harness AI's full potential while upholding ethical standards and privacy protections. The future of AI in psychology and behavioral sciences holds great promise, but it must be navigated with caution and responsibility.

Keywords: artificial intelligence, psychological sciences, behavioral sciences, diagnosis and therapy, ethical considerations

Procedia PDF Downloads 37
5013 Association of Southeast Asian Nations Caught in between International and Regional Human Rights Frameworks: The Myanmar Rohingya Crisis

Authors: Lynamata Chhun

Abstract:

Human Rights enforcement in the newly independent countries like Asian and African has always been penetrating issues. In spite, the existing of the Universal Declaration of Human Rights (UDHR), regions like Africa and Asia where values and cultural norms far differ from the concept had formed their own Human Rights instruments to tackle Human Rights issues in their regions instead of embracing the concept of UDHR completely. ASEAN Human Rights Declaration is one of the examples. This paper aims to examine the enforcement of Human Rights in South East Asia in the context of ASEAN regional integration. Precisely, the author attempts to analyse the effectiveness in undertaking Human Rights issues in the region by applying both the existing international and regional frameworks using the Myanmar Rohingya Crisis as the case study. The methodology of the paper is qualitative analysis where cross-impact analysis is employed to examine the case study. It is anticipated that the main findings of this paper will illuminate how applicable the international instruments are in comparison to the regional instruments in apprehending the human rights issues and will shed light on how ASEAN and dialogue partners should cooperate in the future regarding with the challenging issues of Human Rights in the region.

Keywords: ASEAN Human Rights Declaration, ASEAN integration, ASEAN way, international and regional instruments, Universal Declaration of Human Rights

Procedia PDF Downloads 215
5012 Behavior of Engineering Students in Kuwait University

Authors: Mohammed A. Al-Ajmi, Reem S. Al-Kandari

Abstract:

This study is concerned with the behavior of engineering students in Kuwait University which became a concern due to the global issues of education in all levels. A survey has been conducted to identify academic and societal issues that affect the engineering student performance through. The study is drawing major conclusions with regard to private tutoring and the online availability of textbooks’ solution manuals.

Keywords: solution manual, engineering, textbook, ethics

Procedia PDF Downloads 465
5011 Usability Issues of Smart Phone Applications: For Visually Challenged People

Authors: Anam Ashraf, Arif Raza

Abstract:

In this era of globalization, adoption of technology is quite difficult for people with physical disabilities compared to people with normal abilities. The advancement in mobile based accessible applications has opened up several different avenues for the visually challenged across the globe. Smartphones applications are not very common for blind people, but they access and use these applications in their daily lives to some extent. Several smartphone applications have a number of usability issues for the visually impaired. In this paper, we evaluate the usability of various android and iPhone applications for blind people through analysis and surveys. This paper aspires to provide guidance in order to increase smartphone application accessibility for the visually impaired. An abstract application design is also proposed to overcome usability issues in smartphone applications for visually challenged people.

Keywords: eyes-free shell, human computer interaction, usability engineering, visually challenged

Procedia PDF Downloads 333
5010 Social Media Resignation the Only Way to Protect User Data and Restore Cognitive Balance, a Literature Review

Authors: Rajarshi Motilal

Abstract:

The birth of the Internet and the rise of social media marked an important chapter in the history of humankind. Often termed the fourth scientific revolution, the Internet has changed human lives and cognisance. The birth of Web 2.0, followed by the launch of social media and social networking sites, added another milestone to these technological advancements where connectivity and influx of information became dominant. With billions of individuals using the internet and social media sites in the 21st century, “users” became “consumers”, and orthodox marketing reshaped itself to digital marketing. Furthermore, organisations started using sophisticated algorithms to predict consumer purchase behaviour and manipulate it to sustain themselves in such a competitive environment. The rampant storage and analysis of individual data became the new normal, raising many questions about data privacy. The excessive usage of the Internet among individuals brought in other problems of them becoming addicted to it, scavenging for societal approval and instant gratification, subsequently leading to a collective dualism, isolation, and finally, depression. This study aims to determine the relationship between social media usage in the modern age and the rise of psychological and cognitive imbalances in human minds. The literature review is positioned timely as an addition to the existing work at a time when the world is constantly debating on whether social media resignation is the only way to protect user data and restore the decaying cognitive balance.

Keywords: social media, digital marketing, consumer behaviour, internet addiction, data privacy

Procedia PDF Downloads 47
5009 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 314
5008 A Medical Vulnerability Scoring System Incorporating Health and Data Sensitivity Metrics

Authors: Nadir A. Carreon, Christa Sonderer, Aakarsh Rao, Roman Lysecky

Abstract:

With the advent of complex software and increased connectivity, the security of life-critical medical devices is becoming an increasing concern, particularly with their direct impact on human safety. Security is essential, but it is impossible to develop completely secure and impenetrable systems at design time. Therefore, it is important to assess the potential impact on the security and safety of exploiting a vulnerability in such critical medical systems. The common vulnerability scoring system (CVSS) calculates the severity of exploitable vulnerabilities. However, for medical devices it does not consider the unique challenges of impacts to human health and privacy. Thus, the scoring of a medical device on which human life depends (e.g., pacemakers, insulin pumps) can score very low, while a system on which human life does not depend (e.g., hospital archiving systems) might score very high. In this paper, we propose a medical vulnerability scoring system (MVSS) that extends CVSS to address the health and privacy concerns of medical devices. We propose incorporating two new parameters, namely health impact, and sensitivity impact. Sensitivity refers to the type of information that can be stolen from the device, and health represents the impact on the safety of the patient if the vulnerability is exploited (e.g., potential harm, life-threatening). We evaluate fifteen different known vulnerabilities in medical devices and compare MVSS against two state-of-the-art medical device-oriented vulnerability scoring systems and the foundational CVSS.

Keywords: common vulnerability system, medical devices, medical device security, vulnerabilities

Procedia PDF Downloads 128
5007 A Qualitative Approach to Engineering Design Issues, Problems, and Solutions

Authors: M. U. Arshid, M. A. Kamal

Abstract:

The engineering design process is the activities formulation, to help an engineer raising a plan with a specified goal and performance. The engineering design process is a multi-stage course of action including the conceptualization, research, feasibility studies, establishment of design parameters, preliminary and finally the detailed design. It is a progression from the abstract to the concrete; starting with probably abstract ideas about need, and thereafter elaborating detailed specifications of the object that would satisfy the needs, identified. Engineering design issues, problems, and solutions are discussed in this paper using qualitative approach from an information structure perspective. The objective is to identify the problems, to analyze them and propose solutions by integrating; innovation, practical experience, time and resource management, communications skills, isolating the problem in coordination with all stakeholders. Consequently, this would be beneficial for the engineering community to improve the Engineering design practices.

Keywords: engineering design, engineering design issues, innovation, public sector projects

Procedia PDF Downloads 313
5006 Management Strategies for Risk Events in Construction Industries during Economic Situation and COVID-19 Pandemic in Nigeria

Authors: Ezeabasili Chibuike Patrick

Abstract:

The complex situation of construction industries in Nigeria and the risk of failures involved includes cost overrun, time overrun, Corruption, Government influence, Subcontractor challenges, Political influence and Instability, Cultural differences, Human resources deficiencies, cash flow Challenges, foreign exchange issues, inadequate design, Safety, low productivity, late payment, Quality control issues, project management issues, Environmental issues, Force majeure Competition amongst others has made the industry prone to risk and failures. Good project management remains effective in improving decision-making, which minimizes these risk events. This study was done to address these project risks and good decision-making to avert them. A mixed-method approach to research was used to do this study. Data collected by questionnaires and interviews on thirty-two (32) construction professionals was used in analyses to aid the knowledge and management of risks that were identified. The study revealed that there is no good risk management expertise in Nigeria. Also, that the economic/political situation and the recent COVID-19 pandemic has added to the risk and poor management strategies. The contingency theory and cost has therefore surfaced to be the most strategic management method used to reduce these risk issues and they seem to be very effective.

Keywords: strategies, risk management, contingency theory, Nigeria

Procedia PDF Downloads 96
5005 Social Responsibility and Environmental Issues Addressed by Businesses in Romania

Authors: Daniela Gradinaru, Iuliana Georgescu, Loredana Hutanu (Toma), Mihai-Bogdan Afrasinei

Abstract:

This article aims to analyze the situation of Romanian companies from an environmental point of view. Environmental issues are addressed very often nowadays, and they reach and affect every domain, including the economical one. Implementing an environmental management system will not only help the companies to comply with laws and regulations, but, above all, will offer them an important competitive advantage.

Keywords: environmental management system, environmental reporting, environmental expenses, sustainable development

Procedia PDF Downloads 381
5004 Design and Analysis of Highly Efficient and Reliable Single-Phase Transformerless Inverter for PV Systems

Authors: L. Ashok Kumar, N. Sujith Kumar

Abstract:

Most of the PV systems are designed with transformer for safety purpose with galvanic isolation. However, the transformer is big, heavy and expensive. Also, it reduces the overall frequency of the conversion stage. Generally PV inverter with transformer is having efficiency around 92%–94% only. To overcome these problems, transformerless PV system is introduced. It is smaller, lighter, cheaper and higher in efficiency. However, dangerous leakage current will flow between PV array and the grid due to the stray capacitance. There are different types of configurations available for transformerless inverters like H5, H6, HERIC, oH5, and Dual paralleled buck inverter. But each configuration is suffering from its own disadvantages like high conduction losses, shoot-through issues of switches, dead-time requirements at zero crossing instants of grid voltage to avoid grid shoot-through faults and MOSFET reverse recovery issues. The main objective of the proposed transformerless inverter is to address two key issues: One key issue for a transformerless inverter is that it is necessary to achieve high efficiency compared to other existing inverter topologies. Another key issue is that the inverter configuration should not have any shoot-through issues for higher reliability.

Keywords: grid-connected, photovoltaic (PV) systems, transformerless inverter, stray capacitance, common-mode, leakage current, pulse width modulation (PWM)

Procedia PDF Downloads 470
5003 Artificial Intelligence in Vietnamese Higher Education: Benefits, Challenges and Ethics

Authors: Duong Van Thanh

Abstract:

Artificial Intelligence (AI) has been recently a new trend in Higher Education systems globally as well as in the Vietnamese Higher Education. This study explores the benefits and challenges in applications of AI in 02 selected universities, ie. Vietnam National Universities in Hanoi Capital and the University of Economics in Ho Chi Minh City. Particularly, this paper focuses on how the ethics of Artificial Intelligence have been addressed among faculty members at these two universities. The AI ethical issues include the access and inclusion, privacy and security, transparency and accountability. AI-powered educational technology has the potential to improve access and inclusion for students with disabilities or other learning needs. However, there is a risk that AI-based systems may not be accessible to all students and may even exacerbate existing inequalities. AI applications can be opaque and difficult to understand, making it challenging to hold them accountable for their decisions and actions. It is important to consider the benefits that adopting AI-systems bring to the institutions, teaching, and learning. And it is equally important to recognize the drawbacks of using AI in education and to take the necessary steps to mitigate any negative impact. The results of this study present a critical concern in higher education in Vietnam, where AI systems may be used to make important decisions about students’ learning and academic progress. The authors of this study attempt to make some recommendation that the AI-system in higher education system is frequently checked by a human in charge to verify that everything is working as it should or if the system needs some retraining or adjustments.

Keywords: artificial intelligence, ethics, challenges, vietnam

Procedia PDF Downloads 78
5002 Opinions of Individuals from Different Age and Income Brackets on the Duterte Administration's Overall Performance

Authors: Jose Carlos Montemayor, Kendrick Thomas Angelo Santos

Abstract:

Filipinos have been divided on President Rodrigo Duterte’s leadership ever since his election in 2016. This study aimed to gain a thorough, in-depth understanding of the opinions of Filipinos from different age and income brackets on these issues in order to address the lack of studies analysing the current Philippine political landscape. An interview tackling relevant national issues were conducted with twelve respondents from the intersections of four age groups and three income brackets. The government’s handling of some issues received mixed opinions, some had neutral viewpoints, while others had more unfavorable ones. The responses differed on three levels: (1) the general stance on an issue; (2) the strength of a stance; and (3) the factoring in of an issue in forming an overall perception on the administration’s performance. Contrary to previous studies on political thought, opinions varied greatly such that no unique set of viewpoints could be attributed to any of the defined age or income groups. These results will be most useful to political science researchers, political analysts, and candidates shaping their platforms for the upcoming elections. Future studies are recommended to tackle more national issues and to consider other factors that may affect political opinions and behavior.

Keywords: age groups, opinion formation, socioeconomic brackets, Philippine politics, Rodrigo Duterte

Procedia PDF Downloads 98
5001 The Implications of Population Dynamics on the Environmental Issues: A Case behind Global Change in Climate

Authors: Simiso Fisokuhle Nyandeni

Abstract:

The environment is one of the major components of intergenerational equity under sustainability; however, this component has been facing a lot of issues/crises, which include those that are caused by natural systems due to the actions of humans. Although some of those environmental issues may occur from natural causes, however, climate change effects have shown to increase rapidly due to human behavior, which led to the increase in greenhouse emissions and the over-exploitation of natural resources that maintain an ecological balance in our environment. Based on the recent projections, the growing population tends to outstrip the environmental resources, and as a result, the rapid depletion of natural resources that maintain ecological balance within the environment has resulted in such environmental issues. This paper has adopted desktop analysis to address the main objective, which seeks to address the effects of population dynamics on environmental issues and what needs to be done to maintain the ecological balance between the growing population and the limited resources that are available; thus, the collective data sources were used to justify the literature in order to get adequate results to influence the potential findings. The major findings postulate that there is an ecological imbalance between limited resources available and the growing population; as a result, the environment is taking action against humanity through climate change impacts. Hence findings further outline that in order to prevent such impacts, there should be drastic interventions by the governments (all stakeholders should be involved in decision-making; Governmental or non-governmental institutions, scientists, researchers, etc.) around the world to maintain this ecological balance and also to prioritize the adaptation measures. Therefore, this paper seeks to examine the implications of population dynamics on the environmental issues and what needs to be done in order to maintain this ecological balance between the growing population and environmental resources; hence, this review will be based on the climate change context.

Keywords: population dynamics, climate change, environment, sustainability

Procedia PDF Downloads 82
5000 Media Representation of China: A Content Analysis of Coverage of China-Related Energy in the New York Times

Authors: Lian Liu

Abstract:

By analyzing the content of the New York Times' China-related energy reports, this study aims to explore the construction of China's national image by the mainstream media in the United States. The study analyzes three aspects of the coverage: topics, reporting tendencies, and countries involved. The results of the study show that economic issues are the main focus of the New York Times’ China-related energy coverage, followed by political issues and environmental issues. Overall, the coverage tendency was mainly negative, but positive coverage was dominated by science and technology issues. In addition, the study found that U.S.-China relations and Sino-Russian relations were important contexts for the construction of China's national image in the NYT's China-related energy coverage. These stories highlight China's interstate interactions with the United States, Japan, and Russia, which serve as important links in the coverage. The findings of this study reveal some characteristics and trends of the U.S. mainstream media's country image of China, which are important for a deeper understanding of the U.S.-China relationship and the media's influence on the construction of the country's image.

Keywords: media coverage, China, content analysis, visualization technology

Procedia PDF Downloads 40
4999 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 272
4998 Artificial Intelligence as a Policy Response to Teaching and Learning Issues in Education in Ghana

Authors: Joshua Osondu

Abstract:

This research explores how Artificial Intelligence (AI) can be utilized as a policy response to address teaching and learning (TL) issues in education in Ghana. The dual (AI and human) instructor model is used as a theoretical framework to examine how AI can be employed to improve teaching and learning processes and to equip learners with the necessary skills in the emerging AI society. A qualitative research design was employed to assess the impact of AI on various TL issues, such as teacher workloads, a lack of qualified educators, low academic performance, unequal access to education and educational resources, a lack of participation in learning, and poor access and participation based on gender, place of origin, and disability. The study concludes that AI can be an effective policy response to TL issues in Ghana, as it has the potential to increase students’ participation in learning, increase access to quality education, reduce teacher workloads, and provide more personalized instruction. The findings of this study are significant for filling in the gaps in AI research in Ghana and other developing countries and for motivating the government and educational institutions to implement AI in TL, as this would ensure quality, access, and participation in education and help Ghana industrialize.

Keywords: artificial intelligence, teacher, learner, students, policy response

Procedia PDF Downloads 47
4997 Issues of Time's Urgency and Ritual in Children's Picture Books: A Closer Look at the Contributions of Grandparents

Authors: Karen Armstrong

Abstract:

Although invisible and fleeting, time is an essential variable in perception. Ritual is proposed as an antithesis to the passage of time, a way of linking our narratives with the past, present and future. This qualitative exploration examines a variety of award winning twentieth-century children’s picture books, specifically regarding the issues of time’s urgency and ritual with respect to children and grandparents. The paper will begin with a consideration of issues of time from the area of psychology, with regard to age, specifically contrasting later age and childhood. Next the value of ritual as represented by the presence of grandparents in children’s books. Specific instances of the contributions of grandparents or older adults with regard to this balancing function between time’s urgency and ritual will be discussed. Recommendations for future research include a consideration of grandparents’ or older characters’ depictions in books for older children.

Keywords: children's picture books, grandparents, ritual, time

Procedia PDF Downloads 277