Search results for: privacy measures
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3229

Search results for: privacy measures

3079 Board Regulation and Its Impact on Composition and Effects: Evidence from German Cooperative Banks

Authors: Markus Stralla

Abstract:

This study employs a GMM framework to examine the impact of potential regulatory intervention regarding the occupations of supervisory board members in cooperative banking. To achieve insights, the study proceeds in two different ways. First, it investigates the changes in board structure prior and following to the German Act to Strengthen Financial Market and Insurance Supervision (FinVAG). Second, the study estimates the influence of Ph.D.Share, professional concentration and supervisory power on bank-risk changes in consideration of the implementation of FinVAG. Therefore, the study is based on a sample of 246 German cooperative banks from 2006-2011 while applying four different measures of bank risk, namely credit-, equity-, liquidity-risk, and Z-Score, with the former three also being addressed in FinVAG. Results indicate that the implementation of FinVAG results in (most likely unintentional) structural changes, especially at the expense of farmers, and affects all risk measures and relations between risk measures and supervisory board characteristics in a risk-reducing and therefore intended way. To disentangle the complex relationship between board characteristics and risk measures, the study utilizes two-step system GMM estimator to account for unobserved heterogeneity and simultaneity in order to reduce endogeneity problems. The findings may be especially relevant for stakeholders, regulators, supervisors and managers.

Keywords: bank governance, bank risk-taking, board of directors, regulation

Procedia PDF Downloads 409
3078 Cloud Monitoring and Performance Optimization Ensuring High Availability

Authors: Inayat Ur Rehman, Georgia Sakellari

Abstract:

Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.

Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy

Procedia PDF Downloads 28
3077 Effective Infection Control Measures to Prevent Transmission of Multi-Drug Resistant Organisms from Burn Transfer Cases in a Regional Burn Centre

Authors: Si Jack Chong, Chew Theng Yap, Wan Loong James Mok

Abstract:

Introduction: Regional burn centres face the spectra of introduced multi-drug resistant organisms (MDRO) from transfer patients resident in MDRO endemic countries. MDRO can cause severe nosocomial infection, which in massive burn patients, will lead to greater morbidity and mortality and strain the institution financially. We aim to highlight 4 key measures that have effectively prevented transmission of imported MDRO. Methods: A case of Candida auris (C. auris) from a massive burn patient transferred from an MDRO endemic country is used to illustrate the measures. C. auris is a globally emerging multi-drug resistant fungal pathogen causing nosocomial transmission. Results: Infection control measures used to mitigate the risk of outbreak from transfer cases are: (1) Multidisciplinary team approach involving Infection Control and Infectious Disease specialists early to ensure appropriate antibiotics use and implementation of barrier measures, (2) aseptic procedures for dressing change with strict isolation and donning of personal protective equipment in the ward, (3) early screening of massive burn patient from MDRO endemic region, (4) hydrogen peroxide vaporization terminal cleaning for operating theatres and rooms. Conclusion: The prevalence of air travel and international transfer to regional burn centres will need effective infection control measures to reduce the risk of transmission from imported massive burn patients. In our centre, we have effectively implemented 4 measures which have reduced the risks of local contamination. We share a recent case report to illustrate successful management of a potential MDRO outbreak resulting from transfer of massive burn patient resident in an MDRO endemic area.

Keywords: burns, burn unit, cross infection, infection control

Procedia PDF Downloads 123
3076 A Comparative and Doctrinal Analysis towards the Investigation of a Right to Be Forgotten in Hong Kong

Authors: Jojo Y. C. Mo

Abstract:

Memories are good. They remind us of people, places and experiences that we cherish. But memories cannot be changed and there may well be memories that we do not want to remember. This is particularly true in relation to information which causes us embarrassment and humiliation or simply because it is private – we all want to erase or delete such information. This desire to delete is recently recognised by the Court of Justice of the European Union in the 2014 case of Google Spain SL, Google Inc. v Agencia Española de Protección de Datos, Mario Costeja González in which the court ordered Google to remove links to some information about the complainant which he wished to be removed. This so-called ‘right to be forgotten’ received serious attention and significantly, the European Council and the European Parliament enacted the General Data Protection Regulation (GDPR) to provide a more structured and normative framework for implementation of right to be forgotten across the EU. This development in data protection laws will, undoubtedly, have significant impact on companies and co-operations not just within the EU but outside as well. Hong Kong, being one of the world’s leading financial and commercial center as well as one of the first jurisdictions in Asia to implement a comprehensive piece of data protection legislation, is therefore a jurisdiction that is worth looking into. This article/project aims to investigate the following: a) whether there is a right to be forgotten under the existing Hong Kong data protection legislation b) if not, whether such a provision is necessary and why. This article utilises a comparative methodology based on a study of primary and secondary resources, including scholarly articles, government and law commission reports and working papers and relevant international treaties, constitutional documents, case law and legislation. The author will primarily engage literature and case-law review as well as comparative and doctrinal analyses. The completion of this article will provide privacy researchers with more concrete principles and data to conduct further research on privacy and data protection in Hong Kong and internationally and will provide a basis for policy makers in assessing the rationale and need for a right to be forgotten in Hong Kong.

Keywords: privacy, right to be forgotten, data protection, Hong Kong

Procedia PDF Downloads 160
3075 Ethics Can Enable Open Source Data Research

Authors: Dragana Calic

Abstract:

The openness, availability and the sheer volume of big data have provided, what some regard as, an invaluable and rich dataset. Researchers, businesses, advertising agencies, medical institutions, to name only a few, collect, share, and analyze this data to enable their processes and decision making. However, there are important ethical considerations associated with the use of big data. The rapidly evolving nature of online technologies has overtaken the many legislative, privacy, and ethical frameworks and principles that exist. For example, should we obtain consent to use people’s online data, and under what circumstances can privacy considerations be overridden? Current guidance on how to appropriately and ethically handle big data is inconsistent. Consequently, this paper focuses on two quite distinct but related ethical considerations that are at the core of the use of big data for research purposes. They include empowering the producers of data and empowering researchers who want to study big data. The first consideration focuses on informed consent which is at the core of empowering producers of data. In this paper, we discuss some of the complexities associated with informed consent and consider studies of producers’ perceptions to inform research ethics guidelines and practice. The second consideration focuses on the researcher. Similarly, we explore studies that focus on researchers’ perceptions and experiences.

Keywords: big data, ethics, producers’ perceptions, researchers’ perceptions

Procedia PDF Downloads 262
3074 Work-Related Risk Factors and Preventive Measures among Nurses and Dentists at Faculty of Oral and Dental Medicine

Authors: Marwa Mamdouh Shaban, Nagat Saied Habib, Shireen Ezz El-Din Taha, Eman Mahmoud Seif El-Naser

Abstract:

Background: Dental nurses and dentists were constantly exposed to a number of specific work related health risk factors which develop and intensify with years. Awareness regarding these work-related health risk factors and implementation of preventive health care measures could provide a safe work environment for all dental nurses and dentists. Aim of the study: to assess the work-related health risk factors among dental nurses and dentists and preventive health care measures applied among dental nurses and dentists. Research design: A descriptive design was utilized. Sample: Convenience sample of 50 dental nurses and 150 dentists were included in the current study. Setting: This study was conducted at the dental clinics at faculty of oral and dental medicine, Al-Kasr Al Ainy Hospital. Tools of data collection: Three tools were developed, tested for clarity, and feasibility: a-Socio-demographic data sheet, b-Work-related health risk factors questionnaire, and c-structured observational checklist. Results: The most common work risk factors prevailing among dental nurses were emotional exhaustion (82%), low back pain (76%) and latex allergy (62%) and the most common work risk factors prevailing among dentists were percutaneous exposure incident (100%), emotional exhaustion (100%) and low back pain (93.3%). Also, statistically significant negative correlation (r=-0.274, at p = 0.045) between the incidence of chemical health risk factors and application of chemical preventive measures among dental nurses. A statistically significant negative correlation (r=-0.177, at p = 0.030) between the incidences of mechanical health risk factors among dentists and application of mechanical preventive measures. Conclusion: The studied dental nurses and dentists exposed to many work related health risk factors as latex allergy, percutaneous exposure incidents, low back pain and emotional exhaustion related to inappropriate application of preventive health care measures. Recommendation: Raise awareness of dental nurses and dentists about work-related health risk factors, design and implement health education program for preventive health care measures.

Keywords: work-related risk factors, preventive measures, nurses, dentists

Procedia PDF Downloads 371
3073 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives

Authors: Nawt Almutairi, Ramzi El-Haddadeh

Abstract:

With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.

Keywords: e-service, satisfaction, trust, loyalty

Procedia PDF Downloads 225
3072 Self-Disclosure of Location: Influences of Personality Traits, Intrinsic Motivations and Extrinsic Motivations

Authors: Chechen Liao, Sheng Yi Lin

Abstract:

With the popularity of smartphone usage and the flourish of social networks, many people began to use the 'check-in' functions to share their location information and days of live and self-disclosure. In order to increase exposure and awareness, some stores provide discounts and other benefits to attract consumers to 'check-in' in their stores. The purpose of this study was to investigate whether personality traits, intrinsic motivations, extrinsic motivations, and privacy concerns would affect self-disclosure of location for consumers. Research data were collected from 407 individuals that have used Facebook check-in in Taiwan. This study used SmartPLS 2.0 structural equation modeling to validate the model. The results show that information sharing, information storage, enjoyment, self-presentation, get a feedback, economic reward, and keep up with trends had significant positive effects on self-disclosure. While extroversion and openness to use have significant positive effects on self-disclosure, conscientiousness and privacy concerns have significant negative effects on self-disclosure. The results of the study provide academic and practical implications for the future growth of location-based self-disclosure.

Keywords: check-in, extrinsic motivation, intrinsic motivation, personality trait, self-disclosure

Procedia PDF Downloads 145
3071 Internet Health: A Cross-Sectional Survey Exploring Identified Risks and Online Safety Measures in Parent and Children with Neurodevelopmental Disorders

Authors: Abdirahim Mohamed, Sarita Rana Chhetri, Michael Sleath, Nadia Saleem

Abstract:

Rationale: Internet usage has been very much integrated into our daily lives. Internet usage within a neurodevelopmental disorder population is also on the increase. Nevertheless, there is very little empirical research on how this population virtually protect themselves; along with how their parents can keep them safe online. This topic was an ever-growing concern to the parents within our services and in many cases would add to the stresses and mental health of parents. This ignited an idea within our team to conduct research to explore the perceived online risks within this population and how they keep themselves safe. In conjunction, we also explored how parents and caregivers monitor and safeguard their young people to the potential threats online. Our hypothesis was that the perceived risks will heavily outnumber the safeguarding measures implemented by this population. Method: Within the Coventry and Warwickshire NHS Partnership Trust Child and Adolescent Mental Health Service (CAMHS), we distributed qualitative questionnaires to all the clinical bases (N=80). Questions explored topics such as daily internet usage, safeguarding measures, and perceived threats. The researchers requested for all CAMHS clinicians to identify participants. Participants in this study were accessing CAMHS for neurodevelopmental specific interventions. Results: The data were analysed using both Excel and SPSS. Within SPSS, a MANOVA was conducted and found a significant difference between safeguarding measures and perceived online risks within responses (p ≤ 0.5). This supports our hypothesis that participants in this population are well versed in the safeguarding issues of the internet; however, struggle to implement appropriate preventative measures. Data were also screened using Excel and found that all parents and carers stated they 'monitored their child’s internet use'. Conclusion: Data suggest that parents/carers may require more specific intervention to equip them with preventative measures due to the clear discrepancy between perceived risks and safeguarding measures. More research may also need to be conducted around this area to determine appropriate methodology to explore this topic further.

Keywords: Internet, health , how safe are we , internet health check

Procedia PDF Downloads 232
3070 Practices of Waterwise Circular Economy in Water Protection: A Case Study on Pyhäjärvi, SW Finland

Authors: Jari Koskiaho, Teija Kirkkala, Jani Salminen, Sarianne Tikkanen, Sirkka Tattari

Abstract:

Here, phosphorus (P) loading to the lake Pyhäjärvi (SW Finland) was reviewed, load reduction targets were determined, and different measures of waterwise circular economy to reach the targets were evaluated. In addition to the P loading from the lake’s catchment, there is a significant amount of internal P loading occurring in the lake. There are no point source emissions into the lake. Thus, the most important source of external nutrient loading is agriculture. According to the simulations made with LLR-model, the chemical state of the lake is at the border of the classes ‘Satisfactory’ and ‘Good’. The LLR simulations suggest that a reduction of some hundreds of kilograms in annual P loading would be needed to reach an unquestionably ‘Good’ state. Evaluation of the measures of the waterwise circular economy suggested that they possess great potential in reaching the target P load reduction. If they were applied extensively and in a versatile, targeted manner in the catchment, their combined effect would reach the target reduction. In terms of cost-effectiveness, the waterwise measures were ranked as follows: The best: Fishing, 2nd best: Recycling of vegetation of reed beds, wetlands and buffer zones, 3rd best: Recycling field drainage waters stored in wetlands and ponds for irrigation, 4th best: Controlled drainage and irrigation, and 5th best: Recycling of the sediments of wetlands and ponds for soil enrichment. We also identified various waterwise nutrient recycling measures to decrease the P content of arable land. The cost-effectiveness of such measures may be very good. Solutions are needed to Finnish water protection in general, and particularly for regions like lake Pyhäjärvi catchment with intensive domestic animal production, of which the ‘P-hotspots’ are a crucial issue.

Keywords: circular economy, lake protection, mitigation measures, phosphorus

Procedia PDF Downloads 84
3069 Measure-Valued Solutions to a Class of Nonlinear Parabolic Equations with Degenerate Coercivity and Singular Initial Data

Authors: Flavia Smarrazzo

Abstract:

Initial-boundary value problems for nonlinear parabolic equations having a Radon measure as initial data have been widely investigated, looking for solutions which for positive times take values in some function space. On the other hand, if the diffusivity degenerates too fast at infinity, it is well known that function-valued solutions may not exist, singularities may persist, and it looks very natural to consider solutions which, roughly speaking, for positive times describe an orbit in the space of the finite Radon measures. In this general framework, our purpose is to introduce a concept of measure-valued solution which is consistent with respect to regularizing and smoothing approximations, in order to develop an existence theory which does not depend neither on the level of degeneracy of diffusivity at infinity nor on the choice of the initial measures. In more detail, we prove existence of suitably defined measure-valued solutions to the homogeneous Dirichlet initial-boundary value problem for a class of nonlinear parabolic equations without strong coerciveness. Moreover, we also discuss some qualitative properties of the constructed solutions concerning the evolution of their singular part, including conditions (depending both on the initial data and on the strength of degeneracy) under which the constructed solutions are in fact unction-valued or not.

Keywords: degenerate parabolic equations, measure-valued solutions, Radon measures, young measures

Procedia PDF Downloads 258
3068 A Selection Approach: Discriminative Model for Nominal Attributes-Based Distance Measures

Authors: Fang Gong

Abstract:

Distance measures are an indispensable part of many instance-based learning (IBL) and machine learning (ML) algorithms. The value difference metrics (VDM) and inverted specific-class distance measure (ISCDM) are among the top-performing distance measures that address nominal attributes. VDM performs well in some domains owing to its simplicity and poorly in others that exist missing value and non-class attribute noise. ISCDM, however, typically works better than VDM on such domains. To maximize their advantages and avoid disadvantages, in this paper, a selection approach: a discriminative model for nominal attributes-based distance measures is proposed. More concretely, VDM and ISCDM are built independently on a training dataset at the training stage, and the most credible one is recorded for each training instance. At the test stage, its nearest neighbor for each test instance is primarily found by any of VDM and ISCDM and then chooses the most reliable model of its nearest neighbor to predict its class label. It is simply denoted as a discriminative distance measure (DDM). Experiments are conducted on the 34 University of California at Irvine (UCI) machine learning repository datasets, and it shows DDM retains the interpretability and simplicity of VDM and ISCDM but significantly outperforms the original VDM and ISCDM and other state-of-the-art competitors in terms of accuracy.

Keywords: distance measure, discriminative model, nominal attributes, nearest neighbor

Procedia PDF Downloads 86
3067 Implementation of Statistical Parameters to Form an Entropic Mathematical Models

Authors: Gurcharan Singh Buttar

Abstract:

It has been discovered that although these two areas, statistics, and information theory, are independent in their nature, they can be combined to create applications in multidisciplinary mathematics. This is due to the fact that where in the field of statistics, statistical parameters (measures) play an essential role in reference to the population (distribution) under investigation. Information measure is crucial in the study of ambiguity, assortment, and unpredictability present in an array of phenomena. The following communication is a link between the two, and it has been demonstrated that the well-known conventional statistical measures can be used as a measure of information.

Keywords: probability distribution, entropy, concavity, symmetry, variance, central tendency

Procedia PDF Downloads 134
3066 An Epidemiological Analysis of the Occurrence of Bovine Brucellosis and Adopted Control Measures in South Africa during the Period 2014 to 2019

Authors: Emily Simango, T. Chitura

Abstract:

Background: Bovine brucellosis is among the most neglected zoonotic diseases in developing countries, where it is endemic and a growing challenge to public health. The development of cost-effective control measures for the disease can only be affirmed by the knowledge of the disease epidemiology and the ability to define its risk profiles. The aim of the study was to document the trend of bovine brucellosis and the control measures adopted following reported cases during the period 2014 to 2019 in South Africa. Methods: Data on confirmed cases of bovine brucellosis was retrieved from the website of the World Organisation of Animal Health (WOAH). Data was analysed using the Statistical Package for Social Sciences (IBM SPSS, 2022) version 29.0. Descriptive analysis (frequencies and percentages) and the Analysis of variance (ANOVA) were utilized for statistical significance (p<0.05). Results: The data retrieved in our study revealed an overall average bovine brucellosis prevalence of 8.48. There were statistically significant differences in bovine brucellosis prevalence across the provinces for the years 2016 and 2019 (p≥0.05), with the Eastern Cape Province having the highest prevalence in both instances. Documented control measures for the disease were limited to killing and disposal of disease cases as well as vaccination of susceptible animals. Conclusion: Bovine brucellosis is real in South Africa, with the risk profiles differing across the provinces. Information on brucellosis control measures in South Africa, as reported to the WOAH, is not comprehensive.

Keywords: zoonotic, endemic, Eastern Cape province, vaccination

Procedia PDF Downloads 36
3065 Integrating a Universal Forensic DNA Database: Anticipated Deterrent Effects

Authors: Karen Fang

Abstract:

Investigative genetic genealogy has attracted much interest in both the field of ethics and the public eye due to its global application in criminal cases. Arguments have been made regarding privacy and informed consent, especially with law enforcement using consumer genetic testing results to convict individuals. In the case of public interest, DNA databases have the strong potential to significantly reduce crime, which in turn leads to safer communities and better futures. With the advancement of genetic technologies, the integration of a universal forensic DNA database in violent crimes, crimes against children, and missing person cases is expected to deter crime while protecting one’s privacy. Rather than collecting whole genomes from the whole population, STR profiles can be used to identify unrelated individuals without compromising personal information such as physical appearance, disease risk, and geographical origin, and additionally, reduce cost and storage space. STR DNA profiling is already used in the forensic science field and going a step further benefits several areas, including the reduction in recidivism, improved criminal court case turnaround time, and just punishment. Furthermore, adding individuals to the database as early as possible prevents young offenders and first-time offenders from participating in criminal activity. It is important to highlight that DNA databases should be inclusive and tightly governed, and the misconception on the use of DNA based on crime television series and other media sources should be addressed. Nonetheless, deterrent effects have been observed in countries like the US and Denmark with DNA databases that consist of serious violent offenders. Fewer crimes were reported, and fewer people were convicted of those crimes- a favorable outcome, not even the death penalty could provide. Currently, there is no better alternative than a universal forensic DNA database made up of STR profiles. It can open doors for investigative genetic genealogy and fostering better communities. Expanding the appropriate use of DNA databases is ethically acceptable and positively impacts the public.

Keywords: bioethics, deterrent effects, DNA database, investigative genetic genealogy, privacy, public interest

Procedia PDF Downloads 126
3064 Public and Private Spaces Producing Social Connectedness in Traditional Environment: A Study on Old Medina District of Casablanca

Authors: Asmaa Sokrat, Aykut Karaman

Abstract:

Public and private spaces are major components of the morphology of the city. This research aims to study the interactions between public and private domains in terms of urban space in Casablanca. The research focuses on a general vision of a socio-spatial issue. It plans to identify the public, private, and transition (semi-public, semi-private) spaces as the constituent of the urban space. Moreover, the study investigates the link between public and private spaces with the social dimensions. Additionally, the research argues that the public space is a place of social interaction; as a reflection, this interaction is the intersection between urban space and social connectedness. Besides, social interaction can be the key to distinguishing between the public and private spheres. The methodological approach of the research is based on the literature review and field study. The article is targeting a case study on the old Medina of Casablanca, from daily use of the public and private spaces, the urban tissue, and the urban space types. In conclusion, the research exhibits that a public space could influence the privacy of the residents of a local urban area; thus, this privacy is inverted on the social interaction. This social interaction is the link between the urban space and social connectedness. Hence, this equation affects the typology of the private space.

Keywords: public sphere, private sphere, social connectedness, old Medina of Casablanca

Procedia PDF Downloads 103
3063 Detection of Cyberattacks on the Metaverse Based on First-Order Logic

Authors: Sulaiman Al Amro

Abstract:

There are currently considerable challenges concerning data security and privacy, particularly in relation to modern technologies. This includes the virtual world known as the Metaverse, which consists of a virtual space that integrates various technologies and is therefore susceptible to cyber threats such as malware, phishing, and identity theft. This has led recent studies to propose the development of Metaverse forensic frameworks and the integration of advanced technologies, including machine learning for intrusion detection and security. In this context, the application of first-order logic offers a formal and systematic approach to defining the conditions of cyberattacks, thereby contributing to the development of effective detection mechanisms. In addition, formalizing the rules and patterns of cyber threats has the potential to enhance the overall security posture of the Metaverse and, thus, the integrity and safety of this virtual environment. The current paper focuses on the primary actions employed by avatars for potential attacks, including Interval Temporal Logic (ITL) and behavior-based detection to detect an avatar’s abnormal activities within the Metaverse. The research established that the proposed framework attained an accuracy of 92.307%, resulting in the experimental results demonstrating the efficacy of ITL, including its superior performance in addressing the threats posed by avatars within the Metaverse domain.

Keywords: security, privacy, metaverse, cyberattacks, detection, first-order logic

Procedia PDF Downloads 13
3062 Energy Conservation Strategies of Buildings in Hot, Arid Region: Al-Khobar, Saudi Arabia

Authors: M. H. Shwehdi, S. Raja Mohammad

Abstract:

Recently energy savings have become more pronounced as a result of the world financial crises as well the unstable oil prices. Certainly all entities needs to adapt Energy Conservation and Management Strategies due to high monthly consumption of their spread locations and advancements of its telecom systems. These system improvements necessitate the establishment of more exchange centers as well provide energy savings. This paper investigates the impact of HVAC System Characteristics, Operational Strategies, the impact of Envelope Thermal Characteristics, and energy conservation measures. These are classified under three types of measures i.e. Zero-Investment; Low-Investment and High-Investment Energy Conservation Measures. The study shows that the Energy Conservation Measures (ECMs) pertaining to the HVAC system characteristics and operation represent the highest potential for energy reduction, attention should be given to window thermal and solar radiation characteristics when large window areas are used. The type of glazing system needs to be carefully considered in the early design phase of future buildings. Paper will present the thermal optimization of different size centers in the two hot-dry and hot-humid Saudi Arabian city of Al Khobar, East province.

Keywords: energy conservation, optimization, thermal design, intermittent operation, exchange centers, hot-humid climate, Saudi Arabia

Procedia PDF Downloads 409
3061 Implementation-Specific Obstacles and Measures for Chatbots in B2B Business

Authors: Daniela Greven, Kathrin Endres, Shugana Sundralingam

Abstract:

The use of chatbots has hardly been established in B2B companies to date and involves various challenges. The goal of this paper is to identify the biggest obstacles to the successful implementation of chatbots in B2B companies and to develop measures to overcome them. The obstacles are identified by conducting expert interviews within the framework of Eisenhardt's case study research. These are examined through a socio-technical analysis focusing on people, technology, and organization. By means of systematic literature research and in-depth interviews with German chatbot providers and customers of chatbots, measures for overcoming the obstacles are identified. Using interviews with experts from German chatbot providers, the responsible stakeholders of each measure according to the RASCI Responsibility Matrix are identified. The study shows that there are major obstacles in all areas of a socio-technical system that can cause the implementation of a chatbot to fail. A total of 44 implementation obstacles and 58 measures to overcome these obstacles are identified. The study shows that there are major obstacles in the areas of people, technology, and organization of a socio-technical system that can cause the implementation of a chatbot to fail. A holistic view is therefore essential. The results provide firms with a guideline on how to overcome potential obstacles during chatbot implementation in B2B customer service.

Keywords: chatbots, socio-technical analysis, B2B customer service, implementation success factors

Procedia PDF Downloads 64
3060 Social Implementation of Information Sharing Road Safety Measure in South-East Asia

Authors: Hiroki Kikuchi, Atsushi Fukuda, Hirokazu Akahane, Satoru Kobayakawa, Tuenjai Fukuda, Takeru Miyokawa

Abstract:

According to WHO reports, fatalities by road traffic accidents in many countries of South-East Asia region especially Thailand and Malaysia are increasing year by year. In order to overcome these serious problems, both governments are focusing on road safety measures. In response, the Ministry of Land, Infrastructure, Transport and Tourism (MLIT) of Japan and Japan International Cooperation Agency (JICA) have begun active support based on the experiences to reduce the number of fatalities in road accidents in Japan in the past. However, even if the successful road safety measures in Japan is adopted in South-East Asian countries, it is not sure whether it will work well or not. So, it is necessary to clarify the issues and systematize the process for the implementation of road safety measures in South-East Asia. On the basis of the above, this study examined the applicability of "information sharing traffic safety measure" which is one of the successful road safety measures in Japan to the social implementation of road safety measures in South-East Asian countries. The "Information sharing traffic safety measure" is carried out traffic safety measures by stakeholders such as residents, administration, and experts jointly. In this study, we extracted the issues of implementation of road safety measures under local context firstly. This is clarifying the particular issues with its implementation in South-East Asian cities. Secondly, we considered how to implement road safety measures for solving particular issues based on the method of "information sharing traffic safety measure". In the implementation method, the location of the occurrence of a dangerous event was extracted based on the “HIYARI-HATTO” data which were obtained from the residents. This is because it is considered that the implementation of the information sharing traffic safety measure focusing on the location where the dangerous event occurs leads to the reduction of traffic accidents. Also, the target locations for the implementation of measures differ for each city. In Penang, we targeted the intersections in the downtown, while in Suphan Buri, we targeted mainly traffic control on the intercity highway. Finally, we proposed a method for implementing traffic safety measures. For Penang, we proposed a measure to improve the signal phase and showed the effect of the measure on the micro traffic simulation. For Suphan Buri, we proposed the suitable measures for the danger points extracted by collecting the “HIYARI-HATTO” data of residents to the administration. In conclusion, in order to successfully implement the road safety measure based on the "information sharing traffic safety measure", the process for social implementation of the road safety measures should be consistent and carried out repeatedly. In particular, by clarifying specific issues based on local context in South-East Asian countries, the stakeholders, not only such as government sectors but also local citizens can share information regarding road safety and select appropriate countermeasures. Finally, we could propose this approach to the administration that had the authority.

Keywords: information sharing road safety measure, social implementation, South-East Asia, HIYARI-HATTO

Procedia PDF Downloads 119
3059 Assessing Traffic Calming Measures for Safe and Accessible Emergency Routes in Norrkoping City in Sweden

Authors: Ghazwan Al-Haji

Abstract:

Most accidents occur in urban areas, and the most related casualties are vulnerable road users (pedestrians and cyclists). The traffic calming measures (TCMs) are widely used and considered to be successful in reducing speed and traffic volume. However, TCMs create unwanted effects include: noise, emissions, energy consumption, vehicle delays and emergency response time (ERT). Different vertical and horizontal TCMs have been already applied nationally (Sweden) and internationally with different impacts. It is a big challenge among traffic engineers, planners, and policy-makers to choose and priorities the best TCMs to be implemented. This study will assess the existing guidelines for TCMs in relation to safety and ERT with focus on data from Norrkoping city in Sweden. The expected results will save lives, time, and money on particularly Swedish Roads. The study will also review newly technologies and how they can improve safety and reduce ERT.

Keywords: traffic calming measures, traffic safety, delay time, vulnerable road users

Procedia PDF Downloads 116
3058 Green Design Study of Prefabricated Community Control Measures in Response to Public Health Emergencies

Authors: Enjia Zhang

Abstract:

During the prevention and control of the COVID-19 pandemic, all communities in China were gated and under strict management, which was highly effective in preventing the spread of the epidemic from spreading. Based on the TRIZ theory, this paper intends to propose green design strategies of community control in response to public health emergencies and to optimize community control facilities according to the principle of minimum transformation. Through the questionnaire method, this paper investigates and summarizes the situation and problems of community control during the COVID-19 pandemic. Based on these problems, the TRIZ theory is introduced to figure out the problems and associates them with prefabricated facilities. Afterward, the innovation points and solutions of prefabricated community control measures are proposed by using the contradiction matrix. This paper summarizes the current situation of community control under public health emergencies and concludes the problems such as simple forms of temporary roadblocks, sudden increase of community traffic pressure, and difficulties to access public spaces. The importance of entrance and exit control in community control is emphasized. Therefore, the community control measures are supposed to focus on traffic control, and the external access control measures, including motor vehicles, non-motor vehicles, residents and non-residents access control, and internal public space access control measures, including public space control shared with the society or adjacent communities, are proposed in order to make the community keep the open characteristics and have the flexibility to deal with sudden public health emergencies in the future.

Keywords: green design, community control, prefabricated structure, public health emergency

Procedia PDF Downloads 94
3057 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 365
3056 Balancing Resources and Demands in Activation Work with Young Adults: Exploring Potentials of the Job Demands-Resources Theory

Authors: Gurli Olsen, Ida Bruheim Jensen

Abstract:

Internationally, many young adults not in education, employment, or training (NEET) remain in temporary solutions such as labour market measures or other forms of welfare arrangements. These trends have been associated with ineffective labour market measures, an underfunded theoretical foundation for activation work, limited competence among social workers and labour market employees in using ordinary workplaces as job inclusion measures, and an overemphasis on young adults’ personal limitations such as health challenges and lack of motivation. Two competing models have been prominent in activation work: Place‐Then‐Train and Train‐Then‐Place. A traditional strategy for labour market measures has been to first motivate NEETs to sheltered work and training and then to the regular labour market (train then place). Measures such as Supported Employment (SE) and Individual Placement and Support (IPS) advocate for rapid entry into paid work at the regular labour market with close supervision and training from social workers, employees, and others (place then train). None of these models demonstrate unquestionable results. In this web of working life measures, young adults (NEETs) experience a lack of confidence in their own capabilities and coping strategies vis-á-vis labour market- and educational demands. Drawing on young adults’ own experiences, we argue that the Job Demands-Resources (JD-R) Theory can contribute to the theoretical and practical dimensions of activation work. This presentation will focus on what the JD-R theory entails and how it can be fruitful in activation work with NEETs (what and how). The overarching rationale of the JD-R theory is that an enduring balance between demands (e.g., deadlines, working hours) and resources (e.g., social support, enjoyable work tasks) is important for job performance for people in any job and potentially in other meaningful activities. Extensive research has demonstrated that a balance between demands and resources increases motivation and decreases stress. Nevertheless, we have not identified literature on the JD-R theory in activation work with young adults.

Keywords: activation work, job demands-resources theory, social work, theory development

Procedia PDF Downloads 51
3055 Jeddah’s Hydraulic Protection Systems and the Management of Flood: An Assessment

Authors: Faouzi Ameur, Atef Belhaj Ali

Abstract:

Located in the South-west of Saudi Arabia, Jeddah is more than a harbor. It is a big city of the Red Sea and the second town of Saudi Arabia, after Riyadh the capital. Jeddah profits from several economic assets due especially to its transit position towards the high sacred places of Islam like Mecca and Medina. During summer, this metropolis is transformed into a political capital and a tourist resort for foreigners and Saudis alike. The city of Jeddah was affected by serious sudden floods; two great ones took place in 2009, and in 2011. The human and material tools were considerable, since these events caused the death to hundreds of people, damaged thousands of buildings built on basins slopes, which, however had the authorizations necessary. To cope with these natural disasters, several urban hydraulic measures were undertaken like building dams and canals to collect surface waters. These urban measures aimed at the protection of inhabitants and belongings against the risks of floods as well as the interception and the drainage of streams. Although these protection measures are important, expensive, and effective, they are no longer enough or effective to cope with the evolution of the natural disasters that the city of Jeddah is constantly exposed to. These protective hydraulic measures did not make it possible to reach risk zero situations. They transferred the damages towards other zones. This paper purports to study the protection network systems in Jeddah and to understand their various impacts during floods on the city and on its inhabitants.

Keywords: Jeddah, Saudi Arabia, urbanization, hydraulic protection

Procedia PDF Downloads 221
3054 Life in Bequia in the Era of Climate Change: Societal Perception of Adaptation and Vulnerability

Authors: Sherry Ann Ganase, Sandra Sookram

Abstract:

This study examines adaptation measures and factors that influence adaptation decisions in Bequia by using multiple linear regression and a structural equation model. Using survey data, the results suggest that households are knowledgeable and concerned about climate change but lack knowledge about the measures needed to adapt. The findings from the SEM suggest that a positive relationship exist between vulnerability and adaptation, vulnerability and perception, along with a negative relationship between perception and adaptation. This suggests that being aware of the terms associated with climate change and knowledge about climate change is insufficient for implementing adaptation measures; instead the risk and importance placed on climate change, vulnerability experienced with household flooding, drainage and expected threat of future sea level are the main factors that influence the adaptation decision. The results obtained in this study are beneficial to all as adaptation requires a collective effort by stakeholders.

Keywords: adaptation, Bequia, multiple linear regression, structural equation model

Procedia PDF Downloads 427
3053 Place and Situational Management in Crime Prevention

Authors: Mehdi Moghimi

Abstract:

Doctrines associated with situational prevention considers 'place of committing crime' as one of the fundamental elements of a crime. Meanwhile, with regard to causing or having effect on a crime situation, 'place' can be one of the pivotal indices in situational prevention analyses. This study aims at examining the role of place in construction of a crime situation and explaining the relationship between 'place' and situational preventive measures and procedures. Also, how to identify high-crime places, types of high-crime places and the factors influencing their creation are among the most important secondary objectives of this article. Concerning the purpose, it is a practical study whose material has been written through a documentary method using original sources (English), books and written and translated articles etc. This article is written in two main parts. In the first section, cognitive-conceptual issues about 'place' as one of the main causes of crime situation, and its effective interaction with situational preventive measures will be reviewed. The second part of this paper will focus on criminological examination of places and critical locations of crime and provide situational preventive measures to deal with the situation. 'Crime displacement' and 'geographical distribution of benefits'are also considered as the possible consequences of implementing preventive strategies. The results of the study suggest that the inventory of offenses is distributed according to the spatial characteristics. Moreover, according to the criminological characteristics governing region or location, offenders choose the place of crime based on a logical calculation. Therefore, some locations, regions or neighborhoods are permanent places of occurring lots of crimes. As a result, considering "place", preventive measures and procedures can be systematically directed, and using the most effective ways, limited preventive resources are utilized in the most critical places. Finally, some suggestions for further research and application are provided in line with more favorable promotion of situational preventive measures.

Keywords: crime prevention, place, police crime, situational crime prevention

Procedia PDF Downloads 485
3052 Open Trial of Group Schema Therapy for the Treatment of Eating Disorders

Authors: Evelyn Smith, Susan Simpson

Abstract:

Background: Eating disorder (ED) treatment is complicated by high rates of chronicity, comorbidity, complex personality traits and client dropout. Given these complexities, Schema Therapy (ST) has been identified as a suitable treatment option. The study primarily aims to evaluate the efficacy of group ST for the treatment of EDs. The study further evaluated the effectiveness of ST in reducing schemas and improving quality of life. Method: Participant suitability was ascertained using the Eating Disorder Examination. Following this, participants attended 90-minute weekly group sessions over 25 weeks. Groups consisted of six to eight participants and were facilitated by two psychologists, at least one of who is trained in ST. Measures were completed at pre, mid and post-treatment. Measures assessed ED symptoms, cognitive schemas, schema mode presentations, quality of life, self-compassion and psychological distress. Results: As predicted, measures of ED symptoms were significantly reduced following treatment. No significant changes were observed in early maladaptive schema severity; however, reductions in schema modes were observed. Participants did not report improvements in general quality of life measures following treatment, though improvement in psychological well-being was observed. Discussion: Overall, the findings from the current study support the use of group ST for the treatment of EDs. It is expected that lengthier treatment is needed for the reduction in schema severity. Given participant dropout was considerably low, this has important treatment implications for the suitability of ST for the treatment of EDs.

Keywords: eating disorders, schema therapy, treatment, quality of life

Procedia PDF Downloads 46
3051 Assessment of the Impact of Traffic Safety Policy in Barcelona, 2010-2019

Authors: Lluís Bermúdez, Isabel Morillo

Abstract:

Road safety involves carrying out a determined and explicit policy to reduce accidents. In the city of Barcelona, through the Local Road Safety Plan 2013-2018, in line with the framework that has been established at the European and state level, a series of preventive, corrective and technical measures are specified, with the priority objective of reducing the number of serious injuries and fatalities. In this work, based on the data from the accidents managed by the local police during the period 2010-2019, an analysis is carried out to verify whether the measures established in the Plan to reduce the accident rate have had an effect or not and to what extent. The analysis focuses on the type of accident and the type of vehicles involved. Different count regression models have been fitted, from which it can be deduced that the number of serious and fatal victims of the accidents that have occurred in the city of Barcelona has been reduced as the measures approved by the authorities.

Keywords: accident reduction, count regression models, road safety, urban traffic

Procedia PDF Downloads 92
3050 Investigation of Failures in Wadi-Crossing Pipe Culverts, Sennar State, Sudan

Authors: Magdi M. E. Zumrawi

Abstract:

Crossing culverts are essential element of rural roads. The paper aims to investigate failures of recently constructed wadi-crossing pipe culverts in Sennar state and provide necessary remedial measures. The investigation is conducted to provide an extensive diagnosis study in order to find out the main structural and hydrological weaknesses of the culverts. Literature of steel pipe culverts related to construction practices and common types of culvert failures and their appropriate mitigation measures were reviewed. A detailed field survey was conducted to detect failures and defects appeared on the existing culverts. The results revealed that seepage of water through the embankment and foundation of the culverts leads to excessive erosion and scouring causing sever failures and damages. The design mistakes and poor construction were detected as the main causes of culverts failures. For sustainability of the culverts, various remedial measures are recommended to be considered in urgent rehabilitation of the existing crossings.

Keywords: culvert, erosion, failure, sustainability

Procedia PDF Downloads 287