Search results for: privacy preservation
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1018

Search results for: privacy preservation

898 The Impact of Cryptocurrency Classification on Money Laundering: Analyzing the Preferences of Criminals for Stable Coins, Utility Coins, and Privacy Tokens

Authors: Mohamed Saad, Huda Ismail

Abstract:

The purpose of this research is to examine the impact of cryptocurrency classification on money laundering crimes and to analyze how the preferences of criminals differ according to the type of digital currency used. Specifically, we aim to explore the roles of stablecoins, utility coins, and privacy tokens in facilitating or hindering money laundering activities and to identify the key factors that influence the choices of criminals in using these cryptocurrencies. To achieve our research objectives, we used a dataset for the most highly traded cryptocurrencies (32 currencies) that were published on the coin market cap for 2022. In addition to conducting a comprehensive review of the existing literature on cryptocurrency and money laundering, with a focus on stablecoins, utility coins, and privacy tokens, Furthermore, we conducted several Multivariate analyses. Our study reveals that the classification of cryptocurrency plays a significant role in money laundering activities, as criminals tend to prefer certain types of digital currencies over others, depending on their specific needs and goals. Specifically, we found that stablecoins are more commonly used in money laundering due to their relatively stable value and low volatility, which makes them less risky to hold and transfer. Utility coins, on the other hand, are less frequently used in money laundering due to their lack of anonymity and limited liquidity. Finally, privacy tokens, such as Monero and Zcash, are increasingly becoming a preferred choice among criminals due to their high degree of privacy and untraceability. In summary, our study highlights the importance of understanding the nuances of cryptocurrency classification in the context of money laundering and provides insights into the preferences of criminals in using digital currencies for illegal activities. Based on our findings, our recommendation to the policymakers is to address the potential misuse of cryptocurrencies for money laundering. By implementing measures to regulate stable coins, strengthening cross-border cooperation, fostering public-private partnerships, and increasing cooperation, policymakers can help prevent and detect money laundering activities involving digital currencies.

Keywords: crime, cryptocurrency, money laundering, tokens.

Procedia PDF Downloads 63
897 Willingness to Pay for the Preservation of Geothermal Areas in Iceland: The Contingent Valuation Studies of Eldvörp and Hverahlíð

Authors: David Cook, Brynhildur Davidsdottir, Dadi. M. Kristofersson

Abstract:

The approval of development projects with significant environmental impacts implies that the economic costs of the affected environmental resources must be less than the financial benefits, but such irreversible decisions are frequently made without ever attempting to estimate the monetary value of the losses. Due to this knowledge gap in the processes informing decision-making, development projects are commonly approved despite the potential for social welfare to be undermined. Heeding a repeated call by the OECD to commence economic accounting of environmental impacts as part of the cost-benefit analysis process for Icelandic energy projects, this paper sets out the results pertaining to the nation’s first two contingent valuation studies of geothermal areas likely to be developed in the near future. Interval regression using log-transformation was applied to estimate willingness to pay (WTP) for the preservation of the high-temperature Eldvörp and Hverahlíð fields. The estimated mean WTP was 8,333 and 7,122 ISK for Eldvörp and Hverahlíð respectively. Scaled up to the Icelandic population of national taxpayers, this equates to estimated total economic value of 2.10 and 1.77 billion ISK respectively. These results reinforce arguments in favour of accounting for the environmental impacts of Iceland’s future geothermal power projects as a mandatory component of the exploratory and production license application process. Further research is necessary to understand the economic impacts to specific ecosystem services associated with geothermal environments, particularly connected to changes in recreational amenity. In so doing, it would be possible to gain greater comprehension of the various components of total economic value, evolving understanding of why one geothermal area – in this case, Eldvörp – has a higher preservation value than another.

Keywords: decision-making, contingent valuation, geothermal energy, preservation

Procedia PDF Downloads 186
896 An Advanced Method of Plant Preservation and Colour Retention of Herbarium Specimens

Authors: Abduraheem K., Suboohi Nasrin

Abstract:

Herbaria are specimens of preserved plants, which are very delicate and cellulosic in nature. While these collections are very useful for the enrichment of knowledge and are considered as natural heritage of our entire world, it is very important to preserve and conserve them. The significance is not only to prevent the herbaria from the deterioration of biological agencies but also to preserve its colours and retain natural colour. Colour is not only characteristic of a plant, but it can also help to identify closely related species or to distinguish a plant from a collection of herbaria. Keeping this in mind, a selective solution has been prepared for the conservation and preservation of herbarium in the present study. In this, the quantity of all the selected chemicals, i.e., formaldehyde and copper sulphate was kept constant, and the solution was prepared by dissolving it in distilled water by increasing the amount of picric acid (1, 2, 3, 4, and 5 ml). Fresh specimens of roses and bougainvillea were washed with distilled water and kept in the above solution for 10 to 15 minutes at room temperature. After 10 minutes, the specimen was removed from the solution, dried with the help of paper, and then pressed under the plant press. Blotting sheets were used to absorb the moisture content and were changed every 2 to 3 days to protect against fungal growth. The results revealed that all solutions had insecticidal properties and protected the herbarium specimen against pests. While in the case of colour retention, solution-1 and 2 were not satisfactory colour preservation, and solutions-3 and 5 maintained the colour of rose and bougainvillea leaves for 15 to 20 days and for a month, respectively. After that, the colour begins to fade, and the process is faster in rose leaves than in bougainvillea. And it was also observed that the colour of young leaves started to fade before that of older leaves. When the leaves of rose and bougainvillea are treated with Solution-4, then the colour of rose leaves is maintained for six months.

Keywords: solutions, colour retention, preservation and conservation, leaves of roses and bougainvillea

Procedia PDF Downloads 66
895 Blockchain for IoT Security and Privacy in Healthcare Sector

Authors: Umair Shafique, Hafiz Usman Zia, Fiaz Majeed, Samina Naz, Javeria Ahmed, Maleeha Zainab

Abstract:

The Internet of Things (IoT) has become a hot topic for the last couple of years. This innovative technology has shown promising progress in various areas, and the world has witnessed exponential growth in multiple application domains. Researchers are working to investigate its aptitudes to get the best from it by harnessing its true potential. But at the same time, IoT networks open up a new aspect of vulnerability and physical threats to data integrity, privacy, and confidentiality. It's is due to centralized control, data silos approach for handling information, and a lack of standardization in the IoT networks. As we know, blockchain is a new technology that involves creating secure distributed ledgers to store and communicate data. Some of the benefits include resiliency, integrity, anonymity, decentralization, and autonomous control. The potential for blockchain technology to provide the key to managing and controlling IoT has created a new wave of excitement around the idea of putting that data back into the hands of the end-users. In this manuscript, we have proposed a model that combines blockchain and IoT networks to address potential security and privacy issues in the healthcare domain. Then we try to describe various application areas, challenges, and future directions in the healthcare sector where blockchain platforms merge with IoT networks.

Keywords: IoT, blockchain, cryptocurrency, healthcare, consensus, data

Procedia PDF Downloads 144
894 The Modification of Convolutional Neural Network in Fin Whale Identification

Authors: Jiahao Cui

Abstract:

In the past centuries, due to climate change and intense whaling, the global whale population has dramatically declined. Among the various whale species, the fin whale experienced the most drastic drop in number due to its popularity in whaling. Under this background, identifying fin whale calls could be immensely beneficial to the preservation of the species. This paper uses feature extraction to process the input audio signal, then a network based on AlexNet and three networks based on the ResNet model was constructed to classify fin whale calls. A mixture of the DOSITS database and the Watkins database was used during training. The results demonstrate that a modified ResNet network has the best performance considering precision and network complexity.

Keywords: convolutional neural network, ResNet, AlexNet, fin whale preservation, feature extraction

Procedia PDF Downloads 89
893 Nordic Study on Public Acceptance of Drones

Authors: Virpi Oksman

Abstract:

Drones are new phenomenon in public spaces. Adoption of this kind of new technologies requires public acceptance. Drones and other unmanned aerial systems may have various impacts on people’s living environments, and the public is exposed to possible disadvantages of drones. Public acceptance may be expressed as positive or negative attitude by majority of the citizens towards the new technology or service or as rapid adoption of it in everyday life. In various parts of the globe, in cities and in rural areas, drones as emerging technologies are perceived quite differently. Public acceptance studies of drones have been conducted mostly in highly urbanized environments like in Singapore and in European cities. This paper presents results of a Nordic survey study (N=1000) conducted in Sweden and in Finland. The survey aims at understanding the level of acceptance of different uses of drones in public spaces and the main concerns and benefits related to emerging UAM technologies. The study shows that even though the general attitude towards drones is quite positive, privacy and safety, and noise levels are the main concerns by Nordic citizens. Also, for what purpose and by whom the drones are operated affects the acceptability significantly. The study concludes, that there is need for regulations that safeguard public interests. In addition, considering privacy in design, and quiet environmentally friendly drones support public acceptance of drones.

Keywords: public acceptance, privacy, safety, survey

Procedia PDF Downloads 144
892 Acquisition and Preservation of Traditional Medicinal Knowledge in Rural Areas of KwaZulu Natal, South Africa

Authors: N. Khanyile, P. Dlamini, M. Masenya

Abstract:

Background: Most of the population in Africa is still dependent on indigenous medicinal knowledge for treating and managing ailments. Indigenous traditional knowledge owners/practitioners who own this knowledge are consulted by communities, but their knowledge is not known how they get it. The question of how knowledge is acquired and preserved remains one of the biggest challenges in traditional healing and treatment with herbal medicines. It is regrettable that despite the importance and recognition of indigenous medicinal knowledge globally, the details of acquirement, storing and transmission, and preservation techniques are not known. Hence this study intends to unveil the process of acquirement and transmission, and preservation techniques of indigenous medical knowledge by its owners. Objectives: This study aims to assess the process of acquiring and preservation of traditional medicinal knowledge by traditional medicinal knowledge owners/practitioners in uMhlathuze Municipality, in the province of KwaZulu-Natal, South Africa. The study was guided by four research objectives which were to: identify the types of traditional medicinal knowledge owners who possess this knowledge, establish the approach used by indigenous medicinal knowledge owners/healers for acquiring medicinal knowledge, identify the process of preservation of medicinal knowledge by indigenous medicinal knowledge owners/healers, and determine the challenges encountered in transferring the knowledge. Method: The study adopted a qualitative research approach, and a snowball sampling technique was used to identify the study population. Data was collected through semi-structured interviews with indigenous medicinal knowledge owners. Results: The findings suggested that uMhlathuze municipality had different types of indigenous medicinal knowledge owners who possess valuable knowledge. These are diviners (Izangoma), faith healers (Abathandazi), and herbalists (Izinyanga). The study demonstrated that indigenous medicinal knowledge is acquired in many different ways, including visions, dreams, and vigorous training. The study also revealed the acquired knowledge is preserved or shared with specially chosen children and trainees. Conclusion: The study concluded that this knowledge is gotten through vigorous training, which requires the learner to be attentive and eager to learn. It was recommended that a study of this nature be conducted but at a broader level to enhance an informed conclusion and recommendations.

Keywords: preserving, indigenous medicinal knowledge, indigenous knowledge, indigenous medicinal knowledge owners/practitioners, acquiring

Procedia PDF Downloads 57
891 A Study of New Window Typology for Palestinian Residential Building for More Sustainable Building

Authors: Nisreen Ardda

Abstract:

Fenestrations are one of the main building envelope elements that play an important role in home social-ecological l factors. They play a vital role in providing natural lighting and ventilation, visual, thermal, and acoustical comfort, and also provide weather-tightness, privacy, a feeling of openness. In most home buildings, fenestrations are controlled manually by the occupants, which significantly impacts occupants' comfort and energy use. Culture plays a central role in the Palestinians window operation behavior. Improved windows design that provides the desired privacy while maintaining the appropriate function of fenestration (natural lighting, thermal comfort, and visual openness) is becoming a necessity. Therefore, this paper proposes a window typology to achieve the social and environmental factors in residential buildings in the West Bank. The window typology and reference building were designed in Rivet 2021, and natural ventilation was carried out in Design Builder 4.3.0.039. The results showed that the proposed typology provides the desired privacy and the feeling of openness without compromising natural ventilation as the existing window did.

Keywords: window design, passive design, sustainable built environment, building material

Procedia PDF Downloads 163
890 Analysis of Fish Preservation Methods for Traditional Fishermen Boat

Authors: Kusno Kamil, Andi Asni, Sungkono

Abstract:

According to a report of the World Food and Agriculture Agency (FAO): the post-harvest fish losses in Indonesia reaches 30 percent from 170 trillion rupiahs of marine fisheries reserves, then the potential loss reaches 51 trillion rupiahs (end of 2016 data). This condition is caused by traditionally vulnerable fish catches damaged due to disruption of the cold chain of preservation. The physical and chemical changes in fish flesh increase rapidly, especially if exposed to the scorching heat in the middle of the sea, exacerbated by the low awareness of catch hygiene; many unclean catches which contain blood are often treated without special attention and mixed with freshly caught fish, thereby increasing the potential for faster fish spoilage. This background encourages research on traditional fisherman catch preservation methods that aim to find the best and most affordable methods and/or combinations of fish preservation methods so that they can help fishermen increase their fishing duration without worrying that their catch will be damaged, thereby reducing their economic value when returning to the beach to sell their catches. This goal is expected to be achieved through experimental methods of treatment of fresh fish catches in containers with the addition of anti-bacterial copper, liquid smoke solution, and the use of vacuum containers. The other three treatments combined the three previous treatment variables with an electrically powered cooler (temperature 0~4 ᵒC). As a control specimen, the untreated fresh fish (placed in the open air and in the refrigerator) were also prepared for comparison for 1, 3, and 6 days. To test the level of freshness of fish for each treatment, physical observations were used, which were complemented by tests for bacterial content in a trusted laboratory. The content of copper (Cu) in fish meat (which is suspected of having a negative impact on consumers) was also part of the examination on the 6th day of experimentation. The results of physical observations on the test specimens (organoleptic method) showed that preservation assisted by the use of coolers was still better for all treatment variables. The specimens, without cooling, sequentially showed that the best preservation effectiveness was the addition of copper plates, the use of vacuum containers, and then liquid smoke immersion. Especially for liquid smoke, soaking for 6 days of preservation makes the fish meat soft and easy to crumble, even though it doesn't have a bad odor. The visual observation was then complemented by the results of testing the amount of growth (or retardation) of putrefactive bacteria in each treatment of test specimens within similar observation periods. Laboratory measurements report that the minimum amount of putrefactive bacteria achieved by preservation treatment combining cooler with liquid smoke (sample A+), then cooler only (D+), copper layer inside cooler (B+), vacuum container inside cooler (C+), respectively. Other treatments in open air produced a hundred times more putrefactive bacteria. In addition, treatment of the copper layer contaminated the preserved fresh fish more than a thousand times bigger compared to the initial amount, from 0.69 to 1241.68 µg/g.

Keywords: fish, preservation, traditional, fishermen, boat

Procedia PDF Downloads 48
889 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 51
888 Applying Audience Development Programs in Museums for Raising Community Awareness towards Cultural Heritage Preservation: A Case Study of Alexandria National Museum

Authors: Samar F. Elkasrawy

Abstract:

Museums play a significant role in their communities with respect to culture, history, environment, and social development. They are considered as important sites for families, tourists, school groups, cultural visitors and individuals, looking to enjoy, learn and expand their horizons. Aim of audience development programs is to support individuals and organizations to work together to deliver messages that will raise museums' profile for both existing and potential visitors. They recognize the particular role that museums play for communities, the audiences they seek to reach, the experience they seek to offer and the extent and nature of their collections. This study aims at using both the qualitative and quantitative approach to explore the important role that audience development programs in museums can play in raising awareness in their communities concerning cultural heritage preservation and tourism. The Alexandria National Museum is considered as a valuable case study. In depth interviews with museum managers and staff was conducted as well as an online questionnaire. The study also includes suggestions and guidelines for applying audience development programs in Egyptian museums.

Keywords: Alexandria National Museum, audience development programs, cultural heritage, tourism and preservation awareness

Procedia PDF Downloads 241
887 The Admissibility of Evidence Obtained in Contravention of the Right to Privacy in a Criminal Trial: A Comparative Study of Poland and Germany

Authors: Konstancja Syller

Abstract:

International law and European regulations remain hardly silent about the admissibility of evidence obtained illegally in a criminal trial. However, Article 6 of the European Convention on Human Rights guarantees the right to a fair trial, it does not normalise a proceeding status of specified sources or means of proof outright. Therefore, it is the preserve of national legislation and national law enforcement authorities to decide on this matter. In most countries, especially in Germany and Poland, a rather complex normative approach to the issue of proof obtained in violation of the right to privacy is evident, which pursues in practise to many interpretive doubts. In Germany the jurisprudence has a significant impact within the range of the matter mentioned above. The Constitutional Court and the Supreme Court of Germany protect the right to privacy quite firmly - they ruled on inadmissibility of obtaining a proof in the form of a diary or a journal as a protection measure of constitutional guaranteed right. At the same time, however, the Supreme Court is not very convinced with reference to the issue of whether materials collected as a result of an inspection, call recordings or listening to the premises, which were carried out in breach of law, can be used in a criminal trial. Generally speaking, German courts indicate a crucial importance of the principle of Truth and the principle of proportionality, which both enable a judgement to be made as to the possibility of using an evidence obtained unlawfully. Comparing, in Poland there is almost no jurisprudence of the Constitutional Tribunal relating directly to the issue of illegal evidence. It is somehow surprising, considering the doctrinal analysis of the admissibility of using such proof in a criminal trial is performed in relation to standards resulted from the Constitution. Moreover, a crucial de lega lata legal provision, which enables allowing a proof obtained in infringement of the provisions in respect of criminal proceedings or through a forbidden act, is widely criticised within the legal profession ant therefore many courts give it their own interpretation at odds with legislator’s intentions. The comparison of two civil law legal systems’ standards regarding to the admissibility of an evidence obtained in contravention of the right to privacy in a criminal trial, taking also into account EU legislation and judicature, is the conclusive aim of this article.

Keywords: criminal trial, evidence, Germany, right to privacy, Poland

Procedia PDF Downloads 132
886 Acceptance of Health Information Application in Smart National Identity Card (SNIC) Using a New I-P Framework

Authors: Ismail Bile Hassan, Masrah Azrifah Azmi Murad

Abstract:

This study discovers a novel framework of individual level technology adoption known as I-P (Individual- Privacy) towards Smart National Identity Card health information application. Many countries introduced smart national identity card (SNIC) with various applications such as health information application embedded inside it. However, the degree to which citizens accept and use some of the embedded applications in smart national identity remains unknown to many governments and application providers as well. Moreover, the previous studies revealed that the factors of trust, perceived risk, privacy concern and perceived credibility need to be incorporated into more comprehensive models such as extended Unified Theory of Acceptance and Use of Technology known as UTAUT2. UTAUT2 is a mainly widespread and leading theory existing in the information system literature up to now. This research identifies factors affecting the citizens’ behavioural intention to use health information application embedded in SNIC and extends better understanding on the relevant factors that the government and the application providers would need to consider in predicting citizens’ new technology acceptance in the future. We propose a conceptual framework by combining the UTAUT2 and Privacy Calculus Model constructs and also adding perceived credibility as a new variable. The proposed framework may provide assistance to any government planning, decision, and policy makers involving e-government projects. The empirical study may be conducted in the future to provide proof and empirically validate this I-P framework.

Keywords: unified theory of acceptance and use of technology (UTAUT) model, UTAUT2 model, smart national identity card (SNIC), health information application, privacy calculus model (PCM)

Procedia PDF Downloads 436
885 Data Monetisation by E-commerce Companies: A Need for a Regulatory Framework in India

Authors: Anushtha Saxena

Abstract:

This paper examines the process of data monetisation bye-commerce companies operating in India. Data monetisation is collecting, storing, and analysing consumers’ data to use further the data that is generated for profits, revenue, etc. Data monetisation enables e-commerce companies to get better businesses opportunities, innovative products and services, a competitive edge over others to the consumers, and generate millions of revenues. This paper analyses the issues and challenges that are faced due to the process of data monetisation. Some of the issues highlighted in the paper pertain to the right to privacy, protection of data of e-commerce consumers. At the same time, data monetisation cannot be prohibited, but it can be regulated and monitored by stringent laws and regulations. The right to privacy isa fundamental right guaranteed to the citizens of India through Article 21 of The Constitution of India. The Supreme Court of India recognized the Right to Privacy as a fundamental right in the landmark judgment of Justice K.S. Puttaswamy (Retd) and Another v. Union of India . This paper highlights the legal issue of how e-commerce businesses violate individuals’ right to privacy by using the data collected, stored by them for economic gains and monetisation and protection of data. The researcher has mainly focused on e-commerce companies like online shopping websitesto analyse the legal issue of data monetisation. In the Internet of Things and the digital age, people have shifted to online shopping as it is convenient, easy, flexible, comfortable, time-consuming, etc. But at the same time, the e-commerce companies store the data of their consumers and use it by selling to the third party or generating more data from the data stored with them. This violatesindividuals’ right to privacy because the consumers do not know anything while giving their data online. Many times, data is collected without the consent of individuals also. Data can be structured, unstructured, etc., that is used by analytics to monetise. The Indian legislation like The Information Technology Act, 2000, etc., does not effectively protect the e-consumers concerning their data and how it is used by e-commerce businesses to monetise and generate revenues from that data. The paper also examines the draft Data Protection Bill, 2021, pending in the Parliament of India, and how this Bill can make a huge impact on data monetisation. This paper also aims to study the European Union General Data Protection Regulation and how this legislation can be helpful in the Indian scenarioconcerning e-commerce businesses with respect to data monetisation.

Keywords: data monetization, e-commerce companies, regulatory framework, GDPR

Procedia PDF Downloads 89
884 Digital Curriculum Preservation Planning, Actions, and Challenges

Authors: Misook Ahn

Abstract:

This study examined the Digital Curriculum Repository (DCR) project initiated at Defense Language Institute Foreign Language Center (DLIFLC). The purpose of the DCR is to build a centralized curriculum infrastructure, preserve all curriculum materials, and provide academic service to users (faculty, students, or other agencies). The DCR collection includes core language curriculum materials developed by each language school—foreign language textbooks, language survival kits, and audio files currently in or not in use at the schools. All core curriculum materials with audio and video files have been coded, collected, and preserved at the DCR. The DCR website was designed with MS SharePoint for easy accessibility by the DLIFLC’s faculty and students. All metadata for the collected curriculum materials have been input by language, code, year, book type, level, user, version, and current status (in use/not in use). The study documents digital curriculum preservation planning, actions, and challenges, including collecting, coding, collaborating, designing DCR SharePoint, and policymaking. DCR Survey data is also collected and analyzed for this research. Based on the finding, the study concludes that the mandatory policy for the DCR system and collaboration with school leadership are critical elements of a successful repository system. The sample collected items, metadata, and DCR SharePoint site are presented in the evaluation section.

Keywords: MS share point, digital preservation, repository, policy

Procedia PDF Downloads 129
883 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 92
882 The Ethical and Social Implications of Using AI in Healthcare: A Literature Review

Authors: Deepak Singh

Abstract:

AI technology is rapidly being integrated into the healthcare system, bringing many ethical and social implications. This literature review examines the various aspects of this phenomenon, focusing on the ethical considerations of using AI in healthcare, such as how it might affect patient autonomy, privacy, and doctor-patient relationships. Furthermore, the review considers the potential social implications of AI in Healthcare, such as the potential for automation to reduce the availability of healthcare jobs and the potential to widen existing health inequalities. The literature suggests potential benefits and drawbacks to using AI in healthcare, and it is essential to consider the ethical and social implications before implementation. It is concluded that more research is needed to understand the full implications of using AI in healthcare and that ethical regulations must be in place to ensure patient safety and the technology's responsible use.

Keywords: AI, healthcare, telemedicine, telehealth, ethics, security, privacy, patient, rights, safety

Procedia PDF Downloads 103
881 Giant Achievements in Food Processing

Authors: Farnaz Amidi Fazli

Abstract:

After long period of human experience about food processing from raw eating to canning of food in the last century now it is time to use novel technologies which are sometimes completely different from common technologies. It is possible to decontaminate food without using heat or the foods are stored without using cold chain. Pulsed electric field (PEF) processing is a non-thermal method of food preservation that uses short bursts of electricity, PEF can be used for processing liquid and semi-liquid food products. PEF processing offers high quality fresh-like liquid foods with excellent flavor, nutritional value, and shelf-life. High pressure processing (HPP) technology has the potential to fulfill both consumer and scientific requirements. The use of HPP for over 50 years has found applications in non-food industries. For food applications, ‘high pressure’ can be generally considered to be up to 600 MPa for most food products. After years, freezing has its high potential to food preservation due to new and quick freezing methods. Foods which are prepared by this technology have more acceptability and high quality comparing with old fashion slow freezing. Thus, quick freezing has further been adopted as a widespread commercial method for long-term preservation of perishable foods which improved both the health and convenience of everyone in the industrialised countries. Above parameters are achieved by Fluidised-bed freezing systems, freezing by immersion and Hydrofluidisation on the other hand new thawing methods like high-pressure, microwave, ohmic, and acoustic thawing have a key role in quality and adaptability of final product.

Keywords: quick freezing, thawing, high pressure, pulse electric, hydrofluidisation

Procedia PDF Downloads 295
880 Comparative Survival Rates of Yeasts during Freeze-Drying, Traditional Drying and Spray Drying

Authors: Latifa Hamoudi-Belarbi, L'Hadi Nouri, Khaled Belkacemi

Abstract:

The effect of three methods of drying (traditional drying, freeze-drying and spray-drying) on the survival of concentrated cultures of Geotrichum fragrans and Wickerhamomyces anomalus was studied. The survival of yeast cultures was initially compared immediately after freeze-drying using HES 12%(w/v)+Sucrose 7% (w/v) as protectant, traditional drying in dry rice cakes and finally spray-drying with whey proteins. The survival of G. fragrans and W. anomalus was studied during 4 months of storage at 4°C and 25°C, in the darkness, under vacuum and at 0% relative humidity. The results demonstrated that high survival was obtained using traditional method of preservation in rice cakes (60% for G. fragrans and 65% for W. anomalus) and freeze-drying in (68% for G. fragrans and 74% for W. anomalus). However, poor survival was obtained by spray-drying method in whey protein with 20% for G. fragrans and 29% for W. anomalus. During storage at 25°C, yeast cultures of G. fragrans and W. anomalus preserved by traditional and freeze-drying methods showed no significant loss of viable cells up to 3 months of storage. Spray-dried yeast cultures had the greatest loss of viable count during the 4 months of storage at 25°C. During storage at 4°C, preservation of yeasts cultures using traditional method of preservation provided better survival than freeze-drying. This study demonstrated the effectiveness of the traditional method to preserve yeasts cultures compared to the high cost methods like freeze-drying and spray-drying.

Keywords: freeze-drying, traditional drying, spray drying, yeasts

Procedia PDF Downloads 459
879 Role of Education in the Transference of Global Values

Authors: Baratali Monfarediraz

Abstract:

Humans’ identity is not only under the influence of a certain society or social structure but also it is influenced by an international identity. This article is a research on role of education in the manifestation of universally accepted values such as, advancement of science, improvement in the quality of education, preservation of the natural environment, preservation, and spread of peace, exchange of knowledge and technology, equal educational opportunities, benefiting from a universal morality and etc. Therefore, the relation between universal beliefs and values and educational approaches and programs is the first thing to pay attention to. Studies indicate that the first step in achieving the above mentioned goals is offering learning strategies. Therefore the importance of educational approaches and programs as a tool for the transference of ideas, experiences and thoughts becomes quite clear. Proper education gives everyone the opportunity of acquiring knowledge while creating tendency toward social activities paves the way for achieving the universal values.

Keywords: globalization, universal values, education, universal goal, values, society

Procedia PDF Downloads 351
878 Comparative Analysis of Identity Semiotics in Iran’s Modern and Traditional House Design

Authors: Maryam Ghasemi

Abstract:

One of the most significant components that provide comfort and protection is having a shelter called a house. Even if components and regions are changed or restored to meet new functions, the house's identity must be preserved. In the contemporary era, houses are increasingly being built regardless of cultural identity. This misunderstanding caused a sense of unease. This study analyses archaic and modern architecture to find semiotic areas and qualities in the latter, using the former as a reference. This study's technique used an exploratory assessment of architectural components from both periods. The Abbasid residence and the Ekbatan architectural complex were used as case studies. The identity of Iranian architecture does not correlate with current buildings. The other part is privacy, which is a missing link between traditional and modern Iranian architecture because it is directly related to the identities of homes based on the cultures of their residents.

Keywords: housing, traditional, contemporary, privacy, semiotic

Procedia PDF Downloads 78
877 Determining Importance Level of Factors Affecting Selection of Online Shopping Website with AHP: A Research on Young Consumers

Authors: Nurullah Ekmekci, Omer Akkaya, Vural Cagliyan

Abstract:

Increased use of the Internet has resulted in the emergence of a new retail types called online shopping or electronic retail (e-retail). The rapid growth of the Internet has enabled customers to search information about the product and buy these products or services from e-retailers. Although this new form of shopping has grown in a remarkable way because of offering easiness to people, it is not an easy task to capture the success by distinguishing from competitors in this environment which millions of players takes place. For the success, e-retailers should determine the factors which the customers take notice while they are buying from e-retailers. This paper aims to identify the factors that provide preferability for the online shopping websites and the importance levels of these factors. These main criteria which have taken notice are Customer Service Performance (CSP), Website Performance (WSP), Criteria Related to Product (CRP), Ease of Payment (EP), Security/Privacy (SP), Ease of Return (ER), Delivery Service Performance (DSP) and Order Fulfillment Performance (OFP). It has benefited from Analytic Hierarchy Process to determine the priority of the criteria. Based on analysis, Security/Privacy (SP) criteria seems to be most important criterion with 22 % weight. Companies should attach importance to the security and privacy for making their online website more preferable among the online shoppers.

Keywords: AHP (analytical hierarchy process), multi-criteria decision making, online shopping, shopping

Procedia PDF Downloads 215
876 Alveolar Ridge Preservation in Post-extraction Sockets Using Concentrated Growth Factors: A Split-Mouth, Randomized, Controlled Clinical Trial

Authors: Sadam Elayah

Abstract:

Background: One of the most critical competencies in advanced dentistry is alveolar ridge preservation after exodontia. The aim of this clinical trial was to assess the impact of autologous concentrated growth factor (CGF) as a socket-filling material and its ridge preservation properties following the lower third molar extraction. Materials and Methods: A total of 60 sides of 30 participants who had completely symmetrical bilateral impacted lower third molars were enrolled. The short-term outcome variables were wound healing, swelling and pain, clinically assessed at different time intervals (1st, 3rd & 7th days). While the long-term outcome variables were bone height & width, bone density and socket surface area in the coronal section. Cone beam computed tomography images were obtained immediately after surgery and three months after surgery as a temporal measure. Randomization was achieved by opaque, sealed envelopes. Follow-up data were compared to baseline using Paired & Unpaired t-tests. Results: The wound healing index was significantly better in the test sides (P =0.001). Regarding the facial swelling, the test sides had significantly fewer values than the control sides, particularly on the 1st (1.01±.57 vs 1.55 ±.56) and 3rd days (1.42±0.8 vs 2.63±1.2) postoperatively. Nonetheless, the swelling disappeared within the 7th day on both sides. The pain scores of the visual analog scale were not a statistically significant difference between both sides on the 1st day; meanwhile, the pain scores were significantly lower on the test sides compared with the control sides, especially on the 3rd (P=0.001) and 7th days (P˂0.001) postoperatively. Regarding long-term outcomes, CGF sites had higher values in height and width when compared to Control sites (Buccal wall 32.9±3.5 vs 29.4±4.3 mm, Lingual wall 25.4±3.5 vs 23.1±4 mm, and Alveolar bone width 21.07±1.55vs19.53±1.90 mm) respectively. Bone density showed significantly higher values in CGF sites than in control sites (Coronal half 200±127.3 vs -84.1±121.3, Apical half 406.5±103 vs 64.2±158.6) respectively. There was a significant difference between both sites in reducing periodontal pockets. Conclusion: CGF application following surgical extraction provides an easy, low-cost, and efficient option for alveolar ridge preservation. Thus, dentists may encourage using CGF during dental extractions, particularly when alveolar ridge preservation is required.

Keywords: platelet, extraction, impacted teeth, alveolar ridge, regeneration, CGF

Procedia PDF Downloads 45
875 An Analysis of the Strategies Employed to Curate, Conserve and Digitize the Timbuktu Manuscripts

Authors: F. Saptouw

Abstract:

This paper briefly reviews the range of curatorial interventions made to preserve and display the Timbuktu Manuscripts. The government of South Africa and Mali collaborated to preserve the manuscripts, and brief notes will be presented about the value of archives in those specific spaces. The research initiatives of the Tombouctou Manuscripts Project, based at the University of Cape Town, feature prominently in the text. A brief overview of the history of the archive will be presented and its preservation as a key turning point in curating the intellectual history of the continent. ­­­The strategies of preservation, curation, publication and digitization are presented as complimentary interventions. Each materialization of the manuscripts contributes something significant; the complexity of the contribution is dependent primarily on the format of presentation. This integrated reading of the manuscripts is presented as a means to gain a more nuanced understanding of the past, which greatly surpasses how much information would be gleaned from relying on a single media format.

Keywords: archive, curatorship, cultural heritage, museum practice, Timbuktu manuscripts

Procedia PDF Downloads 85
874 Tussle of Intellectual Property Rights and Privacy Laws with Reference to Artificial Intelligence

Authors: Lipsa Dash, Gyanendra Sahu

Abstract:

Intelligence is the cornerstone of humans, and now they have created a counterpart of themselves artificially. Our understanding of the word intelligence is a very perspective based and mostly superior understanding of what we read, write, perceive and understand the adversities around better. A wide range of industrial sectors have also started involving the technology to perceive, reason and act. Similarly, intellectual property is the product of human intelligence and creativity. The World Intellectual Property Organisation is currently working on technology trends across the globe, and AI tops the list in the digital frontier that will have a profound impact on the world, transforming the way we live and work. Coming to Intellectual Property, patents and creations of the AI’s itself have constantly been in question. This paper explores whether AI’s can fit in the flexibilities of Trade Related Intellectual Property Studies and gaps in the existing IP laws or rthere is a need of amendment to include them in the ambit. The researcher also explores the right of AI’s who create things out of their intelligence and whether they could qualify to be legal persons making the other laws applicable on them. Differentiation between AI creations and human creations are explored in the paper, and the need of amendments to determine authorship, ownership, inventorship, protection, and identification of beneficiary for remuneration or even for determining liability. The humans and humanoids are all indulged in matters related to Privacy, and that attracts another constitutional legal issue to be addressed. The authors will be focusing on the legal conundrums of AI, transhumanism, and the Internet of things.

Keywords: artificial intelligence, humanoids, healthcare, privacy, legal conundrums, transhumanism

Procedia PDF Downloads 94
873 Federated Knowledge Distillation with Collaborative Model Compression for Privacy-Preserving Distributed Learning

Authors: Shayan Mohajer Hamidi

Abstract:

Federated learning has emerged as a promising approach for distributed model training while preserving data privacy. However, the challenges of communication overhead, limited network resources, and slow convergence hinder its widespread adoption. On the other hand, knowledge distillation has shown great potential in compressing large models into smaller ones without significant loss in performance. In this paper, we propose an innovative framework that combines federated learning and knowledge distillation to address these challenges and enhance the efficiency of distributed learning. Our approach, called Federated Knowledge Distillation (FKD), enables multiple clients in a federated learning setting to collaboratively distill knowledge from a teacher model. By leveraging the collaborative nature of federated learning, FKD aims to improve model compression while maintaining privacy. The proposed framework utilizes a coded teacher model that acts as a reference for distilling knowledge to the client models. To demonstrate the effectiveness of FKD, we conduct extensive experiments on various datasets and models. We compare FKD with baseline federated learning methods and standalone knowledge distillation techniques. The results show that FKD achieves superior model compression, faster convergence, and improved performance compared to traditional federated learning approaches. Furthermore, FKD effectively preserves privacy by ensuring that sensitive data remains on the client devices and only distilled knowledge is shared during the training process. In our experiments, we explore different knowledge transfer methods within the FKD framework, including Fine-Tuning (FT), FitNet, Correlation Congruence (CC), Similarity-Preserving (SP), and Relational Knowledge Distillation (RKD). We analyze the impact of these methods on model compression and convergence speed, shedding light on the trade-offs between size reduction and performance. Moreover, we address the challenges of communication efficiency and network resource utilization in federated learning by leveraging the knowledge distillation process. FKD reduces the amount of data transmitted across the network, minimizing communication overhead and improving resource utilization. This makes FKD particularly suitable for resource-constrained environments such as edge computing and IoT devices. The proposed FKD framework opens up new avenues for collaborative and privacy-preserving distributed learning. By combining the strengths of federated learning and knowledge distillation, it offers an efficient solution for model compression and convergence speed enhancement. Future research can explore further extensions and optimizations of FKD, as well as its applications in domains such as healthcare, finance, and smart cities, where privacy and distributed learning are of paramount importance.

Keywords: federated learning, knowledge distillation, knowledge transfer, deep learning

Procedia PDF Downloads 43
872 The Application of Internet of Things in Healthcare: Building an Interconnected Health Environment

Authors: Quinn Au, Amedeo Carmine, Tauheed Khan Mohd

Abstract:

The Internet of Things (IoT) is emerging as a new development in information technology in recent years, with the potential to improve convenience and efficiency in life. Following the rise of IoT, the Social Internet of Things (SIoT) is another new development in which the benefits of connectivity and user-friendliness from social network services (SNS) are its main features. With the introduction of IoT, the world will be much more modernized, convenient, and industrialized. This paper will discuss the applications of IoT in different sectors such as healthcare services, education, and lifestyle. The privacy challenges that IoT still poses to user data will also be discussed. Finally, an empirical study to evaluate the number of active installed IoT connections in recent years demonstrates the increase in usage of IoT regardless of the privacy challenges. The study also examines some types of IoT devices that are being preferred in the market and predictions from researchers about IoT in the upcoming years.

Keywords: IoT, health care, robotics, social Internet of Things

Procedia PDF Downloads 121
871 Heritage Preservation and Cultural Tourism; The 'Pueblos Mágicos' Program and Its Role in Preserving Traditional Architecture in Mexico

Authors: Claudia Rodríguez Espinosa, Erika Elizabeth Pérez Múzquiz

Abstract:

The Pueblos Mágicos federal program tries to preserve the traditional environment of small towns (under 20,000 inhabitants), through economic investments, legislation, and legal aid. To access the program, it’s important to cover 8 requirements; one of them is the fourth, which considers ‘Promotion of symbolic and differentiated touristic attractions, such as architecture, emblematic buildings, festivities and traditions, artisan production, traditional cuisine, and touristic services that guarantee their commercialization along with assistantship and security services’. With this objective in mind, the Federal government of Mexico had developed local programs to protect emblematic public buildings in each of the 83 towns included in the Pueblos Mágicos program that involved federal and local administrations as well as local civil associations, like Adopte una Obra de Arte. In this paper, we present 3 different intervention cases: first the restoration project (now concluded) of the 16th century monastery of Santa María Magdalena in Cuitzeo, an enormous building which took 6 years to be completely restored. Second case, the public spaces intervention in Pátzcuaro, included the Plaza Grande or Vasco de Quiroga square, and the access to the arts and crafts house known as Casa de los once patios or eleven backyards house. The third case is the recovery project of the 16th century atrium of the Tzintzuntzan monastery that included the original olive trees brought by Franciscans monks to this town in the middle 1500’s. This paper tries to present successful preservation projects in 3 different scales: building, urban spaces and landscape; and in 3 different towns with the objective to preserve public architecture, public spaces and cultural traditions. Learn from foreign experiences, different ways to manage preservation projects focused on public architecture and public spaces.

Keywords: cultural tourism, heritage preservation, traditional architecture, public policies

Procedia PDF Downloads 261
870 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 121
869 “Context” Thinking of Contemporary Urban History Space under the Basis of Enlightenment of Chinese Traditional Cultural Philology: Taking West Expansion Plan of Tianyi Pavilion as An Example

Authors: Wei Yan, Wei Dong

Abstract:

Facing the understanding problem of update and preservation of urban history space under background of rapid Chinese urbanization, so at first there is a need to dig the philosophic principles of “antithesis” and “unification” which are contained in the traditional Chinese literature known as “antithesis” and do the job of planning translation by personal understanding in order to form understanding and value systems of dialectical urban history space under the foundation of “antithesis”. Then we could put forward a “context” concept for urban history space under the foregoing basis. After that, we will take the update and preservation of Ningbo Tianyi Pavilion’s historical district as an example to discuss problems related to understanding of urban history area under the basis of Chinese tradition culture, improvement of value system, construction of urban trait space and Chinese “localization” of planning theory.

Keywords: antithesis, traditional values, city renewal and conservation, the “context” of city history space

Procedia PDF Downloads 412