{"title":"An In-Depth Analysis of Smart Healthcare Monitoring Systems for Humans Based on IoT","authors":"Rubal Jeet, S. Kang","doi":"10.4018/ijhisi.324931","DOIUrl":"https://doi.org/10.4018/ijhisi.324931","url":null,"abstract":"Smart healthcare monitoring systems make use of IoT, the most recent technology. As a result, IoT incorporates one of its most critical applications, the health monitoring and control system. Within those systems, individuals commonly use pulse rate sensing devices, ECG sensor systems, and blood pressure sensor with various embedded systems to collect observations from the identification modules and send them to a database machine so that records can be transferred with the patient and the physician in an Android app. This investigation makes it easier to imagine how IoT could be used in difficult medical procedures. The remote health monitoring management system (HMS) is a key IoT app that allows users to connect to smart sensors, people, healthcare professionals, networks, and other connected devices. Clinicians can now constantly monitor their own patients from afar thanks to the tried method, the internet of things.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45027854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cloud Security And Electronic Transaction Security:","authors":"H. Abdullahi","doi":"10.47747/ijisi.v4i2.1085","DOIUrl":"https://doi.org/10.47747/ijisi.v4i2.1085","url":null,"abstract":"The insecurity of cloud leads to loss or exposure of vital information thereby threatens online transactions. These unfortunate happenings resulted in financial loss, reduced patronage of cloud services and investment diversions. Therefore, this chapter assesses cloud security and electronic transaction security. The chapter adopts qualitative research method, data were sourced secondarily through content analysis of edited books, peer-reviewed journals and credible online resources. It was descriptive in nature and thematically analyzed. The paper anchors on routine activity theory and broken windows theory. Findings revealed that cloud activities are under internal security threats of the cloud service providers and external threats of other users of cloud services. The chapter recommends proper background checks for the staff of the cloud service providers, public enlightenment on cloud security protocols. This chapter will be useful to individuals, cloud services providers, NGOs and researchers in the field of online crimes. \u0000 ","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80027794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Dynamics and Implications of the Internet of Things on Data Mining","authors":"B. Lainjo, Hanan Tmouche","doi":"10.47747/ijisi.v4i2.1168","DOIUrl":"https://doi.org/10.47747/ijisi.v4i2.1168","url":null,"abstract":"The research explores and understands the thematic dynamics of the Internet of Things (IoT) and its complementary and cross-cutting data mining (DM) platform. As part of the process, secondary data is utilized based on user-app searches generated by Google Scholar. A database is compiled, analyzed, and presented. This study also discusses the classification of data mining methods and the key data mining techniques for IoT applications. The research findings indicate that IoT continues to evolve with significant degrees of proliferation. Complementary and trailblazing data mining (DM) with more access to cloud computing platforms has accelerated the achievement of planned technological innovations. The outcome has been myriads of apps currently used in different thematic landscapes. Based on available data on user app searches, between 2016 and 2019, themes like sports, supply chain, and agriculture maintained positive trends over the four years. Moreover, the emerging Internet of Nano-Things was beneficial in many sectors. Wireless Sensor Networks (WSNs) were also emerging with more accurate and effective results in gathering information and processing data and communication technologies. However, data mining in IoT applications faces significant security, complexity, and privacy challenges. In summary, available data indicate that IoT is happening and has a significant implication for data mining. All indications suggest that it will continue to grow and increasingly affect how the world interacts with \"things.\" A backdrop of concerns exists, from developing standard protocols to protecting individual privacy. This study recommends various potential solutions; however further studies are required to determine the practicality of the suggested solutions.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85609163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Abubakar Falalu, I. Umar, Amina Ibrahim, Abdulkadir Shehu Bari, Naja’atu Kabir Naja’atu Kabir, Aminu Aminu, Muhammad Ahmad Baballe
{"title":"Design and Simulation of a GSM, Buzzer, and GPS Module-Based Accident Detection System","authors":"Muhammad Abubakar Falalu, I. Umar, Amina Ibrahim, Abdulkadir Shehu Bari, Naja’atu Kabir Naja’atu Kabir, Aminu Aminu, Muhammad Ahmad Baballe","doi":"10.47747/ijisi.v4i2.1155","DOIUrl":"https://doi.org/10.47747/ijisi.v4i2.1155","url":null,"abstract":"The average number of automobiles on the roads around the world has increased as cars become more and more accessible. Our lives are now easier because to the technology and infrastructure that are developing quickly. Technology has also increased the frequency of traffic risks and road accidents, which result in significant loss of life and property due to inadequate emergency resources. Accidents wreak havoc on victims, costing them valuable time and money. It has been determined via considerable research that the majority of accidents result in fatalities as a result of poor communication with the relevant medical authorities and the ensuing dearth of prompt medical assistance. In this study, an accelerometer can be applied as a rollover or crash detector for the car both during and after a collision. The vibration sensor can also be employed in research to measure the vibration rates of any vehicle. A serious accident can be identified by keeping an eye on the information from the accelerometer and vibration sensor. The police control center, any rescue team, or the owners of the vehicle are then sent the alert message via the GSM module, together with the latitude and longitude information provided by the GPS module. As a result, as soon as they receive the emergency notification, the police can locate the accident's site and take the appropriate action. When an accident occurs in a remote place and no one is available to report it, this technique may prove to be a lifesaver. By responding quickly, the emergency services can prevent an accident from happening and save a life","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80209387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Bi-Objective Paediatric Operating Theater Scheduling","authors":"L. Dekhici, K. Belkadi","doi":"10.4018/ijhisi.323451","DOIUrl":"https://doi.org/10.4018/ijhisi.323451","url":null,"abstract":"In this paper, a bi- objective Operating Theater scheduling is proposed. The problem is subject to order and assignment constraints. The first objective is the minimization of the operating theater opening total time also called makespan in manufacturing systems while the second is to maximize constraints satisfaction. The scheduling problem is considered as a two-stage hybrid flow shop with blocking. Several metaheuristics are compared: the firefly algorithm, bats algorithm, particles swarm optimization and local search. In addition to the care specific qualitative and quantitative parameters, the average deviation from the lower bound is used in order to confirm the effectiveness of the methods. The implementation is done on the operating theater of the paediatric hospital of Oran when it is properly and improperly sized.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48266624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bassey Ekeng Effiom, Godwin Odey Amuchi, Favour Ojedor, Gabriel Collins Ebuka, Godwin Michael Ubi
{"title":"Impact Of Information and Communication Technology (ICT), Usage on Students’ Academic Performance in University of Nigeria Nsukka Enugu State","authors":"Bassey Ekeng Effiom, Godwin Odey Amuchi, Favour Ojedor, Gabriel Collins Ebuka, Godwin Michael Ubi","doi":"10.47747/ijisi.v4i1.1109","DOIUrl":"https://doi.org/10.47747/ijisi.v4i1.1109","url":null,"abstract":"The main purpose of this study was to examine the impact of information and communication technology (ICT) usage of student’ academic performance with particular reference to the University of Nigeria Nsukka . A total population of 500 students was sampled using simple random technique. Data for this study were collected using a well-structured questionnaire. Data collected were analyzed using descriptive statistics such as simple table and percentages, while hypotheses formulated were tested using the Pearson Product Moment Correlation Analysis. The results showed that internet usage has led to significant improvement in the academic performance of student of the University of Nigeria Nsukka. The results also showed that e-learning has significant relationship with academic performance of students in the University of Nigeria Nsukka. However, the results showed that the use of Facebook by the students has no significant relationship with their academic performance. Based on the findings, the study recommends that the University authority should expand the current size of the ICT Centre in the campus and make it function efficiently. Also, the University of Nigeria Nsukka authority should provide affordable internet services to students.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85811176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Impacts of PM2.5 on Stock’s Earnings in China","authors":"Weige Huang","doi":"10.47747/ijisi.v4i1.1099","DOIUrl":"https://doi.org/10.47747/ijisi.v4i1.1099","url":null,"abstract":"The particulate matter 2.5 (PM2.5) is a serious air-pollutant emission which has caused serious risks to public health in China. The concerns could impact the decisions of people when they are choosing which companies to work and the decisions further affect the earnings of the companies. This is because people especially the ones with high skills have more choices and would like to choose to work in a company which is located in a city with less PM2.5 concentration and the companies with more high-skill people tend to perform better. That is, the earnings should be higher. This paper studies the impacts of PM2.5 concentration on earnings per share (EPS) of stocks in China market. We find that PM2.5 has positive impacts on EPS in the entire market and the impacts are larger for stocks headquartered in the northwest of China. Also, we find that there exist heterogeneous effects of PM2.5 on EPS. That is, the impacts of PM2.5 tend to increase with EPS.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89377041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information and Communication Technology Usage in Record Keeping in Public Secondary Schools in Ilemela Municipality, Tanzania","authors":"Stella Masegenya, P. Mwila","doi":"10.47747/ijisi.v4i1.1058","DOIUrl":"https://doi.org/10.47747/ijisi.v4i1.1058","url":null,"abstract":"The use of Information and Communication Technology (ICT) in education supports, improves, and optimises the dissemination of knowledge. International studies have demonstrated that ICT can increase student learning and teaching techniques. This study assessed the usage of Information and Communication Technology in Record Keeping in public secondary schools in Ilemela Municipality, Tanzania. Specifically, the study sought to identify types and roles of ICT appliances in school record keeping in public secondary schools, and to describe the attitudes of members of school community towards the usage of ICT in school record keeping in public secondary schools. The study was guided by Diffusion of Innovation Theory and Adaptive Structuration Theory. It adopted a mixed research approach and a convergent parallel research design. The target population of the study was 1032 and sample size comprised 108 respondents, sampled through probability and non-probability techniques. Research instruments included questionnaires and interview guide. Descriptive statistics and thematic analysis were used to analyse quantitative data and qualitative data respectively. The synthesis of the findings indicated that there is inadequate application of ICT in record keeping in public secondary schools because of the inadequacy of ICT facilities, lack of ICT trained personnel and insufficient funds required for overall maintenance and management of ICT related software. Furthermore, it was revealed that members of the school community have positive attitudes towards the use of ICT in record keeping in public secondary schools. The study concluded that ICT usage in record keeping is vital, it plays potential role in record keeping. Therefore, the government through the ministry responsible for education should provide public secondary schools with sufficient and modern ICT facilities that support/enhances the current practices in school administration and management","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73515443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ikepu Christian Oghenerukevwe, NumbaraBari E Kayii
{"title":"Utilization of Cloud Technology Applications for Efficient Office Administration among Secretaries in Rivers State Universities","authors":"Ikepu Christian Oghenerukevwe, NumbaraBari E Kayii","doi":"10.47747/ijisi.v4i1.1059","DOIUrl":"https://doi.org/10.47747/ijisi.v4i1.1059","url":null,"abstract":"The study aimed at assessing the utilization of cloud technology applications for efficient office administration among secretaries at Rivers State universities. Three research questions were posed and answered, while three corresponding hypotheses were formulated and tested at 0.05 level of significance. The research design adopted for this study is an analytic-descriptive design. The population for this study consisted of all 91 secretaries at Rivers State universities. The instrument used for data collection was the \"Cloud Technology Applications Questionnaire (CTAQ)\". The CTAQ was composed of 30 items graded on a four-point scale. The instrument was subjected to content and validity checks by three experts, and a reliability test was conducted using Cronbach's alpha, which gave an overall coefficient of stability of 0.75. Data gathered for research questions was analyzed using mean and standard deviation, and the formulated null hypotheses were tested with a t-test at 0.05 alpha. The findings revealed, among other things, that secretaries in Rivers State universities used platform as a service (PaaS) for office administration to a lesser extent than they used software as a service and communication as a service (CaaS) for office administration. Also, findings revealed that there is no statistically significant difference in the mean ratings of university secretaries at Rivers State University and Ignatius Ajuru University of Education for their use of platform as a service (PaaS), software as a service (SaaS), and communication as a service (CaaS) for office administration. Based on the findings, it was recommended, among others, that universities should create a digital environment to increase and support the use of cloud computing services or applications among employees.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84002321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberculture networks in the literature from 2019 to 2022","authors":"F. Morales, Cruz García Lirios","doi":"10.47747/ijisi.v3i4.1001","DOIUrl":"https://doi.org/10.47747/ijisi.v3i4.1001","url":null,"abstract":"Gross Similarly , cyberculture refers to a scenario of intellectual capital, which is an intangible asset for organizations focused on the management, production and transfer of knowledge. In this sense, the usefulness and ease of use of information technologies presuppose computational skills, but these entail risks and stigmas that inhibit the climate of relationships, support and innovation. Therefore, the establishment of a model for the study of organizational cyberculture around knowledge innovation is the objective of this work. A documentary study was carried out with a selection of sources indexed to national repositories in order to make a model for the study of cyberculture more complex. Lines of research concerning the amplification of repositories, techniques and theories around the amplification of the model are noted.","PeriodicalId":56158,"journal":{"name":"International Journal of Healthcare Information Systems and Informatics","volume":null,"pages":null},"PeriodicalIF":1.1,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86144554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}