33,689 research outputs found

    Technology as tool to overcome barriers of using fitness facilities: A health behavioural perspective

    Get PDF
    Underlying health conditions have been highlighted throughout the literature preventing several populations from engaging in physical activity. There have been little to no attempts made in addressing these populations directly in fitness facilities or indirectly using information technology (IT). The current research aimed at exploring current barriers and practices regarding IT and technological support in a fitness facility environment, using health behaviour theories (HBT) to explain member experiences. The sample was composed of 66 participants selected from 5 fitness facilities in Manchester, UK, of which there were 60.6% males and 39.4% females aged from 18-59. The instrument used was a survey. Health motives were reported by 71.2% of the participants, while ‘injury’ (reported by 70.2%), ‘lack of knowledge about exercise and health’ (reported by 42.4%), and ‘illness’ (reported by 28.1%) as main barriers to use the facilities. The main support mechanisms provided by the facilities management were staff support (59%), with online and technological support only accounting for 38.6% of facility support. The use of personal IT within the facilities were utilised by over half the participants (50.2%). The study revealed the need of additional IT support by fitness facilities in the form of applications and digital platforms. The findings are discussed with HBT as the theoretical underpinnings and suggestions are made for future research regarding IT advancements as support mechanisms

    Location models in the public sector

    Get PDF
    The past four decades have witnessed an explosive growth in the field of networkbased facility location modeling. This is not at all surprising since location policy is one of the most profitable areas of applied systems analysis in regional science and ample theoretical and applied challenges are offered. Location-allocation models seek the location of facilities and/or services (e.g., schools, hospitals, and warehouses) so as to optimize one or several objectives generally related to the efficiency of the system or to the allocation of resources. This paper concerns the location of facilities or services in discrete space or networks, that are related to the public sector, such as emergency services (ambulances, fire stations, and police units), school systems and postal facilities. The paper is structured as follows: first, we will focus on public facility location models that use some type of coverage criterion, with special emphasis in emergency services. The second section will examine models based on the P-Median problem and some of the issues faced by planners when implementing this formulation in real world locational decisions. Finally, the last section will examine new trends in public sector facility location modeling.Location analysis, public facilities, covering models

    A comprehensive meta-analysis of cryptographic security mechanisms for cloud computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.The concept of cloud computing offers measurable computational or information resources as a service over the Internet. The major motivation behind the cloud setup is economic benefits, because it assures the reduction in expenditure for operational and infrastructural purposes. To transform it into a reality there are some impediments and hurdles which are required to be tackled, most profound of which are security, privacy and reliability issues. As the user data is revealed to the cloud, it departs the protection-sphere of the data owner. However, this brings partly new security and privacy concerns. This work focuses on these issues related to various cloud services and deployment models by spotlighting their major challenges. While the classical cryptography is an ancient discipline, modern cryptography, which has been mostly developed in the last few decades, is the subject of study which needs to be implemented so as to ensure strong security and privacy mechanisms in today’s real-world scenarios. The technological solutions, short and long term research goals of the cloud security will be described and addressed using various classical cryptographic mechanisms as well as modern ones. This work explores the new directions in cloud computing security, while highlighting the correct selection of these fundamental technologies from cryptographic point of view
    • 

    corecore