The Ehteraz Contact Tracing Application

Background Information

Globally, the COVID-19 pandemic, which began in January 2020, affected all facets of peoples lives in profound ways. By May 11, 2021, coronavirus had killed at least 3,299,764 and infected at least 158,651,638 people around the world (WHO, 2021). In Qatar, the total number of cases by the same date was 211,732 cases with 516 confirmed deaths (Ministry of Public Health, 2021). One of the most effective responses to the pandemic is mass vaccination (OECD, 2021). The work on the vaccines began as soon as COVID-19 spread. Currently, 94 vaccines are being tested in human clinical trials and 32 have reached the final phases of testing (Zimmer et al., 2021). Although numerous studies have confirmed the efficacy of these vaccines, COVID-19 continues to decimate several nations (Moghadas et al., 2020). For instance, according to Our World in Data (2021), 387 thousand new cases of coronavirus are reported in India every day. Furthermore, there remains the possibility that new pandemics will emerge in the future (RahimiRad et al., 2016). While the exact probability of another 21st century pandemic is difficult to predict, Domínguez-Andrés et al. (2020) state that new pandemics within the next 100 years are highly possible due to globalization and high population density. Therefore, other measures apart from vaccination, such as systematic testing and contract tracing, are required to control epidemics.

Testing and contact tracing work best in tandem, as contact tracing improves the efficiency of testing. The tests for coronavirus are made in three cases: when people voluntarily ask to take the test and pay for it, when a patient has symptoms of the disease, and when a person had close contact with a COVID-19 patient (Callaghan et al., 2020). To help identify those who may have been exposed to COVID-19 due to close contact with a carrier, public health officials use a process called contact tracing. If people are informed that they may have had close contact with a COVID-19 carrier, they will be tested for coronavirus, isolated, and treated if necessary. These measures help to break the chains of infection transmission (WHO, 2020).

The potential dangers of COVID-19 spreading asymptomatically and pre symptomatically highlights the need for identifying all possible contacts through a prompt and effective contact tracing (OCallaghan et al., 2020). WHO (2020) defines contact tracing as the process of identifying, assessing, and managing people who have been exposed to someone who has been infected with the COVID-19 virus (para. 1). Contact tracing is crucial for slowing down epidemics, as it helps to reduce transmission rates through timely identification, isolation, and treatment of new cases (WHO, 2020). Before digital technologies became widespread, contact tracing was done with a pen and paper approach. People were asked to write down all their contacts during the period of infection so that public health officials could notify them of the possibility of infection. With the advancement of technology, many countries developed cellphone applications to track contacts of COVID-19 patients (OCallaghan et al., 2020). EHTERAZ is a contact tracing application used in Qatar that had a significant positive impact on the countrys pandemic situation (Varma et al., 2020). This paper assesses the attitudes of the public toward contract tracing using EHTERAZ.

Significance

COVID-19s ongoing spread makes contact tracing crucial for preventing further outbreaks. Modern contact tracing applications can use the latest technological advances to automatically identify the possibility of contamination with a short time delay (Colizza et al., 2020). Horvath et al. (2020) emphasized that contact tracing applications can moderate the spread of the disease. According to Munzert et al. (2021), governments view contact tracing applications as one of the most promising methods for addressing the COVID-19 pandemic. The applications can help both citizens and authorities in responding quickly to the possibility of contamination to minimize health risks in communities. Such applications, however, can only be effective if they are integrated with local health policy, infectious people are isolated quickly and appropriately, rapid notification is in place, and effectiveness can be transparently assessed (Colizza et al., 2020). Additionally, users adherence and integration of the application in all communities is critical for the effectiveness of such applications (Yang et al., 2020). This study aims to provide crucial information about the attitude of the public towards the EHTERAZ contact tracing application, which can help to modify the application to increase its effectiveness now and in future pandemics.

Problem Statement

Over the past year, contact tracing applications have gained increasing importance in mitigating COVID-19 (Munzert et al., 2021). At the same time, the attitude of the public towards such applications varied. Williams et al. (2020) conducted a study of contact tracing apps in the UK, which found significant evidence that misconceptions, privacy concerns, stigma, and uptake issues have negatively affected publics perception of contact tracing applications. Horvath et al. (2020) conducted a study with a similar focus on public attitudes based on a sample from Dynata, a research firm based in the United States. These studies demonstrated concerns the users of contact tracing had, which provided valuable insights to improve the applications. For instance, Horvath et al. (2020) revealed that people prioritize centralized government contact tracking systems regardless of privacy issues. In summary, research on peoples perception of contact tracing applications became prevalent in 2020.

Research on Qatars EHTERAZ application is centered on its adoption, privacy analysis, and usage policies, but little is known about the publics attitudes toward it. This knowledge is crucial for improving the application and the associated infection control practices. Thus, this paper attempts to close a gap in the literature concerning the attitudes, beliefs, perceptions, and concerns of citizens of Qatar to EHTERAZ.

Purpose, Thesis, and Hypothesis

Purpose statement: The research aims to explore the publics attitudes toward EHTERAZ, a COVID-19 contact tracing application in Qatar, and assess opportunities to improve EHTERAZ use and effectiveness to mitigate the further spread of COVID-19 and for contract tracing in future pandemics.

Thesis statement: The perception of EHTERAZ is affected by a wide variety of factors.

Hypothesis statement: While Qatar residents EHTERAZ generally view EHTERAZ as a beneficial and trustworthy application, uptake level, quality, privacy concerns, trust in the government, and awareness about the functionality of the application have a significant impact on the attitude toward EHTERAZ.

Research Questions

  • RQ1: What are the publics attitudes toward Qatars COVID-19 contact tracing application (EHTERAZ)?
  • RQ2: What are the perceived benefits of using EHTERAZ to mitigate the spread of COVID-19?
  • RQ3: What are the drivers and barriers of the public in using EHTERAZ?

COVID-19 Pandemic

The COVID-19 pandemic has a significant impact on the global economy and peoples lives. The impact would have been even greater if humanity had not learned from the previous pandemics. Due to the measures taken by governments and international organizations, the COVID-19 pandemic is not yet among the top-five deadliest pandemics in human history. Some of the most famous pandemics include smallpox, Influenza of 1918 (Spanish Flu), Plague of Justinian, AIDS, and Black Plague (West, 2020). Currently, only 2% of the global population has been documented to have coronavirus, while the Influenza of 1918 infected 500 million people or one third of the world population at that time (Taubenberger & Morens, 2006). While some questions concerning the origins, virus-related features, and underlying causes remained unanswered, the knowledge gained from studying Spanish Flu aided in the development of strategies to control the COVID-19 pandemic (Morens et al., 2020). In particular, the studies of Spanish Flu together with other pandemics helped to understand the importance of hygiene and lockdown measures to control the spread of the disease.

While there are certain common features among all the pandemics mentioned above, there are some distinct features of the COVID-19 pandemic. First, all of the recent pandemics, including coronavirus, have emerged in the context of globalization, which distinguishes them from previous epidemics by accelerating disease transmission (West, 2020). Second, the COVID-19 pandemic was addressed using unprecedented measures that were a result of close collaboration of numerous government and international organizations. Humanity acted together to control the pandemic by implementing lockdown measures. Third, modern technology was used to treat and diagnose the disease (Gavi, 2020). Previously, during the Black Plague, Spanish Flu, and Justinian Plague, such measures were not available for a variety of reasons. However, when compared to recent pandemics, such as swine flu and Ebola, the measures used to control the transmission of disease were comparable. Finally, the pandemic was addressed using the experience gained from other epidemics to control the disease (Morens et al., 2020). In particular, it was the first pandemic that used the experience of automated contact tracing to control the outbreak. Having the experience of automated contact tracing was crucial as the global society could quickly develop mobile applications and implement policies to control the transmission of the disease. In summary, there are some unique features of the COVID-19 pandemic, some of which were favorable and unfavorable for controlling it.

Brief History of Contact Tracing

Contact tracing is the process of finding, evaluating, and managing people who have been exposed to an infection (WHO, 2020). It is crucial for timely diagnosis of new cases along with quarantine measures to effectively break the chain of transmission (WHO, 2020). Traditional contact tracing involved asking patients to write down all their contacts during the period of infection so that public health officials could notify them of the possibility of infection (Müller et al., 2000). Today, technology has evolved to the point where contact tracing applications can automatically gather information about peoples possible contacts (OCallaghan et al., 2020). Contact tracing is effective for controlling infectious diseases when combined with other methods such as vaccination and screening (Müller et al., 2000). Before delving into the attitudes toward contact tracing, it is beneficial to look back at the history of its development.

Contact tracing was first mentioned in the UK in Sanitary Inspectors Handbook by Taylor (1901). In the late 1800s, the UK established a large administrative body to control the spread of infectious diseases. The standard procedures of the sanitary inspectors during that time included a careful examination of infected peoples homes, the extraction of patients, and the investigation of possible contacts. There was no legal framework requiring patients to reveal all their contacts, and doctors had to rely on persuasion to acquire relevant information (Mooney, 2020). Other nations used similar practices.

In the US, contact tracing was associated primarily with sexually transmitted diseases (STDs or STIs). The practice started in the early 1900s and raised several ethical issues (Bland, 2020). In the 1990s, CDC launched partner counseling and referral services aimed at helping the partners of STD/STI patients acquire healthcare services (Janssen et al., 2001; Bland, 2020). Thus, contact tracing is not a new measure developed specifically for controlling pandemics.

In the 21st century, the need for contact tracing has received increased attention. According to a research concerning various epidemic models, random screening did not have the desired effect on controlling the spread of infectious diseases. Random screening is testing for the virus without following a particular pattern in patient selection. Nevertheless, when combined with individual contact tracing, the effectiveness of screening and vaccination was found to increase significantly (Müller et al., 2000). If a person is found to be contagious, contact tracing can help to find, screen, isolate, and treat people who are at high risk of being contaminated (WHO, 2020). Hyman et al. (2003) claimed that the effectiveness of contact tracing is dependent on the cause of the disease. In the case of HIV, contact tracing was found to be more helpful for identifying super spreaders i.e. individuals who spread infections to a large group of people. On the other hand, random screening was more effective in the epidemics with no superspreaders (Hyman et al., 2003). Thus, both contact tracing and random screenings were found to be effective measures for HIV epidemic mitigation.

The first established idea to use technology for contact tracing emerged in the 2010s. The primary problems with conventional contact tracing by interviewing infected people involve privacy issues (Farrahi et al., 2014). Privacy issues often resulted in insufficient knowledge about the contacts and increased time to receive the required information (Hyman et al., 2003). In order to avoid these problems, Farrahi et al. (2014) proposed the model of contact tracing using communication traces. The researcher assumed that communication by mobile phone is a good proxy for future physical interaction. Empirical evidence also demonstrated that contact tracing via phone traces was an effective tool for controlling the spread of disease at the beginning of an epidemic due to fast-growing costs with an increased number of cases (Farrahi et al., 2014).

The idea of using mobile applications for contact tracing first appeared in the mid-2010s, during the Ebola epidemic in Africa. Sacks et al. (2015) described early testing of mobile applications for contact tracing in Guinea. Even though the results were promising, the data was limited, and future research was required to assess the effectiveness of the new approach. Danquah et al. (2019) conducted an extensive study of the effectiveness of using contact tracing applications in comparison with paper-based contact tracing. The results revealed that mobile application use was associated with increased detection ability and increased detection time. While paper-based contact tracing returned only 39% of contacts, mobile contact tracing found 68% of contacts (Danquah et al., 2019). Thus, it can be concluded that even the earliest versions of mobile contact tracing applications were effective.

Before 2020, the studies of the effectiveness of contact tracing focused primarily on Ebola, tuberculosis, leprosy, and HIV. Saurabh and Prateek (2017) noticed that even though the potential of using contact tracing of any kind for addressing the spread of disease was high, it was limited by the trust of the population in the healthcare system. Smith and Aerts (2014) mentioned that the international medical associations found contact tracing one of the major strategies for diminishing the spread of the disease. Dennis et al. (2018) found that contact tracing with effective analysis techniques can improve the identification of HIV cases. Underwood et al. (2003) found that contact tracing was more effective for controlling tuberculosis than new entrants screening strategy. Thus, the history of contract tracing practices before the COVID-19 pandemic is rich in data.

Automated Contact Tracing Applications

Automated contact tracing applications are viewed as one of the most effective methods for reducing the spread of COVID-19 and other highly contagious infections (Kim & Paul, 2020). Since proximity data can be automatically collected by mobile devices, it can be used for identifying possible contacts of an infected person (Braithwaite et al., 2020). In 2020, Google and Apple announced a partnership about creating a Bluetooth-powered contact tracing algorithm to help with the early identification of new COVID-19 cases (Veale, 2020). Both companies made slight changes in their privacy policies to allow healthcare authorities to gather contact data and store it in a decentralized database (Veale, 2020). Thus, global automated contact tracing is an emerging theme in recent research.

There are several issues that limit the effectiveness of automated contact tracing. Kim and Paul (2020) state that there are problems of automated contact tracking associated with determining the significant contact time with infected individuals. Additionally, adequate contact tracing is impossible without engaging a vast majority of the population (Braithwaite et al., 2020). Nevertheless, it should be acknowledged that the effectiveness of contact tracing will remain very limited, which implies that other measures, including systematic screening and vaccination, should be utilized together with automated contact tracing (Kim & Paul, 2020).

Peoples Perception of Automated Data Collection

Automated data collection and analysis are currently being used in different spheres in modern society. One of the most excessively studied spheres is personalized marketing, both online and offline. Peoples attitude towards personalized ads is affected by different factors. Tessier (2021) argues that the frequency of appearance of personalized advertisements has a high impact on peoples perception of the benefits of such ads. Relatively rare advertisements are generally viewed as beneficial, while frequent personalized ads often cause the feeling of intrusiveness. Thus, people experience privacy concerns when the gathered data is used too often. Additionally, poorly processed data that leads to wrong conclusions cause dissatisfaction among people (Tessier, 2021). OCallaghan et al. (2020) also supported the notion that privacy worries contact tracing application users. Therefore, privacy concerns and feelings of intrusiveness are among the central problems associated with automated data collection.

Marketing studies demonstrated that many customers were ready to share their private information in some cases. For instance, Kerem and Ulla (2018) conducted a qualitative study, which revealed that people are often ready to share their private information with marketers. Customers are willing to share their private information only if the perceived benefits of such sharing are high (Ziefle et al., 2016). In other words, people are ready to trade-off their privacy for access to items and services in which they have a high degree of interest. Dahl and Fridh (2019) confirm this notion, stating that consumers can often be irritated by personalized ads after the purchase, as the ad is no longer perceived as beneficial. Moreover, personalized advertisements may lead to the feeling that a wrong decision was made, which causes regret (Dahl & Fridh, 2019). Thus, attitudes towards automated data collection are very closely connected to the perceived benefits of information disclosure.

Another factor that affects the attitude towards automated data collection is the transparency of their procedures. In particular, Strycharz (2018) stated that privacy concerns emerge based on the available knowledge. Thus, marketers are encouraged to provide extensive information for the users about the policies and measures implemented to protect and use private information (Strycharz, 2018). Additionally, informing the customers about adhering to the government standards of privacy protection is crucial for improving the attitude towards automated data collection (Hess et al., 2020).

Attitudes Toward COVID-19 Automated Contact Tracing Applications

The literature review revealed several themes associated with attitudes toward contact tracing applications. The common themes included uptake issues, the possibility of stigma, privacy concerns, inadequate knowledge about contact tracing applications, and perceived benefits of contact tracing.

Uptake Issues

The effectiveness of contact tracing applications depends on the level of uptake of the population under analysis. Braithwaite et al. (2020) stated that contact tracing applications could help limit the spread of COVID-19 if at least 56% of the population uses them. This implies that determining the factors that affect the support of contact tracing is crucial for the applications success. After conducting extensive survey-based research in France, Guillon and Kergall (2020) revealed three basic factors that affected the level of uptake of the application. These factors included trust in the government, perceived individual health consequences, and time preference. This implies that if governments improve publics trust and educate the public about the consequences of being infected, then the adoption of contact tracing applications will increase.

Sharma et al. (2021) conducted research to identify sociodemographic factors affecting the adoption of a contact tracing application in India. The results demonstrated that the level of income, number of years of formal education, age, and gender were significant determinants of the willingness to install the application. One of the major problems for adopting the application in India was the lack of cellphones, as the countrys level of poverty is very high (Mehta & Shah, 2003). Thus, the reasons for failure to adopt contact tracing applications in India were different from those in France. Yet another study conducted by Jansen-Kosterink et al. (2020) analyzed a large sample of Dutch citizens and revealed that the central reason for failure to adopt contact tracing applications was privacy concernsdifferent from both France and India.

The review of the literature concerning the uptake of contact tracing applications demonstrated that factors affecting the matter differed depending on the region. Therefore, the findings of research in other countries can be applied to Qatar with significant limitations. This finding confirms the need for further research concerning the attitudes toward contact tracing application (EHTERAZ) in Qatar.

Privacy Concerns

Privacy concerns are among the central reason for people refusing to use contact tracing applications in various regions. As mentioned in the previous section, a study based on a large sample of Dutch citizens showed that fear of security breaches of centralized databases with personal data was the primary reason for refusing to use contact tracing applications (Jansen-Kosterink et al., 2020). Similarly, a survey of Irish citizens demonstrated that the primary reason for refusing to use contact tracing applications was the fear of technological companies and mistrust in the government (OCallaghan et al., 2020). In other words, the Irish population feared that their privacy would be breached, and the government would use the data in the future for other purposes. Thus, privacy issues associated with automated contact tracing are named as central reasons for refusing to use contact tracing applications in Europe.

The effect of privacy concerns on the adoption level can be moderated by the privacy policies implemented and communicated by the government. Hassandoust et al. (2021) stated that privacy initiatives implemented by the government had a positive impact on peoples attitudes toward contact tracing applications. Additionally, privacy-controlling technological features, such as anonymity and utilization of less sensitive data were positively perceived by users of contact tracing applications in the United States (Hassandoust et al., 2021; Utz et al., 2021). Bengio et al. (2021) suggest that contact tracing applications should incorporate informed consent, strict oversight, virtual data acquisition based on the principles of anonymity, and informed decision-making. In summary, privacy issues of automated contact tracing applications are a matter of increased concern to the users.

Stigma

Social stigma is another crucial issue associated with the adoption of contact tracing applications. Williams et al. (2020) explain that people may fear learning about being infected, which causes them to become anxious and depressed. Since avoiding is one of the most common coping mechanisms for depression and anxiety, people prefer to abstain from using contact tracing applications, prompt testing, and timely treatment (Peprah & Gyasi, 2020). Apart from creating barriers to adoption levels of contact tracing applications, stigma can also lead to under-reporting of new COVID-19 cases and an increase in the number of fatalities (Kisa & Kisa, 2020). The anxiety and avoidance are associated with the fear of being discriminated against, causing delayed diagnosis, increased transmission, and delayed notification of contacts (Sotgiu & Dobler, 2020). Thus, social stigma is associated with low adoption levels and decreased effectiveness of contact tracking applications.

Inadequate Knowledge

Low adoption levels of contact tracing applications may be associated with inadequate knowledge about such applications and associated misconceptions. Williams et al. (2020) reported that many people from a sample of UK citizens were unaware of the existence of contact tracing applications utilization for fighting COVID-19. Similarly, Hassandoust et al. (2021) claimed that privacy concerns are associated with the lack of knowledge about the privacy measure that was implemented to defend the sensitive information shared through the application. For instance, some people believed that contact tracing applications created some interactive maps visible to everybody, where infected people are shown (Williams et al., 2020). Huang et al. (2021) reported that high awareness about the importance of contact tracing is the key to high adoption levels. ApplebyArnold et al. (2019) suggested that using social media to promote the idea that the government uses such applications to share control and inform the public about possible dangers. Thus, a low level of awareness and accurate knowledge about contact tracing is one of the key factors associated with the promotion of contact tracing.

Perceived Benefits

The adoption of contact tracing applications was also dependent on the perceived benefits received from using them. Guillon and Kergall (2020) stated that perceived individual health consequences were one of the dominant factors encouraging the adoption of contact tracing applications in France. In other words, the higher the perceived health benefits, the higher the chance of adopting such applications (Guillon & Kergall, 2020). Williams et al. (2020) indicated that people who use contact tracing are those who believe it serves a greater good. For instance, citizens of the UK who were ready to use the application believed that the benefits of using it exceeded any perceived drawbacks (Williams et al., 2020). Thus, learning about how the public understands the associated benefits is crucial for high uptake of the application.

EHTERAZ

Even though EHTERAZ is a relatively new application for contact tracing, there is a significant body of research assessing its technical characteristics. The assessment of the application differed among the reviewed studies. For instance, Raman et al. (2021) evaluated the application as inadequate, as it was not available in the local language and did not have an adequate tutorial. Additionally, Raman (2021) criticized the application for being very low in transparency rights, ease of accessibility, and security. However, Zhao et al. (2020) reported that the application had very accurate proximity measurements that incorporated Bluetooth technology and GPS. In other words, the application could accurately determine the contacts automatically. According to Varma et al. (2020), the implementation of the contact tracing policies and EHTERAZ as an obligatory measure for addressing the spread of COVID-19 helped to minimize the impact of the pandemic on society and economics.

Knowledge Gap

The literature review demonstrated that contact tracing is a well-established practice. The utilization of modern technology had a mixed impact on contact tracing, as it was associated with significant benefits and challenges. Although research in various countries regarding the citizens attitudes toward the COVID-19 applications was conducted, such a study has not been conducted yet in Qatar. At the same time, even though several studies on EHTERAZ were conducted, the publics perception of the application was not assessed. The present study will contribute to the current body of knowledge by closing the identified gap.

Information Security Policies and Measures

How well developed are my organizations information security policies?

In my opinion, information security policies in my organization are well developed and fully implemented. This is because they all in action and fully followed. Updating of the policies also takes place regularly to prevent dormancy of the policies.

Policies and measures to ensure confidentiality, availability, and reliability

  1. Confidentiality: this is ensured when disclosure of information to unauthorized individuals or systems is controlled. The organization uses policies such as encryption of all sensitive data when being transmitted to other sites. There is also the use of cookies policy incorporated to ensure the privacy of electronic communications within the organization. The confidentiality of health care records in the organization is also maintained in accordance with the Information Practices Act (Peltier, 2004). This Act issues the following policies: Only authorized persons shall have access to any medical records, If not in use medical records shall be locked up in files in a locked room, and that the organization shall review its record management procedures occasionally (Peltier & Blackley, 2005).
  2. Availability: these are policies to ensure that information is available when needed. Policies implemented in the organization to ensure information availability include Use of backups; this is whereby copies of any stored information are produced. There is also the use of physical security; physical security is provided to the information systems to prevent the availability of information to unauthorized persons.
  3. Reliability: Reliability of the information in the organization is mainly through ensuring that personnel who are dealing with the information are fully qualified. There are also disaster recovery actions to ensure the loss of information is reduced (Vacca, 2009).

Steps to take to ensure that data remains accessible in the event of a catastrophic event such as a fire or other natural disaster?

  1. Always have a backup: at least one copy of the original data should be kept in a different storage disk. Backup could also be in form of hard copies printed and stored in secure cabinets, preferably kept in an offsite location. This helps protect the backup from damage in case of a disaster. In an offsite, location is not possible then at least the backup should be kept in a fireproof safe (Vacca, 2009).
  2. Ensure backup is updated at least once a week: to ensure that all data is kept in a backup, the organization should make sure that that the backup copies are up to date such that in case of a disaster, no data is lost.
  3. Procuring fire-resistant cabinets and safes: The business will always have some vital records being kept in an on-site location. For onsite storage, standard filing equipment is mostly used, as is believed to offer fire protection (Peltier & Blackley, 2005).

To ensure that organizations information is accessible in the event of a disaster, the following should be undertaken: prioritizing the specific categories of vital records lost in the disaster (Peltier & Blackley, 2005). Vital records mainly include contracts for ownership of property, operational records, produced reports, current client files, and software source records. All these should be tracked and designated to secure the relocation site. The arrangement of how backup is to be transported should also be made to prevent any possible loss during transportation (Peltier & Blackley, 2005).

Things to do to further enhance information security:

  1. Installation of patches: for greater security of information, the organization can apply patches. These are small software add-ons structured to deal specifically with security holes and other computer problems.
  2. Installation of application-layer firewalls: these enhance information security in the organization by monitoring and inspecting packets entering and leaving the organization. Firewalls also foil hackers on the internet and make a computer invisible to internet intruders (Peltier, 2004).
  3. Training and education of employees: the organization can also enhance its information security by educating the employees on information security issues. Employees educated on the importance of information security will help reduce the chances of insecurity threats such as social engineering. Employees will also be careful when dealing with outsiders through the internet.

References

Peltier, T. R. (2004). Information security policies and procedures: a practitioners reference. London: Auerbach Publications.

Peltier, T.R & Blackley, J. A. (2005). Information security fundamentals. New York: Auerbach Publications.

Vacca, J. R. (2009). Computer and information security handbook. Boston: Kaufmann.

Pattern Recognition in Machine Learning

With the development of new technology, it becomes possible to widen a range of tasks that can be fulfilled by computers. The tasks that modern researchers and programmers focus on are different in nature, but all of them must have practical significance and be helpful for users. This literature review is intended at studying the works devoted to geometric shape recognition. It focuses on geometric pattern recognition in machine learning discussed in modern articles from high-quality scholarly sources.

The recognition of geometric and other patterns in machine learning did not become a popular research subject a long time ago. In their study devoted to the methods of texture recognition, Ojala et al. focus on the multiresolution approach to the classification of textures in black-and-white images with the help of uniform local binary patterns (985). The advantages of the method discussed above are presented by the ease of use, the ability to provide accurate results, and applicability to situations that involve nonuniformly illuminated scenes.

The creation of algorithms that recognize simple geometric shapes is helpful in many fields of activity, including photography, challenge-response tests, and production. As is clear from the works that delve into the history of geometric shape recognition, the ability of computers to distinguish between various shapes is the key aspect of diagram understanding problematized in the twentieth century (Song et al. 936). Shape recognition methods are widely used in modern software systems that are capable of working with both digital and hand-sketched images (Song et al. 936). The variety of approaches to the recognition of geometric shapes allows creating programs with reference to specific tasks.

Speaking about other trends in geometric pattern recognition discussed by modern experimentators, it is pivotal to focus on the Hough transform and its uses. As is stated by Fernández et al., the Hough transform is a popular technique used for shape recognition and the detection of complex elements in 2d images (3901). The technique was invented almost forty years ago, but it is still used in the machine analysis of various images.

When it comes to the beneficial features of the Hough transform, modern researchers note its positive results in working with heterogeneous lighting conditions, low-quality images, or image noise (Mukhopadhyay and Chaudhuri 993). Despite the benefits of this technique for shape recognition, some authors argue that its voting processes need to be improved. For instance, Spratling believes that the need to vote for numerous parameter values results in spurious peaks and quantization effects (16). With that in mind, some aspects of the technique need improvement to provide more accurate results.

The analysis of principal components or PCA is another method used to teach computers to differentiate between various geometrical shapes. The mentioned method is based on the extraction of principal components, a number of uncorrelated variables retrieved with the help of orthogonal transformations. PCA forms the basis of numerous approaches to geometric shape recognition in machine learning; for instance, Ahmed and Aradhya use it to test the subspace method of image recognition (10).

As is clear from the review by Song et al., other popular and widely used shape recognition techniques for 2d images include one-pass detection and randomized detection (937). Additionally, the researchers list the use of global geometric properties of input elements for further filtering and recognition.

In the end, by teaching computers to recognize simple and complex geometric shapes, it is possible to solve a number of visual tasks related to image analysis, the protection of data, and even quality control. Nowadays, the methods of machine learning are widely used to create systems capable of recognizing geometric patterns in various types of images, including binary ones. Popular methods of shape recognition and extraction are based on well-known techniques such as the Hough transform.

Work Cited

Ahmed, Muzameel, and Manjunath Aradhya. A Study of Sub-Pattern Approach in 2D Shape Recognition Using the PCA and Ridgelet PCA. International Journal of Rough Sets and Data Analysis (IJRSDA), vol. 2, no. 3, 2016, pp. 10-31.

Fernández, Ariel, et al. Optical Implementation of the Generalized Hough Transform with Totally Incoherent Light. Optics Letters, vol. 40, no. 16, 2015, pp. 3901-3904.

Mukhopadhyay, Priyanka, and Bidyut B. Chaudhuri. A Survey of Hough Transform. Pattern Recognition, vol. 48, no. 3, 2015, pp. 993-1010.

Ojala, Timo, et al. Multiresolution Gray-Scale and Rotation Invariant Texture Classification with Local Binary Patterns. IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 24, no. 7, 2002, pp. 971-987.

Song, Dan, et al. Retrieving Geometric Information from Images: The Case of Hand-Drawn Diagrams. Data Mining and Knowledge Discovery, vol. 31, no. 4, 2017, pp. 934-971.

Spratling, Michael W. A Neural Implementation of the Hough Transform and the Advantages of Explaining Away. Image and Vision Computing, vol. 52, 2016, pp. 15-24.

Explosion at Concept Sciences Inc. Facility

One should perfectly realize the fact that the industrial advance we have today is a two-edged sword that could be very useful and dangerous at the same time. The fact is that the tendency towards the increased complexity of manufacturing processes and the use of hazardous materials to produce a certain product could result in unpredicted consequences. The modern chemical industry could be taken as a great example to this statement.

There are numerous accidents at factories and plants. Besides, the explosion at Concept Sciences could be considered the event of this sort. For this reason, its investigation could contribute to the improved comprehending of the issue and might help to minimize the risk of new emergencies of this sort.

The explosion at Concept Sciences happened on February 19, 1999. A process vessel that contained hundreds of pounds of hydroxylamine exploded at the same time in Allentown, Pennsylvania. In the course of the investigation, specialists determined that the HA in the process tank was explosively decomposed (The explosion at Concept Sciences, 2002). One of the main cases for this process was the concentration of the substance and high temperature that triggered the reaction.

The explosion was extremely powerful and caused serious damage to the area. The worst thing was that four CSI employees and one manager were killed in the accident. Two people were injured seriously and four other individuals acquired moderate traumas (Waldman, 1999). Finally, due to the extreme power of the explosion, numerous facilities that in the area were also damaged.

The given accident became a unique event that attracted attention to the great danger that comes from the chemical industry. For this reason, there were numerous attempts to investigate it and outline clear causes that resulted in the appearance of the given complex situation. Besides, there are several causal factors. First of all, the high temperature could be considered one of the main aspects that resulted in the appearance of the emergent situation.

Moreover, HA crystals and solutions could explosively decompose at high concentrations (The explosion at Concept Sciences, 2002). It means that this could also serve as one of the main causal factors preceding the explosion and triggering the chemical reaction. High concentration of these elements along with heating resulted in increased speeds of decomposition and serious damage.

In this regard, the investigation of the given case could help to understand the unique importance of safety information and the impact it might have on the preservation of the appropriate security level. One should realize the fact that if workers had known the information about the great danger of high concentrations of HA crystals, the explosion would have been avoided (Long, 2004). Moreover, the high temperature that was observed during the process also became a crucial factor. In this regard, the adequate information about the appropriate security measures could help to eliminate the potential threat and avoid losses.

Altogether, to improve the process safety management, it is crucial to provide workers with the most relevant and appropriate information about chemical changes and alterations of the state of materials related to these. Only under these conditions emergencies could be avoided. Finally, it is also curial to introduce the constant monitoring system that will be able to trace the alterations in the state of the most hazardous materials and signalize in case some threatening states are observed.

References

Long, L. (2004). The explosion at Concept Sciences: Hazards of hydroxylamine. Process Safety Progress, 23(2), 114-120. Web.

The explosion at Concept Sciences: Hazards or hydroxylamine. (2002). Web.

Waldman, A. (1999). Five are killed in explosion in Pennsylvania. The New York Times. Web.

Laying Sidewalks and Bridges in Missouri

Description

In most states, public entities are permitted to collaborate in service delivery and joint purchasing. Bridge bundling is the practice of delivering small-scale pavement and bridge projects under one multi-project contract (Xiong et al. 37). The aim is to reduce mobilization cost, derive economies of scale benefits, support contractor scheduling, and improve output (Xiong et al. 43). The bundles usually include bridges with comparable features that are situated on country roads to minimize traffic impacts.

Missouris Safe & Sound Bridge Program

In 2008, the Missouri Department of Transportation (MoDOT) undertook this five-year program to rebuild or replace 802 bridges in a severe or poor state. The total cost was $685 million financed through indirect GARVEE bonds paid as 24 annual reimbursements of $50 million (MoDOT). The amount constituted about a third of the Federal budget MoDOT gets annually for bridge replacement. The scope of the project covered the rehabilitation of 248 bridges and the reconstruction of another 554 by December 31, 2013 (Federal Highway Administration). The program was accomplished ahead of time; it took 3.5 years, not five years as initially planned. The project delivery method involved design-bid-build (DBB) for rehabilitation and design-build (DB) for bridges earmarked for replacement. Procurement entailed the MoDOT inviting bids in clusters based on-site, nature of repairs, or project size (Federal Highway Administration). Five companies won the contract to restore 248 bridges. The remainder (earmarked for replacement) were bundled into one design-build contract and awarded to KTU Constructors.

Moving from a P3 Program

Missouris Safe & Sound bridge program represented a shift from the Public-Private Partnership (P3) model to the design-build project delivery method. The P3 approach involves contracts with private contractors or consortia in construction, operation, or financing of infrastructural projects that last throughout the projects lifespan (Tran 2). Thus, the method tends to limit government influence and introduces risk premiums. By bundling projects according to location, nature of repairs, and size under the Safe & Sound program, MoDOT could minimize financing and contracting costs and project planning time under the DBB/DB framework. Therefore, the primary reason for moving away from the P3 model was to ensure the fast delivery of quality bridges at low costs.

Other Bundled Bridge Efforts

Many Departments of Transportation (DOT) have attempted the practice of bundling bridge projects. For example, the Rapid Bridge Replacement program being done by the Pennsylvania DOT involves the reconstruction of 558 bridges in a lousy state through one multi-project contract (Xiong et al. 37). In contrast, Oregon continually invites bids for its bundled projects archived in a database. In 2012, the New York DOT grouped its 2,500 bridges into six statewide DBB and four DB contracts in four areas (Xiong et al. 37).

Advantages of a Bundled Bridge Program

A single bundled contract has distinct advantages over alternate contracting approaches. In my view, cooperative purchasing creates economies of scale in sourcing for materials, resulting in lower costs for individual bridge projects. Additional cost savings may come from improved mobilization (labor and equipment) and flexibility in scheduling that minimizes costly closures. Bundled bridge projects can also attract adequate bidders. As a result, different competitive contract sizes that lend themselves to economies of scale can be formulated for each local contractor. Further, higher efficiency is achieved in logistics (due to road closures) and standard designs, equipment, and skills (Price 1). Other advantages include speed due to local subcontracting and simplicity in the negotiation and management of a single bundled contract.

Bundled Bridge Candidates

A successful bundling program depends on the efficacy of the criteria for identifying bridges to be included in each cluster. The Washington State Association of County Engineers recommends that, for projects over 20ft, bundled bridges must be county-owned, have a sufficiency rating of <50, and be structurally deficient (4). Further, the projected replacement cost must not exceed $5 million. In general, project categories eligible for grouping are those in geographic proximity and those where the engineers cost estimate is higher than the projected cost under the bundled program.

Disadvantages to a Bundled Bridge Program

Bundling concentrates risk in one contractor. As such, the company will often demand a more significant risk premium in a single multi-project contract compared to the total cost of individual contracts (Tran 6). Thus, the state will pay more for this kind of agreement than for separate projects. Moreover, in my view, the impacts on the budget will be more severe to the state when a corporation holding a single-project contract exceeds the budget than when one of the five or smaller contractors does the same. Bundling also means only larger, well-resourced firms can bid for the grouped projects. Thus, it may not attract many bidders.

Non-candidates for a Bundled Bridge Program

Some projects are not suited for bundling. Bridge rehabilitation or replacement may not be possible if the sites are miles apart due to administrative costs and logistical challenges (Xiong et al. 43). Further, work categories that cannot be undertaken simultaneously or sequentially are not ideal for bundling. Traffic impacts due to road closures are reduced through efficient scheduling. A project whose estimated cost (engineer) does not exceed the budget allocated to it under the multi-project contract should not be bundled. Bundling aims to reduce spending in each venture through the economies of scale.

Works Cited

Federal Highway Administration. Project Profile: Missouri Safe and Sound Bridge Improvement Program. U.S. Department of Transportation, Web.

Missouri Department of Transportation [MoDOT]. Safe and Sound Fact Sheet. Missouri Department of Transportation. Web.

Price, Chris. Crumbling Bridges: Now is the Time to Take Action. HNTB Corporation, 2016.

Tran, Dai, et al. A Project Delivery Selection Matrix for Highway Design and Construction. Journal of the Transportation Research Board, vol. 2347, no. 1, 2013, pp. 3-10.

Washington State Association of County Engineers [WSACE]. Bridge Bundling: WSACE Annual Conference. WSACE, 2017.

Xiong, Yingge, et al. Bundling or Grouping Pavement and Bridge Projects: Analysis and Strategies. Transportation Research Record: Journal of the Transportation Research Board, vol. 2613, 2017, pp. 37-44.

Disadvantages of Taking College Courses Online Instead of on Campus

Outline

Thesis: The following is an illustration of the various disadvantages posed by taking online college courses as opposed to on-campus learning, including limited interaction, technical difficulties, and time management for these students.

Background

Online courses are a major component of contemporary learning. While covid-19 elicited the topic of their relevance in k-12 and high schools, colleges and other higher education institutions have well-developed mechanisms to foster this form of learning. Nonetheless, while they afford students the chance to learn remotely, they posit various ingrained disadvantages. The following is an illustration of the various disadvantages posed by taking online college courses as opposed to on-campus learning, including limited interaction, technical difficulties, and time management for these students.

Limited Interaction

Dumford and Miller posit a major impediment to learning through online systems in college, stating that it results in limited interaction, hindering communication. The authors dictate that students who pursue online courses exhibit lower concern with collaborative learning (Dumford & Miller 453). This form of education is integral for real-life operations, a field where these students become disadvantaged. Furthermore, they also have reduced student-faculty interactions when compared with students that take part in on-campus studies (Dumford & Miller 460). Such students are also likely to refrain from discussion with other learners in their course, a stark contrast with their counterparts attending traditional classrooms. The authors indicate the reduced exposure to efficient teaching practices these students face as well as inferior interaction quality (Dumford & Miller 452). The study illustrates that while online education has its benefits, it is disadvantageous in many instances as the students do not interact, leading to fewer connections and a tendency to work together with others. Students that graduate from online courses exhibit lower teamwork habits due to the structure of their learning environment.

Technical Difficulties

Internet access and technology are critical components in online learning; however, technical difficulties indicate that access remains limited, positing a negative issue related to online education. Florida College Access Network states that many college students do not have access to reliable internet (Par.1). They are also plagued by issues such as sharing devices with their peers, an issue that hinders their capacity to perform optimally. Reliable internet signifies a major problem for college students, not an inconvenience. Their reliance on high-quality internet makes poor connections an impediment to attaining their degrees (Florida College Access Network par.2). The research also indicates that uneven internet access would boost inequalities between students. For instance, the author states that 1 in 4 students has internet issues that affect their ability to connect to course content (Florida College Access Network par.3). Lack of reliable internet also affects students with caregiver duties, with 27% of the group stating they face these challenges (Florida College Access Network par.3). As such, online learning leads some students to access partial course content with spotty internet connection.

Paul and Jefferson also claim that face-to-face instruction is beneficial to students when compared to online learning, as the latter depends on networked systems. The authors state that students are forced to rely on access to a steady internet connection for their studies (Paul & Jefferson par.20). In this instance, if a student experiences technical problems, they cannot submit assignments, communicate, and may be impaired when accessing study material. Online students are likely to have other obligations and commitments that take up their time. An unsteady connection would frustrate the student, discourage learning, and hinder performance (Paul & Jefferson par.20). Despite the freedom to move around, students are grounded by an internet connection and cannot operate without high bandwidth. While a student may easily find free Wi-Fi locations, their internet connection quality may be low. Online students require a fast connection to work on school projects.

Time Management

Students that take online courses determine time management as the greatest disadvantage to their studies. While online education posits the possibility for an individual to learn anytime and does not limit their location, its best appeal also makes it difficult for most students who choose this option to learn. Online learners feel pressure to finish assignments and operate as in face-to-face classes. They have to be organized, a factor that elicits problems as online students are notorious procrastinators (BC Campus par.12). These students may get behind if they do not have individuals that pressure them to develop timetables to cover their assignments on time before their next classes (BC Campus par.12). Therefore, time management is a crucial disadvantage for students taking online courses as they are not provided with schedules to handle classwork.

Furthermore, Montgomery college showcases one of the online learnings major issues as procrastination, an aspect of bad time management. Internet-based courses are notorious for procrastination as students do not have a guiding force stating they should attend class on time (Montgomery College par.13). Students freedom in this aspect translates to a dangerous state as they do not have reminders for assignments that are due or upcoming exams. This freedom with no supervision makes it easy for individuals to put off assignments and reading in an online environment (Montgomery College par.13). An individual may realize they have wasted a lot of time and are required to submit assignments and take exams they are ill-prepared to handle.

Procrastination is a widespread issue among college students that pursue online courses as they may prioritize other issues as opposed to learning. Irma Jones and Dianna Blankenship also state that procrastination is a major problem for undergraduate students and their faculties (2). They claim the habits effects on academic performance pose a significant concern for these institutions. In this instance, student characteristics, technology, and instructor characteristics are the main variables affecting online students performance (Jones & Blankenship 2). An online environment provides procrastinators with the perfect environment to deviate from their duties. They discern that study materials are readily available and fail to allocate their days effectively to optimally gain academic information, making the system disastrous to their learning (Jones & Blankenship 2). Online learning provides a good environment for procrastinating, affecting many students performance.

Rutgers considers time management in terms of distractions at home as opposed to a classroom setting for college students as a major problem for online learning. Online learning requires electronic devices, an ironic issue as they may distract a student from the learning process for extended periods (Botros par.2). Students are prone to using their phones or keeping them close during study sessions. They may be distracted by incoming text messages, ignoring their timetable and deviating from studying to respond (Botros par.2). It is also plausible for students to watch videos or open social media accounts such as Twitter as they study. These distractions are major detriments to student performance as they do not concentrate on their studies due to time management challenges.

Works Cited

Botros, Sandy. Online Learning Distractions at Home, 2020, Web.

Dumford, Amber D., and Angie L. Miller. Online Learning in Higher Education: Exploring Advantages and Disadvantages for Engagement. Journal of Computing in Higher Education, vol. 30, no. 3, 2018, pp. 452465.

Jones, Irma S, and Dianna C Blankenship. Year Two: Effect of Procrastination on Academic Performance of Undergraduate Online Students. Research in Higher Education Journal, vol. 39, 2021, pp. 111.

Montgomery College. Advantages and Disadvantages of Online Courses. Montgomery College, Maryland, Montgomery College, 2022, Web.

Paul, Jasmine, and Felicia Jefferson. A Comparative Analysis of Student Performance in an Online vs. Face-to-Face Environmental Science Course from 2009 to 2016. Frontiers in Computer Science, vol. 1, 2019, Web.

Shier, Mary. 10.2 Pros and Cons of Online Learning. Student Success, BCcampus, 2020, Web.

An Analysis of the TechnologyOne Case

The software as a service (SaaS) model of distribution of software products has experienced considerable popularity in the past years. The case of TechnologyOne presents an example of a company that successfully transitioned to providing cloud-based enterprises SaaS solutions. Nevertheless, the company would still benefit from maintaining both cloud and on-site versions of its software since both options have advantages.

TechnologyOne would benefit from keeping an on-site version of its enterprise software because it would be able to target another niche. On-premise software provides better data accessibility, safety, and complete ownership (Aljawarneh & Malhotra 2020). Thus, TechnologyOne could provide its on-site software to organizations such as Defense Departments which value the three aforementioned factors. Research shows that on-site software is still in demand, which means that the market would sustain the provision of two options simultaneously (Zhang, Yue, & Hui, 2019). When offering a SaaS package by TechnologyOne to potential clients, I recommend they use the support plan by the hour. Such a method of support provision would be more reasonable to use because it would save a lot of money for the client. Yet, its negatives would be the inability to access the support at any moment and the possibly high expenses in the case if the demand for help is high.

Cloud-based SaaS involves keeping large arrays of data on the software providers servers, which leads to security problems. Therefore, the primary security measures I will look for in a SaaS company are data encryption, data loss prevention, and access management. In the case of international companies, the main question would concern the location of their servers since, in certain jurisdictions, including the United States, data storage laws state that government agencies can ask companies to grant access to the data stored on their servers (Pollack, 2016). Thus, when choosing a cloud-based service provider, it is essential to ensure that it abides by the laws protecting data, such as the General Data Protection Regulation of the European Union (What is GDP, n.d.). As a result, the organization will ensure its private datas safety.

Thus, TechnologyOne is a service that could benefit from offering on-premise solutions. The company clients should choose the by-the-hour support plan to save resources. When choosing cloud-based software providers, they must check the regulations they abide by.

References

Aljawarneh, S., & Malhotra, M. (2020). Impacts and challenges of cloud business intelligence. IGI Global.

Pollack, D. (2016). Is your cloud data safe from government searches? IAPP. Web.

What is GDPR, the EUs new data protection law? (n.d.). GDRP.EU. Web.

Zhang, X., Yue, W., & Hui, W. (2019). Software piracy and bundling in the cloud-based software era. Information Technology & People, 32(4), 10851122. Web.

Technologies Assisting Freelancers in Their Work

The term freelance worker refers to a person performing tasks for an individual or corporation without an employment agreement extending beyond the completion of the job. The term freelancer also implies a person working solely for himself/herself. As his/her own boss, a freelancer is, of course, in complete charge of their scheduling and allocation of effort and resources, including to high tech devices.

Successful freelancing is often associated with competence in riding the current technology wave to hasten work and broaden mastery. It is clear that the Internet is a vital time and effort saver for all freelancers, and one of the most convenient ways to access it is through the newest e-book readers. These devices allow users to track what others say about books, current events, issues, and developments in most fields.

Monitoring relevant Internet forums and checking out the homepages of interested parties is a powerful way to catch up and keep up with daily changes in public preferences and opinions. Visiting sites related to unfamiliar subjects offers a quick and dirty education in a new field. These regular visits are accomplished easily with an e-book reader.

Such portable devices also allow people who often are separated by miles and oceans to pass information from one to another. While the temptation to share gossip is powerful, these e-book readers, with their portable web access, are also a vehicle for sharing professional advice and hints, tips, and tricks.

Looking backward, a generation in technology, other devices, and facilities have become almost de rigor. It is really difficult, for example, to envision a freelance writer surviving for long without email and Internet access these days. Writing companies and clients expect a freelancer, whatever their specialty, to be available online, more or less around the clock. They may need to receive email alerts, to communicate with customers and staff, and to be able to upload documents promptly through a website or directly through email.

Mobile phones freed freelancers from being chained to their landlines, stuck inside waiting for callbacks, or calling into their companys headquarters to find out about orders! Even companies that encourage writers to work from home sometimes need to coordinate in person. Fortunately, cell phones can reduce the amount of time and stress involved in attending in-office meetings.

For freelancers, their home often becomes their office, often resembling the proverbial boiler room. A mobile phone, especially one with some advanced features, can extend the reach of the home office, both in terms of distance and function. A cell phone may even make a vacation feasible if the device is equipped with Internet browsing features, SMS, voice mail, and a camera. Most issues can be resolved; communication lines remain open, and work progresses seamlessly.

According to data gathered by ResearchWritingCenter.com, from internal reports and with the help of Google Analytics:

  • In 2009: 28.3% of all visits to the site were performed through mobile devices.
  • In 2010: 56.5 % of all visits to the site were performed through mobile devices for just the first months.

These numbers are predicted to increase as devices increase in power and flexibility, helping writers and other freelance professionals to accomplish more in less time, and stay connected with each other and with the wider world.

Losing or fatally damaging a high-tech gadget (and it does happen  rain, swimming pools, hard floors, kids: all are deadly!), once one has arduously entered ones whole lifes information into its memory chips, is a potential disaster. Good sense suggests retaining a backup of all this personal and professional data on a laptop or desktop, kept safely at home. The laptop or desktop can be updated with each days new work or information.

The synergistic combination of the flexibility and mobility offered by hand-held devices and the immense computing power contained in the newest models of laptops and desktops can catapult a determined, disciplined, creative writer into higher salary and promotion.

These days, even a smart, capable writer needs to know how to use and exploit at least some of the modern technological equipment to succeed. You still require superb qualifications, of course, good communication and people skills, deep knowledge and expertise, and a professional attitude. Companies may nonetheless say a regretful No to individuals who fumble and hang back when it comes to the new necessary devices of everyday working life.

West Palm Beach Citys Emergency Plan

Introductory Material

This Emergency Plan is developed for West Palm Beach, West Palm Beach County, Florida. In 2015, the population of the city was 106,779 people (U.S. Census Bureau, 2017). The citys demographic data (2010 census) reveal the need to pay specific attention to such groups as the elderly, Hispanic populations, people with disabilities as the number of these people is significant, and it is steadily growing (see Figure 1).

People with special needs often require special equipment and medication as well as a particular type of care. It is noteworthy that many aging people and people with disabilities do not reside in healthcare facilities but prefer receiving care in their homes, which creates an additional load on the emergency agencies during an evacuation. Moreover, approximately 20% of residents live below poverty, which means that they do not have vehicles and tend to have limited access to communication systems used in the case of emergency (Prasad, 2016).

The number of the citys population changes during the year. The number of farmworkers increases significantly during the harvest season, and it can be difficult to estimate the exact number of workers as some of them are illegal immigrants. A considerable part of these workers does not speak English, which should be taken into account during the implementation of communications operations (Rivera & Kapucu, 2015). The number of tourists also affects the population density during different seasons. For instance, the season lasts from January to March, and approximately 30% of tourists come during this period. During other seasons, approximately 20-25% visit the city. The city also has correctional facilities that can house over 2,500 inmates (Palm Beach County Sheriffs Office, 2016). This is a significant number of people who should be coordinated with specific care during the evacuation, shelter-in-place, or quarantine procedures.

 Demographic data.
Figure 1. Demographic data, estimates of 2010.

Promulgation Document / Signatures

This plan is to be followed in all emergency situations that can occur in West Palm Beach, Florida. The plan is updated and recognized as the countys Emergency Operations Plan. This plan is approved and signed by the Palm Beach Board of County Commissioners. The responsible authority for the coordination, development, updating of this plan is the Division of Emergency Management (DEM) of the city.

Name Signature Date

Approval and Implementation

The DEM is the major agency responsible for the development and implementation of this emergency plan. The staff of this agency is responsible for updating this plan. The agencies that are also involved in the development and/or implementation of this plan (for instance, law enforcement or healthcare agencies) can initiate some changes. However, the DEM staff develops (in collaboration with the corresponding agencies) and adds the changes to this plan. It is applicable in case of citywide emergency or when some parts of the jurisdiction are affected. This plan supersedes all previous plans.

West Palm Beach Mayor
Jeri Muoio
Signature ____________________ Date
_____________________

Record of Changes

N Date Description of Change Section Posted by

Record of Distribution

Agency Name of the person receiving the document Delivery Date Number of Copies
West Palm Beach Mayor office
West Palm Beach Fire-Rescue
Florida Fire Chiefs Association
Chief Fire Officers Association of Palm Beach County
Florida Fish and Wildlife Conservation Commission
West Palm Beach Police Department
Florida Department of Health in Palm Beach County West Palm Beach Health Center
Hazardous Materials Oversight Committee
Emergency Planning Committee
Post-Disaster Redevelopment Advisory Committee
State Emergency Response Coalition
Statewide Radiological Emergency Preparedness (REP) Taskforce
Urban Area Working Group

Purpose, Scope, Situation Overview, and Assumptions

Purpose

The purpose of this Emergency Plan is to:

  • Develop a comprehensive planning approach that will be utilized when addressing hazards, threats, disasters, and emergencies that may affect West Palm Beach, Florida.
  • Reduce the vulnerability of all people residing in the city or visiting it.
  • Describe major types of hazards, threats, disasters, and emergencies that may impact West Palm Beach, Florida.
  • Describe the roles and responsibilities of the agencies involved.

Scope

This plan is to be implemented when major city-wide disasters occur.

Situation Overview

Hazard Analysis Summary

The major hazards that may affect the city include severe weather conditions that include but are not confined to hurricanes, tornadoes, droughts, and fires. Due to its geographical position, low elevation, and frequent storms, the city is vulnerable to floods. Heatwaves are also a serious hazard that mainly affects the elderly (Rivera & Kapucu, 2015). Another hazard is the risk of the spread of communicable diseases such as the Zika virus, H1N1 virus, and even Ebola. The Ebola virus was documented in Palm Beach County in 2014). Other hazards include agricultural diseases and pests, technological hazards (transportation incidents, hazardous materials, nuclear power plant accidents), and human-caused hazards (terrorism, school violence, mass migration).

Capability Assessment

The DEM collaborates with various partners as well as different agencies on the state and county levels. This collaboration ensures the ability to respond effectively to hazards. All the areas (peoples health, property safety, risks assessment, communication, and so on) are addressed due to these collaborations. The agencies provide extensive training to their employees aimed at planning, responding, and preventing various hazards. Emergency personnel also receives training (as well as formal education) from the Emergency Management Institute.

Mitigation Overview

West Palm Beach Mitigation Program involves a set of pre- and post-disaster initiatives, plans, projects, and policies aimed at reducing and preventing any damages from numerous hazards. Local Mitigation Strategy is developed in accordance with existing state and federal guidelines and is updated based on the advanced research in the sphere of emergency management. The partnerships between agencies, businesses, and individuals ensure the effective implementation of this plan.

Concept of Operations

The process of the declaration of the state of emergency includes four agents (see Figure 2). The DEM is the major coordinator of the collaboration of the agencies involved in the implementation of the emergency response. This organization notifies the agencies that are to be involved to respond to a hazard about the exact hazard that is taking place or is expected to occur. The DEM also addresses local healthcare facilities, educational establishments, and other public or private organizations to help in responding to the hazard.

The process of the declaration of a state of emergency.
Figure 2. The process of the declaration of a state of emergency.

Organization and Assignment of Responsibilities

The Division of Emergency Management includes a number of sections that address different areas of emergency management (see Figure 3).

The structure of the Division of Emergency Management.
Figure 3. The structure of the Division of Emergency Management.

The Emergency Management Director requests a local state of emergency. The Public Safety Director is notified of the need to declare the state of local emergency and addresses the City Administrator who advises the Mayor. The Mayor declares the local state of emergency.

Direction, Control, and Collaboration

When the state of emergency is declared, the citys Emergency Operations Center (EOC) starts responding in accordance with existing plans depending on the hazard and its scale. The EOC is responsible for effective communication and coordination of agencies, organizations, and individuals involved. The EOC follows the corresponding emergency response plan, but this agency also can make decisions if some unexpected events take place.

Information Collection, Analysis, and Dissemination

The Documentation Unit of the Planning Section is responsible for data collection, analysis, and dissemination. This unit is responsible for the development of hard copies and digital copies of reports, charts, and graphics revealing the most relevant information concerning the situation. The distribution channels are mainly electronic while hard copies may be sent (especially after the completion of emergency operations).

Communications

The DEM has the responsibility to notify the agencies at state and federal levels. This organization also responses to the request of the corresponding state and federal agencies. The communication is carried out by land-line telephones, cell phones, online systems.

Administration, Finance, and Logistics

The DEM is responsible for collecting, disseminating data, developing plans and protocols as well as their dissemination. The changes to the plans are introduced by this agency through other agencies (for example, EOC, law enforcement facilities, and so on) can request the DEM to change some plans or protocols. The Administration / Finance Section involves units that focus on the needs of organizations and businesses as well as individuals associated with financial issues, recovery, and so on (see Figure 4).

The Administration / Finance Section Structure.
Figure 4. The Administration / Finance Section Structure.

The Recovery Branch includes units that focus on the coordination of resources, information, and capabilities among the involved public sector and private organizations and agencies. This branch is responsible for enhancing the stakeholders preparedness in pre- and post-disaster response. The lead agency is the Office of Small Business Administration, and support agencies include the DEM, Small Business Development Board, Disaster Recovery Coalition and others. The Infrastructure Branch of the DEM includes transportation unit, public works unit, and energy unit that address pre-disaster preparedness and post-disaster recovery associated with roads, transportation, and so on (Davis et al., 2014).

Plan Development and Maintenance

This plan is developed by the DEM in collaboration with other agencies. This organization provides copies of the plan to the agencies, public and private organizations involved. The Division is also responsible for the development of training to its and other agencies employees.

Authorities and References

Palm Beach County

  • Resolution R-89-384 (Declaration of a State of Local Emergency

Florida Statutes

  • Chapter 22 (Emergency Continuity of Government)
  • Chapter 154 (Public Health Facilities)
  • Chapter 252 (Emergency Management)
  • Chapter 381 (Public Health)
  • Chapter 768 (Good Samaritan Act)

Federal

  • Public Law 93-288 (Federal Response Plan)
  • Public Law 100-707 (The Stafford Act)

Emergency Support Function Annexes

ESF #1  Communications

Communication systems

Communications systems available during emergencies are divided into federal, state systems, and local (Florida Disaster, 2012). A Regional Emergency Response Network is the communications system that includes radios with high capabilities enabling the systems functioning during hurricane seasons. It is also mobile, which is essential during an emergency (Rivera & Kapucu, 2015). It enables to access the most remote areas and some of the most vulnerable populations. People living in poverty have limited access to information and often learn about emergencies when it is late (Prasad, 2016). A tactical system and one station with such elements as Emergency Deployable Interoperable Communication System, a secure wireless communications network, and Tactical Satellite Communications.

The use of communications systems

The use of the systems depends on the nature of the hazard as well as the functioning of the systems as some of them may be damaged, especially in case of severe weather hazards. When all the systems operate properly, it is possible to utilize cell phones and land-line telephones as well as the Internet (to share data). However, when these lines are damaged, the Regional Emergency Response Network and Emergency Deployable Interoperable Communication System will be used.

Authority to declare states of emergency and succession

  • The Mayor declares the state of local emergency.
  • In the absence of Mayor, the succession leadership line includes Vice Mayor, Administrator, Public Safety Department Director, or Emergency Management Director.

The declaration process of the state of emergency

The state of the emergency declaration process.
Figure 5. The state of the emergency declaration process.

Activation of the corresponding facilities during an emergency

The Division of Emergency Management is responsible for activating and deactivating the necessary facilities. The units involved are the Documentation Unit, Resource Unit, Demobilization Unit, Administration/Finance Section, Emergency Operations Center Support Unit, the Point of Distribution Unit, Special Needs Unit.

The notification of neighboring jurisdictions

The DEM is responsible for notifying neighboring jurisdictions. The organization will use such tools as cell phones, land-line telephones, the Internet, emergency communications networks if other channels are damaged.

The coordination of communications between on-scene and off-scene staff and agencies

To manage communications between on- and off-scene personnel, it is possible to communicate via cell phones, radio, land-line telephone, or any combination of these channels (Huder, 2012).

Training and exercise

The Emergency Management Institute offers training courses concerning the use and development of communications systems. The DEM provides training to its employees. Public and private organizations are encouraged to train their employees to raise awareness of existing communications systems and the ways to use them (Rivera & Kapucu, 2015).

ESF #2  Search and Rescue

Lead Agency

West Palm Beach Fire-Rescue

Support Agencies

  • Florida Fire Chiefs Association
  • Chief Fire Officers Association of Palm Beach County
  • Florida Fish and Wildlife Conservation Commission
  • Amateur Radio Emergency Services
  • The citys fire and police departments.

Steps were undertken to conduct an urban search, waterborne rescue, and search, aeronautical search, and rescue

The units mentioned above (in collaboration with the National Guard if necessary) locate, extricate, provide the necessary medical aid to victims trapped in collapsed buildings and structures. Waterborne search and rescue procedures involve locating (missing people and vessels or damaged aircraft of missing people), extricating, and providing medical assistance to the survivors. Aeronautical search and rescue measures involve locating, extricating, and providing medical aid to missing people in the wilderness or rural areas.

Communications and the provision of psychological support and medical aid

Department of health is the leading agency coordinating, planning, disseminating data concerning psychological support, and the provision of support and medical aid to survivors. The DEM collaborates with the Department of Health and disseminates the necessary information (protocols, guidelines, and so on) to public and private organizations and agencies.

Training and exercise

The agencies involved provide the necessary training to their employees.

Support Annexes

Population Protection

Evacuation and sheltering-in-place

A large-scale evacuation of the residents, travelers, and domesticated animals of West Palm Beach is implemented in case of such hazards as severe weather (hurricane, tornado, and so on), floods, wildfires, terrorist attacks, hazardous materials spills, and so on. It is vital to make sure that emergency personnel explains the need to leave their homes as some people are reluctant to do so. It is necessary to pay specific attention to communication with people with special needs and the elderly (Ozguven et al., 2015). The Emergency Management Director recommends initiating evacuation, and the Mayor is responsible for initiating this measure. The shelter-in-place measure is initiated when contamination occurs, the communicable disease rapidly spreads.

Emergency response for people with disabilities, aging populations, unattended minors

The aging population is one of the most vulnerable groups, and it has been estimated that over 70% of fatalities are older than 60, while almost half of the victims are over 75 (Ozguven et al., 2015). Some of the major concerns associated with emergency response for disabled people include communications and transportation (Rutkow, Taylor, & Gable, 2015). Healthcare facilities providing care to such populations have the necessary equipment to carry out transportation effectively. During emergencies, private organizations may be addressed, and their equipment can be used to implement transportation and communication successfully (Rivera & Kapucu, 2015).

Isolation and quarantine

Quarantine and isolation are initiated in case of contamination of certain territories. It is initiated by the Mayor. Law enforcement agencies (in the most serious cases, National Guard) will ensure public order ad isolation of the affected people.

Registration and document tracking actions

The Documentation Unit is responsible for registration and documentation.

Management and relocation of incarcerated individuals

Correctional facilities have the corresponding emergency plans and protocols disseminated by the DEM. These facilities ensure the effective implementation of evacuation, shelter-in-place, quarantine, or isolation of incarcerated people. If some damage is caused to the necessary equipment and vehicles, the facilities address the Emergency Operations Center that provides the necessary tools.

Actions are undertaken to respond to peoples refusal to leave their houses

A possible response to people's refusal to leave their houses.
Figure 6. A possible response to peoples refusal to leave their houses.

Management and coordination of pets evacuation

The DEM includes the Animal Services Unit that collaborates with the Division of Animal Care and Control, American Red Cross, Florida Fish, and Wildlife Conservation Commission to ensure the effective evacuation of pets.

Training and exercise

The organizations involved provide training to their employees. The DEM, as well as the organizations and agencies mentioned in this section, may initiate some exercise to train their employees.

Hazard-, Threat-, or Incident-Specific Annexes

Flood

Hazard summary

Flood is a rise in water, which is often a result of heavy rains or failure of water control structures such as dams (National Weather Service, n.d.). Floods often cause significant damage to infrastructure as roads and railways are often affected. In severe conditions, buildings can also be substantially damaged. It is often associated with a threat of contamination of food and drinking water, and the spread of diseases in people and animals.

Authority and agencies to notify, mitigate against, prepare, and respond to, as well as recover from the disaster

Agencies involved.
Figure 7. Agencies involved.

Resources

The agencies mentioned above provide the necessary resources. The DEM and Emergency Operations Center can also address private and public organizations that can provide assistance and resources.

Transportation

Since infrastructure may be damaged, air transportation can be used to implement search and rescue operations.

Public safety

Public safety can be ensured by local law enforcement agencies and the National Guard if necessary.

Training and exercise

The DEM, as well as the organizations and agencies mentioned in this section, can initiate some exercise to train their employees.

Biological Incident

Hazard summary

  • Zika virus is one of the most serious hazards that may occur in West Palm Beach. The virus is associated with such birth defects as microcephaly when contracted by pregnant females (Florida Health, 2017). Children affected by microcephaly tend to have smaller brains and have developmental disorders.
  • The spread of H1N1 in the county in 2009-2010 put under threat the health of thousands of people. This disease is still regarded as one of the most serious biological threats that are addressed via vaccination, shelter-in-place, and quarantine measures.
  • A suspected case of Ebola in the county also reveals the need to develop a sound plan of treating passengers coming from different areas affected by epidemics (Rivera & Kapucu, 2015).

Agencies involved

The involved agencies are the Division of Emergency Management, the Mayor who declares the state of emergency, the Department of Health, Florida Department of Environmental Protection (assists in investigating and determining various disease outbreaks), the Center for Disease Control and Prevention citys healthcare facilities.

Assessment, prevention and protection measures

Department of Health and the Center for Disease Control and Prevention assess and monitor the number of affected people. Department of Health coordinates the populations vaccination.

Communications

The major communication channels may include cell phones, land-line telephone, online channels, or any combination of these methods. If the biological hazard is accompanied by severe weather conditions and some channels are damaged, it is necessary to use emergency networks (for example, Emergency Deployable Interoperable Communication System).

Isolation and quarantine

Isolation and quarantine procedures should be implemented as there is a threat to the development of an epidemic. Individuals are isolated in healthcare facilities, and there can be no need in addressing law enforcement agencies. The local law enforcement agencies (National Guard, if necessary) ensure the effective implementation of large-scale isolation and quarantine measures.

Transportation

The continuity of transportation should be monitored as the high rate of absenteeism may significantly impair the process. The coordination of travel from and to the affected territories is essential to reduce the threat of the spread of a possible epidemic.

Public safety

Local law enforcement agencies will ensure the implementation of the quarantine measures as well as maintenance of public order as epidemics can be associated with an increased level of criminal activity and public unrest.

Training and exercise

Department of Health in collaboration with the DEM and local healthcare facilities provides training and exercise to their employees.

References

Davis, J., Paramygin, V., Vogiatzis, C., Sheng, Y., Pardalos, P., & Figueiredo, R. (2014). Strengthening the resiliency of a coastal transportation system through integrated simulation of storm surge, inundation, and nonrecurrent congestion in Northeast Florida. Journal of Marine Science and Engineering, 2(2), 287-305.

Florida Disaster. (2012). The State of Florida comprehensive emergency management plan. Web.

Florida Health. (2017). Zika virus. Web.

Huder, R. (2012). Disaster operations and decision making. Hoboken, NJ: John Wiley & Sons.

National Weather Service. (n.d.). Flood safety. Web.

Ozguven, E., Horner, M., Kocatepe, A., Marcelin, J., Abdelrazig, Y., Sando, T., & Moses, R. (2015). Metadata-based needs assessment for emergency transportation operations with a focus on an aging population: A case study in Florida. Transport Reviews, 36(3), 383-412.

Palm Beach County Sheriffs Office. (2016). Corrections general.

Prasad, S. (2016). Assessing the need for evacuation assistance in the 100 year floodplain of South Florida. Applied Geography, 67, 67-76.

Rivera, F., & Kapucu, N. (2015). Disaster vulnerability, hazards and resilience. Orlando, FL: Springer.

Rutkow, L., Taylor, H., & Gable, L. (2015). Emergency preparedness and response for disabled individuals: Implications of recent litigation. The Journal of Law, Medicine & Ethics, 43(s1), 91-94.

U.S. Census Bureau. (2017). People.

Bionic Vests: The Use in Business

CBC [ CBC News: The National]. (2018). A bionic vest decreases fatigue and prevents injury | The Fix [Video]. YouTube. 

Bionic vests improve and facilitate working conditions for workers in Ford factories. This video describes the features of operation, the pros and cons of specific bionic vests. Based on the facts provided in the video, vests operate without a particular power source. The principle of operation is based only on mechanical movement, which makes it possible to lighten the load on the workers body qualitatively. The device operator who is being interviewed says that the vest helps him qualitatively. Despite the small load from one cycle of production activities, their constant repetition can be painful. The load on the body only increases, and the tension in the muscles and the body accumulates. In this case, the bionic vest allows you to perform cycles of actions, transferring the load to the device. The video also says that the machine is still costly despite the above advantages.

Ekso Bionics, Inc. (2018). EksoVest operator manual

Manual describing the components, features, and working principle of EksoVest, manufactured and developed by Ekso Bionics, inc. This source, which is a manual for the operation of bionic EksoVest, describes the features and equipment of the device. Each EksoVest is made up of the hardware, as mentioned earlier, components, and properly balanced soft products. Each operator selects the soft products that match their vest using the sizing tables and matrix. The customized delicate items are sewn on the vests chest, waist, and arm cuff plates by the operator. EksoVest can aid with lifts of 5 to 15 pounds. The vests modular design allows it to accommodate a wide range of body shapes, with sizes ranging from 52 to 64 feet.

Jones, D. (2018). Ford rolls out largest adoption of exoskeleton technology to date. Design Engineering. 

This article describes Fords use of EksoVest, developed and manufactured by Ekso Bionics, inc. Ford Motor Company is implementing 75 upper-body exoskeletons across 15 plants in the United States, Canada, Mexico, Brazil, Romania, and China, in what is believed to be the largest deployment of the technology to date. EksoVest technology from Ekso Bionics is used by Ford to provide continuous structural protection for personnel conducting overhead duties that require them to reach upwards for lengthy periods of time. Ekso was researching application usage at about the same time that Ford was trying to implement exoskeletons in its workforce; as a result, the two companies formed an agreement. The cooperation got off after an early version received excellent feedback from Ford, according to Ekso, and the car giant supplied lots of essential comments. According to Kevin Dacey, Ford provided a testing environment and essential feedback on design ideas, a Sr. Mechanical Engineer at Ekso Bionics.

At the same time, Ekso Bionics gave iterations to fulfill the needs coming from their workforce. A lightweight, comfortable upper-body exoskeleton was created due to the partnership between the two companies. This machine provides a significant amount of lift during overhead activities, reducing the risk of shoulder muscle injury and strain. The EksoVest is powered by a passive spring-driven actuator at each shoulder during a lift, which gives torque to the users arms. The actuator activates when the user lifts their arm, creating tension in both arms and permitting the EksoVest to provide 5-15lbs of movement support, depending on which spring is used. With sizes ranging from 52 to 64, the vests modular construction allows it to fit various body types. According to the report, the EksoVEST is entirely mechanical and does not require any electrical or battery power to perform FES treatment.

References

CBC [ CBC News: The National]. (2018). A bionic vest decreases fatigue and prevents injury | The Fix [Video]. YouTube.

Ekso Bionics, Inc. (2018). EksoVest operator manual.

Jones, D. (2018). Ford rolls out largest adoption of exoskeleton technology to date. Design Engineering.