IOT MONITORING SYSTEMS FOR OCCUPATIONAL SAFETY IN COSTA RICA
##plugins.themes.bootstrap3.article.main##
Abstract
Introduction: This study explores the implementation of IoT Monitoring Systems to improve occupational safety in Costa Rica. It focuses on how these technologies can prevent occupational hazards and promote a safe working environment. Research Question/Objectives: To evaluate the challenges in occupational safety in Costa Rica and how the implementation of IoT systems can offer effective solutions. It aims to understand the impact of these technologies in preventing accidents and promoting safe work practices. Methodology: A qualitative approach was used, integrating theories and practices in the analysis of IoT monitoring systems. Interviews and case studies were conducted, complemented by real-time analysis to evaluate the effectiveness of IoT systems in occupational safety. This methodology allows for a detailed understanding of the interaction between technology and safety measures. Results: The research reveals that the adoption of IoT monitoring systems significantly improves occupational safety in Costa Rica, reducing the risks and costs associated with workplace accidents. These findings are supported by the applied methodology and the analyzed case studies. Final Considerations: The qualitative methodology used highlights the importance of linking theories and practices to address occupational safety through IoT technology. The results demonstrate that an integrated strategy, combining advanced technology with existing safety practices, can substantially improve working conditions. This study underscores the need for a coherent methodological approach to effectively integrate technological solutions into occupational safety, thus contributing to a safer and more technologically advanced work environment in Costa Rica.
##plugins.themes.bootstrap3.article.details##
How to Cite
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
openAccess
Al-Jammas, M. H., Al-Sabawi, E. A., Yassin, A. M., & Abdulrazzaq, A. H. (2024). Brain tumors recognition based on deep learning. e-Prime - Advances in Electrical Engineering, Electronics and Energy, 8. https://doi.org/10.1016/j.prime.2024.100500
Bahmanzadegan, F., & Ghaemi, A. (2024). Modification and functionalization of zeolites to improve the efficiency of CO2 adsorption: A review. Case Studies in Chemical and Environmental Engineering, 9. https://doi.org/10.1016/j.cscee.2023.100564
Bhat, M. A. (2024). Unveiling the overlooked threat: Macroplastic pollution in indoor markets in an urban city. Case Studies in Chemical and Environmental Engineering, 9. https://doi.org/10.1016/j.cscee.2023.100558
Custers, B., & Vrabec, H. (2024). Tell me something new: data subject rights applied to inferred data and profiles. Computer Law & Security Review, 52. https://doi.org/10.1016/j.clsr.2024.105956
Du, Z., Liu, L., Huang, M., Fu, Y., & Zhang, W. (2024). Bulwark: A proof-of-stake protocol with strong consistency and liveness. Computer Networks, 242. https://doi.org/10.1016/j.comnet.2024.110245
Egea-Cariñanos, P., Calaza-Martínez, P., López Roche, D., & Cariñanos, P. (2024). Uses, attitudes and perceptions of urban green spaces according to the sociodemographic profile: An exploratory analysis in Spain. Cities, 150. https://doi.org/10.1016/j.cities.2024.104996
Fukuda, R., Sho, K., Kidokoro, T., & Lim, H. (2024). Inheriting housing inequality: Parental homeownership and place of origin as key factors for homeownership in Japanese metropolitan areas. Cities, 150. https://doi.org/10.1016/j.cities.2024.105064
Glisic, S. (2024). Quantum vs post?quantum security for future networks: Survey. Cyber Security and Applications, 2. https://doi.org/10.1016/j.csa.2024.100039
Golf-Papez, M., Heller, J., Hilken, T., Chylinski, M., de Ruyter, K., Keeling, D. I., & Mahr, D. (2022). Embracing falsity through the metaverse: The case of synthetic customer experiences. Business Horizons, 65(6), 739-749. https://doi.org/10.1016/j.bushor.2022.07.007
Großmann, K., Adams, R.-M., Bolotova, A., Gunko, M., Lilius, J., Messerschmidt, S., & Sandmann, L. (2024). Self-responsibilization, the municipality, and the state: Peripheralization shaping local initiatives in shrinking small towns. Cities, 150. https://doi.org/10.1016/j.cities.2024.105067
Guo, Z., Hao, J., & Kennedy, L. (2024). Protection path of personal data and privacy in China: Moving from monism to dualism in civil law and then in criminal law. Computer Law & Security Review, 52. https://doi.org/10.1016/j.clsr.2023.105928
Hassan, Q., Algburi, S., Jaszczur, M., Barakat, M., Sameen, A. Z., Ali, B. M., & Kassid, D. J. (2024). Advancing Toward a Sustainable Future in subtropical semi-arid type climatic zone: Iraq case - The Progress of Solar Photovoltaic Energy Implementation. e-Prime - Advances in Electrical Engineering, Electronics and Energy. https://doi.org/10.1016/j.prime.2024.100565
Kaduwela, N. A., Horner, S., Dadar, P., & Manworren, R. C. B. (2024). Application of a human-centered design for embedded machine learning model to develop data labeling software with nurses: Human-to-Artificial Intelligence (H2AI). Int J Med Inform, 183, 105337. https://doi.org/10.1016/j.ijmedinf.2023.105337
Lee, Y. Y., Gan, C. L., & Liew, T. W. (2023). Rationality and impulse buying: Is your emotion a part of the equation? Computers in Human Behavior Reports, 12. https://doi.org/10.1016/j.chbr.2023.100337
Nabi, F., & Zhou, X. (2024). Enhancing intrusion detection systems through dimensionality reduction: A comparative study of machine learning techniques for cyber security. Cyber Security and Applications, 2. https://doi.org/10.1016/j.csa.2023.100033
Nawaz, M. S., Nawaz, M. Z., Fournier-Viger, P., & Luna, J. M. (2024). Analysis and classification of employee attrition and absenteeism in industry: A sequential pattern mining-based methodology. Computers in Industry, 159-160. https://doi.org/10.1016/j.compind.2024.104106
Offermans, T., Szyma?ska, E., Souza, F. A. A., & Jansen, J. J. (2024). Process expert knowledge is essential in creating value from data-driven industrial soft sensors. Computers & Chemical Engineering, 183. https://doi.org/10.1016/j.compchemeng.2024.108602
Saeidi, S., & Baradari, Z. (2023). Examining the correlation between metrics in the Instagram social network to identify fake pages and improve marketing. Computers in Human Behavior Reports, 12. https://doi.org/10.1016/j.chbr.2023.100341
Sarkis, M., Fyfe, A. T., Kontoravdi, C., & Papathanasiou, M. M. (2024). Towards a Net Zero, socially sustainable and eco-efficient biopharma industry: how far are we? Current Opinion in Chemical Engineering, 44. https://doi.org/10.1016/j.coche.2024.101027
Thotadi, C., Debbala, M., Rao, S., Eeralla, A., Palaniswamy, B., Mookherji, S., Odelu, V., & Reddy, A. G. (2024). E-Brightpass: A Secure way to access social networks on smartphones. Cyber Security and Applications, 2. https://doi.org/10.1016/j.csa.2023.100021
Ya?ci, M. Y., & Aydin, M. A. (2024). EA-GAT: Event aware graph attention network on cyber-physical systems. Computers in Industry, 159-160. https://doi.org/10.1016/j.compind.2024.104097
Zakariazadeh, A., Ahshan, R., Al Abri, R., & Al-Abri, M. (2024). Renewable energy integration in sustainable water systems: A review. Cleaner Engineering and Technology, 18. https://doi.org/10.1016/j.clet.2024.100722
Zhao, X., Qi, Z., & Pompili, D. (2024). Link adaptation in Underwater Wireless Optical Communications based on deep learning. Computer Networks, 242. https://doi.org/10.1016/j.comnet.2024.110233