Search results for: NIST standards
1987 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4
Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono
Abstract:
Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations
Procedia PDF Downloads 1531986 Determining the Appropriate Methodology for the Security Evaluation of Equipment Related to Information and Communication Technology in the Industry
Authors: Sofia Ahanj Sofia Ahanj, Mahsa Rahmani Mahsa Rahmani, Zahra Sadeghigol, Vida Nobakht Vida Nobakht
Abstract:
Providing security in the electricity industry, as one of the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both technical and managerial dimensions is discussed in the laboratory. There are various standards in the field of general ICT technical-security evaluation. The most important are ISO / IEC 15408, ISO / IEC 27001 and NIST SP 800-53. In the present paper, these standards are first examined. Then, the standards and reports in the industrial field have been reviewed and compared, and finally, based on the results and special considerations of information and communication technology equipment in the electricity industry, the appropriate methodology has been presented.Keywords: security standards, ISO/IEC 15408, ISA/IEC 62443 series, NIST SP 800-53, NISTIR 7628
Procedia PDF Downloads 1681985 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment
Authors: Atma Sahu
Abstract:
After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems
Procedia PDF Downloads 951984 Statistical Randomness Testing of Some Second Round Candidate Algorithms of CAESAR Competition
Authors: Fatih Sulak, Betül A. Özdemir, Beyza Bozdemir
Abstract:
In order to improve symmetric key research, several competitions had been arranged by organizations like National Institute of Standards and Technology (NIST) and International Association for Cryptologic Research (IACR). In recent years, the importance of authenticated encryption has rapidly increased because of the necessity of simultaneously enabling integrity, confidentiality and authenticity. Therefore, at January 2013, IACR announced the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR Competition) which will select secure and efficient algorithms for authenticated encryption. Cryptographic algorithms are anticipated to behave like random mappings; hence, it is important to apply statistical randomness tests to the outputs of the algorithms. In this work, the statistical randomness tests in the NIST Test Suite and the other recently designed randomness tests are applied to six second round algorithms of the CAESAR Competition. It is observed that AEGIS achieves randomness after 3 rounds, Ascon permutation function achieves randomness after 1 round, Joltik encryption function achieves randomness after 9 rounds, Morus state update function achieves randomness after 3 rounds, Pi-cipher achieves randomness after 1 round, and Tiaoxin achieves randomness after 1 round.Keywords: authenticated encryption, CAESAR competition, NIST test suite, statistical randomness tests
Procedia PDF Downloads 3151983 Challenges of Implementing Zero Trust Security Based on NIST SP 800-207
Authors: Mazhar Hamayun
Abstract:
Organizations need to take a holistic approach to their Zero Trust strategic and tactical security needs. This includes using a framework-agnostic model that will ensure all enterprise resources are being accessed securely, regardless of their location. Such can be achieved through the implementation of a security posture, monitoring the posture, and adjusting the posture through the Identify, Detect, Protect, Respond, and Recover Methods, The target audience of this document includes those involved in the management and operational functions of risk, information security, and information technology. This audience consists of the chief information security officer, chief information officer, chief technology officer, and those leading digital transformation initiatives where Zero Trust methods can help protect an organization’s data assets.Keywords: ZTNA, zerotrust architecture, microsegmentation, NIST SP 800-207
Procedia PDF Downloads 871982 Security of Database Using Chaotic Systems
Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem
Abstract:
Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST
Procedia PDF Downloads 2651981 Selection Standards for National Teams: Theory and Practice
Authors: Alexey Kulik
Abstract:
This article deals with selection standards for national sport teams. The author examines the legal framework for selection criteria and suggests using the most honest criteria.Keywords: national teams, standards of forming teams, selection standards, sport legislations
Procedia PDF Downloads 5071980 UK GAAP and IFRS Standards: Similarities and Differences
Authors: Feddaoui Amina
Abstract:
This paper aimed to help researchers and international companies to the differences and similarities between IFRS (International financial reporting standards) and UK GAAP or UK accounting principles, and to the accounting changes between standard setting of the International Accounting Standards Board and the Accounting Standards Board in United Kingdom. We will use in this study statistical methods to calculate similarities and difference frequencies between the UK standards and IFRS standards, according to the PricewaterhouseCoopers report in 2005. We will use the one simple test to confirm or refuse our hypothesis. In conclusion, we found that the gap between UK GAAP and IFRS is small.Keywords: accounting, UK GAAP, IFRS, similarities, differences
Procedia PDF Downloads 2111979 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map
Authors: Hongmin Deng, Qionghua Wang
Abstract:
A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID
Procedia PDF Downloads 4011978 Development of Risk-Based Ambient Air Quality Standards in the Russian Federation on the Basis of Risk Assessment Procedures Harmonized with International Approaches
Authors: Nina V. Zaitseva, Pavel Z. Shur, Nina G. Atiskova
Abstract:
Nowadays harmonization of sanitary and hygienic standards of environmental quality with international standards is crucial part of integration of Russia into the international community. Harmonization of Russian and international ambient air quality standards may be realized by risk-based standards development. In this paper approaches to risk-based standards development and examples of these approaches implementation are presented.Keywords: harmonization, health risk assessment, evolutionary modelling, benchmark level, nickel, manganese
Procedia PDF Downloads 3901977 Adoption and Diffusion of Valuation Standards in the Forensic Accounting Community and in Courts: Facilitating and Inhibiting Factors
Authors: Matteo Manera, Mariateresa Torchia, Gregory Moscato
Abstract:
Forensic accounting is a hot subject of research in accounting. Valuation remains one of the major topics for practitioners. Valuation standards are a powerful instrument that can contribute to a fair process: their use aims at reducing subjectivity and arbitrary decisions in courts. In most jurisdictions, valuation standards are not the law: forensic accountants are not obliged to use valuation standards when they perform valuation works for judges. To date, as far as we know, no literature work has investigated adoption and diffusion of valuation standards in the forensic accounting space. In this paper, we analyze the spread of valuation standards through the lenses of isomorphism and -as corollaries- of Agency Theory and Signaling Theory. Because of lack of research in the particular area of valuation standards adoption, the present work relies on qualitative, exploratory research, based on semi-structured interviews conducted (up to saturation) with expert forensic accountants. Our work digs into motivations behind adoption and diffusion, as well into perceptions of forensic accountants around benefits of valuation standards and into barriers to their diffusion: the result is that, while the vast majority of forensic accountants praise the great work of the standards setters in introducing valuation standards, it might be that less than 50% of forensic accountants actually use valuation standards, in courts. Our preliminary findings, to be supported or refuted by future research, lead us to address a “trilogy” of recommendations to the stakeholders involved in the process of adoption and diffusion of valuation standards in courts.Keywords: forensic accounting, valuation standards, adoption of standards, motivations, benefits, barriers, Isomorphism
Procedia PDF Downloads 1721976 Towards a Common Architecture for Cloud Computing Interoperability
Authors: Sana Kouchi, Hassina Nacer, Kadda Beghdad-bey
Abstract:
Cloud computing is growing very fast in the market and has become one of the most controversial discussed developments in recent years. Cloud computing providers become very numerous in these areas and each of them prefers its own cloud computing infrastructure, due to the incompatibility of standards and cloud access formats, which prevents them from accepting to support cloud computing applications in a standardized manner, this heterogeneity creates the problem of interoperability between clouds, and considering that cloud customers are probably in search of an interoperable cloud computing, where they will have total control over their applications and simply migrate their services as needed, without additional development investment. A cloud federation strategy should be considered. In this article, we propose a common architecture for the cloud that is based on existing architectures and also the use of best practices from ICT frameworks, such as IBM, ITIL, NIST, etc., to address the interoperability of architectures issues in a multi-cloud system.Keywords: cloud computing, reference architecture, interoperability, standard
Procedia PDF Downloads 1721975 Investigation of Bremsstrahlung, Braking Radiation from Beta-Emitting Radioactive Sources
Authors: Metin Kömsöken, Ayşe Güneş Tanır, Onur Karaman
Abstract:
Usage of high energy charged particles for diagnosis and treatment has been widespread in medicine. The main purpose is to investigate that Bremsstrahlung which occurs by tissue interactions with charged particles should not be neglected. Nuclear stopping power (Bremsstrahlung) was calculated for lung, brain, skin, muscle, bone (cortical) and water targets for the energies of electrons obtained from LINAC used in radiotherapy and of β+ sources used in positron emission tomography (PET). These calculations were done by using the four different analytical functions including classical Bethe-Bloch, Tsoulfanidis, modified Bethe-Bloch and modified Tsoulfanidis equations. It was concluded that obtained results were compatible with that of National Institute of Standards and Technology (NIST-ESTAR).Keywords: β- emitting source, bremsstrahlung, therapeutic radionuclides, LINAC
Procedia PDF Downloads 3331974 Importance of Standards in Engineering and Technology Education
Authors: Ahmed S. Khan, Amin Karim
Abstract:
During the past several decades, the economy of each nation has been significantly affected by globalization and technology. Government regulations and private sector standards affect a majority of world trade. Countries have been working together to establish international standards in almost every field. As a result, workers in all sectors need to have an understanding of standards. Engineering and technology students must not only possess an understanding of engineering standards and applicable government codes, but also learn to apply them in designing, developing, testing and servicing products, processes and systems. Accreditation Board for Engineering & Technology (ABET) criteria for engineering and technology education require students to learn and apply standards in their class projects. This paper is a follow-up of a 2006-2009 NSF initiative awarded to IEEE to help develop tutorials and case study modules for students and encourage standards education at college campuses. It presents the findings of a faculty/institution survey conducted through various U.S.-based listservs representing the major engineering and technology disciplines. The intent of the survey was to the gauge the status of use of standards and regulations in engineering and technology coursework and to identify benchmark practices. In light of survey findings, recommendations are made to standards development organizations, industry, and academia to help enhance the use of standards in engineering and technology curricula.Keywords: standards, regulations, ABET, IEEE, engineering, technology curricula
Procedia PDF Downloads 2881973 Design and Implementation of Pseudorandom Number Generator Using Android Sensors
Authors: Mochamad Beta Auditama, Yusuf Kurniawan
Abstract:
A smartphone or tablet require a strong randomness to establish secure encrypted communication, encrypt files, etc. Therefore, random number generation is one of the main keys to provide secrecy. Android devices are equipped with hardware-based sensors, such as accelerometer, gyroscope, etc. Each of these sensors provides a stochastic process which has a potential to be used as an extra randomness source, in addition to /dev/random and /dev/urandom pseudorandom number generators. Android sensors can provide randomness automatically. To obtain randomness from Android sensors, each one of Android sensors shall be used to construct an entropy source. After all entropy sources are constructed, output from these entropy sources are combined to provide more entropy. Then, a deterministic process is used to produces a sequence of random bits from the combined output. All of these processes are done in accordance with NIST SP 800-22 and the series of NIST SP 800-90. The operation conditions are done 1) on Android user-space, and 2) the Android device is placed motionless on a desk.Keywords: Android hardware-based sensor, deterministic process, entropy source, random number generation/generators
Procedia PDF Downloads 3751972 Universal Design Building Standard for India: A Critical Inquiry
Authors: Sushil Kumar Solanki, Rachna Khare
Abstract:
Universal Design is a concept of built environment creation, where all people are facilitated to the maximum extent possible without using any type of specialized design. However, accessible design is a design process in which the needs of people with disabilities are specifically considered. Building standards on accessibility contains scoping and technical requirements for accessibility to sites, facilities, building and elements by individual with disability. India is also following its prescriptive types of various building standards for the creation of physical environment for people with disabilities. These building standards are based on western models instead of research based standards to serve Indian needs. These standards lack contextual connect when reflects in its application in the urban and rural environment. This study focuses on critical and comparative study of various international building standards and codes, with existing Indian accessibility standards to understand problems and prospects of concept of Universal Design building standards for India. The result of this study is an analysis of existing state of Indian building standard pertaining to accessibility and future need of performance based Universal Design concept.Keywords: accessibility, building standard, built-environment, universal design
Procedia PDF Downloads 2961971 Steps towards the Development of National Health Data Standards in Developing Countries
Authors: Abdullah I. Alkraiji, Thomas W. Jackson, Ian Murray
Abstract:
The proliferation of health data standards today is somewhat overlapping and conflicting, resulting in market confusion and leading to increasing proprietary interests. The government role and support in standardization for health data are thought to be crucial in order to establish credible standards for the next decade, to maximize interoperability across the health sector, and to decrease the risks associated with the implementation of non-standard systems. The normative literature missed out the exploration of the different steps required to be undertaken by the government towards the development of national health data standards. Based on the lessons learned from a qualitative study investigating the different issues to the adoption of health data standards in the major tertiary hospitals in Saudi Arabia and the opinions and feedback from different experts in the areas of data exchange and standards and medical informatics in Saudi Arabia and UK, a list of steps required towards the development of national health data standards was constructed. Main steps are the existence of: a national formal reference for health data standards, an agreed national strategic direction for medical data exchange, a national medical information management plan and a national accreditation body, and more important is the change management at the national and organizational level. The outcome of this study can be used by academics and practitioners to develop the planning of health data standards, and in particular those in developing countries.Keywords: interoperabilty, medical data exchange, health data standards, case study, Saudi Arabia
Procedia PDF Downloads 3381970 The International Labor Organization and the Formulation of International Labor Standards
Authors: Tahraoui Boualem
Abstract:
The International Labor Organization is one of the specialized agencies of the United Nations, and it is the only organization within the United Nations system that is distinguished by its tripartite legitimacy and which simultaneously includes governments, workers' and employers' organizations of its member states in a joint effort to set standards and policies Work to promote decent work in various parts of the world, and the expression of international labor standards basically means two types of documents, namely international labor agreements and international labor recommendations, and so far its general conference, which is held annually, has set a number of standards, the number of which has reached 184 agreements and 192 recommendations so far. For this reason, it is decided to clarify the International Labor Organization and the formulation of international labor standards within two sections. In the first topic, the researcher discusses the concept of the International Labor Organization, and in the second topic, it highlights the legal basis for the authority of the International Labor Organization in protecting the rights of workers.Keywords: international labor, international labor standards, rights of workers, nation’s system
Procedia PDF Downloads 711969 Subsidiary Strategy and Importance of Standards: Re-Interpreting the Integration-Responsiveness Framework
Authors: Jo-Ann Müller
Abstract:
The integration-responsiveness (IR) framework presents four distinct internationalization strategies which differ depending on the extent of pressure the company faces for local responsiveness and global integration. This study applies the framework to standards by examining differences in the relative importance of three types of standards depending on the role the subsidiary plays within the corporate group. Hypotheses are tested empirically in a two-stage procedure. First, the subsidiaries are grouped performing cluster analysis. In the second step, the relationship between cluster affiliation and subsidiary strategy is tested using multinomial Probit estimation. While the level of local responsiveness of a firm relates to the relative importance of national and international formal standards, the degree of vertical integration is associated with the application of internal company.Keywords: FDI, firm-level data, standards, subsidiary strategy
Procedia PDF Downloads 2861968 A Study on Fire Safety Standards through Case Study of Performance Based Design
Authors: Kyung Hoon Park, Hyung Jun Kim, Jong Wook Song
Abstract:
Super-tall building, large-scale and multi-purpose underground spaces reflect changes in construction trend. As current laws and codes such as Fire Services Act and construction codes are not enough to secure the fire safety of those structures and spaces, it is required to provide systemic supplement for performance-based design to establish or revise laws and technical standards to cope with the changes flexibly. In this study, the performance-based design standards of structures designed in Korea are compared with specification based design standards in an attempt to find the ways to establish fire safety standards for structures in Korea.Keywords: performance based design, specification based design, fire safety design, life safety
Procedia PDF Downloads 3751967 Framework for Implementation of National Electrical Safety Grounding Standards for Communication Infrastructure
Authors: Atif Mahmood, Mohammad Inayatullah Khan Babar
Abstract:
Communication infrastructure has been installed, operated, and maintained all over the world according to defined electrical safety standards for separate or joint structures. These safety standards have been set for the safeguard of public, utility workers (employees and contractors), utility facilities, electrical communication equipment’s connected to the utility facilities and other facilities or premise adjacent to utility facilities. Different communication utilities in Pakistan use standards of different countries due to the absence of Common National Electrical Safety Standards of Pakistan. It is really important to devise a framework for implementation of a uniform standard for strict compliance. In this context, it is important to explore the compliance of safety standards for communication conductors and equipment for separate or joint structures for which NESC standards are taken as reference. Specific reference to grounding techniques including grounding AC/DC systems and its frames, leaving Fences, Messenger wires and special circuits used for the protection for lightning etc, ungrounded so recommendations are also given after in-depth analysis of current technical practices for the installation and maintenance of communication infrastructure.Keywords: utility facilities, grounding electrodes, special circuits, grounding conductor
Procedia PDF Downloads 3481966 Variations of Testing Concrete Mechanical Properties by European Standard and American Code
Authors: Ahmed M. Seyam, Rita Nemes, Salem Georges Nehme
Abstract:
Europe and the United States have a worldwide significance in the field of concrete control and construction; according to that, a lot of countries adopted their standards and regulations in the concrete field, as proof of the Europe and US strong standards and due to lack of own regulations. The main controlled property of concrete are the compressive strength, flexure tensile strength, and modulus of elasticity as it relates both to its bearing capacity and to the durability of the elements built with it, so in this paper, ASTM standard and EN standards method of testing those properties were put under the microscope to compare the variations between them.Keywords: concrete, ASTM, EU standards, compressive strength, flexural strength, modulus of elasticity
Procedia PDF Downloads 951965 Development of Industry Sector Specific Factory Standards
Authors: Peter Burggräf, Moritz Krunke, Hanno Voet
Abstract:
Due to shortening product and technology lifecycles, many companies use standardization approaches in product development and factory planning to reduce costs and time to market. Unlike large companies, where modular systems are already widely used, small and medium-sized companies often show a much lower degree of standardization due to lower scale effects and missing capacities for the development of these standards. To overcome these challenges, the development of industry sector specific standards in cooperations or by third parties is an interesting approach. This paper analyzes which branches that are mainly dominated by small or medium-sized companies might be especially interesting for the development of factory standards using the example of the German industry. For this, a key performance indicator based approach was developed that will be presented in detail with its specific results for the German industry structure.Keywords: factory planning, factory standards, industry sector specific standardization, production planning
Procedia PDF Downloads 3941964 Dissemination of Knowledge on Quality Control for Upgrading Product Standards for Small and Micro Community Enterprises
Authors: Niyom Suwandej
Abstract:
This research paper investigated the opinions of small and micro community enterprises from Jom Pluak Subdistrict, Bangkhontee District, Samut Songkram Province towards product quality control, and the findings are aimed to disseminate knowledge on quality control for upgrading product standards for small and micro community enterprises. The study employed both qualitative and quantitative methods, in which there were 23 samples in the study. The study was divided into 2 steps which were (1) studying the opinions of the respondents towards the community’s product quality control and upgrading product standards; (2) creating development guidance for product quality control and upgrading product standards for small and micro community enterprise. The demographic findings revealed female respondents as the majority, with most above 50 years of age and married. Most had more than 15 years of working experience. The education level reported by most respondents was primary school or lower followed by secondary school or lower with most respondents was vocational certificate level. Most respondents had the highest level of satisfaction with the existing condition of product quality control knowledge management. Pertaining to opinions on the guidance of knowledge creation for product quality control for small and micro community enterprise, the respondents were willing to apply the knowledge in upgrading their product standards. For the opinions of knowledge creation for product quality control and product standards, the respondents had the highest level of satisfaction. Guidance of knowledge creation for product quality control and product standards for small and micro community enterprises received the highest level of satisfaction from the respondents. Furthermore they had knowledge and comprehension in product quality control and product standards and could apply the knowledge in improving the quality of their production and product standards for small and micro community enterprises.Keywords: product quality control, product standards, community enterprise, marketing management
Procedia PDF Downloads 4691963 Levels of Selected Heavy Metals in Varieties of Vegetable oils Consumed in Kingdom of Saudi Arabia and Health Risk Assessment of Local Population
Authors: Muhammad Waqar Ashraf
Abstract:
Selected heavy metals, namely Cu, Zn, Fe, Mn, Cd, Pb, and As, in seven popular varieties of edible vegetable oils collected from Saudi Arabia, were determined by graphite furnace atomic absorption spectrometry (GF-AAS) using microwave digestion. The accuracy of procedure was confirmed by certified reference materials (NIST 1577b). The concentrations for copper, zinc, iron, manganese, lead and arsenic were observed in the range of 0.035 - 0.286, 0.955 - 3.10, 17.3 - 57.8, 0.178 - 0.586, 0.011 - 0.017 and 0.011 - 0.018 µg/g, respectively. Cadmium was found to be in the range of 2.36 - 6.34 ng/g. The results are compared internationally and with standards laid down by world health agencies. A risk assessment study has been carried out to assess exposure to these metals via consumption of vegetable oils. A comparison has been made with safety intake levels for these heavy metals recommended by Institute of Medicine of the National Academies (IOM), US Environmental Protection Agency (US EPA) and Joint FAO/WHO Expert Committee on Food Additives (JECFA). The results indicated that the dietary intakes of the selected heavy metals from daily consumption of 25 g of edible vegetable oils for a 70 kg individual should pose no significant health risk to local population.Keywords: vegetable oils, heavy metals, contamination, health risk assessment
Procedia PDF Downloads 4521962 The Effects of Stand Density, Standards and Species Composition on Biomass Production in Traditional Coppices
Authors: Marek Mejstřík, Radim Matula, Martin Šrámek
Abstract:
Traditional coppices and coppice-with-standards were widely used throughout Europe and Asia for centuries but were largely abandoned in the second half of the 19th century, especially in central and northwestern Europe. In the last decades, there has been a renewed interest in traditional coppicing for nature conservation and most often, for rapid woody biomass production. However, there is little information on biomass productivity of traditional coppices and what affects it. Here, we focused on the effects of stand density, standards and tree species composition on sprout biomass production in newly restored coppices in the Czech Republic. We measured sprouts and calculated sprout biomass 7 years after the harvest from 2013 resprouting stumps in two 4 ha experimental plots. Each plot was divided into 64 subplots with different densities of standards and sprouting stumps. Total sprout biomass declined with increasing density of standards, but the effect of standards differed significantly among studied species. Whereas increasing density of standards decreased sprout biomass in Quercus petraea and Carpinus betulus, it did not affect sprout biomass productivity in Acer campestre and Tilia cordata. Sprout biomass on stand-level increased linearly with an increasing number of sprouting stumps and we observed no leveling of this relationship even in the highest densities of stumps. We also found a significant shift in tree species composition with the steeply declining relative abundance of Quercus in favor of other studied tree species.Keywords: traditional coppice, coppice with standards, sprout biomass, forest management
Procedia PDF Downloads 1601961 An Audit of the Care in Recovery in Women after an Obstetrics Procedure
Authors: A. Haddick, A. Soltan
Abstract:
Background: During the period of recovery from an operative obstetric procedure, a woman is not only at risk of the life-threatening complications accompanying labour but also those associated with surgery and anaesthesia. It is speculated that women in the recovery area may receive a lower standard of care over a night shift. Thus obstetric recovery room care should be evaluated regularly to ensure all women receive an equally high standard of care 24/7. Aim: The aim of this audit was to undertake an audit in the Liverpool Women’s Hospital on the care in recovery, and to ascertain the extent to which the standards were met. This audit included the full audit cycle. Method: Standards were taken from the AAGBI, RCOA, NICE and CNST guidelines. There were 12 standards including appropriate documentation of vital signs and appropriate length of stay after surgery. Notes from 100 patients were analysed from March 2011-March 2012. There were 52 day notes and 48 night notes; these were accessed to gain the relevant data. In the re audit 35 notes were accessed from March 14-September 14. Results: The Liverpool Women’s Hospital met in total 10 of these standards. 10 were met during the day shift (83%) and 0 met during the night shift. In the re audit, there was a significant improvement in the standards met at night. 9 of the standards were met during the day and 7 of the standards were met at night. Clearly there are still improvements to be made. Conclusions: In the original audit, an audit action plan was formulated. This was following discussion of the results of this audit in an MDT meeting and presentation with a consultant Obstetrician, the head of Midwifery, the head of Obstetrics theatres and a recovery nurse. This audit will be further discussed in the Liverpool Woman's Hospital in July 2015 for further implementation for improvement.Keywords: care, recovery, room, women
Procedia PDF Downloads 3011960 New Formula for Revenue Recognition Likely to Change the Prescription for Pharma Industry
Authors: Shruti Hajirnis
Abstract:
In May 2014, FASB issued Accounting Standards Update (ASU) 2014-09, Revenue from Contracts with Customers (Topic 606), and the International Accounting Standards Board (IASB) issued International Financial Reporting Standards (IFRS) 15, Revenue from Contracts with Customers that will supersede virtually all revenue recognition requirements in IFRS and US GAAP. FASB and the IASB have basically achieved convergence with these standards, with only some minor differences such as collectability threshold, interim disclosure requirements, early application and effective date, impairment loss reversal and nonpublic entity requirements. This paper discusses the impact of five-step model prescribed in new revenue standard on the entities operating in Pharma industry. It also outlines the considerations for these entities while implementing the new standard.Keywords: revenue recognition, pharma industry, standard, requirements
Procedia PDF Downloads 4441959 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories
Authors: Umesh Kumar Singh, Chanchala Joshi
Abstract:
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.Keywords: CVSS score, risk level, security measurement, vulnerability category
Procedia PDF Downloads 3211958 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case
Authors: Azin Karami, Bahareh Heydari
Abstract:
There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.Keywords: human rights, human security, national sovereignty, irregular immigrants
Procedia PDF Downloads 183