Search results for: security incident
3142 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014
Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini
Abstract:
Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-value3141 e-Learning Security: A Distributed Incident Response Generator
Authors: Bel G Raggad
Abstract:
An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection
Procedia PDF Downloads 4373140 Rapid Evidence Remote Acquisition in High-Availability Server and Storage System for Digital Forensic to Unravel Academic Crime
Authors: Bagus Hanindhito, Fariz Azmi Pratama, Ulfah Nadiya
Abstract:
Nowadays, digital system including, but not limited to, computer and internet have penetrated the education system widely. Critical information such as students’ academic records is stored in a server off- or on-campus. Although several countermeasures have been taken to protect the vital resources from outsider attack, the defense from insiders threat is not getting serious attention. At the end of 2017, a security incident that involved academic information system in one of the most respected universities in Indonesia affected not only the reputation of the institution and its academia but also academic integrity in Indonesia. In this paper, we will explain our efforts in investigating this security incident where we have implemented a novel rapid evidence remote acquisition method in high-availability server and storage system thus our data collection efforts do not disrupt the academic information system and can be conducted remotely minutes after incident report has been received. The acquired evidence is analyzed during digital forensic by constructing the model of the system in an isolated environment which allows multiple investigators to work together. In the end, the suspect is identified as a student (insider), and the investigation result is used by prosecutors to charge the suspect as an academic crime.Keywords: academic information system, academic crime, digital forensic, high-availability server and storage, rapid evidence remote acquisition, security incident
Procedia PDF Downloads 1523139 Design of Incident Information System in IoT Virtualization Platform
Authors: Amon Olimov, Umarov Jamshid, Dae-Ho Kim, Chol-U Lee, Ryum-Duck Oh
Abstract:
This paper proposes IoT virtualization platform based incident information system. IoT information based environment is the platform that was developed for the purpose of collecting a variety of data by managing regionally scattered IoT devices easily and conveniently in addition to analyzing data collected from roads. Moreover, this paper configured the platform for the purpose of providing incident information based on sensed data. It also provides the same input/output interface as UNIX and Linux by means of matching IoT devices with the directory of file system and also the files. In addition, it has a variety of approaches as to the devices. Thus, it can be applied to not only incident information but also other platforms. This paper proposes the incident information system that identifies and provides various data in real time as to urgent matters on roads based on the existing USN/M2M and IoT visualization platform.Keywords: incident information system, IoT, virtualization platform, USN, M2M
Procedia PDF Downloads 3513138 Integrating a Security Operations Centre with an Organization’s Existing Procedures, Policies and Information Technology Systems
Authors: M. Mutemwa
Abstract:
A Cybersecurity Operation Centre (SOC) is a centralized hub for network event monitoring and incident response. SOCs are critical when determining an organization’s cybersecurity posture because they can be used to detect, analyze and report on various malicious activities. For most organizations, a SOC is not part of the initial design and implementation of the Information Technology (IT) environment but rather an afterthought. As a result, it is not natively a plug and play component; therefore, there are integration challenges when a SOC is introduced into an organization. A SOC is an independent hub that needs to be integrated with existing procedures, policies and IT systems of an organization such as the service desk, ticket logging system, reporting, etc. This paper discussed the challenges of integrating a newly developed SOC to an organization’s existing IT environment. Firstly, the paper begins by looking at what data sources should be incorporated into the Security Information and Event Management (SIEM) such as which host machines, servers, network end points, software, applications, web servers, etc. for security posture monitoring. That is which systems need to be monitored first and the order by which the rest of the systems follow. Secondly, the paper also describes how to integrate the organization’s ticket logging system with the SOC SIEM. That is how the cybersecurity related incidents should be logged by both analysts and non-technical employees of an organization. Also the priority matrix for incident types and notifications of incidents. Thirdly, the paper looks at how to communicate awareness campaigns from the SOC and also how to report on incidents that are found inside the SOC. Lastly, the paper looks at how to show value for the large investments that are poured into designing, building and running a SOC.Keywords: cybersecurity operation centre, incident response, priority matrix, procedures and policies
Procedia PDF Downloads 1533137 Information Security Dilemma: Employees' Behaviour on Three-Dimensions to Failure
Authors: Dyana Zainudin, Atta Ur-Rahman, Thaier Hamed
Abstract:
This paper explains about human nature concept as to understand the significance of information security in employees’ mentality including leaders in an organisation. By studying on a theory concept of the latest Von Solms fourth waves, information security governance basically refers to the concept of a set of methods, techniques and tools that responsible for protecting resources of a computer system to ensure service availability, confidentiality and integrity of information. However, today’s information security dilemma relates to the acceptance of employees mentality. The major causes are a lack of communication and commitment. These types of management in an organisation are labelled as immoral/amoral management which effects on information security compliance. A recovery action is taken based on ‘learn a lesson from incident events’ rather than prevention. Therefore, the paper critically analysed the Von Solms fourth waves’ theory with current human events and its correlation by studying secondary data and also from qualitative analysis among employees in public sectors. ‘Three-dimensions to failure’ of information security dilemma are explained as deny, don’t know and don’t care. These three-dimensions are the most common vulnerable behaviour owned by employees. Therefore, by avoiding the three-dimensions to failure may improve the vulnerable behaviour of employees which is often related to immoral/amoral management.Keywords: information security management system, information security behaviour, information security governance, information security culture
Procedia PDF Downloads 2083136 Hauntology of History: Intimate Revolt in Lou Ye’s Summer Palace
Authors: Yueming Li
Abstract:
This paper analyzes Lou Ye’s Summer Palace (2006), an autobiographical film of the Sixth Generation of Directors in Mainland China, from the approaches of inter-textual analysis and intellectual history. It highlights the film’s reconstruction of the June 4th Incident as an intermediary device for the revival and haunting of the 1980s’ New Enlightenment Movement. The paper demonstrates how the June 4th Incident unfolds as historical trauma and collective experience of the Generation through Lou’s flickering narrative in both plot organization and visual representation, under an individualized and internal viewpoint. It further proposes that these revenants of the June 4th Incident translate into “realms of memory,” which lend themselves for biographical and historical reconstruction of the June 4th Incident based on a politics of embodiment. Through this, Lou and his contemporaries acquire agency to actively respond to the June 4th Incident as an “intimate revolt.” In this sense, the film revisits the New Enlightenment Movement in that they similarly construct rebellious connotations in a seemingly depoliticized manner. As the paper examines how an autobiographical film reconstructs, revisits, and responds to a historical event and its absence, it answers how individuals’ agency intertwines with and counteracts their historical living contexts.Keywords: new enlightenment movement, summer palace, the June 4th incident, the sixth generation of directors
Procedia PDF Downloads 1243135 Modification of the Risk for Incident Cancer with Changes in the Metabolic Syndrome Status: A Prospective Cohort Study in Taiwan
Authors: Yung-Feng Yen, Yun-Ju Lai
Abstract:
Background: Metabolic syndrome (MetS) is reversible; however, the effect of changes in MetS status on the risk of incident cancer has not been extensively studied. We aimed to investigate the effects of changes in MetS status on incident cancer risk. Methods: This prospective, longitudinal study used data from Taiwan’s MJ cohort of 157,915 adults recruited from 2002–2016 who had repeated MetS measurements 5.2 (±3.5) years apart and were followed up for the new onset of cancer over 8.2 (±4.5) years. A new diagnosis of incident cancer in study individuals was confirmed by their pathohistological reports. The participants’ MetS status included MetS-free (n=119,331), MetS-developed (n=14,272), MetS-recovered (n=7,914), and MetS-persistent (n=16,398). We used the Fine-Gray sub-distribution method, with death as the competing risk, to determine the association between MetS changes and the risk of incident cancer. Results: During the follow-up period, 7,486 individuals had new development of cancer. Compared with the MetS-free group, MetS-persistent individuals had a significantly higher risk of incident cancer (adjusted hazard ratio [aHR], 1.10; 95% confidence interval [CI], 1.03-1.18). Considering the effect of dynamic changes in MetS status on the risk of specific cancer types, MetS persistence was significantly associated with a higher risk of incident colon and rectum, kidney, pancreas, uterus, and thyroid cancer. The risk of kidney, uterus, and thyroid cancer in MetS-recovered individuals was higher than in those who remained MetS but lower than MetS-persistent individuals. Conclusions: Persistent MetS is associated with a higher risk of incident cancer, and recovery from MetS may reduce the risk. The findings of our study suggest that it is imperative for individuals with pre-existing MetS to seek treatment for this condition to reduce the cancer risk.Keywords: metabolic syndrome change, cancer, risk factor, cohort study
Procedia PDF Downloads 783134 Investigation of Arson Fire Incident in Textile Garment Building Using Fire Dynamic Simulation
Authors: Mohsin Ali Shaikh, Song Weiguo, Muhammad Kashan Surahio, Usman Shahid, Rehmat Karim
Abstract:
This study investigated a catastrophic arson fire incident that occurred at a textile garment building in Karachi, Pakistan. Unfortunately, a catastrophic event led to the loss of 262 lives and caused 55 severe injuries. The primary objective is to analyze the aspects of the fire incident and understand the causes of arson fire disasters. The study utilized Fire Dynamic Simulation (F.D.S) was employed to simulate fire propagation, visibility, harmful gas concentration, fire temperature, and numerical results. The analysis report has determined the specific circumstances that created the unpleasant incident in the present study. The significance of the current findings lies in their potential to prevent arson fires, improve fire safety measures, and the development of safety plans in building design. The fire dynamic simulation findings can serve as a theoretical basis for the investigation of arson fires and evacuation planning in textile garment buildings.Keywords: investigation, fire arson incident, textile garment, fire dynamic simulation (FDS)
Procedia PDF Downloads 903133 Incident Management System: An Essential Tool for Oil Spill Response
Authors: Ali Heyder Alatas, D. Xin, L. Nai Ming
Abstract:
An oil spill emergency can vary in size and complexity, subject to factors such as volume and characteristics of spilled oil, incident location, impacted sensitivities and resources required. A major incident typically involves numerous stakeholders; these include the responsible party, response organisations, government authorities across multiple jurisdictions, local communities, and a spectrum of technical experts. An incident management team will encounter numerous challenges. Factors such as limited access to location, adverse weather, poor communication, and lack of pre-identified resources can impede a response; delays caused by an inefficient response can exacerbate impacts caused to the wider environment, socio-economic and cultural resources. It is essential that all parties work based on defined roles, responsibilities and authority, and ensure the availability of sufficient resources. To promote steadfast coordination and overcome the challenges highlighted, an Incident Management System (IMS) offers an essential tool for oil spill response. It provides clarity in command and control, improves communication and coordination, facilitates the cooperation between stakeholders, and integrates resources committed. Following the preceding discussion, a comprehensive review of existing literature serves to illustrate the application of IMS in oil spill response to overcome common challenges faced in a major-scaled incident. With a primary audience comprising practitioners in mind, this study will discuss key principles of incident management which enables an effective response, along with pitfalls and challenges, particularly, the tension between government and industry; case studies will be used to frame learning and issues consolidated from previous research, and provide the context to link practice with theory. It will also feature the industry approach to incident management which was further crystallized as part of a review by the Joint Industry Project (JIP) established in the wake of the Macondo well control incident. The authors posit that a common IMS which can be adopted across the industry not only enhances response capacity towards a major oil spill incident but is essential to the global preparedness effort.Keywords: command and control, incident management system, oil spill response, response organisation
Procedia PDF Downloads 1563132 Major Incident Tier System in the Emergency Department: An Approach
Authors: Catherine Bernard, Paul Ransom
Abstract:
Recent events have prompted emergency planners to re-evaluate their emergency response to major incidents and mass casualties. At the Royal Sussex County Hospital, we have adopted a tiered system comprised of three levels, anticipating an increasing P1, P2 or P3 load. This will aid planning in the golden period between Major Incident ‘Standby,’ and ‘Declared’. Each tier offers step-by-step instructions on appropriate patient movement within and out of the department, as well as suggestions for overflow areas and additional staffing levels. This system can be adapted to individual hospitals and provides concise instructions to be followed in a potentially overwhelming situation.Keywords: disaster planning, emergency preparedness, major incident planning, mass casualty event
Procedia PDF Downloads 3753131 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique
Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam
Abstract:
With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services
Procedia PDF Downloads 1193130 Artificial Intelligence for Safety Related Aviation Incident and Accident Investigation Scenarios
Authors: Bernabeo R. Alberto
Abstract:
With the tremendous improvements in the processing power of computers, the possibilities of artificial intelligence will increasingly be used in aviation and make autonomous flights, preventive maintenance, ATM (Air Traffic Management) optimization, pilots, cabin crew, ground staff, and airport staff training possible in a cost-saving, less time-consuming and less polluting way. Through the use of artificial intelligence, we foresee an interviewing scenario where the interviewee will interact with the artificial intelligence tool to contextualize the character and the necessary information in a way that aligns reasonably with the character and the scenario. We are creating simulated scenarios connected with either an aviation incident or accident to enhance also the training of future accident/incident investigators integrating artificial intelligence and augmented reality tools. The project's goal is to improve the learning and teaching scenario through academic and professional expertise in aviation and in the artificial intelligence field. Thus, we intend to contribute to the needed high innovation capacity, skills, and training development and management of artificial intelligence, supported by appropriate regulations and attention to ethical problems.Keywords: artificial intelligence, aviation accident, aviation incident, risk, safety
Procedia PDF Downloads 223129 Legal Issues of Food Security in Republic of Kazakhstan
Authors: G. T. Aigarinova
Abstract:
This article considers the legal issues of food security as a major component of national security of the republic. The problem of food security is the top priority of the economic policy strategy of any state, the effectiveness of this solution influences social, political, and ethnic stability in society. Food security and nutrition is everyone’s business. Food security exists when all people, at all times, have physical, social and economic access to sufficient safe and nutritious food that meets their dietary needs and food preferences for an active and healthy life. By analyzing the existing legislation in the area of food security, the author identifies weaknesses and gaps, suggesting ways to improve it.Keywords: food security, national security, agriculture, public resources, economic security
Procedia PDF Downloads 4253128 Analysis of the Scattered Fields by Dielectric Sphere Inside Different Dielectric Mediums: The Case of the Source and Observation Point Is Reciprocal
Authors: Emi̇ne Avşar Aydin, Nezahat Günenç Tuncel, A. Hami̇t Serbest
Abstract:
The electromagnetic scattering from a canonical structure is an important issue in electromagnetic theory. In this study, the electromagnetic scattering from a dielectric sphere with oblique incidence is investigated. The incident field is considered as a plane wave with H polarized. The scattered and transmitted field expressions with unknown coefficients are written. The unknown coefficients are obtained by using exact boundary conditions. Then, the sphere is considered as having frequency dependent dielectric permittivity. The frequency dependence is shown by Cole-Cole model. The far scattered field expressions are found respect to different incidence angles in the 1-8 GHz frequency range. The observation point is the angular distance of pi from an incident wave. While an incident wave comes with a certain angle, observation point turns from 0 to 360 degrees. According to this, scattered field amplitude is maximum at the location of the incident wave, scattered field amplitude is minimum at the across incident wave. Also, the scattered fields are plotted versus frequency to show frequency-dependence explicitly. Graphics are shown for some incident angles compared with the Harrington's solution. Thus, the results are obtained faster and more reliable with reciprocal rotation. It is expected that when there is another sphere with different properties in the outer sphere, the presence and location of the sphere will be detected faster. In addition, this study leads to use for biomedical applications in the future.Keywords: scattering, dielectric sphere, oblique incidence, reciprocal rotation
Procedia PDF Downloads 2983127 Security of Internet of Things: Challenges, Requirements and Future Directions
Authors: Amjad F. Alharbi, Bashayer A. Alotaibi, Fahd S. Alotaibi
Abstract:
The emergence of Internet of Things (IoT) technology provides capabilities for a huge number of smart devices, services and people to be communicate with each other for exchanging data and information over existing network. While as IoT is progressing, it provides many opportunities for new ways of communications as well it introduces many security and privacy threats and challenges which need to be considered for the future of IoT development. In this survey paper, an IoT security issues as threats and current challenges are summarized. The security architecture for IoT are presented from four main layers. Based on these layers, the IoT security requirements are presented to insure security in the whole system. Furthermore, some researches initiatives related to IoT security are discussed as well as the future direction for IoT security are highlighted.Keywords: Internet of Things (IoT), IoT security challenges, IoT security requirements, IoT security architecture
Procedia PDF Downloads 3753126 The Value of Job Security across Various Welfare Policies
Authors: Eithan Hourie, Miki Malul, Raphael Bar-El
Abstract:
To investigate the relationship between various welfare policies and the value of job security, we conducted a study with 201 people regarding their assessments of the value of job security with respect to three elements: income stability, assurance of continuity of employment, and security in the job. The experiment simulated different welfare policy scenarios, such as the amount and duration of unemployment benefits, workfare, and basic income. The participants evaluated the value of job security in various situations. We found that the value of job security is approximately 22% of the starting salary, which is distributed as follows: 13% reflects income security, 8.7% reflects job security, and about 0.3% is for being able to keep their current employment in the future. To the best of our knowledge, this article is one of the pioneers in trying to quantify the value of job security in different market scenarios and at varying levels of welfare policy. Our conclusions may help decision-makers when deciding on a welfare policy.Keywords: job security value, employment protection legislation, status quo bias, expanding welfare policy
Procedia PDF Downloads 1063125 Network Security Attacks and Defences
Authors: Ranbir Singh, Deepinder Kaur
Abstract:
Network security is an important aspect in every field like government offices, Educational Institute and any business organization. Network security consists of the policies adopted to prevent and monitor forbidden access, misuse, modification, or denial of a computer network. Network security is very complicated subject and deal by only well trained and experienced people. However, as more and more people become wired, an increasing number of people need to understand the basics of security in a networked world. The history of the network security included an introduction to the TCP/IP and interworking. Network security starts with authenticating, commonly with a username and a password. In this paper, we study about various types of attacks on network security and how to handle or prevent this attack.Keywords: network security, attacks, denial, authenticating
Procedia PDF Downloads 4043124 Assessment of the Photovoltaic and Solar Thermal Potential Installation Area on Residential Buildings: Case Study of Amman, Jordan
Authors: Jenan Abu Qadourah
Abstract:
The suitable surface areas for the ST and PV installation are determined based on incident solar irradiation on different surfaces, shading analysis and suitable architectural area for integration considering limitations due to the constructions, available surfaces area and use of the available surfaces for other purposes. The incident solar radiation on the building surfaces and the building solar exposure analysis of the location of Amman, Jordan, is performed with Autodesk Ecotect analysis 2011 simulation software. The building model geometry within the typical urban context is created in “SketchUp,” which is then imported into Ecotect. The hourly climatic data of Amman, Jordan selected are the same ones used for the building simulation in IDA ICE and Polysun simulation software.Keywords: photovoltaic, solar thermal, solar incident, simulation, building façade, solar potential
Procedia PDF Downloads 1403123 Remembrance and Mourning: Taking the History of Poetry and on the Burning of the Old Summer Palace by the Anglo-French Forces as the Core of the Research
Authors: Wang Hsiao-Wen
Abstract:
This paper is based on the burning of the Old Summer Palace by the Anglo-French forces. The Old Summer Palace, Yuanmingyuan, is an imperial garden located outside Beijing, but it was looted and burned down by the Anglo-French troops. Hundreds of guards died, and Emperor Xianfeng also fled from the back door to the Chengde Mountain Resort in a hurry. It is a very shameful piece of Chinese imperial history. At that time, it was well known that the capital was almost occupied. However, the detailed process of the whole incident and the subsequent accountability was regarded as a national shame, which was omitted in the historical records and rarely mentioned by scholars, especially under the rulings of Xianfeng and Tongzhi. Due to this, the researcher explored how the incident was documented in historical poetry and how the war was recalled and evaluated from different perspectives so that rich and diverse historical interpretations can be constructed. The issues explored and discussed in this paper are divided into two parts: (i) the historical writing of the Incident in Gengshen Year, which mainly focuses on the Historical Poetry on the Burning of the Old Summer Palace by the Anglo-French forces, and (ii) the different identities of poets and their perspectives of mourning, which leads to the homogeneity or heterogeneity of their interpretations.Keywords: Anglo-French expedition to China, the Incident in Gengshen Year, burning of the Old Summer Palace, historical poetry
Procedia PDF Downloads 703122 Guidelines for Proper Internal Control of Internet Payment: A Case Study of Internet Payment Gateway, Thailand
Authors: Pichamon Chansuchai
Abstract:
The objective of this research were to investigate electronic payment system on the internet and offer the guidelines for proper internal control of the payment system based on international standard security control (ISO/IEC 17799:2005),in a case study of payment of the internet, Thailand. The guidelines covered five important areas: (1) business requirement for access control, (2) information systems acquisition, development and maintenance, (3) information security incident management, (4) business continuity management, and (5) compliance with legal requirement. The findings from this qualitative study revealed the guidelines for proper internet control that were more reliable and allow the same line of business to implement the same system of control.Keywords: audit, best practice, internet, payment
Procedia PDF Downloads 5003121 A Multicopy Strategy for Improved Security Wireless Sensor Network
Authors: Tuğçe Yücel
Abstract:
A Wireless Sensor Network(WSN) is a collection of sensor nodes which are deployed randomly in an area for surveillance. Efficient utilization of limited battery energy of sensors for increased network lifetime as well as data security are major design objectives for WSN. Moreover secure transmission of data sensed to a base station for further processing. Producing multiple copies of data packets and sending them on different paths is one of the strategies for this purpose, which leads to redundant energy consumption and hence reduced network lifetime. In this work we develop a restricted multi-copy multipath strategy where data move through ‘frequently’ or ‘heavily’ used sensors is copied by the sensor incident to such central nodes and sent on node-disjoint paths. We develop a mixed integer programing(MIP) model and heuristic approach present some preleminary test results.Keywords: MIP, sensor, telecommunications, WSN
Procedia PDF Downloads 5103120 Association of Human Immunodeficiency Virus with Incident Autoimmune Hemolytic Anemia: A Population-Based Cohort Study in Taiwan
Authors: Yung-Feng Yen, I-an Jen, Yi-Ming Arthur Chen
Abstract:
The molecular mimicry between human immunodeficiency virus (HIV) protein and red blood cell (RBC) antigens could induce the production of anti-RBC autoantibodies. However, the association between HIV infection and subsequent development of autoimmune hemolytic anemia (AIHA) remains unclear. This nationwide population-based cohort study aimed to determine the association between incident AIHA and HIV in Taiwan. From 2000–2012, we identified adult people living with HIV/AIDS (PLWHA) from the Taiwan centers for disease control HIV Surveillance System. HIV-infected individuals were defined by positive HIV-1 western blot. Age- and sex-matched controls without HIV infection were selected from the Taiwan National Health Insurance Research Database for comparison. All patients were followed until Dec. 31, 2012, and observed for occurrence of AIHA. Of 171,468 subjects (19,052 PLWHA, 152,416 controls), 30 (0.02%) had incident AIHA during a mean follow-up of 5.45 years, including 23 (0.12%) PLWHA and 7 (0.01%) controls. After adjusting for potential confounders, HIV infection was found to be an independent risk factor of incident AIHA (adjusted hazard ratio [AHR], 20.9; 95% confidence interval [CI], 8.34-52.3). Moreover, PLWHA receiving HAART were more likely to develop AIHA than those not receiving HAART (AHR, 10.8; 95% CI, 2.90-40.1). Additionally, the risk of AIHA was significantly increased in those taking efavirenz (AHR, 3.15; 95% CI, 1.18-8.43) or atazanavir (AHR, 6.58; 95% CI, 1.88-22.9) component of the HAART. In conclusion, HIV infection is an independent risk factor for incident AIHA. Clinicians need to be aware of the higher risk of AIHA in PLWHA.Keywords: autoimmune disease , hemolytic anemia, HIV, highly active antiretroviral treatment
Procedia PDF Downloads 2353119 The Benefits of Security Culture for Improving Physical Protection Systems at Detection and Radiation Measurement Laboratory
Authors: Ari S. Prabowo, Nia Febriyanti, Haryono B. Santosa
Abstract:
Security function that is called as Physical Protection Systems (PPS) has functions to detect, delay and response. Physical Protection Systems (PPS) in Detection and Radiation Measurement Laboratory needs to be improved continually by using internal resources. The nuclear security culture provides some potentials to support this research. The study starts by identifying the security function’s weaknesses and its strengths of security culture as a purpose. Secondly, the strengths of security culture are implemented in the laboratory management. Finally, a simulation was done to measure its effectiveness. Some changes were happened in laboratory personnel behaviors and procedures. All became more prudent. The results showed a good influence of nuclear security culture in laboratory security functions.Keywords: laboratory, physical protection system, security culture, security function
Procedia PDF Downloads 1853118 Blockchain Solutions for IoT Challenges: Overview
Authors: Amir Ali Fatoorchi
Abstract:
Regardless of the advantage of LoT devices, they have limitations like storage, compute, and security problems. In recent years, a lot of Blockchain-based research in IoT published and presented. In this paper, we present the Security issues of LoT. IoT has three levels of security issues: Low-level, Intermediate-level, and High-level. We survey and compare blockchain-based solutions for high-level security issues and show how the underlying technology of bitcoin and Ethereum could solve IoT problems.Keywords: Blockchain, security, data security, IoT
Procedia PDF Downloads 2103117 Enhancing of Laser Imaging by Using Ultrasound Effect
Authors: Hayder Raad Hafuze, Munqith Saleem Dawood, Jamal Abdul Jabbar
Abstract:
The effect of using both ultrasounds with laser in medical imaging of the biological tissue has been studied in this paper. Different wave lengths of incident laser light (405 nm, 532 nm, 650 nm, 808 nm and 1064 nm) were used with different ultrasound frequencies (1MHz and 3.3MHz). The results showed that, the change of acoustic intensity enhance the laser penetration of the tissue for different thickness. The existence of the ideal Raman-Nath diffraction pattern were investigated in terms of phase delay and incident angle.Keywords: tissue, laser, ultrasound, effect, imaging
Procedia PDF Downloads 4333116 COVID-19: A Thread to the Security System of Foreign Investment
Authors: Mehdi Ghaemi
Abstract:
In principle, foreign investment security is enshrined in International Investment Agreements (IIAs) and Bilateral Investment Treaties (BITs) in the form of protection standards such as the Full Protection and Security Standard (FPS). Accordingly, the host countries undertake to provide the necessary security for the economic activities of foreign investment. With the outbreak of coronavirus, the international community called COVID-19 a threat to international peace security, as well as to the public interest and national security of nations; and to deal with, they proposed several solutions, generally including quarantine, creating social distances, and restricting businesses. This article first studies the security of foreign investment in international investment law. In the following, it analyzes the consequences of the COVID-19 pandemic for foreign investment security so that if there is a threat to that security, solutions could be offered to reduce it.Keywords: foreign investment, FPS standard, host country, public health, COVID-19
Procedia PDF Downloads 1053115 Predicting Root Cause of a Fire Incident through Transient Simulation
Authors: Mira Ezora Zainal Abidin, Siti Fauzuna Othman, Zalina Harun, M. Hafiz M. Pikri
Abstract:
In a fire incident involving a Nitrogen storage tank that over-pressured and exploded, resulting in a fire in one of the units in a refinery, lack of data and evidence hampered the investigation to determine the root cause. Instrumentation and fittings were destroyed in the fire. To make it worst, this incident occurred during the COVID-19 pandemic, making collecting and testing evidence delayed. In addition to that, the storage tank belonged to a third-party company which requires legal agreement prior to the refinery getting approval to test the remains. Despite all that, the investigation had to be carried out with stakeholders demanding answers. The investigation team had to devise alternative means to support whatever little evidence came out as the most probable root cause. International standards, practices, and previous incidents on similar tanks were referred. To narrow down to just one root cause from 8 possible causes, transient simulations were conducted to simulate the overpressure scenarios to prove and eliminate the other causes, leaving one root cause. This paper shares the methodology used and details how transient simulations were applied to help solve this. The experience and lessons learned gained from the event investigation and from numerous case studies via transient analysis in finding the root cause of the accident leads to the formulation of future mitigations and design modifications aiming at preventing such incidents or at least minimize the consequences from the fire incident.Keywords: fire, transient, simulation, relief
Procedia PDF Downloads 953114 Enhancing Cloud Computing with Security Trust Model
Authors: John Ayoade
Abstract:
Cloud computing is a model that enables the delivery of on-demand computing resources such as networks, servers, storage, applications and services over the internet. Cloud Computing is a relatively growing concept that presents a good number of benefits for its users; however, it also raises some security challenges which may slow down its use. In this paper, we identify some of those security issues that can serve as barriers to realizing the full benefits that cloud computing can bring. One of the key security problems is security trust. A security trust model is proposed that can enhance the confidence that users need to fully trust the use of public and mobile cloud computing and maximize the potential benefits that they offer.Keywords: cloud computing, trust, security, certificate authority, PKI
Procedia PDF Downloads 4843113 Reaching New Levels: Using Systems Thinking to Analyse a Major Incident Investigation
Authors: Matthew J. I. Woolley, Gemma J. M. Read, Paul M. Salmon, Natassia Goode
Abstract:
The significance of high consequence, workplace failures within construction continues to resonate with a combined average of 12 fatal incidents occurring daily throughout Australia, the United Kingdom, and the United States. Within the Australian construction domain, more than 35 serious, compensable injury incidents are reported daily. These alarming figures, in conjunction with the continued occurrence of fatal and serious, occupational injury incidents globally suggest existing approaches to incident analysis may not be achieving required injury prevention outcomes. One reason may be that, incident analysis methods used in construction have not kept pace with advances in the field of safety science and are not uncovering the full range system-wide contributory factors that are required to achieve optimal levels of construction safety performance. Another reason underpinning this global issue may also be the absence of information surrounding the construction operating and project delivery system. For example, it is not clear who shares the responsibility for construction safety in different contexts. To respond to this issue, to the author’s best knowledge, a first of its kind, control structure model of the construction industry is presented and then used to analyse a fatal construction incident. The model was developed by applying and extending the Systems Theoretic and Incident Model and Process method to hierarchically represent the actors, constraints, feedback mechanisms, and relationships that are involved in managing construction safety performance. The Causal Analysis based on Systems Theory (CAST) method was then used to identify the control and feedback failures involved in the fatal incident. The conclusions from the Coronial investigation into the event are compared with the findings stemming from the CAST analysis. The CAST analysis highlighted additional issues across the construction system that were not identified in the coroner’s recommendations, suggested there is a potential benefit in applying a systems theory approach to incident analysis in construction. The findings demonstrate the utility applying systems theory-based methods to the analysis of construction incidents. Specifically, this study shows the utility of the construction control structure and the potential benefits for project leaders, construction entities, regulators, and construction clients in controlling construction performance.Keywords: construction project management, construction performance, incident analysis, systems thinking
Procedia PDF Downloads 130