Search results for: cyber hygiene
329 Fears of Strangers: Causes of Anonymity Rejection on Virtual World
Authors: Proud Arunrangsiwed
Abstract:
This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.Keywords: anonymous, anonymity, online identity, trust message, reliability
Procedia PDF Downloads 359328 A Qualitative Study on Cyberbullying and Traditional Bullying among Taiwanese High School Students
Authors: Chia-Wen Wang, Patou Masika Musumari, Teeranee Techasrivichien, S. Pilar Suguimoto, Chang-Chuan Chan, Masako Ono-Kihara, Masahiro Kihara
Abstract:
Background: In recent years, a particular form of bullying, referred to as 'cyberbullying' has emerged along with the rapid expansion of the Internet, social network services (SNSs) and smart phones. Many Asian countries, including Taiwan, are faced with both the cyberbullying and the traditional form of bullying. This study aims to explore Taiwanese adolescents’ experiences, perceptions and opinions regarding cyberbullying and traditional bullying through the perspective of victim, perpetrator, or witness. Method: This is a qualitative study using face-to-face in-depth interviews guided by a semi-structured questionnaire among high school students -aged 16 to 18 years- in Taipei, Taiwan. The participants were recruited through convenience sampling from five high schools between June and November 2016. Interviews were digitally recorded, transcribed, and analyzed using the thematic analysis approach. Results: Forty-eight participants were recruited, of which, 14 (29.2%) reported had ever experienced bullying. Specifically, 7 participants (14.6%) reported had ever been victims of cyberbullying, 1 (2%) had been victims of traditional bullying, and 6 (12.5%) had been victims of both cyber and traditional bullying. The majority (70.8%) reported had ever witnessed acts of bullying; however, none of the participants recognized had ever been a perpetrator of bullying. Cyberbullying mostly happens on social media (Facebook and Instagram) or LINE instant messaging application, and included upload and sharing of degrading pictures and videos of victims, as well as gossip and mean messages by the perpetrators. The anonymous and public nature of social media groups in schools made it easier to perpetrate bullying. The victim of traditional bullying reported being the target of verbal attack because of his physical appearance. Regardless of the type of bullying, victims reported feeling bad, angry, or depressed as a result of being bullied. Witnesses of both cyber- and traditional bullying cited physical appearance (e.g. having the big/flat bust or big butt, or overweight or obese) and disability as the most reasons of being a bullying victim. Conclusion: Both cyberbullying and traditional bullying had negative emotional and psychological impacts on victims. This study warrants further research to assess the extent of this phenomenon and understand the characteristics of perpetrators, victims, and witnesses to inform the design of tailored interventions using appropriate channels of dissemination.Keywords: cyberbullying, traditional bullying, social media, adolescents
Procedia PDF Downloads 345327 An Approach of High Scalable Production Capacity by Adaption of the Concept 'Everything as a Service'
Authors: Johannes Atug, Stefan Braunreuther, Gunther Reinhart
Abstract:
Volatile markets, as well as increasing global competition in manufacturing, lead to a high demand of flexible and agile production systems. These advanced production systems in turn conduct to high capital expenditure along with high investment risks. Developments in production regarding digitalization and cyber-physical systems result to a merger of informational- and operational technology. The approach of this paper is to benefit from this merger and present a framework of a production network with scalable production capacity and low capital expenditure by adaptation of the IT concept 'everything as a service' into the production environment.Keywords: digital manufacturing system, everything as a service, reconfigurable production, value network
Procedia PDF Downloads 343326 Virucidal, Bactericidal and Fungicidal Efficiency of Dry Microfine Steam on Innate Surfaces
Authors: C. Recchia, M. Bourel, B. Recchia
Abstract:
Microorganisms (viruses, bacteria, fungi) are responsible for most communicable diseases, threatening human health. For domestic use, chemical agents are often criticized because of their potential dangerousness, and natural solutions are needed. Application of the “dry microfine steam” (DMS) technology was tested on a selection of common pathogens (SARS-CoV-2, enterovirus EV-71, human coronavirus 229E, E. coli, S. aureus, C. albicans), on different innate surfaces, for 5 to 10 seconds. Quantification of the remaining pathogens was performed, and the reduction rates ranged from 99.8% (S. aureus on plastic) to over 99.999%. DMS showed high efficacy in the elimination of common microorganisms and could be seen as a natural alternative to chemical agents to improve domestic hygiene.Keywords: steam, SARS-CoV-2, bactericidal, virucidal, fungicidal, sterilization
Procedia PDF Downloads 163325 Exploring Cybersecurity and Phishing Attacks within Healthcare Institutions in Saudi Arabia: A Narrative Review
Authors: Ebtesam Shadadi, Rasha Ibrahim, Essam Ghadafi
Abstract:
Phishing poses a significant threat as a cybercrime by tricking end users into revealing their confidential and sensitive information. Attackers often manipulate victims to achieve their malicious goals. The increasing prevalence of Phishing has led to extensive research on this issue, including studies focusing on phishing attempts in healthcare institutions in the Kingdom of Saudi Arabia. This paper explores the importance of analyzing phishing attacks, specifically focusing on those targeting the healthcare industry. The study delves into the tactics, obstacles, and remedies associated with these attacks, all while considering the implications for Saudi Vision 2030.Keywords: phishing, cybersecurity, cyber threat, social engineering, vision 2030
Procedia PDF Downloads 61324 CLEAN Jakarta Waste Bank Project: Alternative Solution in Urban Solid Waste Management by Community Based Total Sanitation (CBTS) Approach
Authors: Mita Sirait
Abstract:
Everyday Jakarta produces 7,000 tons of solid waste and only about 5,200 tons delivered to landfill out of the city by 720 trucks, the rest are left yet manageable, as reported by Government of Clean Sector. CLEAN Jakarta Project is aimed at empowering community to achieve healthy environment for children and families in urban slum in Semper Barat and Penjaringan sub-district of North Jakarta that consisted of 20,584 people. The project applies Community Based Total Sanitation, an approach to empowering community to achieve total hygiene and sanitation behaviour by triggering activities. As regulated by Ministry of Health, it has 5 pillars: (1) open defecation free, (2) hand-washing with soaps, (3) drinking-water treatment, (4) solid-waste management and (5) waste-water management; and 3 strategic components: 1) demand creation, 2) supply creation and 3) enabling environment. Demand creation is generated by triggering community’s reaction to their daily sanitation habits by exposing them to their surrounding where they can see faeces, waste and other environmental pollutant to stimulate disgusting, embarrassing and responsibility sense. Triggered people then challenged to commit to improving their hygiene practice such as to stop littering and start waste separation. In order to support this commitment, and for supply creation component, the project initiated waste bank with community working group. It facilitated capacity-building trainings, waste bank system formulation and meetings with local authorities to solicit land permit and waste bank decree. As it is of a general banking system, waste bank has customer service, teller, manager, legal paper and provides saving book and money transaction. In 8 months, two waste banks have established with 148 customers, 17 million rupiah cash, and about 9 million of stored recyclables. Approximately 2.5 tons of 15-35 types of recyclable are managed in both waste banks per week. On enabling environment, the project has initiated sanitation working group in community and multi sectors government level, and advocated both parties. The former is expected to promote behaviour change and monitoring in the community, while the latter is expected to support sanitation with regulations, strategies, appraisal and awards; to coordinate partnering and networking, and to replicate best practices to other areas.Keywords: urban community, waste management, Jakarta, community based total sanitation (CBTS)
Procedia PDF Downloads 294323 On the Resilience of Operational Technology Devices in Penetration Tests
Authors: Marko Schuba, Florian Kessels, Niklas Reitz
Abstract:
Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.Keywords: penetration testing, OT, ICS, OT security
Procedia PDF Downloads 15322 Epulis in Cat's Lips: Understanding the Causes, Symptoms, and Treatment Options
Authors: Sadaf Salek
Abstract:
Introduction: Cats are susceptible to various health conditions, and one such ailment that can affect their oral health is epulis in their lips. Epulis refers to a benign tumor or growth that can develop in different areas of a cat's mouth, including the lips. While epulis is not life-threatening, it can still cause discomfort and affect a cat's overall quality of life. This essay aims to delve into the causes, symptoms, and treatment options for epulis in cat's lips, shedding light on this lesser-known oral condition. Causes: Epulis in a cat's lips can have several causes. Firstly, genetic predisposition plays a significant role, with certain breeds being more prone to developing these growths. Secondly, chronic irritation to the mouth, such as from dental diseases or foreign objects, can also contribute to the development of epulis. Lastly, hormonal imbalances, specifically an excess of estrogen, have been associated with the occurrence of these tumors in cats. Understanding these causes can help cat owners take preventive measures to reduce the risk of epulis in their feline companions. Symptoms: Identifying the symptoms of epulis in a cat's lips is vital for early intervention and effective treatment. The most common symptoms include swelling, redness, and the presence of a visible growth or lump on the lip. Cats with epulis may also exhibit drooling, difficulty eating, and a reluctance to groom themselves. Any change in eating habits or oral behavior should not be overlooked and prompt a visit to the veterinarian for a thorough examination. Treatment ptions: When it comes to treating epulis in a cat's lips, various options are available, depending on the size, location, and characteristics of the growth. The primary treatment involves surgical removal of the tumor. This procedure should be performed by a qualified veterinarian, ensuring complete excision of the mass while preserving as much healthy tissue as possible. In some cases, radiation therapy may be necessary, especially if the tumor is large or aggressive. Additionally, a veterinarian may recommend oral hygiene care and regular dental cleaning to prevent further growths and maintain the cat's oral health. Prevention and Care: Preventing epulis in a cat's lips is not always possible, especially if genetic factors are involved. However, certain preventive measures can minimize the risk of these growths. Maintaining good oral hygiene through regular brushing and the use of appropriate dental products can help prevent chronic irritation and dental diseases. Routine veterinary check-ups should also include thorough oral examinations to detect any abnormal growths or changes in the mouth at an early stage. Pet owners should be observant and seek veterinary care promptly for any signs of discomfort or changes in eating habits. Conclusion: Epulis in a cat's lips is a condition that requires attention and proper treatment. Understanding the causes, identifying symptoms, and exploring treatment options are of utmost importance to help improve a cat's oral health and overall well-being.Keywords: fibroma, cat, lip, epulis
Procedia PDF Downloads 52321 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime
Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim
Abstract:
Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.Keywords: construction industry, cybercrime, information and communication technology adoption, risk
Procedia PDF Downloads 509320 Smart Grids Cyber Security Issues and Challenges
Authors: Imen Aouini, Lamia Ben Azzouz
Abstract:
The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.Keywords: smart grids, smart meters, home area network, neighbor area network
Procedia PDF Downloads 424319 The Evaluation of Sexual Literacy Teacher Training Program in Thai Teachers
Authors: Chitraporn Boonthanom, Pailin Sisookho
Abstract:
The Sexual Literacy Training Teachers Program (SLTTP) based on sexual health problems in Thai students includes sexual development, sexual hygiene, high-risk behaviors, Sexual Transmitter Infections and HIV/AIDS, unwanted pregnancy, unsafe abortion, and sexual abuse that increase among Thai students. The training aimed at providing teachers with the sexuality knowledge, sexuality information access skills, communication skill to effectively teach in their class. 28 teachers were participated from schools in Bangkok metropolitan and Nakorn Patom province. The result show the mean score of the pre-test was 8.46 (SD=1.77) and the post-test was 10.13 (SD=2.34). The post-training results were found to be higher than pre–training results but not significant. As teachers are increasing the sexual literacy is very important for Thai students.Keywords: sexual literacy, teachers, training, sexuality education
Procedia PDF Downloads 357318 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System
Authors: Nareshkumar Harale, B. B. Meshram
Abstract:
The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design
Procedia PDF Downloads 227317 Insider Theft Detection in Organizations Using Keylogger and Machine Learning
Authors: Shamatha Shetty, Sakshi Dhabadi, Prerana M., Indushree B.
Abstract:
About 66% of firms claim that insider attacks are more likely to happen. The frequency of insider incidents has increased by 47% in the last two years. The goal of this work is to prevent dangerous employee behavior by using keyloggers and the Machine Learning (ML) model. Every keystroke that the user enters is recorded by the keylogging program, also known as keystroke logging. Keyloggers are used to stop improper use of the system. This enables us to collect all textual data, save it in a CSV file, and analyze it using an ML algorithm and the VirusTotal API. Many large companies use it to methodically monitor how their employees use computers, the internet, and email. We are utilizing the SVM algorithm and the VirusTotal API to improve overall efficiency and accuracy in identifying specific patterns and words to automate and offer the report for improved monitoring.Keywords: cyber security, machine learning, cyclic process, email notification
Procedia PDF Downloads 57316 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack
Authors: Vincent Andrew Cappellano
Abstract:
In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.Keywords: architecture, resiliency, availability, cyber-attack
Procedia PDF Downloads 108315 The Challenge of Assessing Social AI Threats
Authors: Kitty Kioskli, Theofanis Fotis, Nineta Polemi
Abstract:
The European Union (EU) directive Artificial Intelligence (AI) Act in Article 9 requires that risk management of AI systems includes both technical and human oversight, while according to NIST_AI_RFM (Appendix C) and ENISA AI Framework recommendations, claim that further research is needed to understand the current limitations of social threats and human-AI interaction. AI threats within social contexts significantly affect the security and trustworthiness of the AI systems; they are interrelated and trigger technical threats as well. For example, lack of explainability (e.g. the complexity of models can be challenging for stakeholders to grasp) leads to misunderstandings, biases, and erroneous decisions. Which in turn impact the privacy, security, accountability of the AI systems. Based on the NIST four fundamental criteria for explainability it can also classify the explainability threats into four (4) sub-categories: a) Lack of supporting evidence: AI systems must provide supporting evidence or reasons for all their outputs. b) Lack of Understandability: Explanations offered by systems should be comprehensible to individual users. c) Lack of Accuracy: The provided explanation should accurately represent the system's process of generating outputs. d) Out of scope: The system should only function within its designated conditions or when it possesses sufficient confidence in its outputs. Biases may also stem from historical data reflecting undesired behaviors. When present in the data, biases can permeate the models trained on them, thereby influencing the security and trustworthiness of the of AI systems. Social related AI threats are recognized by various initiatives (e.g., EU Ethics Guidelines for Trustworthy AI), standards (e.g. ISO/IEC TR 24368:2022 on AI ethical concerns, ISO/IEC AWI 42105 on guidance for human oversight of AI systems) and EU legislation (e.g. the General Data Protection Regulation 2016/679, the NIS 2 Directive 2022/2555, the Directive on the Resilience of Critical Entities 2022/2557, the EU AI Act, the Cyber Resilience Act). Measuring social threats, estimating the risks to AI systems associated to these threats and mitigating them is a research challenge. In this paper it will present the efforts of two European Commission Projects (FAITH and THEMIS) from the HorizonEurope programme that analyse the social threats by building cyber-social exercises in order to study human behaviour, traits, cognitive ability, personality, attitudes, interests, and other socio-technical profile characteristics. The research in these projects also include the development of measurements and scales (psychometrics) for human-related vulnerabilities that can be used in estimating more realistically the vulnerability severity, enhancing the CVSS4.0 measurement.Keywords: social threats, artificial Intelligence, mitigation, social experiment
Procedia PDF Downloads 65314 A Survey in Techniques for Imbalanced Intrusion Detection System Datasets
Authors: Najmeh Abedzadeh, Matthew Jacobs
Abstract:
An intrusion detection system (IDS) is a software application that monitors malicious activities and generates alerts if any are detected. However, most network activities in IDS datasets are normal, and the relatively few numbers of attacks make the available data imbalanced. Consequently, cyber-attacks can hide inside a large number of normal activities, and machine learning algorithms have difficulty learning and classifying the data correctly. In this paper, a comprehensive literature review is conducted on different types of algorithms for both implementing the IDS and methods in correcting the imbalanced IDS dataset. The most famous algorithms are machine learning (ML), deep learning (DL), synthetic minority over-sampling technique (SMOTE), and reinforcement learning (RL). Most of the research use the CSE-CIC-IDS2017, CSE-CIC-IDS2018, and NSL-KDD datasets for evaluating their algorithms.Keywords: IDS, imbalanced datasets, sampling algorithms, big data
Procedia PDF Downloads 328313 Study of Germs Responsible of Nosocomial Infections in Hospital of Guelma
Authors: Wissem Abdaoui, Ilhem Mokhtari, Adel Gouri, Benouareth Djamel Eddine
Abstract:
Contracted in a health facility, hospital-acquired infections are a major public health problem in recent years. The increase of nosocomial infections is partly related to diagnostic and therapeutic advances in medicine. The aim of our study was to isolate and diagnose some types of bacteria that are circulating in the hospital by performing different samples at two medical services: Pulmonary and Infectious Diseases. The antibiotic susceptibility tests were performed for bacterial isolates. The results have shown that there is a predominance of enterobacteria followed by the staphylococcus with its two species epidermidis ans saprophyticus. The study of the antibiogramme identified that some of these bacteria have a resistant profile against all the tested antibiotics. The fight against nosocomial infections is difficult because it must act on several factors: quality of care, safety of the hospital environment, hygiene, wearing gloves etc. are all areas that should be of heightened vigilance and preventive measures.Keywords: nosocomial infection, isolation, identification, sensitivity and resistance to antibiotics
Procedia PDF Downloads 380312 Lactic Acid Solution and Aromatic Vinegar Nebulization to Improve Hunted Wild Boar Carcass Hygiene at Game-Handling Establishment: Preliminary Results
Authors: Rossana Roila, Raffaella Branciari, Lorenzo Cardinali, David Ranucci
Abstract:
The wild boar (Sus scrofa) population has strongly increased across Europe in the last decades, also causing severe fauna management issues. In central Italy, wild boar is the main hunted wild game species, with approximately 40,000 animals killed per year only in the Umbria region. The meat of the game is characterized by high-quality nutritional value as well as peculiar taste and aroma, largely appreciated by consumers. This type of meat and products thereof can meet the current consumers’ demand for higher quality foodstuff, not only from a nutritional and sensory point of view but also in relation to environmental sustainability, the non-use of chemicals, and animal welfare. The game meat production chain is characterized by some gaps from a hygienic point of view: the harvest process is usually conducted in a wild environment where animals can be more easily contaminated during hunting and subsequent practices. The definition and implementation of a certified and controlled supply chain could ensure quality, traceability and safety for the final consumer and therefore promote game meat products. According to European legislation in some animal species, such as bovine, the use of weak acid solutions for carcass decontamination is envisaged in order to ensure the maintenance of optimal hygienic characteristics. A preliminary study was carried out to evaluate the applicability of similar strategies to control the hygienic level of wild boar carcasses. The carcasses, harvested according to the selective method and processed into the game-handling establishment, were treated by nebulization with two different solutions: a 2% food-grade lactic acid solution and aromatic vinegar. Swab samples were performed before treatment and in different moments after-treatment of the carcasses surfaces and subsequently tested for Total Aerobic Mesophilic Load, Total Aerobic Psychrophilic Load, Enterobacteriaceae, Staphylococcus spp. and lactic acid bacteria. The results obtained for the targeted microbial populations showed a positive effect of the application of the lactic acid solution on all the populations investigated, while aromatic vinegar showed a lower effect on bacterial growth. This study could lay the foundations for the optimization of the use of a lactic acid solution to treat wild boar carcasses aiming to guarantee good hygienic level and safety of meat.Keywords: game meat, food safety, process hygiene criteria, microbial population, microbial growth, food control
Procedia PDF Downloads 158311 Chemical Risk Posed by Hospital Liquid Effluents Example CHU Beni Messous Algiers
Authors: Laref Nabil
Abstract:
Ecology is at the center of many debates and international regulations. It therefore becomes a necessity and a privileged axis in many countries policy. The rise of environmental problems, the particularism of the hospital as an actor Public Health must lead by example in hygiene, prevention of risks to man and his environment. In this, it seemed interesting to make a poster on hospital liquid effluents in order to know not only the regulatory aspects but also their degree of pollution and their management in health institutions. Materials and methods: Samples taken at several looks, analysis performed at STEP Reghaia Algiers. Discussion and / or findings: In general, central gaze analysis results of water we can conclude that the contents of the various physico-chemical parameters greatly exceed the standards. Although the hypothesis of assimilating hospital liquid effluents domestic waters is confirmed, the liquid effluent from the University Hospital of Beni Messous and dumped in the natural environment still represent ecotoxicological risk.Keywords: health, hospital, liquid effluents, water
Procedia PDF Downloads 448310 Artificial Intelligence and Governance in Relevance to Satellites in Space
Authors: Anwesha Pathak
Abstract:
With the increasing number of satellites and space debris, space traffic management (STM) becomes crucial. AI can aid in STM by predicting and preventing potential collisions, optimizing satellite trajectories, and managing orbital slots. Governance frameworks need to address the integration of AI algorithms in STM to ensure safe and sustainable satellite activities. AI and governance play significant roles in the context of satellite activities in space. Artificial intelligence (AI) technologies, such as machine learning and computer vision, can be utilized to process vast amounts of data received from satellites. AI algorithms can analyse satellite imagery, detect patterns, and extract valuable information for applications like weather forecasting, urban planning, agriculture, disaster management, and environmental monitoring. AI can assist in automating and optimizing satellite operations. Autonomous decision-making systems can be developed using AI to handle routine tasks like orbit control, collision avoidance, and antenna pointing. These systems can improve efficiency, reduce human error, and enable real-time responsiveness in satellite operations. AI technologies can be leveraged to enhance the security of satellite systems. AI algorithms can analyze satellite telemetry data to detect anomalies, identify potential cyber threats, and mitigate vulnerabilities. Governance frameworks should encompass regulations and standards for securing satellite systems against cyberattacks and ensuring data privacy. AI can optimize resource allocation and utilization in satellite constellations. By analyzing user demands, traffic patterns, and satellite performance data, AI algorithms can dynamically adjust the deployment and routing of satellites to maximize coverage and minimize latency. Governance frameworks need to address fair and efficient resource allocation among satellite operators to avoid monopolistic practices. Satellite activities involve multiple countries and organizations. Governance frameworks should encourage international cooperation, information sharing, and standardization to address common challenges, ensure interoperability, and prevent conflicts. AI can facilitate cross-border collaborations by providing data analytics and decision support tools for shared satellite missions and data sharing initiatives. AI and governance are critical aspects of satellite activities in space. They enable efficient and secure operations, ensure responsible and ethical use of AI technologies, and promote international cooperation for the benefit of all stakeholders involved in the satellite industry.Keywords: satellite, space debris, traffic, threats, cyber security.
Procedia PDF Downloads 76309 Ion Beam Sputtering Deposition of Inorganic-Fluoropolymer Nano-Coatings for Real-Life Applications
Authors: M. Valentini, D. Melisi, M. A. Nitti, R A. Picca, M. C. Sportelli, E. Bonerba, G. Casamassima, N. Cioffi, L. Sabbatini, G. Tantillo, A. Valentini
Abstract:
In recent years antimicrobial coatings are receiving increasing attention due to their high demand in medical applications as well as in healthcare and hygiene. Research and technology are constantly involved to develop advanced finishing which can provide bacteriostatic growth without compromising the other typical properties of a textile as durability and non-toxicity, just to cite a few. Here we report on the antimicrobial coatings obtained, at room temperature and without the use of solvents, by means of the ion beam co-sputtering technique of an Ag target and a polytetrafluoroethylene one. In particular, such method allows to conjugate the well-known antimicrobial action of silver with the anti-stain and water-repellent properties of the fluoropolymer. Moreover, different Ag nanoparticle loadings (φ) were prepared by tuning the material deposition conditions achieving a fine control on film thickness and their antimicrobial/anti-stain properties.Keywords: antimicrobial, ion beam sputtering, nanocoatings, anti-stain
Procedia PDF Downloads 392308 Ethereum Based Smart Contracts for Trade and Finance
Authors: Rishabh Garg
Abstract:
Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols.Keywords: blockchain, distributed ledger technology, decentralized applications, ethereum, smart contracts, trade finance
Procedia PDF Downloads 153307 Leadership in Future Operational Environment
Authors: M. Şimşek
Abstract:
Rapidly changing factors that affect daily life also affect operational environment and the way military leaders fulfill their missions. With the help of technological developments, traditional linearity of conflict and war has started to fade away. Furthermore, mission domain has broadened to include traditional threats, hybrid threats and new challenges of cyber and space. Considering the future operational environment, future military leaders need to adapt themselves to the new challenges of the future battlefield. But how to decide what kind of features of leadership are required to operate and accomplish mission in the new complex battlefield? In this article, the main aim is to provide answers to this question. To be able to find right answers, first leadership and leadership components are defined, and then characteristics of future operational environment are analyzed. Finally, leadership features that are required to be successful in redefined battlefield are explained.Keywords: future operational environment, leadership, leadership components
Procedia PDF Downloads 434306 Study on Network-Based Technology for Detecting Potentially Malicious Websites
Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park
Abstract:
Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits
Procedia PDF Downloads 366305 Readiness of Military Professionals for Challenging Situations
Authors: Petra Hurbišová, Monika Davidová
Abstract:
The article deals with the readiness of military professionals for challenging situations. It discusses higher requirements on the psychical endurance of military professionals arising from the specific nature of the military occupation, which is typical for being very difficult to maintain regularity, which is in accordance with the hygiene of work alternated by relaxation. The soldier must be able to serve in the long term and constantly intense performance that goes beyond human tolerance to stress situations. A challenging situation is always associated with overcoming difficulties, obstacles and complicated circumstances or using unusual methods, ways and means to achieve the desired (expected) objectives, performing a given task or satisfying an important need. This paper describes the categories of challenging situations, their classification and characteristics. Attention is also paid to the formation of personality in challenging situations, coping with stress in challenging situations, Phases of solutions of stressful situations, resistance to challenging life situations and its factors. Finally, the article is focused on increasing the readiness of military professionals for challenging situations.Keywords: coping, challenging situations, stress, stressful situations, military professionals, resilience
Procedia PDF Downloads 316304 ISIS and Social Media
Authors: Neda Jebellie
Abstract:
New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies
Procedia PDF Downloads 487303 Prevalence and Risk Factors of Eimeria Spp. and Giardia Spp. in Rabbits of Local Algerian Population
Authors: Mina Henneb, Rafik Belabbas, Safia Zenia
Abstract:
The objective of this study was to determine the prevalence and to identify the risk factors of Eimeria spp. and Giardia spp. infection in rabbits from the local population of four localities in northern Algeria. Dung samples were collected from 16 farms, totalling 111 rabbits, and were analysed by the flotation method. Additional, data regarding the farms and management practices were obtained by means of a questionnaire used in the surveys and interviews. The results revealed that the prevalence of Eimerias pp. contamination was 68.75% (11/16) for farms and 58.56% (65/111) for rabbits, respectively. The prevalence of Giardia spp. was respectively 56.25% (9/16) for farms and 11.7% (13/111) for rabbits. The analyses showed that the prevalence of Eimeria spp. was significantly higher in the farms that did not comply with hygiene and non-conventional feeding and watering. However, the prevalence of Giardia spp. was significant in rabbits kept in poor conditions of rearing. In conclusion, this study showed that the prevalence of these two parasites in rabbits from the local population is relevant and may have important implications for the rabbit industry and public health, especially in rural areas.Keywords: Algeria, digestive parasites, prevalence, rabbits, risk factors
Procedia PDF Downloads 171302 The Image of Uganda in Germany: Assessing the Perceptions of Germans about Uganda as a Tourist Destination
Authors: K. V. Nabichu
Abstract:
The rationale of this research was to review how Germans perceive Uganda as a tourism destination, after German visitors arrivals to Uganda remain few compared to other destinations like Kenya. It was assumed that Uganda suffers a negative image in Germany due to negative media influence. The study findings indicate that Uganda is not a popular travel destination in Germany, there is generally lack of travel information about Uganda. Despite the respondents’ hearing about Uganda’s and her beautiful attractions, good climate and friendly people, they also think Uganda is unsafe for travel. Findings further show that Uganda is a potential travel destination for Germans due to her beautifull landscape, rich culture, wild life, primates and the Nile, however political unrest, insecurity, the fear for diseases and poor hygiene hinder Germans from travelling to Uganda. The media, internet as well as friends and relatives were the major primary sources of information on Uganda while others knew about Uganda through their school lessons and sports. Uganda is not well advertised and promoted in Germany.Keywords: destination Uganda and Germany, image, perception, negative media influence
Procedia PDF Downloads 340301 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking
Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye
Abstract:
The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.Keywords: algorithm, cryptography, cryptosystem, network
Procedia PDF Downloads 349300 Visual Odometry and Trajectory Reconstruction for UAVs
Authors: Sandro Bartolini, Alessandro Mecocci, Alessio Medaglini
Abstract:
The growing popularity of systems based on unmanned aerial vehicles (UAVs) is highlighting their vulnerability, particularly in relation to the positioning system used. Typically, UAV architectures use the civilian GPS, which is exposed to a number of different attacks, such as jamming or spoofing. This is why it is important to develop alternative methodologies to accurately estimate the actual UAV position without relying on GPS measurements only. In this paper, we propose a position estimate method for UAVs based on monocular visual odometry. We have developed a flight control system capable of keeping track of the entire trajectory travelled, with a reduced dependency on the availability of GPS signals. Moreover, the simplicity of the developed solution makes it applicable to a wide range of commercial drones. The final goal is to allow for safer flights in all conditions, even under cyber-attacks trying to deceive the drone.Keywords: visual odometry, autonomous uav, position measurement, autonomous outdoor flight
Procedia PDF Downloads 218