Search results for: information security risk treatment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 23731

Search results for: information security risk treatment

23371 The Role of Group Interaction and Managers’ Risk-willingness for Business Model Innovation Decisions: A Thematic Analysis

Authors: Sarah Müller-Sägebrecht

Abstract:

Today’s volatile environment challenges executives to make the right strategic decisions to gain sustainable success. Entrepreneurship scholars postulate mainly positive effects of environmental changes on entrepreneurship behavior, such as developing new business opportunities, promoting ingenuity, and the satisfaction of resource voids. A strategic solution approach to overcome threatening environmental changes and catch new business opportunities is business model innovation (BMI). Although this research stream has gained further importance in the last decade, BMI research is still insufficient. Especially BMI barriers, such as inefficient strategic decision-making processes, need to be identified. Strategic decisions strongly impact organizational future and are, therefore, usually made in groups. Although groups draw on a more extensive information base than single individuals, group-interaction effects can influence the decision-making process - in a favorable but also unfavorable way. Decisions are characterized by uncertainty and risk, whereby their intensity is perceived individually differently. The individual risk-willingness influences which option humans choose. The special nature of strategic decisions, such as in BMI processes, is that these decisions are not made individually but in groups due to their high organizational scope. These groups consist of different personalities whose individual risk-willingness can vary considerably. It is known from group decision theory that these individuals influence each other, observable in different group-interaction effects. The following research questions arise: i) How does group interaction shape BMI decision-making from managers’ perspective? ii) What are the potential interrelations among managers’ risk-willingness, group biases, and BMI decision-making? After conducting 26 in-depth interviews with executives from the manufacturing industry, applied Gioia methodology reveals the following results: i) Risk-averse decision-makers have an increased need to be guided by facts. The more information available to them, the lower they perceive uncertainty and the more willing they are to pursue a specific decision option. However, the results also show that social interaction does not change the individual risk-willingness in the decision-making process. ii) Generally, it could be observed that during BMI decisions, group interaction is primarily beneficial to increase the group’s information base for making good decisions, less than for social interaction. Further, decision-makers mainly focus on information available to all decision-makers in the team but less on personal knowledge. This work contributes to strategic decision-making literature twofold. First, it gives insights into how group-interaction effects influence an organization’s strategic BMI decision-making. Second, it enriches risk-management research by highlighting how individual risk-willingness impacts organizational strategic decision-making. To date, it was known in BMI research that risk aversion would be an internal BMI barrier. However, with this study, it becomes clear that it is not risk aversion that inhibits BMI. Instead, the lack of information prevents risk-averse decision-makers from choosing a riskier option. Simultaneously, results show that risk-averse decision-makers are not easily carried away by the higher risk-willingness of their team members. Instead, they use social interaction to gather missing information. Therefore, executives need to provide sufficient information to all decision-makers to catch promising business opportunities.

Keywords: business model innovation, cognitive biases, group-interaction effects, strategic decision-making, risk-willingness

Procedia PDF Downloads 58
23370 Effect on Body Weight of Naltrexone/Bupropion in Overweight and Obese Participants with Cardiovascular Risk Factors in a Large Randomized Double-Blind Study

Authors: Amy Halseth, Kevin Shan, Kye Gilder, John Buse

Abstract:

The study assessed the effect of prolonged-release naltrexone 32 mg/bupropion 360 mg (NB) on cardiovascular (CV) events in overweight/obese participants at elevated CV risk. Participants must lose ≥ 2% body weight at 16 wks, without a sustained increase in blood pressure, to continue drug. The study was terminated early after second interim analysis with 50% of all CV events. Data on CV endpoints has been published. Current analyses focus on weight change. Intent-to-treat (ITT) population (placebo [PBO] N=4450, NB N=4455) was 54.5% female, 83.5% white, mean age 61 yrs, mean BMI 37.3 kg/m2; 85.2% had type 2 diabetes, 32.1% had CV disease, 17.4% had both. At 52 wks, ITT-LOCF analysis showed greater least squares mean percent change in weight (LSM%ΔBW) with NB (-3.1%; 95% CI -4.8, -1.4) vs PBO (-0.3%; 95% CI -1.9, 1.4). Both groups demonstrated greater weight loss while on-treatment (NB [-7.3%], PBO [-3.9%]). Odds ratios of 5% and 10% weight loss were 3.3 and 4.1 (ITT-LOCF), respectively, in NB over PBO. At 104 wks, on-treatment LSM%ΔBW was -6.3% with NB (n=1137) vs -3.5% with PBO (n=741). Major reasons for NB withdrawal were adverse events (AE, 29%) and patient decision (21%), with GI disorders being the most common. Weight loss with NB in this study, in an older population predominantly with diabetes and elevated CV risk, was somewhat lower than that observed in overweight/obese participants without diabetes and similar to participants with diabetes in Phase 3 studies.

Keywords: contrave, mysimba, obesity, pharmacotherapy, weight loss

Procedia PDF Downloads 296
23369 The Critical Relevance of Credit and Debt Data in Household Food Security Analysis: The Risks of Ineffective Response Actions

Authors: Siddharth Krishnaswamy

Abstract:

Problem Statement: Currently, when analyzing household food security, the most commonly studied food access indicators are household income and expenditure. Larger studies do take into account other indices such as credit and employment. But these are baselines studies and by definition are conducted infrequently. Food security analysis for access is usually dedicated to analyzing income and expenditure indicators. And both these indicators are notoriously inconsistent. Yet this data can very often end up being the basis on which household food access is calculated; and by extension, be used for decision making. Objectives: This paper argues that along with income and expenditure, credit and debit information should be collected so that an accurate analysis of household food security (and in particular) food access can be determined. The lack of collection and analysis of this information routinely means that there is often a “masking” of the actual situation; a household’s food access and food availability patterns may be adequate mainly as a result of borrowing and may even be due to a long- term dependency (a debt cycle). In other words, such a household is, in reality, worse off than it appears a factor masked by its performance on basic access indicators. Procedures/methodologies/approaches: Existing food security data sets collected in 2005 in Azerbaijan, 2010 across Myanmar and 2014-15 across Uganda were used to support the theory that analyzing income and expenditure of a HHs and analyzing the same in addition to data on credit & borrowing patterns will result in an entirely different scenario of food access of the household. Furthermore, the data analyzed depicts food consumption patterns across groups of households and then relates this to the extent of dependency on credit, i.e. households borrowing money in order to meet food needs. Finally, response options that were based on analyzing only income and expenditure; and response options based on income, expenditure, credit, and borrowing – from the same geographical area of operation are studied and discussed. Results: The purpose of this work was to see if existing methods of household food security analysis could be improved. It is hoped that food security analysts will collect household level information on credit and debit and analyze them against income, expenditure and consumption patterns. This will help determine if a household’s food access and availability are dependent on unsustainable strategies such as borrowing money for food or undertaking sustained debts. Conclusions: The results clearly show the amount of relevant information that is missing in Food Access analysis if debit and borrowing of the household is not analyzed along with the typical Food Access indicators that are usually analyzed. And the serious repercussions this has on Programmatic response and interventions.

Keywords: analysis, food security indicators, response, resilience analysis

Procedia PDF Downloads 306
23368 Security in Resource Constraints: Network Energy Efficient Encryption

Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy

Abstract:

Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.

Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC

Procedia PDF Downloads 124
23367 Spatial Analysis for Wind Risk Index Assessment

Authors: Ljiljana Seric, Vladimir Divic, Marin Bugaric

Abstract:

This paper presents methodology for spatial analysis of GIS data that is used for assessing the microlocation risk index from potential damages of high winds. The analysis is performed on freely available GIS data comprising information about wind load, terrain cover and topography of the area. The methodology utilizes the legislation of Eurocode norms for determination of wind load of buildings and constructions. The core of the methodology is adoption of the wind load parameters related to location on geographical spatial grid. Presented work is a part of the Wind Risk Project, supported by the European Commission under the Civil Protection Financial Instrument of the European Union (ECHO). The partners involved in Wind Risk project performed Wind Risk assessment and proposed action plan for three European countries – Slovenia, Croatia and Germany. The proposed method is implemented in GRASS GIS open source GIS software and demonstrated for Case study area of wider area of Split, Croatia. Obtained Wind Risk Index is visualized and correlated with critical infrastructures like buildings, roads and power lines. The results show good correlation between high Wind Risk Index with recent incidents related to wind.

Keywords: Eurocode norms, GIS, spatial analysis, wind distribution, wind risk

Procedia PDF Downloads 295
23366 The Effects of Cross-Border Use of Drones in Nigerian National Security

Authors: H. P. Kerry

Abstract:

Drone technology has become a significant discourse in a nation’s national security, while this technology could constitute a danger to national security on the one hand, on the other hand, it is used in developed and developing countries for border security, and in some cases, for protection of security agents and migrants. In the case of Nigeria, drones are used by the military to monitor and tighten security around the borders. However, terrorist groups have devised a means to utilize the technology to their advantage. Therefore, the potential danger in the widespread proliferation of this technology has become a myriad of risks. The research on the effects of cross-border use of drones in Nigerian national security looks at the negative and positive consequences of using drone technology. The study employs the use of interviews and relevant documents to obtain data while the study applied the Just War theory to justify the reason why countries use force; it further buttresses the points with what the realist theory thinks about the use of force. In conclusion, the paper recommends that the Nigerian government through the National Assembly should pass a bill for the establishment of a law that will guide the use of armed and unarmed drones in Nigeria enforced by the Nigeria Civil Aviation Authority and the office of the National Security Adviser.

Keywords: armed drones, drones, cross-border, national security

Procedia PDF Downloads 137
23365 Testicular Dose and Associated Risk from Common Pelvis Radiation Therapy in Iran

Authors: Ahmad Shanei, Milad Baradaran-Ghahfarokhi

Abstract:

This study aimed to investigate testicular dose (TD) and the associated risk of heritable disease from common pelvis radiotherapy of male patients in Iran. In this work, the relation between TD and changes in beam energy, pelvis size, source to skin distance (SSD) and beam directions (anterior or posterior) were also evaluated. The values of TDs were measured on 67 randomly selected male patients during common pelvis radiotherapy using 1.17 and 1.33 MeV, Theratron Cobalt-60 unit at SSD of 80 cm and 9 MV, Neptun 10 PC and 18 MV, GE Saturne 20 at SSD of 100 cm at Seyed-Al Shohada Hospital, Isfahan, Iran. Results showed that the maximum TD was up to 12% of the tumor dose. Considering the risk factor for radiation-induced heritable disorders of 0.1% per Sv, an excess risk of hereditary disorders of 72 per 10000 births was conservatively calculated. There was a significant difference in the measured TD using different treatment machines and energies (P < 0.001). The TD at 100 cm SSD were much less than that for 80 cm SSD (P <0.001). The Pearson Correlation test showed that, as expected, there was a strong correlation between TD and patient’s pelvis size (r = 0.275, P <0.001). Using the student’s t-tests, it was found that, there was not a significant difference between TD and beam direction (P = 0.231). Iranian male patients undergoing pelvic radiotherapy have the potential of receiving a TD of more than 1 Gy which might result in temporary azoospermia. The risk for induction of hereditary disorders in future generations should be considered as low but not negligible in comparison with the correspondent nominal risk.

Keywords: pelvis radiotherapy, testicular dose, infertility, hereditary effects

Procedia PDF Downloads 520
23364 Food Security in the Middle East and North Africa

Authors: Sara D. Garduno-Diaz, Philippe Y. Garduno-Diaz

Abstract:

To date, one of the few comprehensive indicators for the measurement of food security is the Global Food Security Index. This index is a dynamic quantitative and qualitative bench marking model, constructed from 28 unique indicators, that measures drivers of food security across both developing and developed countries. Whereas the Global Food Security Index has been calculated across a set of 109 countries, in this paper we aim to present and compare, for the Middle East and North Africa (MENA), 1) the Food Security Index scores achieved and 2) the data available on affordability, availability, and quality of food. The data for this work was taken from the latest (2014) report published by the creators of the GFSI, which in turn used information from national and international statistical sources. According to the 2014 Global Food Security Index, MENA countries rank from place 17/109 (Israel, although with resent political turmoil this is likely to have changed) to place 91/109 (Yemen) with household expenditure spent in food ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food as a share of household consumption in most countries and better food safety net programs in the MENA have contributed to a notable increase in food affordability. The region has also however experienced a decline in food availability, owing to more limited food supplies and higher volatility of agricultural production. In terms of food quality and safety the MENA has the top ranking country (Israel). The most frequent challenges faced by the countries of the MENA include public expenditure on agricultural research and development as well as volatility of agricultural production. Food security is a complex phenomenon that interacts with many other indicators of a country’s well-being; in the MENA it is slowly but markedly improving.

Keywords: diet, food insecurity, global food security index, nutrition, sustainability

Procedia PDF Downloads 328
23363 Comparing Trastuzumab-Related Cardiotoxicity between Elderly and Younger Patients with Breast Cancer: A Prospective Cohort Study

Authors: Afrah Aladwani, Alexander Mullen, Mohammad AlRashidi, Omamah Alfarisi, Faisal Alterkit, Abdulwahab Aladwani, Asit Kumar, Emad Eldosouky

Abstract:

Introduction: Trastuzumab is a HER-2 targeted humanized monoclonal antibody that significantly improves the therapeutic outcomes of metastatic and non-metastatic breast cancer. However, it is associated with increased risk of cardiotoxicity that ranges from mild decline in the cardiac ejection fraction to permanent cardiomyopathy. Concerns have been raised in treating eligible older patients. This study compares trastuzumab outcomes between two age cohorts in the Kuwait Cancer Control Centre (KCCC). Methods: In a prospective comparative observational study, 93 HER-2 positive breast cancer patients undergoing different chemotherapy protocols + trastuzumab were included and divided into two cohorts based on their age (˂60 and ≥60 years old). The baseline left ventricular ejection fraction (LVEF) was assessed and monitored every three months during trastuzumab treatment. Event of cardiotoxicity was defined as ≥10% decline in the LVEF from the baseline. The lower accepted normal limit of the LVEF was 50%. Results: The median baseline LVEF was 65% in both age cohorts (IQR 8% and 9% for older and younger patients respectively). Whereas, the median LVEF post-trastuzumab treatment was 51% and 55% in older and younger patients respectively (IQR 8%; p-value = 0.22), despite the fact that older patients had significantly lower exposure to anthracyclines compared to younger patients (60% and 84.1% respectively; p-value ˂0.001). 86.7% and 55.6% of older and younger patients, respectively, developed ≥10% decline in their LVEF from the baseline. Among those, only 29% of older and 27% of younger patients reached a LVEF value below 50% (p-value = 0.88). Statistically, age was the only factor that significantly correlated with trastuzumab induced cardiotoxicity (OR 4; p-value ˂0.012), but it did not increase the requirement for permanent discontinuation of treatment. A baseline LVEF value below 60% contributed to developing a post-treatment value below normal ranges (50%). Conclusion: Breast cancer patients aged 60 years and above in Kuwait were at 4-fold higher risk of developing ≥10% decline in their LVEF from the baseline than younger patients during trastuzumab treatment. Surprisingly, previous exposure to anthracyclines and multiple comorbidities were not associated with significant increased risk of cardiotoxicity.

Keywords: breast cancer, elderly, Trastuzumab, cardiotoxicity

Procedia PDF Downloads 186
23362 Closed Incision Negative Pressure Therapy Dressing as an Approach to Manage Closed Sternal Incisions in High-Risk Cardiac Patients: A Multi-Centre Study in the UK

Authors: Rona Lee Suelo-Calanao, Mahmoud Loubani

Abstract:

Objective: Sternal wound infection (SWI) following cardiac operation has a significant impact on patient morbidity and mortality. It also contributes to longer hospital stays and increased treatment costs. SWI management is mainly focused on treatment rather than prevention. This study looks at the effect of closed incision negative pressure therapy (ciNPT) dressing to help reduce the incidence of superficial SWI in high-risk patients after cardiac surgery. The ciNPT dressing was evaluated at 3 cardiac hospitals in the United Kingdom". Methods: All patients who had cardiac surgery from 2013 to 2021 were included in the study. The patients were classed as high risk if they have two or more of the recognised risk factors: obesity, age above 80 years old, diabetes, and chronic obstructive pulmonary disease. Patients receiving standard dressing (SD) and patients using ciNPT were propensity matched, and the Fisher’s exact test (two-tailed) and unpaired T-test were used to analyse categorical and continuous data, respectively. Results: There were 766 matched cases in each group. Total SWI incidences are lower in the ciNPT group compared to the SD group (43 (5.6%) vs 119 (15.5%), P=0.0001). There are fewer deep sternal wound infections (14(1.8%) vs. 31(4.04%), p=0.0149) and fewer superficial infections (29(3.7%) vs. 88 (11.4%), p=0.0001) in the ciNPT group compared to the SD group. However, the ciNPT group showed a longer average length of stay (11.23 ± 13 days versus 9.66 ± 10 days; p=0.0083) and higher mean logistic EuroSCORE (11.143 ± 13 versus 8.094 ± 11; p=0.0001). Conclusion: Utilization of ciNPT as an approach to help reduce the incidence of superficial and deep SWI may be effective in high-risk patients requiring cardiac surgery.

Keywords: closed incision negative pressure therapy, surgical wound infection, cardiac surgery complication, high risk cardiac patients

Procedia PDF Downloads 59
23361 Renewable Energy and Energy Security in Malaysia: A Quantitative Analysis

Authors: Endang Jati Mat Sahid, Hussain Ali Bekhet

Abstract:

Robust economic growth, increasing population, and personal consumption are the main drivers for the rapid increase of energy demand in Malaysia. Increasing demand has compounded the issue of national energy security due to over-dependence on fossil fuel, depleting indigenous domestic conventional energy resources which in turns has increased the country’s energy import dependence. In order to improve its energy security, Malaysia has seriously embarked on a renewable energy journey. Many initiatives on renewable energy have been introduced in the past decade. These strategies have resulted in the exploding growth of renewable energy deployment in Malaysia. Therefore, this study investigated the impact of renewable energy deployment on energy security. Secondary data was used to calculate the energy security indicators. The study also compared the results of applying different energy security indicators namely availability, applicability, affordability and acceptability dimension of energy resources. The evaluation shows that Malaysia will experience slight improvement in availability and acceptability dimension of energy security. This study suggests that energy security level could be further enhanced by efficient utilization of energy, reducing carbon content of energy and facilitating low-carbon industries.

Keywords: energy policy, energy security, Malaysia, renewable energy

Procedia PDF Downloads 215
23360 Approved Cyclic Treatment System of Grey Water

Authors: Hanen Filali, Mohamed Hachicha

Abstract:

Treated grey water (TGW) reuse emerged as an alternative resource to meet the growing demand for water for agricultural irrigation and reduce the pressure on limited existing fresh water. However, this reuse needs adapted management in order to avoid environmental and health risks. In this work, the treatment of grey water (GW) was studied from a cyclic treatment system that we designed and implemented in the greenhouse of National Research Institute for Rural Engineering, Water and Forests (INRGREF). This system is composed of three levels for treatment (TGW 1, TGW 2, and TGW 3). Each level includes a sandy soil box. The use of grey water was moderated depending on the chemical and microbiological quality obtained. Different samples of soils and treated grey water were performed and analyzed for 14 irrigation cycles. TGW through cyclic treatment showed physicochemical parameters like pH, electrical conductivity (EC), chemical oxygen demand (COD), biological oxygen demand (BOD5) in the range of 7,35-7,91, 1,69-5,03 dS/m, 102,6-54,2 mgO2/l, and 31,33-15,74 mgO2/l, respectively. Results showed a reduction in the pollutant load with a significant effect on the three treatment levels; however, an increase in salinity was observed during all irrigation cycles. Microbiological results showed good grey water treatment with low health risk on irrigated soil. Treated water quality was below permissible Tunisian standards (NT106.03), and treated water is suitable for non-potable options.

Keywords: treated grey water, irrigation, cyclic treatment, soils, physico-chemical parameters, microbiological parameters

Procedia PDF Downloads 72
23359 Analysis of the Predictive Performance of Value at Risk Estimations in Times of Financial Crisis

Authors: Alexander Marx

Abstract:

Measuring and mitigating market risk is essential for the stability of enterprises, especially for major banking corporations and investment bank firms. To employ these risk measurement and mitigation processes, the Value at Risk (VaR) is the most commonly used risk metric by practitioners. In the past years, we have seen significant weaknesses in the predictive performance of the VaR in times of financial market crisis. To address this issue, the purpose of this study is to investigate the value-at-risk (VaR) estimation models and their predictive performance by applying a series of backtesting methods on the stock market indices of the G7 countries (Canada, France, Germany, Italy, Japan, UK, US, Europe). The study employs parametric, non-parametric, and semi-parametric VaR estimation models and is conducted during three different periods which cover the most recent financial market crisis: the overall period (2006–2022), the global financial crisis period (2008–2009), and COVID-19 period (2020–2022). Since the regulatory authorities have introduced and mandated the Conditional Value at Risk (Expected Shortfall) as an additional regulatory risk management metric, the study will analyze and compare both risk metrics on their predictive performance.

Keywords: value at risk, financial market risk, banking, quantitative risk management

Procedia PDF Downloads 65
23358 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security

Authors: Carmen J. Savelli, Romy Conzade

Abstract:

Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.

Keywords: food safety, food security, nutrition, policy

Procedia PDF Downloads 390
23357 Arteriosclerosis and Periodontitis: Correlation Expressed in the Amount of Fibrinogen in Blood

Authors: Nevila Alliu, Saimir Heta, Ilma Robo, Vera Ostreni

Abstract:

Periodontitis as an oral pathology caused by specific bacterial flora functions as a focal infection for the onset and aggravation of arteriosclerosis. These two distant pathologies, since they affect organs at a distance from each other, communicate with each other with correlation at the level of markers of inflammation in the blood. Fluctuations in the level of fibrinogen in the blood, depending on the active or passive phase of the existing periodontitis, affect the promotion of arteriosclerosis. The study is of the review type to analyze the effect of non-surgical periodontal treatment on fluctuations in the level of fibrinogen in the blood. The reduction of fibrinogen levels in the blood after non-surgical periodontal treatment of periodontitis in the patient's cavity is visible data and supported by literature sources. Also, the influence of a high amount of fibrinogen in the blood on the occurrence of arteriosclerosis is also another important data that again relies on many sources of literature. Conclusions: Thromboembolism and arteriosclerosis, as risk factors expressed in clinical data, have temporary bacteremia in the blood, which can occur significantly and often between phases of non-surgical periodontal treatment of periodontitis, treatments performed with treatment phases and protocols of predetermined treatment. Arterial thromboembolism has a significant factor, such as high levels of fibrinogen in the blood, which are significantly reduced during the period of non-surgical periodontal treatment.

Keywords: fibrinogen, refractory periodontitis, atherosclerosis, non-surgical, periodontal treatment

Procedia PDF Downloads 77
23356 A Secure System for Handling Information from Heterogeous Sources

Authors: Shoohira Aftab, Hammad Afzal

Abstract:

Information integration is a well known procedure to provide consolidated view on sets of heterogeneous information sources. It not only provides better statistical analysis of information but also facilitates users to query without any knowledge on the underlying heterogeneous information sources The problem of providing a consolidated view of information can be handled using Semantic data (information stored in such a way that is understandable by machines and integrate-able without manual human intervention). However, integrating information using semantic web technology without any access management enforced, will results in increase of privacy and confidentiality concerns. In this research we have designed and developed a framework that would allow information from heterogeneous formats to be consolidated, thus resolving the issue of interoperability. We have also devised an access control system for defining explicit privacy constraints. We designed and applied our framework on both semantic and non-semantic data from heterogeneous resources. Our approach is validated using scenario based testing.

Keywords: information integration, semantic data, interoperability, security, access control system

Procedia PDF Downloads 324
23355 Organisational Disclosure: Threats to Individuals' Privacy

Authors: N. A. Badrul

Abstract:

People are concerned that they are vulnerable as a result of what is exposed about them on the internet. Users are increasingly aware of their privacy and are making various efforts to protect their personal information. However, besides individuals themselves, organisations are also exposing personal information of their staff to the general public by publishing it on their official website. This practice may put individuals at risk and particularly vulnerable to threats. This preliminary study explores explicitly the amount and types of personal information disclosure from organisational websites. Threats and risks related to the disclosures are discussed. In general, all the examined organisational websites discloses personal information with varies identifiable degree of data.

Keywords: personal information, privacy, e-government, information disclosure

Procedia PDF Downloads 285
23354 On the Effectiveness of Electricity Market Development Strategies: A Target Model for a Developing Country

Authors: Ezgi Avci-Surucu, Doganbey Akgul

Abstract:

Turkey’s energy reforms has achieved energy security through a variety of interlinked measures including electricity, gas, renewable energy and energy efficiency legislation; the establishment of an energy sector regulatory authority; energy price reform; the creation of a functional electricity market; restructuring of state-owned energy enterprises; and private sector participation through privatization and new investment. However, current strategies, namely; “Electricity Sector Reform and Privatization Strategy” and “Electricity Market and Supply Security Strategy” has been criticized for various aspects. The present paper analyzes the implementation of the aforementioned strategies in the framework of generation scheduling, transmission constraints, bidding structure and general aspects; and argues the deficiencies of current strategies which decelerates power investments and creates uncertainties. We conclude by policy suggestions to eliminate these deficiencies in terms of price and risk management, infrastructure, customer focused regulations and systematic market development.

Keywords: electricity markets, risk management, regulations, balancing and settlement, bilateral trading, generation scheduling, bidding structure

Procedia PDF Downloads 533
23353 Trusting Smart Speakers: Analysing the Different Levels of Trust between Technologies

Authors: Alec Wells, Aminu Bello Usman, Justin McKeown

Abstract:

The growing usage of smart speakers raises many privacy and trust concerns compared to other technologies such as smart phones and computers. In this study, a proxy measure of trust is used to gauge users’ opinions on three different technologies based on an empirical study, and to understand which technology most people are most likely to trust. The collected data were analysed using the Kruskal-Wallis H test to determine the statistical differences between the users’ trust level of the three technologies: smart speaker, computer and smart phone. The findings of the study revealed that despite the wide acceptance, ease of use and reputation of smart speakers, people find it difficult to trust smart speakers with their sensitive information via the Direct Voice Input (DVI) and would prefer to use a keyboard or touchscreen offered by computers and smart phones. Findings from this study can inform future work on users’ trust in technology based on perceived ease of use, reputation, perceived credibility and risk of using technologies via DVI.

Keywords: direct voice input, risk, security, technology, trust

Procedia PDF Downloads 160
23352 Oral Biofilm and Stomatitis Denture: Local Implications and Cardiovascular Risks

Authors: Adriana B. Ribeiro, Camila B. Araujo, Frank L. Bueno, Luiz Eduardo V. Silva, Caroline V. Fortes, Helio C. Salgado, Rubens Fazan Jr., Claudia H. L. da Silva

Abstract:

Denture-related stomatitis (DRS) has recently been associated with deleterious cardiovascular effects, including hypertension. This study evaluated salivary parameters, blood pressure (BP) and heart rate variability (HRV), before and after DRS treatment in edentulous patients (n=14). Collection of unstimulated and stimulated saliva, as well as blood pressure (BP) measurements and electrocardiogram recordings were performed before and after 10 days of DRS treatment. The salivary flow (mL/min) was found similar at both times while pH was smaller (more neutral) after treatment (7.3 ± 2.2 vs. 7.1 ± 0.24). Systolic BP (mmHg) showed a trend, but not a significant reduction after DRS treatment (158 ± 25.68 vs. 148 ± 16,72, p=0,062) while diastolic BP was found similar in both times (86 ± 13.93 and 84 ± 9.38). Overall HRV, measured by standard deviation of RR intervals was not affected by DRS treatment (24 ± 4 vs 18 ± 2 ms), but differences of successive RR intervals (an index of parasympathetic cardiac modulation) increased after the treatment (26 ± 4 vs 19 ± 2 ms). Moreover, another index of vagal modulation of the heart, the power of RR interval spectra at high-frequency, was also markedly higher after DRS treatment (236 ± 63 vs 135 ± 32 ms²). Such findings strongly suggest that DRS is linked to an autonomic imbalance with sympathetic overactivity, which is markedly deleterious, increasing cardiovascular risk and the incidence of diseases such as hypertension. Acknowledgment: This study is supported by FAPESP, CNPq.

Keywords: biofilm, denture stomatitis, HRV, blood pressure

Procedia PDF Downloads 207
23351 Uncertainty in Risk Modeling

Authors: Mueller Jann, Hoffmann Christian Hugo

Abstract:

Conventional quantitative risk management in banking is a risk factor of its own, because it rests on assumptions such as independence and availability of data which do not hold when rare events of extreme consequences are involved. There is a growing recognition of the need for alternative risk measures that do not make these assumptions. We propose a novel method for modeling the risk associated with investment products, in particular derivatives, by using a formal language for specifying financial contracts. Expressions in this language are interpreted in the category of values annotated with (a formal representation of) uncertainty. The choice of uncertainty formalism thus becomes a parameter of the model, so it can be adapted to the particular application and it is not constrained to classical probabilities. We demonstrate our approach using a simple logic-based uncertainty model and a case study in which we assess the risk of counter party default in a portfolio of collateralized loans.

Keywords: risk model, uncertainty monad, derivatives, contract algebra

Procedia PDF Downloads 549
23350 The Use of Medicinal Plants among Middle Aged People in Rural Area, West Java, Indonesia

Authors: Rian Diana, Naufal Muharam Nurdin, Faisal Anwar, Hadi Riyadi, Ali Khomsan

Abstract:

The use of traditional medicine (herbs and medicinal plants) are common among Indonesian people especially the elderly. Few study explore the use of medicinal plants in middle aged people. This study aims to collect information on the use of medicinal plants in middle aged people in rural areas. This cross sectional study included 224 subjects aged 45-59 years old and conducted in Cianjur District, West Java in 2014. Semi-structured questionnaires were used to collect information about preference in treatment of illness, the use of medicinal plants, and their purposes. Information also recorded plant names, parts used, mode of preparation, and dosage. Buying drugs in stall (83.9%) is the first preference in treatment of illness, followed by modern treatment 19.2% (doctors) and traditional treatment 17.0% (herbs/medicinal plants). 87 subjects (38.8%) were using herbs and medicinal plants for curative (66.7%), preventive (31.2%), and rehabilitative (2.1%) purposes. In this study, 48 species are used by the subjects. Physalis minima L. 'cecenet', Orthosiphon aristatus Mic. 'kumis kucing', and Annona muricata 'sirsak' are commonly used for the treatment of hypertension and stiffness. Leaves (64.6%) are the most common part used. Medicinal plants were washed and boiled in a hot water. Subject drinks the herbs with a different dosage. One in three middle aged people used herbal and medicinal plants for curative and preventive treatment particularly hypertension and stiffness. Increasing knowledge about herbal or medicinal plants dosage and their interaction with medical drugs are important to do.Doses vary between 1-3 glasses/day for treatment and 1-2 glasses/months for prevention of diseases.

Keywords: herbs, hypertension, medicinal plants, middle age, rural

Procedia PDF Downloads 218
23349 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 346
23348 The Study of the Awareness of Sexual Risk Bahaviors and Sexual Risk Behaviors of Adolescents Students

Authors: Sumitta Sawangtook, Parichart Thano

Abstract:

The purposes of research were to study the relationship between the awareness of sexual risk behaviors and sexual risk behaviors of adolescent students, and to compare the sexual risk behaviors of adolescent students by gender, education level, sweetheart’s number, achievement, sexual value, and the influence of the friendship group. The research sample of 344 sevenths through twelfth grade students in secondary school for the academic year 2014, Dindang district Bangkok was selected by simple random sampling. The research instruments are: 1) demographic questionnaire 2) evaluation form of the awareness of sexual risk behaviors 3) questionnaire about sexual value 4) questionnaire about the influence of the friendship group and 5) evaluation form of sexual risk behaviors. They were used for data collections which are subsequently analyzed by percentage, mean, standard deviation, t-test, One-way Analysis of Variances. The results of this study were presented as follow: 1) The awareness of sexual risk behaviors was negatively correlated with sexual risk behaviors of adolescent students (r=-.27, p=.000). 2) There was significant difference at .05 level in sexual risk behaviors among adolescent students who had gender difference (t=5.90, p=.000). 3) There was no significant difference at .05 level in sexual risk behaviors among adolescent students who had the different level of education (t=1.41, p=.16). 4) There was significant difference at .05 level in sexual risk behaviors among adolescent students who had the different level of sweetheart’s number (F=13.03, p=.000). 5) There was significant difference at .05 level in sexual risk behaviors among adolescent students who had the different level of achievement (F=4.77, p=.009). 6) There were significant difference at .05 level in sexual risk behaviors among adolescent students who had different level of sexual value (F=50.91, p=.000) 7) There were significant difference at .05 level in sexual risk behaviors among adolescent students who had different level of the influence of the friendship group (F=98.41, p=.000).

Keywords: the awareness of sexual risk behaviors, sexual risk behaviors, adolescent students

Procedia PDF Downloads 433
23347 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han

Abstract:

As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.

Keywords: actuator, user authentication, security evaluation, haptic actuator

Procedia PDF Downloads 325
23346 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures

Authors: Zeinab Ranjbar

Abstract:

Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.

Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security

Procedia PDF Downloads 350
23345 Early Warning Signals: Role and Status of Risk Management in Small and Medium Enterprises

Authors: Alexander Kelíšek, Denisa Janasová, Veronika Mitašová

Abstract:

Weak signals using is often associated with early warning. It is possible to find a link between early warning, respectively early problems detection and risk management. The idea of early warning is very important in the context of crisis management because of the risk prevention possibility. Weak signals are likened to risk symptoms. Nowadays, their usefulness as a tool of proactive problems solving is emphasized. Based on it, it is possible to use weak signals not only in strategic planning, project management, or early warning system, but also as a subsidiary element in risk management. The main question is how to effectively integrate weak signals into risk management. The main aim of the paper is to point out the possibilities of weak signals using in small and medium enterprises risk management.

Keywords: early warning system, weak signals, risk management, small and medium enterprises (SMEs)

Procedia PDF Downloads 400
23344 An Improved Image Steganography Technique Based on Least Significant Bit Insertion

Authors: Olaiya Folorunsho, Comfort Y. Daramola, Joel N. Ugwu, Lawrence B. Adewole, Olufisayo S. Ekundayo

Abstract:

In today world, there is a tremendous rise in the usage of internet due to the fact that almost all the communication and information sharing is done over the web. Conversely, there is a continuous growth of unauthorized access to confidential data. This has posed a challenge to information security expertise whose major goal is to curtail the menace. One of the approaches to secure the safety delivery of data/information to the rightful destination without any modification is steganography. Steganography is the art of hiding information inside an embedded information. This research paper aimed at designing a secured algorithm with the use of image steganographic technique that makes use of Least Significant Bit (LSB) algorithm for embedding the data into the bit map image (bmp) in order to enhance security and reliability. In the LSB approach, the basic idea is to replace the LSB of the pixels of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The system was implemented using C# programming language of Microsoft.NET framework. The performance evaluation of the proposed system was experimented by conducting a benchmarking test for analyzing the parameters like Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The result showed that image steganography performed considerably in securing data hiding and information transmission over the networks.

Keywords: steganography, image steganography, least significant bits, bit map image

Procedia PDF Downloads 241
23343 Evaluation of Disease Risk Variables in the Control of Bovine Tuberculosis

Authors: Berrin Şentürk

Abstract:

In this study, due to the recurrence of bovine tuberculosis, in the same areas, the risk factors for the disease were determined and evaluated at the local level. This study was carried out in 32 farms where the disease was detected in the district and center of Samsun province in 2014. Predetermined risk factors, such as farm, environmental and economic risks, were investigated with the survey method. It was predetermined that risks in the three groups are similar to the risk variables of the disease on the global scale. These risk factors that increase the susceptibility of the infection must be understood by the herd owners. The risk-based contagious disease management system approach should be applied for bovine tuberculosis by farmers, animal health professionals and public and private sector decision makers.

Keywords: bovine tuberculosis, disease management, control, outbreak, risk analysis

Procedia PDF Downloads 372
23342 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 311