Search results for: cyber hygiene
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 571

Search results for: cyber hygiene

181 Aggression, Satisfaction and Online Rant Engagement of College Students in General Santos City

Authors: Amanda Andrea Beatrix Brita, Dominic J. Buenaventura, Charmaine A. Seromines, Antonne Noel V. Chua, Ma. Luisa G. Badilles

Abstract:

Online ranting, or the act of forcefully expressing your opinion towards other people over the Internet, has been an ongoing issue ever since the creation of the Internet. Due to the COVID-19 pandemic, the rise of active users has been observed to have increased during this time, thus increasing the number of people being engaged in online activities, which consequently affects the number of individuals who participate in online ranting. However, with all that is observed, what is usually not a topic being discussed about this event are the motivations that lead people to do online ranting. The study was undertaken to discover the level of aggression, Satisfaction, and online engagement in their environment. We utilized 2 researcher-made questionnaires that were validated by three experts, namely for the Satisfaction and engagement levels. We adapted Cyber-Aggression Typology Questionnaire (CATQ) for the level of aggression. Quota sampling was used in determining the respondents. A quota of 250 students was recommended. The results showed that the students in every institution have a deficient level of aggression, and the majority of the institution has a shallow level of Satisfaction when it comes to online ranting. Similar findings are presented in the level of engagement; 2 out of 3 of the institution students have shallow engagement in the general settings that expound students' engagement. Although the result shows deficient levels, there are still instances and possibilities that students may still engage in an online rant regarding various circumstances when triggered. Researchers assumed that there are restrictions on movements likely to show opinions online because of consequences.

Keywords: aggression, satisfaction, online rant engagement, online rant

Procedia PDF Downloads 52
180 Using Autoencoder as Feature Extractor for Malware Detection

Authors: Umm-E-Hani, Faiza Babar, Hanif Durad

Abstract:

Malware-detecting approaches suffer many limitations, due to which all anti-malware solutions have failed to be reliable enough for detecting zero-day malware. Signature-based solutions depend upon the signatures that can be generated only when malware surfaces at least once in the cyber world. Another approach that works by detecting the anomalies caused in the environment can easily be defeated by diligently and intelligently written malware. Solutions that have been trained to observe the behavior for detecting malicious files have failed to cater to the malware capable of detecting the sandboxed or protected environment. Machine learning and deep learning-based approaches greatly suffer in training their models with either an imbalanced dataset or an inadequate number of samples. AI-based anti-malware solutions that have been trained with enough samples targeted a selected feature vector, thus ignoring the input of leftover features in the maliciousness of malware just to cope with the lack of underlying hardware processing power. Our research focuses on producing an anti-malware solution for detecting malicious PE files by circumventing the earlier-mentioned shortcomings. Our proposed framework, which is based on automated feature engineering through autoencoders, trains the model over a fairly large dataset. It focuses on the visual patterns of malware samples to automatically extract the meaningful part of the visual pattern. Our experiment has successfully produced a state-of-the-art accuracy of 99.54 % over test data.

Keywords: malware, auto encoders, automated feature engineering, classification

Procedia PDF Downloads 49
179 Development of an Intelligent Decision Support System for Smart Viticulture

Authors: C. M. Balaceanu, G. Suciu, C. S. Bosoc, O. Orza, C. Fernandez, Z. Viniczay

Abstract:

The Internet of Things (IoT) represents the best option for smart vineyard applications, even if it is necessary to integrate the technologies required for the development. This article is based on the research and the results obtained in the DISAVIT project. For Smart Agriculture, the project aims to provide a trustworthy, intelligent, integrated vineyard management solution that is based on the IoT. To have interoperability through the use of a multiprotocol technology (being the future connected wireless IoT) it is necessary to adopt an agnostic approach, providing a reliable environment to address cyber security, IoT-based threats and traceability through blockchain-based design, but also creating a concept for long-term implementations (modular, scalable). The ones described above represent the main innovative technical aspects of this project. The DISAVIT project studies and promotes the incorporation of better management tools based on objective data-based decisions, which are necessary for agriculture adapted and more resistant to climate change. It also exploits the opportunities generated by the digital services market for smart agriculture management stakeholders. The project's final result aims to improve decision-making, performance, and viticulturally infrastructure and increase real-time data accuracy and interoperability. Innovative aspects such as end-to-end solutions, adaptability, scalability, security and traceability, place our product in a favorable situation over competitors. None of the solutions in the market meet every one of these requirements by a unique product being innovative.

Keywords: blockchain, IoT, smart agriculture, vineyard

Procedia PDF Downloads 170
178 Women's Menstrual Experience in India: A Psycho-Social Approach

Authors: Bhavna Rajagopal, Mrinmoyi Kulkarni

Abstract:

Today women experience more menstrual cycles than their ancestors did a hundred years ago, owing to early puberty, fewer pregnancies and dietary changes. Much of the research in menstruation is located in the medical domain with a focus on physical symptoms. The research in psychology is largely concerned with premenstrual syndrome (PMS), whereas the focus in sociology is on social and cultural practices relating to menstruation. Research that simultaneously studies the physical, psychological, social and cultural aspects is lacking. Therefore, in this study, an attempt has been made to identify socio-cultural, psychological and physical factors that interact to influence a woman’s experience of menstruation in the urban setting. The study included seven unmarried women in the age group of 24-30 and data was obtained through a focus group discussion. The transcript of the focus group discussion was thematically analysed. Two major themes relating to the self and social experience of menstruation emerged. Themes relating to the self included menarcheal experiences, self-perception, mood and management of menstrual hygiene and symptoms while themes relating to social experience included the construction of menstruation by family and peers, and cultural factors. Attitudes towards the menstrual cycle appeared to be primarily influenced by severity of symptoms and the resulting disruption to daily life. Outcomes of this study have indicated that future research needs to study menstruation and its impact on women’s wellbeing by adopting a socio-ecological approach and by collecting data using the whole cycle approach across a woman’s reproductive years.

Keywords: India, menstrual cycle, psychosocial approach, wellbeing

Procedia PDF Downloads 111
177 Local Differential Privacy-Based Data-Sharing Scheme for Smart Utilities

Authors: Veniamin Boiarkin, Bruno Bogaz Zarpelão, Muttukrishnan Rajarajan

Abstract:

The manufacturing sector is a vital component of most economies, which leads to a large number of cyberattacks on organisations, whereas disruption in operation may lead to significant economic consequences. Adversaries aim to disrupt the production processes of manufacturing companies, gain financial advantages, and steal intellectual property by getting unauthorised access to sensitive data. Access to sensitive data helps organisations to enhance the production and management processes. However, the majority of the existing data-sharing mechanisms are either susceptible to different cyber attacks or heavy in terms of computation overhead. In this paper, a privacy-preserving data-sharing scheme for smart utilities is proposed. First, a customer’s privacy adjustment mechanism is proposed to make sure that end-users have control over their privacy, which is required by the latest government regulations, such as the General Data Protection Regulation. Secondly, a local differential privacy-based mechanism is proposed to ensure the privacy of the end-users by hiding real data based on the end-user preferences. The proposed scheme may be applied to different industrial control systems, whereas in this study, it is validated for energy utility use cases consisting of smart, intelligent devices. The results show that the proposed scheme may guarantee the required level of privacy with an expected relative error in utility.

Keywords: data-sharing, local differential privacy, manufacturing, privacy-preserving mechanism, smart utility

Procedia PDF Downloads 48
176 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 72
175 Implementation of a Quality Management Approach in the Laboratory of Quality Control and the Repression of Fraud (CACQE) of the Wilaya of Bechar

Authors: Khadidja Mebarki, Naceur Boussouar, Nabila Ihaddadene, M. Akermi

Abstract:

Food products are particularly sensitive, since they concern the health of the consumer, whether it’s be from the health point of view or commercial, this kind of product must be subjected to rigorous controls, in order to prevent any fraud. Quality and safety are essential for food security, public health and economic development. The strengthening of food security is essential to increase food security which is considered reached when all individuals can at any time access safe and nutritious food they need to lead healthy and active lives. The objective of this project is to initiate a quality approach in the laboratories of the quality control and the repression of fraud. It will be directed towards the application of good laboratory practices, traceability, management of quality documents (quality, procedures and specification manual) and quality audits. And to prepare the ground for a possible accreditation by ISO 17025 standard of BECHAR laboratory’s. The project will take place in four main stages: 1- Preparation of an audit grid; 2- Realization of a quality audit according to the method of 5 M completed by a section on quality documentation; 3- Drafting of an audit report and proposal for recommendations; 4- Implementation of corrective actions on the ground. This last step consisted in the formalization of the cleaning disinfection plan; work on good hygiene practices, establishment of a mapping of processes and flow charts of the different processes of the laboratory, classifying quality documents and formalizing the process of document management. During the period of the study within the laboratory, all facets of the work were almost appreciated, as we participated in the expertise performed in within it.

Keywords: quality, management, ISO 17025 accreditation, GLP

Procedia PDF Downloads 489
174 Niche Authorities and Social Activism: Interrogating the Activities of Selected Bloggers in Ghana

Authors: Akosua Asantewaa Anane

Abstract:

Social media and its networking sites have become beneficial to society. With the advent of Web 2.0, many people are becoming technologically savvy and attracted to internet-based activities. With the click of a button, users are now sharing more information on topics, events and issues than before. A new phenomenon in the Ghanaian journalism sphere is the advent of blogger and citizen journalism, some of whom have become niche authorities. Niche authorities have emerged through the habitual and persistent curation of news on specific topics, resulting in the steady growth and emergence of valuable contributions to news sharing. Minimal studies have been conducted on niche authorities and their role in social activism in Ghana. This study, anchored on Cialdini’s Six Principles of Persuasion (reciprocation, consistency, social proof, liking, authority and scarcity), explores the features of niche authorities, their areas of expertise, as well as their authoritative voices in the curation of news stories. Using qualitative content analysis, cyber ethnography and thematic analysis of purposively sampled social media posts of five niche authorities, the study interrogates how these niche authorities employ the six principles of persuasion on their platforms to spark conversations on development, social inclusion and gender-based issues in the country. The study discusses how niche authorities deploy the principles in social activism and further recommends nurturing and mentoring communication strategies to progressively guide the youth to become future niche authorities in news curation and news sharing.

Keywords: social activism, cialdini’s six principles of persuasion, news curation, niche authorities

Procedia PDF Downloads 38
173 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 253
172 Development of Multifunctional Yarns and Fabrics for Interactive Textiles

Authors: Muhammad Bilal Qadir, Danish Umer, Amir Shahzad

Abstract:

The use of conductive materials in smart and interactive textiles is gaining significant importance for creating value addition, innovation, and functional product development. These products find their potential applications in health monitoring, military, protection, communication, sensing, monitoring, actuation, fashion, and lifestyles. The materials which are most commonly employed in such type of interactive textile include intrinsically conducting polymers, conductive inks, and metallic coating on textile fabrics and inherently conducting metallic fibre yarns. In this study, silver coated polyester filament yarn is explored for the development of multifunctional interactive gloves. The composite yarn was developed by covering the silver coated polyester filament around the polyester spun yarn using hollow spindle technique. The electrical and tensile properties of the yarn were studied. This novel yarn was used to manufacture a smart glove to explore the antibacterial, functional, and interactive properties of the yarn. The change in electrical resistance due to finger movement at different bending positions and antimicrobial properties were studied. This glove was also found useful as an interactive tool to operate the commonly used touch screen devices due to its conductive nature. The yarn can also be used to develop the sensing elements like stretch, strain, and piezoresistive sensors. Such sensor can be effectively used in medical and sports textile for performance monitoring, vital signs monitoring and development of antibacterial textile for healthcare and hygiene.

Keywords: conductive yarn, interactive textiles, piezoresistive sensors, smart gloves

Procedia PDF Downloads 220
171 Representation of Islamophobia on Social Media: Facebook Comments Analysis

Authors: Nadia Syed

Abstract:

The digital age has inevitably changed the way in which hate crime is committed. The cyber world has become a highly effective means for individuals and groups to be targeted, harmed, and marginalized , largely through online medium. Facebook has become one of the fastest growing social media platforms. At the end of 2013, Facebook had 1,23bn monthly active users and 757 million daily users who log onto Facebook. Within this online space, there are also an increasing number of online virtual communities, and hate groups who are using this freedom to share a violent, Islamophobic and racist description which attempts to create a aggressive virtual environment. This paper is a research on the rise of Islamophobia and the role of media in spreading it. This paper focusing on how the media especially Facebook is portraying Islam as the religion which promotes violence and ultimately playing a significant role in the global rise of Islamophobia against Muslims. It is important to analyse these ‘new’ communities by monitoring the activities they conduct, because the material they post, potentially can have a harmful impact on community cohesion within society. Additionally, as a result of recent figures that shows an increase in online anti-Muslim abuse, there is a pertinent need to address the issue about Islamophobia on social media. On the whole, this study found Muslims being demonized and vilified online which had manifested through negative attitudes, discrimination, stereotypes, physical threats and online harassment which all had the potential to incite violence or prejudicial action because it disparages and intimidates a protected individual or group.

Keywords: Islamophobia, online, social media, facebook, internet, extremism

Procedia PDF Downloads 73
170 Impact of Water, Sanitation and Hygiene Interventions on Water Quality in Primary Schools of Pakistan

Authors: Jamil Ahmed, Li P. Wong, Yan P. Chua

Abstract:

The United Nation's sustainable development goals include the target to ensure access to water and sanitation for all; however, very few studies have assessed school-based drinking water in Pakistan. The purpose of this study was to characterize water quality in primary schools of Pakistan and to characterize how recent WASH interventions were associated with school water quality. We conducted a representative cross-sectional study of primary schools in the Sindh province of Pakistan. We used structured observations and structured interviews to ascertain the school’s WASH conditions. Our primary exposures of interest were the implementation of previous WASH interventions in the school and the water source type. Outcomes of interest included water quality (measured by various chemical and microbiological indicators) and water availability at the school’s primary drinking water source. We used log-binomial regression to characterize how WASH exposures were associated with water quality outcomes. We collected data from 256 schools. Groundwater was the primary drinking water source at most schools (87%). Water testing showed that 14% of the school’s water had arsenic above the WHO recommendations, and over 50% of the water samples exceeded recommendations for both lead and cadmium. A majority of the water sources (52%) had fecal coliform contamination. None of the schools had nitrate contamination (0%), and few had fluoride contamination (5%). Regression results indicated that having a recent WASH intervention at the school was not associated with either arsenic contamination (prevalence ratio=0.97; 95% CI: 0.46-2.1) or with fecal coliform contamination (PR=0.88; 95% CI: 0.67-1.17). Our assessment unveiled several water quality gaps that exist, including high heavy metal and fecal contamination. Our findings will help various stakeholders to take suitable action to improve water quality in Pakistani schools.

Keywords: WASH interventions, water quality, primary school children, heavy metals

Procedia PDF Downloads 116
169 Study of Some Biometric Parameters of the Incubated Eggs and Unhatched Eggs Depending on the Age of Breeding in Domestic Japanese Quail Coturnix japonica (Aves, Phasianidae)

Authors: Amina Smaï, Habiba Idouhar-Saadi, Safia Zenia, Fairouz Haddadj, Salaheddine Doumandji

Abstract:

The poultry industry (chicken and egg consumption) has become important in Algeria, but that does not prevent other farms from beginning to position themselves on the ground like the turkey, guinea fowl, partridge and quail Japanese. The breeding importance of this last, reside, also in game meat, egg quality and their therapeutic role without forgetting its growth performance. To the same effect, a study was held at the center of Zeralda hunting on various parameters such as the weight and number of eggs laid and this in order to know better the potential of production and reproduction of domestic quail. Egg laying has started from the 8th week of reproductive age, their harvest and their counts are performed daily up to 32 weeks of age and more. We have given the biometrics of incubated eggs and unhatched eggs. The parameters studied were the weight, large and small diameter, density, volume, shell index and the shape index. The work revealed that the maximum weight in males is reached in the 11th week, against the female, he reached the 13th week of age. Indeed, there is a good correlation (R = 0.79) between the weight of females and egg production. The rate of unhatched eggs varies between 11 and 43%, these values are recorded respectively in breeding under the age of 25 and 43 weeks. Furthermore, the biometric parameters of hatched and unhatched eggs have differences that are marked, especially during the beginning and end of lay. Further results will be subsequently exploited. Indeed, rearing Japanese quail is easy in technical terms and does not require big investment but its practical application vigilance and daily presence of the breeder within the farm who oversees the hygiene and well-being of its poultry.

Keywords: Japanese quail, biometrics, eggs, unhatching eggs, reproduction

Procedia PDF Downloads 170
168 Incorporating Morality Standards in eLearning Process at INU

Authors: Khader Musbah Titi

Abstract:

In this era, traditional education systems do not meet the new challenges created by emerging technologies. On the other hand, eLearning offers all the necessary tools to meet these challenges. Using the Internet has brought numerous benefits to most educational institutions; it has also stretched traditional problems of plagiarism, cheating, stealing, vandalism, and spying into the cyberspace. This research discusses these issues in an eLearning environment. It attempts to provide suggestions and possible solutions to some of these issues. The main aim of this research is to conduct a survey at Irbid National University (INU), one of the oldest and biggest universities in Jordan, to study information related to moral and ethical issues in e-learning environment that affect the construction of the students’ characters in the future. The study will focus on student’s behavior and actions through the Internet using Learning Management System (LMS). Another aim of this research is to analyze the opinions of the instructors and last year students at INU about ethical behavior and interaction through LMS. The results show that educational institutes that use LMS should focus on student character development along with field knowledge. According to disadvantages, the results of the study showed that most of students behave unethically in their online activities (cheating, plagiarism, copy/paste etc.) while studying online courses through LMS. The result showed that instructors play a major role in the character development of students. The result also showed that academic institute must have variant mechanisms and strict policy in LMS to control unethical actions of students.

Keywords: LMS, cyber ethics, e-learning, IT ethics, students’ behaviors

Procedia PDF Downloads 224
167 Identification of Flooding Attack (Zero Day Attack) at Application Layer Using Mathematical Model and Detection Using Correlations

Authors: Hamsini Pulugurtha, V.S. Lakshmi Jagadmaba Paluri

Abstract:

Distributed denial of service attack (DDoS) is one altogether the top-rated cyber threats presently. It runs down the victim server resources like a system of measurement and buffer size by obstructing the server to supply resources to legitimate shoppers. Throughout this text, we tend to tend to propose a mathematical model of DDoS attack; we discuss its relevancy to the choices like inter-arrival time or rate of arrival of the assault customers accessing the server. We tend to tend to further analyze the attack model in context to the exhausting system of measurement and buffer size of the victim server. The projected technique uses an associate in nursing unattended learning technique, self-organizing map, to make the clusters of identical choices. Lastly, the abstract applies mathematical correlation and so the standard likelihood distribution on the clusters and analyses their behaviors to look at a DDoS attack. These systems not exclusively interconnect very little devices exchanging personal data, but to boot essential infrastructures news standing of nuclear facilities. Although this interconnection brings many edges and blessings, it to boot creates new vulnerabilities and threats which might be conversant in mount attacks. In such sophisticated interconnected systems, the power to look at attacks as early as accomplishable is of paramount importance.

Keywords: application attack, bandwidth, buffer correlation, DDoS distribution flooding intrusion layer, normal prevention probability size

Procedia PDF Downloads 194
166 Analysis and Mapping of Climate and Spring Yield in Tanahun District, Nepal

Authors: Resham Lal Phuldel

Abstract:

This study based on a bilateral development cooperation project funded by the governments of Nepal and Finland. The first phase of the project has been completed in August 2012 and the phase II started in September 2013 and will end September 2018. The project strengthens the capacity of local governments in 14 districts to deliver services in water supply, sanitation and hygiene in Western development region and in Mid-Western development region of Nepal. In recent days, several spring sources have been dried out or slowly decreasing its yield across the country due to changing character of rainfall, increasing evaporative losses and some other manmade causes such as land use change, infrastructure development work etc. To sustain the hilly communities, the sources have to be able to provide sufficient water to serve the population, either on its own or in conjunction with other sources. Phase III have measured all water sources in Tanahu district in 2004 and sources were located with the GPS. Phase II has repeated the exercise to see changes in the district. 3320 water sources as identified in 2004 and altogether 4223 including new water sources were identified and measured in 2014. Between 2004 and 2014, 50% flow rate (yield) deduction of point sources’ average yield in 10 years is found. Similarly, 21.6% and 34% deductions of average yield were found in spring and stream water sources respectively. The rainfall from 2002 to 2013 shows erratic rainfalls in the district. The monsoon peak month is not consistent and the trend shows the decrease of annual rainfall 16.7 mm/year. Further, the temperature trend between 2002 and 2013 shows warming of + 0.0410C/year.

Keywords: climate change, rainfall, source discharge, water sources

Procedia PDF Downloads 261
165 Motivation for Work and Organizational Commitment in an Engineering Public Faculty: A Perception of Technical and Administrative Employees

Authors: Fátima Aparecida de Carvalho, Ester Eliane Jeunon

Abstract:

This study addresses issues in the public service: motivation to work and organizational commitment. The goal of this research was to examine how it configures the motivation to work and organizational commitment of the technical and administrative effective staff of the School of Engineering at UFMG. For this purpose a descriptive research under a quantitative and qualitative approach has been performed. In the quantitative research it has been applied a questionnaire to all 146 technical and administrative institution effective staff, that configures a census research. This questionnaire was divided into three parts, the first one aimed at performing a socio-demographic survey of participants, the second one aimed to measure motivation and the third one aimed at measuring organizational commitment. The Bases Organizational Commitment Scale (EBACO) was used in the analysis of data obtained in the third part of the questionnaire. The qualitative research was conducted through interviews with 08 managers, with open-ended questions structured in an analysis category, thus contemplating the administrative structure of the School of Engineering. The results of the research revealed that there is no relevant difference between the hygiene and motivational indices, related to the staff´s gender and area of work. Nonetheless, it was observed higher motivational indices for staff with shorter duration of employment in the institution. Also, the results shown high organizational commitment of the staff with the institution, with a predominance of the component “Requirement for performance”, followed by commitments “Consistent line of activity”, “Affiliative” and “Affective”, which reached almost tge some average in this study. Finally the results showed that all commitment indices have positive moderated correlation to the motivational indices, except the “shortage of alternative” index.

Keywords: motivation to work, organizational commitment, public service, human resources

Procedia PDF Downloads 383
164 Korean Smart Cities: Strategic Foci, Characteristics and Effects

Authors: Sang Ho Lee, Yountaik Leem

Abstract:

This paper reviews Korean cases of smart cities through the analysis framework of strategic foci, characteristics and effects. Firstly, national strategies including c(cyber), e(electronic), u(ubiquitous) and s(smart) Korea strategies were considered from strategic angles. Secondly, the characteristics of smart cities in Korea were looked through the smart cities examples such as Seoul, Busan, Songdo and Sejong cities etc. from the views on the by STIM (Service, Technology, Infrastructure and Management) analysis. Finally, the effects of smart cities on socio-economies were investigated from industrial perspective using the input-output model and structural path analysis. Korean smart city strategies revealed that there were different kinds of strategic foci. c-Korea strategy focused on information and communications network building and user IT literacy. e-Korea strategy encouraged e-government and e-business through utilizing high-speed information and communications network. u-Korea strategy made ubiquitous service as well as integrated information and communication operations center. s-Korea strategy is propelling 4th industrial platform. Smart cities in Korea showed their own features and trends such as eco-intelligence, high efficiency and low cost oriented IoT, citizen sensored city, big data city. Smart city progress made new production chains fostering ICTs (Information Communication Technologies) and knowledge intermediate inputs to industries.

Keywords: Korean smart cities, Korean smart city strategies, STIM, smart service, infrastructure, technologies, management, effect of smart city

Procedia PDF Downloads 348
163 Methods and Algorithms of Ensuring Data Privacy in AI-Based Healthcare Systems and Technologies

Authors: Omar Farshad Jeelani, Makaire Njie, Viktoriia M. Korzhuk

Abstract:

Recently, the application of AI-powered algorithms in healthcare continues to flourish. Particularly, access to healthcare information, including patient health history, diagnostic data, and PII (Personally Identifiable Information) is paramount in the delivery of efficient patient outcomes. However, as the exchange of healthcare information between patients and healthcare providers through AI-powered solutions increases, protecting a person’s information and their privacy has become even more important. Arguably, the increased adoption of healthcare AI has resulted in a significant concentration on the security risks and protection measures to the security and privacy of healthcare data, leading to escalated analyses and enforcement. Since these challenges are brought by the use of AI-based healthcare solutions to manage healthcare data, AI-based data protection measures are used to resolve the underlying problems. Consequently, this project proposes AI-powered safeguards and policies/laws to protect the privacy of healthcare data. The project presents the best-in-school techniques used to preserve the data privacy of AI-powered healthcare applications. Popular privacy-protecting methods like Federated learning, cryptographic techniques, differential privacy methods, and hybrid methods are discussed together with potential cyber threats, data security concerns, and prospects. Also, the project discusses some of the relevant data security acts/laws that govern the collection, storage, and processing of healthcare data to guarantee owners’ privacy is preserved. This inquiry discusses various gaps and uncertainties associated with healthcare AI data collection procedures and identifies potential correction/mitigation measures.

Keywords: data privacy, artificial intelligence (AI), healthcare AI, data sharing, healthcare organizations (HCOs)

Procedia PDF Downloads 48
162 Identifying Lead Poisoning Risk Factors among Non-Pregnant Adults in New York City through Motivational Interviewing Techniques

Authors: Nevila Bardhi, Joanna Magda, Kolapo Alex-Oni, Slavenka Sedlar, Paromita Hore

Abstract:

The New York City Department of Health and Mental Hygiene (NYC DOHMH) receives blood lead test results for NYC residents and conducts lead poisoning case investigations for individuals with elevated blood lead levels exposed to lead occupationally and non-occupationally. To (1) improve participant engagement, (2) aid the identification of potential lead sources, and (3) better tailor recommendations to reduce lead exposure, Motivational Interviewing (MI) techniques were incorporated during risk assessment interviews of non-pregnant adults by DOHMH’s Adult Lead Poisoning Prevention (ALP) Program. MI is an evidence-based counselling method used in clinical settings that have been effective in promoting behavior change by resolving ambivalence and enhancing motivation in treating both physiological and psychological health conditions. The incorporation of MI techniques in the ALP risk assessment interview was effective in improving the identification of lead sources for non-pregnant adult cases, thus, allowing for the opportunity to better tailor lead poisoning prevention recommendations. The embedding of MI cues in the ALP risk assessment interview also significantly increased engagement in the interview process, resulting in approximately 50 more interviews conducted per year and a decrease in interview refusals during case investigations. Additionally, the pre-MI interview completion rate was 57%, while the post-MI Interview completion rate was 68%. We recommend MI techniques to be used by other lead poisoning prevention programs during lead poisoning investigations in similar diverse populations.

Keywords: lead poisoning prevention, motivational interviewing, behavior change, lead poisoning risk factors, self-efficacy

Procedia PDF Downloads 62
161 Periodontal Soft Tissue Sculpturing and Use of Interim Appliance for Rehabilitation of Anterior Edentulousness: Case Report

Authors: Hande Yesil, Seda Aycan Altan, M. Vehbi Bal, Alper Uyar, O. Cumhur Sipahi

Abstract:

Purpose: Fixed partial dentures (FPDs) must fulfill functional requirements such as phonetics, chewing efficiency and esthetics especially in the anterior region. A convex type tissue surface is usually recommended for pontics of FPDs. That pontic design also provides suitable oral hygiene and ease of cleaning. However, high esthetic requirements and correct emergence profile are not always achievable because of the convex shape of adjacent soft tissues. Therefore, the ovate type pontic which fulfills the high esthetic demands of the patients may be a good alternative to the modified ridge lap pontic design. Clinical Report: A female patient referred with the complaint of anterior upper edentulousness. In the oral examination it was determined that teeth 11, 12, 21, 22 were deficient. A thick and convex gingival tissue that may cause aesthetic problems was also observed.. Periodontal augmentation surgery was performed to ensure proper papillary configuration and gingival contour. An interim removable partial denture (IRPD) which applied pressure to operated gingival tissues was fabricated postoperatively. The IRPD was used for 4 weeks and after completion of tissue sculpting, the permanent FPD with an ovate pontic was fabricated and cemented. After a follow-up period of 6 months, not any esthetical and hygienic problem was detected and the patient was satisfied with her prosthesis. Conclusion: It was concluded that shaping of gingival contours with IRPD and use of a FPD with ovate pontic fulfills all esthetic and hygienic requirements.

Keywords: interim appliance, ovate pontic, tissue sculpturing, fixed partial denture

Procedia PDF Downloads 256
160 Research on Intercity Travel Mode Choice Behavior Considering Traveler’s Heterogeneity and Psychological Latent Variables

Authors: Yue Huang, Hongcheng Gan

Abstract:

The new urbanization pattern has led to a rapid growth in demand for short-distance intercity travel, and the emergence of new travel modes has also increased the variety of intercity travel options. In previous studies on intercity travel mode choice behavior, the impact of functional amenities of travel mode and travelers’ long-term personality characteristics has rarely been considered, and empirical results have typically been calibrated using revealed preference (RP) or stated preference (SP) data. This study designed a questionnaire that combines the RP and SP experiment from the perspective of a trip chain combining inner-city and intercity mobility, with consideration for the actual condition of the Huainan-Hefei traffic corridor. On the basis of RP/SP fusion data, a hybrid choice model considering both random taste heterogeneity and psychological characteristics was established to investigate travelers’ mode choice behavior for traditional train, high-speed rail, intercity bus, private car, and intercity online car-hailing. The findings show that intercity time and cost exert the greatest influence on mode choice, with significant heterogeneity across the population. Although inner-city cost does not demonstrate a significant influence, inner-city time plays an important role. Service attributes of travel mode, such as catering and hygiene services, as well as free wireless network supply, only play a minor role in mode selection. Finally, our study demonstrates that safety-seeking tendency, hedonism, and introversion all have differential and significant effects on intercity travel mode choice.

Keywords: intercity travel mode choice, stated preference survey, hybrid choice model, RP/SP fusion data, psychological latent variable, heterogeneity

Procedia PDF Downloads 85
159 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 102
158 Improving Traditional Methods of Handling Fish from Integrated Pond Culture Systems in Monai Village, New Bussa, Nigeria

Authors: Olokor O. Julius, Ngwu E. Onyebuchi, Ajani K. Emmanuel, Omitoyin O. Bamidele, Olokor O. Linda, Akomas Stella

Abstract:

The study assessed the quality changes of Clarias gariepenus obtained from integrated culture systems (rice, poultry and fish) which were displayed at 31-33oC average daily temperature on the traditional market table used by local fish farmers to sell fish harvested from their ponds and those on an improved table designed for this study. Unlike the conventional table, the improved table was screened against flies and indiscriminate touch by customers. The fishes were displayed on both tables for 9 hours and quality attributes were monitored hourly by trained panelists. For C. gariepinus, the gills, and intestine recorded faster deterioration starting from the fourth and fifth hours while those on the improved table were prolonged by one hour. Scores for skin brightness and texture did not indicate quality deterioration throughout the display period. However, at the end of the storage time, samples on the improved table recorded 1.5 x 104 cfu/g while samples in unscreened table recorded 3.7 x 10 7 cfu/g. The study shows how simple modifications of a traditional practice can help extend keeping qualities of farmed fish, reduce health hazards in local communities where there is no electricity to preserve fish in whatever form despite a boom in aquaculture. Monai community has a fish farm estate of over 200 small holder farmers with annual output capacity of over $10 million dollars. The simple improvement made to farmers practice in this study is to ensure Community hygiene and boost income of peasant fish farmers by improving the market quality of their products.

Keywords: fish spoilage, improved handling, income generation, retail table

Procedia PDF Downloads 423
157 Clothing as Cure: Dress as Moral Treatment in Psychiatry

Authors: Dorothy Chyung

Abstract:

In the psychiatric interview, the mental status exam begins with an assessment of the patient's appearance, noting aspects such as grooming and hygiene. However, it is not well established whether further examination of a patient's attire can provide further useful information. The popular assumption is that those who are mentally unwell will manifest this in unusual clothing. In the moral treatment of the 19th century, proper clothing was also seen as a pivotal therapeutic concern. This project examines assumptions about clothing, both as a reflection of and treatment for psychopathology. The methodology considers the opinions expressed in 19th century art and journals, as well as asylum rules, in comparison to contemporary psychiatric practice and research evidence. Per moral treatment in the 19th century, self-discipline and a proper environment would cure insanity. Madness was evident in the opposite of these ideals—such as ragged or ‘improper’ clothing—and rules about attire delineated the most correct (i.e. sane) ways to dress. These rules applied not only for the patients but also for staff. Despite these ideals, accusations were made that asylums, in fact, dressed patients to look more mentally unwell and further removed patients’ agency. Current practice in psychiatric hospitals retains remnants of moral treatment. Patients are expected to dress ‘appropriately’ while retaining some choice to build self-esteem, with arguments about safety being used to justify the removal of choice. Meanwhile, staff is expected to dress professionally and as role models, based on the assumption that conservative dress is least pathological. Research on this subject is limited, and there is little evidence that discrete psychiatric diagnoses manifest in the particular dress, nor that conservative dress would result in a reduction in pathology. Dressing unusually has become a privilege granted only to those without association with mental illness.

Keywords: fashion, history of psychiatry, medical humanities, mental health treatment

Procedia PDF Downloads 192
156 Cybersecurity Assessment of Decentralized Autonomous Organizations in Smart Cities

Authors: Claire Biasco, Thaier Hayajneh

Abstract:

A smart city is the integration of digital technologies in urban environments to enhance the quality of life. Smart cities capture real-time information from devices, sensors, and network data to analyze and improve city functions such as traffic analysis, public safety, and environmental impacts. Current smart cities face controversy due to their reliance on real-time data tracking and surveillance. Internet of Things (IoT) devices and blockchain technology are converging to reshape smart city infrastructure away from its centralized model. Connecting IoT data to blockchain applications would create a peer-to-peer, decentralized model. Furthermore, blockchain technology powers the ability for IoT device data to shift from the ownership and control of centralized entities to individuals or communities with Decentralized Autonomous Organizations (DAOs). In the context of smart cities, DAOs can govern cyber-physical systems to have a greater influence over how urban services are being provided. This paper will explore how the core components of a smart city now apply to DAOs. We will also analyze different definitions of DAOs to determine their most important aspects in relation to smart cities. Both categorizations will provide a solid foundation to conduct a cybersecurity assessment of DAOs in smart cities. It will identify the benefits and risks of adopting DAOs as they currently operate. The paper will then provide several mitigation methods to combat cybersecurity risks of DAO integrations. Finally, we will give several insights into what challenges will be faced by DAO and blockchain spaces in the coming years before achieving a higher level of maturity.

Keywords: blockchain, IoT, smart city, DAO

Procedia PDF Downloads 79
155 Inter-Departmental Survey to Check the Impact of Bio-Safety Training Sessions among Lab Employees

Authors: Noorulaine Maqsood, Saeed Khan

Abstract:

Background: Concern regarding incident reporting and bio-safety training in clinical laboratories in Pakistan has increased remarkably in the last few years due to rapid increase in diagnosis and research on infectious organisms. In order to ensure the safety of employees, this issue needs to be addressed immediately. Bio-safety training sessions and lectures are necessary for the protection of laboratory workers in order to ensure safe practices and minimize the count of incident reporting in the lab. Objective: To carry out an inter-departmental survey in lab regarding the awareness of bio-safety practices among lab employees before and after conducting bio-safety training sessions. Methodology: We conducted a 30 questions survey of laboratory workers in June 2013 (before training session) to gather information related to bio-safety awareness. Afterwards, we conducted another survey after training sessions and workshops related to bio-safety. Result: The survey regarding bio-safety level showed that before the training session 32% of the participants were aware of bio-safety level being used in their lab whereas after the session this percentage increased to 72%. 48% of the participants had information about the proper usage of PPE which increased to 76%. Awareness regarding proper management of hazardous waste increased from 32% to 64%. The incident reporting practice, sample handling and hand hygiene awareness was previously reported to be 40%, 65%, and 52% that increased to 80%, 85% and 88% respectively after the training session was completed. Conclusion: The first survey results showed lack of awareness that suggest nearly all senior scientists, faculty, medical technologist, lab attendant and housekeeping staff working in laboratories are required to have bio-safety training, and required inspection at least twice a year by a bio-safety officer and also required to renew their bio-safety training. After the training session, significant changes in awareness level and attitude of the participants regarding biosafety practices were observed. Therefore, such bio-safety sessions should be carried out regularly in clinical laboratories.

Keywords: biosafety practices, clinical laboratory, Pakistan, survey

Procedia PDF Downloads 402
154 Direct Composite Veneers as Treatment of Anterior Teeth: Case Report

Authors: Amerah Alsalem

Abstract:

Aim: Laminate veneers are restorations which are envisioned to correct existing abnormalities, esthetic deficiencies, and discolorations. Laminate veneer restorations may be processed in two different ways: direct or indirect. Materials and methods: Direct composite laminate veneers require minimal preparation compared to indirect composite veneers, cost less and are easier to repair, so are useful in young patients. However, composites can have inherent limitations such as shrinkage, limited toughness; color instability and susceptibility to wear that reduce the lifespan of the restoration and cause postoperative complications. Every new material or method introduced to the field of dentistry aims to achieve esthetics and successful dental treatments with minimal invasiveness. Therefore, direct laminate veneer restorations have been developed for advanced esthetic problems of anterior teeth. Tooth discolorations, rotated teeth, coronal fractures, congenital or acquired malformations, diastemas, discolored restorations, palatally positioned teeth, the absence of lateral incisors, abrasions and erosions are the main indications for direct laminate veneer restorations. Result: Direct veneers, as esthetic procedures, have become treatment alternatives for patients with esthetic problems of anterior teeth in recent years. The cost, social and time factors have to be considered. Although ceramic laminate veneer restorations have some advantages like color stability and high resistance against abrasion, they have also some disadvantages, including high cost and long chair time. Moreover, they have some problems such as the necessity of an additional adhesive cement. Conclusion: Although there are still some disadvantages, especially discolorations and fragility, with the development of new composite resins, direct laminate veneer restorations can be a treatment option for patients with esthetic problems of anterior teeth, when applied judiciously with good patient hygiene motivation.

Keywords: direct, veneers, composite, anterior

Procedia PDF Downloads 256
153 The Effect of Colloidal Metals Nanoparticles on Quarantine Bacterium - Clavibacter michiganensis Ssp. sepedonicus

Authors: Włodzimierz Przewodowski, Agnieszka Przewodowska

Abstract:

Colloidal metal nanoparticles have drawn increasing attention in the field of phytopathology because of their unique properties and possibilities of applications. Their antibacterial activity, no induction of the development of pathogen resistance and the ability to penetrate most of biological barriers make them potentially useful in the fighting against dangerous pathogens. These properties are very important in the case of protection of strategic crops in the world, like potato - fourth crop in the world - which is host to numerous pathogenic microorganisms causing serious diseases, significantly affecting yield and causing the economic losses. One of the most important and difficult to reduce pathogen of potato plant is quarantine bacterium Clavibacter michiganensis ssp. sepedonicus (Cms) responsible for ring rot disease. Control and detection of these pathogens is very complicated. Application of healthy, certified seed material as well as hygiene in potato production and storage are the most efficient ways of preventing of ring rot disease. Currently used disinfectants and pesticides, have many disadvantages, such as toxicity, low efficiency, selectivity, corrosiveness, and the inability to eliminate the pathogens in potato tissue. In this situation, it becomes important to search for new formulations based on components harmful to health, yet efficient, stable during prolonged period of time and a with wide range of biocide activity. Such capabilities are offered by the latest generation of biocidal nanoparticles such as colloidal metals. Therefore the aim of the presented research was to develop newly antibacterial preparation based on colloidal metal nanoparticles and checking their influence on the Cms bacteria. Our preliminary results confirmed high efficacy of the nano-colloids in controlling the this selected pathogen.

Keywords: clavibacter michiganensis ssp. sepedonicus, colloidal metal nanoparticles, phytopathology, bacteria

Procedia PDF Downloads 247
152 Spirituality Enhanced with Cognitive-Behavioural Techniques: An Effective Method for Women with Extramarital Infidelity: A Literature Review

Authors: Setareh Yousife

Abstract:

Introduction: Studies suggest that Extramarital Infidelity (EMI) variants, such as sexual and emotional infidelities are increasing in marriage relationships. To our knowledge, less is known about what therapies and mental-hygiene factors can prevent more effective this behavior and address it. Spiritual and cognitive-behavioural health have proven to reduce marital conflict, Increase marital satisfaction and commitment. Objective: This study aims to discuss the effectiveness of spiritual counseling combined with Cognitive-behavioural techniques in addressing Extramarital Infidelity. Method: Descriptive, analytical, and intervention articles indexed in SID, Noormags, Scopus, Iranmedex, Web of Science and PubMed databases, and Google Scholar were searched. We focused on Studies in which Women with extramarital relationships, including heterosexual married couples-only studies and spirituality/religion and CBT as coping techniques used as EMI therapy. Finally, the full text of all eligible articles was prepared and discussed in this review. Results: 25 publications were identified, and their textual analysis facilitated through four thematic approaches: The nature of EMI in Women, the meaning of spirituality in the context of mental health and human behavior as well as psychotherapy; Spirituality integrated into Cognitive-Behavioral approach, The role of Spirituality as a deterrent to EMI. Conclusions: The integration of the findings discussed herein suggests that the application of cognitive and behavioral skills in addressing these kinds of destructive family-based relationships is inevitable. As treatments based on religion/spirituality or cognition/behavior do not seem adequately effective in dealing with EMI, the combination of these approaches may lead to higher efficacy in fewer sessions and a shorter time.

Keywords: spirituality, religion, cognitive behavioral therapy, extramarital relation, infidelity

Procedia PDF Downloads 216