Search results for: cyber liability insurance
394 Leadership in Future Operational Environment
Authors: M. Şimşek
Abstract:
Rapidly changing factors that affect daily life also affect operational environment and the way military leaders fulfill their missions. With the help of technological developments, traditional linearity of conflict and war has started to fade away. Furthermore, mission domain has broadened to include traditional threats, hybrid threats and new challenges of cyber and space. Considering the future operational environment, future military leaders need to adapt themselves to the new challenges of the future battlefield. But how to decide what kind of features of leadership are required to operate and accomplish mission in the new complex battlefield? In this article, the main aim is to provide answers to this question. To be able to find right answers, first leadership and leadership components are defined, and then characteristics of future operational environment are analyzed. Finally, leadership features that are required to be successful in redefined battlefield are explained.Keywords: future operational environment, leadership, leadership components
Procedia PDF Downloads 435393 A Study of Financial Literacy among Undergraduates
Authors: Prasansha Kumari
Abstract:
Financial Literacy is the possession of knowledge and understanding of financial matters. Financial Literacy often entails the knowledge of properly making decisions pertaining to certain personal financial areas like real estate, insurance investing, and savings. This paper intends to identify and analyze the financial knowledge among university undergraduates by using 200 undergraduates in four faculties of University of Kelaniya, Sri Lanka. Collected data will be analyzed by descriptive research method using SPSS package. Expected outcomes are considerable percentage of undergraduates have basic knowledge on financial matters while it has a law percentage for advanced financial literacy among undergraduates. Students from faculty of Commerce and Management and Science have good understanding about financial matters than undergraduates in other two facultiesKeywords: advanced finance, undergraduates, financial literacy, savings
Procedia PDF Downloads 346392 Study on Network-Based Technology for Detecting Potentially Malicious Websites
Authors: Byung-Ik Kim, Hong-Koo Kang, Tae-Jin Lee, Hae-Ryong Park
Abstract:
Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.Keywords: Advanced Persistent Threat (APT), malware, network security, network packet, exploit kits
Procedia PDF Downloads 369391 ISIS and Social Media
Authors: Neda Jebellie
Abstract:
New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies
Procedia PDF Downloads 490390 Interpretable Deep Learning Models for Medical Condition Identification
Authors: Dongping Fang, Lian Duan, Xiaojing Yuan, Mike Xu, Allyn Klunder, Kevin Tan, Suiting Cao, Yeqing Ji
Abstract:
Accurate prediction of a medical condition with straight clinical evidence is a long-sought topic in the medical management and health insurance field. Although great progress has been made with machine learning algorithms, the medical community is still, to a certain degree, suspicious about the model's accuracy and interpretability. This paper presents an innovative hierarchical attention deep learning model to achieve good prediction and clear interpretability that can be easily understood by medical professionals. This deep learning model uses a hierarchical attention structure that matches naturally with the medical history data structure and reflects the member’s encounter (date of service) sequence. The model attention structure consists of 3 levels: (1) attention on the medical code types (diagnosis codes, procedure codes, lab test results, and prescription drugs), (2) attention on the sequential medical encounters within a type, (3) attention on the medical codes within an encounter and type. This model is applied to predict the occurrence of stage 3 chronic kidney disease (CKD3), using three years’ medical history of Medicare Advantage (MA) members from a top health insurance company. The model takes members’ medical events, both claims and electronic medical record (EMR) data, as input, makes a prediction of CKD3 and calculates the contribution from individual events to the predicted outcome. The model outcome can be easily explained with the clinical evidence identified by the model algorithm. Here are examples: Member A had 36 medical encounters in the past three years: multiple office visits, lab tests and medications. The model predicts member A has a high risk of CKD3 with the following well-contributed clinical events - multiple high ‘Creatinine in Serum or Plasma’ tests and multiple low kidneys functioning ‘Glomerular filtration rate’ tests. Among the abnormal lab tests, more recent results contributed more to the prediction. The model also indicates regular office visits, no abnormal findings of medical examinations, and taking proper medications decreased the CKD3 risk. Member B had 104 medical encounters in the past 3 years and was predicted to have a low risk of CKD3, because the model didn’t identify diagnoses, procedures, or medications related to kidney disease, and many lab test results, including ‘Glomerular filtration rate’ were within the normal range. The model accurately predicts members A and B and provides interpretable clinical evidence that is validated by clinicians. Without extra effort, the interpretation is generated directly from the model and presented together with the occurrence date. Our model uses the medical data in its most raw format without any further data aggregation, transformation, or mapping. This greatly simplifies the data preparation process, mitigates the chance for error and eliminates post-modeling work needed for traditional model explanation. To our knowledge, this is the first paper on an interpretable deep-learning model using a 3-level attention structure, sourcing both EMR and claim data, including all 4 types of medical data, on the entire Medicare population of a big insurance company, and more importantly, directly generating model interpretation to support user decision. In the future, we plan to enrich the model input by adding patients’ demographics and information from free-texted physician notes.Keywords: deep learning, interpretability, attention, big data, medical conditions
Procedia PDF Downloads 91389 The Reality of Engineering Education in the Kingdom of Saudi Arabia and Its Suitainability to The Requirements of The Labor Market
Authors: Hamad Albadr
Abstract:
With the development that has occurred in the orientation of universities from liability cognitive and maintain the culture of the community to responsibility job formation graduates to work according to the needs of the community development; representing universities in today's world, the prime motivator for the wheel of development in the community and find appropriate solutions to the problems they are facing and adapt to the demands of the changing environment. In this paper review of the reality of engineering education in the Kingdom of Saudi Arabia and its suitability to the requirements of the labor market, where they will be looking at the university as a system administrator educational using System Analysis Approach as one of the methods of modern management to analyze the performance of organizations and institutions, administrative and quality assessment. According to this approach is to deal with the system as a set of subsystems as components of the main divided into : input, process, and outputs, and the surrounding environment, will also be used research descriptive method and analytical , to gather information, data and analysis answers of the study population that consisting of a random sample of the beneficiaries of these services that the universities provided that about 500 professionals about employment in the business sector.Keywords: universities in Saudi Arabia, engineering education, labor market, administrative, quality assessment
Procedia PDF Downloads 342388 The Impact of AI on Consumers’ Morality: An Empirical Evidence
Authors: Mingxia Zhu, Matthew Tingchi Liu
Abstract:
AI grows gradually in the market with its efficiency and accuracy, influencing people’s perceptions, attitude, and even consequential behaviors. Current study extends prior research by focusing on AI’s impact on consumers’ morality. First, study 1 tested individuals’ believes about AI and human’s moral perceptions and people’s attribution of moral worth to AI and human. Moral perception refers to a computational system an entity maintains to detect and identify moral violations, while moral worth here denotes whether individual regard an entity as worthy of moral treatment. To identify the effect of AI on consumers’ morality, two studies were employed. Study 1 is a within-subjects survey, while study 2 is an experimental study. In the study 1, one hundred and forty participants were recruited through online survey company in China (M_age = 27.31 years, SD = 7.12 years; 65% female). The participants were asked to assign moral perception and moral worth to AI and human. A paired samples t-test reveals that people generally regard that human has higher moral perception (M_Human = 6.03, SD = .86) than AI (M_AI = 2.79, SD = 1.19; t(139) = 27.07, p < .001; Cohen’s d = 1.41). In addition, another paired samples t-test results showed that people attributed higher moral worth to the human personnel (M_Human = 6.39, SD = .56) compared with AIs (M_AI = 5.43, SD = .85; t(139) = 12.96, p < .001; d = .88). In the next study, two hundred valid samples were recruited from survey company in China (M_age = 27.87 years, SD = 6.68 years; 55% female) and the participants were randomly assigned to two conditions (AI vs. human). After viewing the stimuli of human versus AI, participants are informed that one insurance company would determine the price purely based on their declaration. Therefore, their open-ended answers were coded into ethical, honest behavior and unethical, dishonest behavior according to the design of prior literature. A Chi-square analysis revealed that 64% of the participants would immorally lie towards AI insurance inspector while 42% of participants reported deliberately lower mileage facing with human inspector (χ^2 (1) = 9.71, p = .002). Similarly, the logistic regression results suggested that people would significantly more likely to report fraudulent answer when facing with AI (β = .89, odds ratio = 2.45, Wald = 9.56, p = .002). It is demonstrated that people would be more likely to behave unethically in front of non-human agents, such as AI agent, rather than human. The research findings shed light on new practical ethical issues in human-AI interaction and address the important role of human employees during the process of service delivery in the new era of AI.Keywords: AI agent, consumer morality, ethical behavior, human-AI interaction
Procedia PDF Downloads 84387 Packet Analysis in Network Forensics: Insights, Tools, and Case Study
Authors: Dalal Nasser Fathi, Amal Saud Al-Mutairi, Mada Hamed Al-Towairqi, Enas Fawzi Khairallah
Abstract:
Network forensics is essential for investigating cyber incidents and detecting malicious activities by analyzing network traffic, with a focus on packet and protocol data. This process involves capturing, filtering, and examining network data to identify patterns and signs of attacks. Packet analysis, a core technique in this field, provides insights into the origins of data, the protocols used, and any suspicious payloads, which aids in detecting malicious activity. This paper explores network forensics, providing guidance for the analyst on what to look for and identifying attack sites guided by the seven layers of the OSI model. Additionally, it explains the most commonly used tools in network forensics and demonstrates a practical example using Wireshark.Keywords: network forensic, packet analysis, Wireshark tools, forensic investigation, digital evidence
Procedia PDF Downloads 8386 The Application of International Law in Terms of Earthlife Africa Johannesburg and Another v Minister of Energy and Others 65662/16 (2017) Case
Authors: M. van der Bank
Abstract:
This study involves a legal analysis of the case Earthlife Africa Johannesburg v Minister of Environmental Affairs and Others. The case considered the impact of the Thabametsi Power Project if it operated to the expected year 2060 on the global climate and ever-changing climate, in South Africa. This judgment highlights the significance, place and principles of climate change and where climate change impacts the South African environmental law which has its founding principles in the Constitution of the Republic of South Africa, 1996. This paper seeks to examine the advances for climate change regulation and application in terms of international law, in South Africa, through a qualitative study involving comparative national and international case law. A literature review study was conducted to compare and contrast the various aspects of law in order to support the argument undertaken. The paper presents a detailed discussion of the current legislation and the position as it currently stands with reference to international law and interpretation. The relevant protections as outlined in the National Environmental Management Act will be discussed. It then proceeds to outline the potential liability of the Minister in the interpretation and application of international law.Keywords: climate change; environment, environmental review, international law; and principles
Procedia PDF Downloads 125385 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking
Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye
Abstract:
The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.Keywords: algorithm, cryptography, cryptosystem, network
Procedia PDF Downloads 349384 Visual Odometry and Trajectory Reconstruction for UAVs
Authors: Sandro Bartolini, Alessandro Mecocci, Alessio Medaglini
Abstract:
The growing popularity of systems based on unmanned aerial vehicles (UAVs) is highlighting their vulnerability, particularly in relation to the positioning system used. Typically, UAV architectures use the civilian GPS, which is exposed to a number of different attacks, such as jamming or spoofing. This is why it is important to develop alternative methodologies to accurately estimate the actual UAV position without relying on GPS measurements only. In this paper, we propose a position estimate method for UAVs based on monocular visual odometry. We have developed a flight control system capable of keeping track of the entire trajectory travelled, with a reduced dependency on the availability of GPS signals. Moreover, the simplicity of the developed solution makes it applicable to a wide range of commercial drones. The final goal is to allow for safer flights in all conditions, even under cyber-attacks trying to deceive the drone.Keywords: visual odometry, autonomous uav, position measurement, autonomous outdoor flight
Procedia PDF Downloads 221383 Retrospective Study on the Impacts of Age, Gender, Economic Status, Education Level and Drug Availability in Public Hospital on Seeking Care of Dermatological Condition in Rwanda
Authors: Uwizera Egide
Abstract:
Introduction: Dermatological conditions are one of the most burdensome diseases in our health system. Global studies suggest that around 1 in 3 people gets a skin disease at a certain point in their life, though this does not necessarily guarantee the urge to consult. For a high-ranking disease, it is surprising how there is not enough data to support its effect on the economy and the general health system impact. It is for that reason that this study’s aim is to identify the burden of dermatological conditions in Rwanda so as to have a general picture of what our population is going through in regards to dermatological conditions. Methods: We used a cross sectional retrospective study. Data were obtained from patient’s information recorded in an open clinic at CHUB in a period of six months from July to December of the year 2021. Results: The study had a total of 4600 patients who attended dermatology service in a period of six months from July to December of the year 2021. We found a list of 102 dermatological diseases that presented at variable rates. The most prevalent disease was atopic dermatitis, at a rate of 23%. About 90% of presented conditions had only one choice of treatment from the hospital pharmacy. Most patients who presented were between 18-35 years old and with a predominance of the female gender; the level of education was either secondary or University Degree in our study, 65.4% of patients who presented were female; the majority, around 45% were between 18-35 years old, mostly being single 56%. The majority came from Southern province as it is the location of the hospital. The insurance mostly used was community-based health insurance with 63.8%, followed by RSSB with 18.5%, MS/UR, and other private insurances. The frequency of group drugs prescribed among all dermatological medications, steroids were the most commonly given medications at a rate of 39%, followed by emollients, antibiotics, and antifungal. The drugs prescribed were mostly available in the pharmacy of CHUB, with 60% and 40% being found in pharmacies outside the hospital. Conclusion: Dermatological conditions are prevalent in all age groups and distributed through all socioeconomic classes. About 9.2% of patient who consulted CHUB in 2021 presented one Dermatological condition of which 40 % of prescribed medications is never found in Hospital urging a need to buy medication in private pharmacies with more expenses and a risk of not complying on prescribed medication if in case they can’t afford paying them outside the CHUB. This finding urges a need to avail all essential dermatological drugs in hospital pharmacies to allow our patients to get them for the proper compliance of prescribed drugs in the management of skin diseases.Keywords: atopic dermatitis, CHUB (centre hopitalier univerisitaire de butare), dermatological condition, fungal infections
Procedia PDF Downloads 119382 LuMee: A Centralized Smart Protector for School Children who are Using Online Education
Authors: Lumindu Dilumka, Ranaweera I. D., Sudusinghe S. P., Sanduni Kanchana A. M. K.
Abstract:
This study was motivated by the challenges experienced by parents and guardians in ensuring the safety of children in cyberspace. In the last two or three years, online education has become very popular all over the world due to the Covid 19 pandemic. Therefore, parents, guardians and teachers must ensure the safety of children in cyberspace. Children are more likely to go astray and there are plenty of online programs are waiting to get them on the wrong track and also, children who are engaging in the online education can be distracted at any moment. Therefore, parents should keep a close check on their children's online activity. Apart from that, due to the unawareness of children, they tempt to share their sensitive information, causing a chance of being a victim of phishing attacks from outsiders. These problems can be overcome through the proposed web-based system. We use feature extraction, web tracking and analysis mechanisms, image processing and name entity recognition to implement this web-based system.Keywords: online education, cyber bullying, social media, face recognition, web tracker, privacy data
Procedia PDF Downloads 91381 Incidence of Breast Cancer and Enterococcus Infection: A Retrospective Analysis
Authors: Matthew Cardeiro, Amalia D. Ardeljan, Lexi Frankel, Dianela Prado Escobar, Catalina Molnar, Omar M. Rashid
Abstract:
Introduction: Enterococci comprise the natural flora of nearly all animals and are ubiquitous in food manufacturing and probiotics. However, its role in the microbiome remains controversial. The gut microbiome has shown to play an important role in immunology and cancer. Further, recent data has suggested a relationship between gut microbiota and breast cancer. These studies have shown that the gut microbiome of patients with breast cancer differs from that of healthy patients. Research regarding enterococcus infection and its sequala is limited, and further research is needed in order to understand the relationship between infection and cancer. Enterococcus may prevent the development of breast cancer (BC) through complex immunologic and microbiotic adaptations following an enterococcus infection. This study investigated the effect of enterococcus infection and the incidence of BC. Methods: A retrospective study (January 2010- December 2019) was provided by a Health Insurance Portability and Accountability Act (HIPAA) compliant national database and conducted using a Humans Health Insurance Database. International Classification of Disease (ICD) 9th and 10th codes, Current Procedural Terminology (CPT), and National Drug Codes were used to identify BC diagnosis and enterococcus infection. Patients were matched for age, sex, Charlson Comorbidity Index (CCI), antibiotic treatment, and region of residence. Chi-squared, logistic regression, and odds ratio were implemented to assess the significance and estimate relative risk. Results: 671 out of 28,518 (2.35%) patients with a prior enterococcus infection and 1,459 out of 28,518 (5.12%) patients without enterococcus infection subsequently developed BC, and the difference was statistically significant (p<2.2x10⁻¹⁶). Logistic regression also indicated enterococcus infection was associated with a decreased incidence of BC (RR=0.60, 95% CI [0.57, 0.63]). Treatment for enterococcus infection was analyzed and controlled for in both enterococcus infected and noninfected populations. 398 out of 11,523 (3.34%) patients with a prior enterococcus infection and treated with antibiotics were compared to 624 out of 11,523 (5.41%) patients with no history of enterococcus infection (control) and received antibiotic treatment. Both populations subsequently developed BC. Results remained statistically significant (p<2.2x10-16) with a relative risk of 0.57 (95% CI [0.54, 0.60]). Conclusion & Discussion: This study shows a statistically significant correlation between enterococcus infection and a decrease incidence of breast cancer. Further exploration is needed to identify and understand not only the role of enterococcus in the microbiome but also the protective mechanism(s) and impact enterococcus infection may have on breast cancer development. Ultimately, further research is needed in order to understand the complex and intricate relationship between the microbiome, immunology, bacterial infections, and carcinogenesis.Keywords: breast cancer, enterococcus, immunology, infection, microbiome
Procedia PDF Downloads 174380 Quick Response(QR) Code for Vehicle Registration and Identification
Authors: S. Malarvizhi, S. Sadiq Basha, M. Santhosh Kumar, K. Saravanan, R. Sasikumar, R. Satheesh
Abstract:
This is a web based application which provides authorization for the vehicle identification and registration. It also provides mutual authentication between the police and users in order to avoid misusage. The QR code generation in this application overcomes the difficulty in the manual registration of the vehicle documents. This generated QR code is placed in the number plates of the vehicles. The QR code is scanned using the QR Reader installed in the smart devices. The police officials can check the vehicle details and file cases on accidents, theft and traffic rules violations using QR code. In addition to vehicle insurance payments and renewals, the renewal alert is sent to the vehicle owner about payment deadline. The non-permitted vehicles can be blocked in the next check-post by sending the alert messages.Keywords: QR code, QR reader, registration, authentication, idenfication
Procedia PDF Downloads 496379 A Machine Learning Approach to Detecting Evasive PDF Malware
Authors: Vareesha Masood, Ammara Gul, Nabeeha Areej, Muhammad Asif Masood, Hamna Imran
Abstract:
The universal use of PDF files has prompted hackers to use them for malicious intent by hiding malicious codes in their victim’s PDF machines. Machine learning has proven to be the most efficient in identifying benign files and detecting files with PDF malware. This paper has proposed an approach using a decision tree classifier with parameters. A modern, inclusive dataset CIC-Evasive-PDFMal2022, produced by Lockheed Martin’s Cyber Security wing is used. It is one of the most reliable datasets to use in this field. We designed a PDF malware detection system that achieved 99.2%. Comparing the suggested model to other cutting-edge models in the same study field, it has a great performance in detecting PDF malware. Accordingly, we provide the fastest, most reliable, and most efficient PDF Malware detection approach in this paper.Keywords: PDF, PDF malware, decision tree classifier, random forest classifier
Procedia PDF Downloads 92378 Technology Impact on the Challenge between Human Rights and Cyber Terrorism
Authors: Abanoub Zare Zakaria Herzalla
Abstract:
The link between terrorism and human rights has become a major challenge in the fight against terrorism around the world. This is based on the fact that terrorism and human rights are so closely linked that when the former starts, the latter are violated. This direct connection was recognized in the Vienna Declaration and Program of Action adopted by the World Conference on Human Rights in Vienna on June 25, 1993, which recognizes that acts of terrorism in all their forms and manifestations aim to destroy the human rights of people. Terrorism therefore represents an attack on our most basic human rights. To this end, the first part of this article focuses on the connections between terrorism and human rights and seeks to highlight the interdependence between these two concepts. The second part discusses the emerging concept of cyberterrorism and its manifestations. An analysis of the fight against cyberterrorism in the context of human rights is also carried out.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 51377 A Deep Reinforcement Learning-Based Secure Framework against Adversarial Attacks in Power System
Authors: Arshia Aflaki, Hadis Karimipour, Anik Islam
Abstract:
Generative Adversarial Attacks (GAAs) threaten critical sectors, ranging from fingerprint recognition to industrial control systems. Existing Deep Learning (DL) algorithms are not robust enough against this kind of cyber-attack. As one of the most critical industries in the world, the power grid is not an exception. In this study, a Deep Reinforcement Learning-based (DRL) framework assisting the DL model to improve the robustness of the model against generative adversarial attacks is proposed. Real-world smart grid stability data, as an IIoT dataset, test our method and improves the classification accuracy of a deep learning model from around 57 percent to 96 percent.Keywords: generative adversarial attack, deep reinforcement learning, deep learning, IIoT, generative adversarial networks, power system
Procedia PDF Downloads 42376 The Impact of Artificial Intelligence on Human Rights Legislations and Evolution
Authors: Shenouda Farag Aziz Ibrahim
Abstract:
The relationship between terrorism and human rights has become an important issue in the fight against terrorism worldwide. This is based on the fact that terrorism and human rights are closely linked, so that when the former begins, the latter suffers. This direct link was recognized in the Vienna Declaration and Program of Action adopted by the International Conference on Human Rights held in Vienna on 25 June 1993, which recognized that terrorist acts aim to violate human rights in all their forms and manifestations. . Therefore, terrorism represents an attack on fundamental human rights. For this purpose, the first part of this article focuses on the relationship between terrorism and human rights and aims to show the relationship between these two concepts. In the second part, the concept of cyber threat and its manifestations are discussed. An analysis of the fight against terrorism in the context of human rights was also made..Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security.
Procedia PDF Downloads 43375 Digital Transformation in Production Planning and Control: Evaluation of the Organizational Readiness
Authors: Tobias Wissing, Peter Burggräf, Johannes Wagner
Abstract:
Cost pressure, competitiveness and the increasing turbulence of globalized saturated markets has been the driver for a variety of research activities in the field of production planning and control (PPC) during the past decades. For some time past an increasing awareness for innovative technologies in terms of Industry 4.0 can be noticed. Although there are many promising approaches a solely installation of those smart solutions will not maximize the PPC performance. To accelerate the successful digital transformation the cooperation between employee and technology also has to be adapted. The existing processes and organizational structures might be not sufficient to maximize the utilization of technological innovations. This paper presents the key results of an extensive study which was conducted by the Laboratory for Machine Tools and Production Engineering (WZL) of the RWTH Aachen University to evaluate the current situation and examine the organizational readiness for this digital transformation.Keywords: cyber-physical production system, digital transformation, industry 4.0, production planning and control
Procedia PDF Downloads 354374 Net Folklore as a Part of Kazakhstani Internet Literature
Authors: Dina Sabirova, Madina Moldagali
Abstract:
The rapid development of new media, especially the Internet, has led to major changes in folk culture. The net space is increasingly becoming a creation of the ‘folk’ imagination, saturated with multimedia stories with collective authorship, like traditional folklore. Moreover, the Internet picks up and changes old folklore traditions, such as the form of publication, the way of storytelling, or gave a new morality to the ‘old tales’. In this article, the similarities and differences between Internet folklore/ cyber-folklore/ digital folklore and oral folk art were examined by using the material of modern Kazakh authors. The relationship between tradition and innovation was studied in order to interpret the sequence of the authors' research taking into account the realities. The material of the article was the prose texts of Kazakh writers published in internet magazines and social networks. An immanent and intertextual analysis of the text was carried out. Thus, the new forms of Internet folklore lead to new forms of expression and social morality in societyKeywords: internet literature, modern Kazakhstani authors, net folklore, oral folk art
Procedia PDF Downloads 99373 Perceived Ethnic Discrimination, Aggression, and School Connectedness among Adolescents in Finland
Authors: Isik Z. Ulubas, Kaj Bjorkqvist
Abstract:
The relationships between perceived ethnic discrimination, peer aggression and school connectedness are being examined among 1,000 adolescents in Ostrobothnia, Finland with an online questionnaire. The study aims at investigating perceived ethnic discrimination in school environment by peers and teachers, and within society in general. Six types of aggressive behavior are measured: physical, verbal, indirect, and cyber aggression, in addition to both verbal and physical sexual harassment. High perceived ethnic discrimination is expected to be related with high aggression and low school connectedness. Adolescents who have special diet and clothing because of their cultural or religious background are expected to score higher on perceived ethnic discrimination and lower school connectedness. Adolescents who have lower domestic language skills (Finnish/Swedish) are expected to show lower school connectedness and higher perceived ethnic discrimination.Keywords: adolescents, aggression, ethnic discrimination, school connectedness
Procedia PDF Downloads 223372 Social Enterprises over Microfinance Institutions: The Challenges of Governance and Management
Authors: Dean Sinković, Tea Golja, Morena Paulišić
Abstract:
Upon the end of the vicious war in former Yugoslavia in 1995, international development community widely promoted microfinance as the key development framework to eradicate poverty, create jobs, increase income. Widespread claims were made that microfinance institutions would play vital role in creating a bedrock for sustainable ‘bottom-up’ economic development trajectory, thus, helping newly formed states to find proper way from economic post-war depression. This uplifting neoliberal narrative has no empirical support in the Republic of Croatia. Firstly, the type of enterprises created via microfinance sector are small, unskilled, labor intensive, no technology and with huge debt burden. This results in extremely high failure rates of microenterprises and poor individuals plunging into even deeper poverty, acute indebtedness and social marginalization. Secondly, evidence shows that microcredit is exact reflection of dangerous and destructive sub-prime lending model with ‘boom-to-bust’ scenarios in which benefits are solely extracted by the tiny financial and political elite working around the microfinance sector. We argue that microcredit providers are not proper financial structures through which developing countries should look way out of underdevelopment and poverty. In order to achieve sustainable long-term growth goals, public policy needs to focus on creating, supporting and facilitating the small and mid-size enterprises development. These enterprises should be technically sophisticated, capable of creating new capabilities and innovations, with managerial expertise (skills formation) and inter-connected with other organizations (i.e. clusters, networks, supply chains, etc.). Evidence from South-East Europe suggest that such structures are not created via microfinance model but can be fostered through various forms of social enterprises. Various legal entities may operate as social enterprises: limited liability private company, limited liability public company, cooperative, associations, foundations, institutions, Mutual Insurances and Credit union. Our main hypothesis is that cooperatives are potential agents of social and economic transformation and community development in the region. Financial cooperatives are structures that can foster more efficient allocation of financial resources involving deeper democratic arrangements and more socially just outcomes. In Croatia, pioneers of the first social enterprises were civil society organizations whilst forming a separated legal entity. (i.e. cooperatives, associations, commercial companies working on the principles of returning the investment to the founder). Ever since 1995 cooperatives in Croatia have not grown by pursuing their own internal growth but mostly by relying on external financial support. The greater part of today’s registered cooperatives tend to be agricultural (39%), followed by war veterans cooperatives (38%) and others. There are no financial cooperatives in Croatia. Due to the above mentioned we look at the historical developments and the prevailing social enterprises forms and discuss their advantages and disadvantages as potential agents for social and economic transformation and community development in the region. There is an evident lack of understanding of this business model and of its potential for social and economic development followed by an unfavorable institutional environment. Thus, we discuss the role of governance and management in the formation of social enterprises in Croatia, stressing the challenges for the governance of the country’s social enterprise movement.Keywords: financial cooperatives, governance and management models, microfinance institutions, social enterprises
Procedia PDF Downloads 277371 Cloud Computing Security for Multi-Cloud Service Providers: Controls and Techniques in Our Modern Threat Landscape
Authors: Sandesh Achar
Abstract:
Cloud computing security is a broad term that covers a variety of security concerns for organizations that use cloud services. Multi-cloud service providers must consider several factors when addressing security for their customers, including identity and access management, data at rest and in transit, egress and ingress traffic control, vulnerability and threat management, and auditing. This paper explores each of these aspects of cloud security in detail and provides recommendations for best practices for multi-cloud service providers. It also discusses the challenges inherent in securing a multi-cloud environment and offers solutions for overcoming these challenges. By the end of this paper, readers should have a good understanding of the various security concerns associated with multi-cloud environments in the context of today’s modern cyber threats and how to address them.Keywords: multi-cloud service, system organization control, data loss prevention, identity and access management
Procedia PDF Downloads 98370 The Impact of Globalization on the Development of Israel Advanced Changes
Authors: Erez Cohen
Abstract:
The study examines the socioeconomic impact of development of an advanced industry in Israel. The research method is based on data collected from the Israel Central Bureau of Statistics and from the National Insurance Institute (NII) databases, which provided information that allows to examine the Economic and Social Changes during the 1990s. The study examined the socioeconomic effects of the development of advanced industry in Israel. The research findings indicate that as a result of globalization processes, the weight of traditional industry began to diminish as a result of factory closures and the laying off of workers. These circumstances led to growing unemployment among the weaker groups in Israeli society, detracting from their income and thus increasing inequality among different socioeconomic groups in Israel and enhancement of social disparities.Keywords: globalization, Israeli advanced industry, public policy, socio-economic indicators
Procedia PDF Downloads 165369 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia
Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana
Abstract:
Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization
Procedia PDF Downloads 238368 Mining and Ecological Events and its Impact on the Genesis and Geo-Distribution of Ebola Outbreaks in Africa
Authors: E Tambo, O. O. Olalubi, E. C. Ugwu, J. Y. Ngogang
Abstract:
Despite the World Health Organization (WHO) declaration of international health emergency concern, the status quo of responses and efforts to stem the worst-recorded Ebola epidemic Ebola outbreak is still precariously inadequate in most of the affected in West. Mining natural resources have been shown to play a key role in both motivating and fuelling ethnic, civil and armed conflicts that have plagued a number of African countries over the last decade. Revenues from the exploitation of natural resources are not only used in sustaining the national economy but also armies, personal enrichment and building political support. Little is documented on the mining and ecological impact on the emergence and geographical distribution of Ebola in Africa over time and space. We aimed to provide a better understanding of the interconnectedness among issues of mining natural, resource management, mining conflict and post-conflict on Ebola outbreak and how wealth generated from abundant natural resources could be better managed in promoting research and development towards strengthening environmental, socioeconomic and health systems sustainability on Ebola outbreak and other emerging diseases surveillance and responses systems prevention and control, early warning alert, durable peace and sustainable development rather than to fuel conflicts, resurgence and emerging diseases epidemics in the perspective of community and national/regional approach. Our results showed the first assessment of systematic impact of all major minerals conflict events diffusion over space and time and mining activities on nine Ebola genesis and geo-distribution in affected countries across Africa. We demonstrate how, where and when mining activities in Africa increase ecological degradation, conflicts at the local level and then spreads violence across territory and time by enhancing the financial capacities of fighting groups/ethnics and diseases onset. In addition, led process of developing minimum standards for natural resource governance; improving governmental and civil society capacity for natural resource management, including the strengthening of monitoring and enforcement mechanisms; understanding the post-mining and conflicts community or national reconstruction and rehabilitation programmes in strengthening or developing community health systems and regulatory mechanisms. In addition the quest for the control over these resources and illegal mining across the landscape forest incursion provided increase environmental and ecological instability and displacement and disequilibrium, therefore affecting the intensity and duration of mining and conflict/wars and episode of Ebola outbreaks over time and space. We highlight the key findings and lessons learnt in promoting country or community-led process in transforming natural resource wealth from a peace liability to a peace asset. The imperative necessity for advocacy and through facilitating intergovernmental deliberations on critical issues and challenges affecting Africa community transforming exploitation of natural resources from a peace liability to outbreak prevention and control. The vital role of mining in increasing government revenues and expenditures, equitable distribution of wealth and health to all stakeholders, in particular local communities requires coordination, cooperative leadership and partnership in fostering sustainable developmental initiatives from mining context to outbreak and other infectious diseases surveillance responses systems in prevention and control, and judicious resource management.Keywords: mining, mining conflicts, mines, ecological, Ebola, outbreak, mining companies, miners, impact
Procedia PDF Downloads 302367 Challenges in Environmental Governance: A Case Study of Risk Perceptions of Environmental Agencies Involved in Flood Management in the Hawkesbury-Nepean Region, Australia
Authors: S. Masud, J. Merson, D. F. Robinson
Abstract:
The management of environmental resources requires engagement of a range of stakeholders including public/private agencies and different community groups to implement sustainable conservation practices. The challenge which is often ignored is the analysis of agencies involved and their power relations. One of the barriers identified is the difference in risk perceptions among the agencies involved that leads to disjointed efforts of assessing and managing risks. Wood et al 2012, explains that it is important to have an integrated approach to risk management where decision makers address stakeholder perspectives. This is critical for an effective risk management policy. This abstract is part of a PhD research that looks into barriers to flood management under a changing climate and intends to identify bottlenecks that create maladaptation. Experiences are drawn from international practices in the UK and examined in the context of Australia through exploring the flood governance in a highly flood-prone region in Australia: the Hawkesbury Ne-pean catchment as a case study. In this research study several aspects of governance and management are explored: (i) the complexities created by the way different agencies are involved in assessing flood risks (ii) different perceptions on acceptable flood risk level; (iii) perceptions on community engagement in defining acceptable flood risk level; (iv) Views on a holistic flood risk management approach; and, (v) challenges of centralised information system. The study concludes that the complexity of managing a large catchment is exacerbated by the difference in the way professionals perceive the problem. This has led to: (a) different standards for acceptable risks; (b) inconsistent attempt to set-up a regional scale flood management plan beyond the jurisdictional boundaries: (c) absence of a regional scale agency with license to share and update information (d) Lack of forums for dialogue with insurance companies to ensure an integrated approach to flood management. The research takes the Hawkesbury-Nepean catchment as case example and draws from literary evidence from around the world. In addition, conclusions were extrapolated from eighteen semi-structured interviews from agencies involved in flood risk management in the Hawkesbury-Nepean catchment of NSW, Australia. The outcome of this research is to provide a better understanding of complexity in assessing risks against a rapidly changing climate and contribute towards developing effective risk communication strategies thus enabling better management of floods and achieving increased level of support from insurance companies, real-estate agencies, state and regional risk managers and the affected communities.Keywords: adaptive governance, flood management, flood risk communication, stakeholder risk perceptions
Procedia PDF Downloads 288366 Consumer Welfare in the Platform Economy
Authors: Prama Mukhopadhyay
Abstract:
Starting from transport to food, today’s world platform economy and digital markets have taken over almost every sphere of consumers’ lives. Sellers and buyers are getting connected through platforms, which is acting as an intermediary. It has made consumer’s life easier in terms of time, price, choice and other factors. Having said that, there are several concerns regarding platforms. There are competition law concerns like unfair pricing, deep discounting by the platforms which affect the consumer welfare. Apart from that, the biggest problem is lack of transparency with respect to the business models, how it operates, price calculation, etc. In most of the cases, consumers are unaware of how their personal data are being used. In most of the cases, they are unaware of how algorithm uses their personal data to determine the price of the product or even to show the relevant products using their previous searches. Using personal or non-personal data without consumer’s consent is a huge legal concern. In addition to this, another major issue lies with the question of liability. If a dispute arises, who will be responsible? The seller or the platform? For example, if someone ordered food through a food delivery app and the food was bad, in this situation who will be liable: the restaurant or the food delivery platform? In this paper, the researcher tries to examine the legal concern related to platform economy from the consumer protection and consumer welfare perspectives. The paper analyses the cases from different jurisdictions and approach taken by the judiciaries. The author compares the existing legislation of EU, US and other Asian Countries and tries to highlight the best practices.Keywords: competition, consumer, data, platform
Procedia PDF Downloads 146365 Interest Charges and Sustainability Challenges: The Case of OECD Countries
Authors: Aime Philombe Zapji Ymele
Abstract:
Servicing public debt is a significant budgetary burden. In the sense that the payment of interest charges is a liability on the balance sheet of the public budget and affects fiscal policy. Interest charges can sometimes become a burden if they crowd out private activities. In order to analyse and understand the determinants of the debt burden and its impact on the sustainability of public finances, the present work focuses on OECD countries. It is noted from the literature that the factors that determine interest charges are macroeconomic (inflation, GDP growth, and interest rates) and public finances (primary balance and public debt). After analysing a panel of 33 OECD countries and using ordinary least squares (OLS), we find that public debt, inflation, and long-term interest rates are positively correlated with interest charges. An increase in any of these variables leads to an increase in debt charges. On the other hand, a growth in GDP is negatively associated with interest charges. Indeed, an increase in GDP generates enough revenue to meet the repayment of debt charges. According to the empirical analysis, we can say that, despite the large and growing debt-to-GDP ratio of major OECD countries, interest charges are not a threat to the sustainability of public finances. However, it is important for these countries to reduce the ratio of public debt to GDP because, in the face of the many challenges (health, aging population, etc.) that are looming on the horizon, an increase in interest rates could bring with it considerable burdens that would threaten the budgetary balance of these states.Keywords: interest charges, sustainability, public debt, interest rates
Procedia PDF Downloads 124