Search results for: cyber risk assessment
10508 Oncological and Antiresorptive Treatment of Breast Cancer: Dental Assessment and Risk of MRONJ Development
Authors: Magdalena Korytowska, Gunnar Lengstrand, Cecilia Larsson Wexell
Abstract:
Background: Breast cancer (BC) is the most common cancer among women worldwide, and cases are continuing to increase in Sweden. Bone is the most common metastatic site in breast cancer patients, where > 65-75% of women with advanced breast cancer develop bone metastases during their disease. To prevent the skeletal-related events of metastases (e.g., pathological fractures, bone loss, cancer-induced bone pain, and hypercalcemia bone), two different classes of antiresorptive medications (AR), bisphosphonate and denosumab are typically administered every 3 to 4 weeks. Since 2015, adjuvant bisphosphonate treatment has been used every six months for three to five years in postmenopausal women for the prevention of skeletal metastases and improved survival. Methods: A case-control study was conducted to test the hypotheses that patients treated with high-dose AR are at higher risk of developing MRONJ than breast cancer patients with adjuvant bisphosphonate treatment at a lower dose. Medical and odontological data was collected between 2015-2020. Assessment of oral health and dental care before and during oncological treatment took place at the specialist clinic for Orofacial medicine linked to the specific hospital. Results: In total, 220 patients were included, 101 patients in the high-dose group and 119 patients in the adjuvant BP-treatment group. MRONJ was diagnosed in 13 patients (14%) in the high-dose group. The mandible was affected in most of the cases (84.6%), with a mean duration of high-dose treatment of 19.7 months. In 46.2% of cases, no dental cause of MRONJ could be identified. Overall, estrogen receptor-positive (ER+) BC was the most representative type in 172 patients (78.2%). However, this was 83.9% in the high-dose cases group. The most used drug was denosumab. Twenty-five patients (26.9%) switched their medication from ZOL to denosumab during their oncological treatment. Patients with ER+ breast cancer were reported in 88 patients (87.8%) in the adjuvant group that was treated with ZOL. Conclusions: MRONJ was diagnosed only in the high-dose AR group. Dental assessment and care of patients in the adjuvant group should be considered, with a recommendation to potentially prolong ZOL treatment from 3 to 5 years, with concomitant use of hormonal therapy in patients diagnosed with ER+ breast cancer to prevent bone loss induced by oncological treatment. A new referral for dental assessment is very important in the case of bone metastases when treatment with high dose AR will be required since it is associated with a higher risk of MRONJ.Keywords: antiresorptive therapy, breast cancer, dental care, MRONJ
Procedia PDF Downloads 8710507 Cross Matching: An Improved Method to Obtain Comprehensive and Consolidated Evidence
Authors: Tuula Heinonen, Wilhelm Gaus
Abstract:
At present safety, assessment starts with animal tests although their predictivity is often poor. Even after extended human use experimental data are often judged as the core information for risk assessment. However, the best opportunity to generate true evidence is to match all available information. Cross matching methodology combines the different fields of knowledge and types of data (e.g. in-vitro and in-vivo experiments, clinical observations, clinical and epidemiological studies, and daily life observations) and gives adequate weight to individual findings. To achieve a consolidated outcome, the information from all available sources is analysed and compared with each other. If single pieces of information fit together a clear picture becomes visible. If pieces of information are inconsistent or contradictory careful consideration is necessary. 'Cross' can be understood as 'orthographic' in geometry or as 'independent' in mathematics. Results coming from different sources bring independent and; therefore, they result in new information. Independent information gives a larger contribution to evidence than results coming repeatedly from the same source. A successful example of cross matching is the assessment of Ginkgo biloba where we were able to come to the conclusive result: Ginkgo biloba leave extract is well tolerated and safe for humans.Keywords: cross-matching, human use, safety assessment, Ginkgo biloba leave extract
Procedia PDF Downloads 28710506 Internal Factors that Prevent Using Assessment for Learning Strategies: A Case Study of Saudi Arabia
Authors: Khalid A. Alotaibi
Abstract:
To assess the students, there are different strategies adopted by teachers and all are important while taking their scope into consideration. Teachers may face some obstacles that prevent them using the assessment for learning. These obstacles can be internal or external. The present study has been collected from two regions (Riyadh and Hotat Bani Tamim) of Saudi Arabia, with sample size of 174 teachers. The results of the study have shown that the significant factors that can prevent teachers using assessment for learning are; the way of introducing the new form of assessment, lack of teachers' training, clarity of the regulations and size of students in the class. Additionally, other elements have also shown in this paper.Keywords: teachers, assessment, assessment for learning, internal factors and external factors
Procedia PDF Downloads 45210505 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 15410504 The Acceptance of E-Assessment Considering Security Perspective: Work in Progress
Authors: Kavitha Thamadharan, Nurazean Maarop
Abstract:
The implementation of e-assessment as tool to support the process of teaching and learning in university has become a popular technological means in universities. E-Assessment provides many advantages to the users especially the flexibility in teaching and learning. The e-assessment system has the capability to improve its quality of delivering education. However, there still exists a drawback in terms of security which limits the user acceptance of the online learning system. Even though there are studies providing solutions for identified security threats in e-learning usage, there is no particular model which addresses the factors that influences the acceptance of e-assessment system by lecturers from security perspective. The aim of this study is to explore security aspects of e-assessment in regard to the acceptance of the technology. As a result a conceptual model of secure acceptance of e-assessment is proposed. Both human and security factors are considered in formulation of this conceptual model. In order to increase understanding of critical issues related to the subject of this study, interpretive approach involving convergent mixed method research method is proposed to be used to execute the research. This study will be useful in providing more insightful understanding regarding the factors that influence the user acceptance of e-assessment system from security perspective.Keywords: secure technology acceptance, e-assessment security, e-assessment, education technology
Procedia PDF Downloads 45910503 Assessment of Predictive Confounders for the Prevalence of Breast Cancer among Iraqi Population: A Retrospective Study from Baghdad, Iraq
Authors: Nadia H. Mohammed, Anmar Al-Taie, Fadia H. Al-Sultany
Abstract:
Although breast cancer prevalence continues to increase, mortality has been decreasing as a result of early detection and improvement in adjuvant systemic therapy. Nevertheless, this disease required further efforts to understand and identify the associated potential risk factors that could play a role in the prevalence of this malignancy among Iraqi women. The objective of this study was to assess the perception of certain predictive risk factors on the prevalence of breast cancer types among a sample of Iraqi women diagnosed with breast cancer. This was a retrospective observational study carried out at National Cancer Research Center in College of Medicine, Baghdad University from November 2017 to January 2018. Data of 100 patients with breast cancer whose biopsies examined in the National Cancer Research Center were included in this study. Data were collected to structure a detailed assessment regarding the patients’ demographic, medical and cancer records. The majority of study participants (94%) suffered from ductal breast cancer with mean age 49.57 years. Among those women, 48.9% were obese with body mass index (BMI) 35 kg/m2. 68.1% of them had positive family history of breast cancer and 66% had low parity. 40.4% had stage II ductal breast cancer followed by 25.5% with stage III. It was found that 59.6% and 68.1% had positive oestrogen receptor sensitivity and positive human epidermal growth factor (HER2/neu) receptor sensitivity respectively. In regard to the impact of prediction of certain variables on the incidence of ductal breast cancer, positive family history of breast cancer (P < 0.0001), low parity (P< 0.0001), stage I and II breast cancer (P = 0.02) and positive HER2/neu status (P < 0.0001) were significant predictive factors among the study participants. The results from this study provide relevant evidence for a significant positive and potential association between certain risk factors and the prevalence of breast cancer among Iraqi women.Keywords: Ductal Breast Cancer, Hormone Sensitivity, Iraq, Risk Factors
Procedia PDF Downloads 12810502 Association of Xeroderma pigmentosum Group D Gene Polymorphism with Colorectal Cancer Risk in Kashmiri Population
Authors: Syed Sameer Aga, Saniya Nissar
Abstract:
The Xeroderma pigmentosum group D gene (XPD) plays a key role in nucleotide excision repair (NER) pathway of the damaged DNA. Genetic polymorphisms in the coding region of the XPD gene may alter DNA repair capacity of the protein and hence can modulate the risk of colorectal cancer (CRC) risk. The aim of the study was to determine the genetic association of XPD Lys751Gln polymorphism with the risk of colorectal cancer (CRC) development. 120 CRC patients and 160 normal controls were assessed for genotype frequencies of XPD Lys751Gln polymorphism using PCR-RFLP technique. We observed a significant association (p < 0.05) between the XPD Lys751Gln polymorphism and the risk of developing CRC (p < 0.05). Additionally, Gln/Gln genotype of the XPD gene doubled the risk for the development of CRC [p < 0.05; OR=2.25 95% CI (1.07-4.7)]. Our results suggest that there is a significant association between the XPD Lys751Gln polymorphism and the risk of CRC.Keywords: colorectal cancer, polymorphism, RFLP, DNA Repair, NER, XPD
Procedia PDF Downloads 21610501 The Role of Risk Management Practices in the Relationship between Risks Factors and Construction Project Performance
Authors: Ali Abdullah Albezaghi
Abstract:
This article aims to introduce a conceptual framework that can facilitate investigations concerning the role of risk management practices in the relationship between construction risks and the construction project's performance. This article is structured based on the extant literature; it reviews theoretical perspectives, highlights the gaps, and illustrates the significance of developing a framework of suggested relationships. Despite growing interest in the role of risks in construction project performance, previous studies have paid little attention to investigating the moderating role of risk management practices on the risk-performance link. This has left researchers and construction project managers with minimal information to explain the conditions under which risk management practices can reduce the impact of project-related risks and improve performance. In this context, this article suggests a viable research model with propositions that assess risk-performance relationships and discusses the potential moderating effects on the domain relationship. This paper adds to the risk management literature by focusing on risk variables that directly impact performance. Further, it also considers the moderating role of risk management practices in such relationships.Keywords: risk management practices, external risks, internal risks, project risks, project performance
Procedia PDF Downloads 13710500 Breast Cancer Risk Factors: A Big Data Analysis of Black and White Women in the USA
Authors: Tejasvi Parupudi, Mochen Li, Lakshya Mittal, Ignacio G. Camarillo, Raji Sundararajan
Abstract:
With breast cancer becoming a global pandemic, it is very important to assess a woman’s risk profile accurately in a timely manner. Providing an estimate of the risk of developing breast cancer to a woman gives her an opportunity to consider options to decrease this risk. Women at low risk may be suggested yearly screenings whereas women with a high risk of developing breast cancer would be candidates for aggressive surveillance. Fortunately, there is a set of risk factors that are used to predict the probability of a woman being diagnosed with breast cancer in the future. Studying risk factors and understanding how they correlate to cancer is important for early diagnosis, prevention and reducing mortality rates. The effect of crucial risk factors among black and white women was compared in this study. The various risk factors analyzed include breast density, age, cancer in a first-degree relative, menopausal status, body mass index (BMI) and prior breast cancer diagnosis, etc. Breast density, age at first full-term birth and BMI were utilized in this study as important risk factors for the comparison of incidence rates between women of black and white races in the USA. Understanding the differences could lead to the development of solutions to reduce disparity in mortality rates among black women by improving overall access to care.Keywords: big data, breast cancer, risk factors, incidence rates, mortality, race
Procedia PDF Downloads 27510499 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations
Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa
Abstract:
This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy
Procedia PDF Downloads 20410498 Efficacy of Self-Assessment in Written Production among High School Students
Authors: Yoko Suganuma Oi
Abstract:
The purpose of the present study is to find the efficacy of high school student self-assessment of written production. It aimed to explore the following two research questions: 1)How is topic development of their written production improved after student self-assessment and teacher feedback? 2)Does the consistency between student self-assessment and teacher assessment develop after student self-assessment and teacher feedback? The data came from the written production of 82 Japanese high school students aged from 16 to 18 years old, an American English teacher and one Japanese English teacher. Students were asked to write English compositions, about 150 words, for thirty minutes without using dictionaries. It was conducted twice at intervals of two months. Students were supposed to assess their own compositions by themselves. Teachers also assessed students’ compositions using the same assessment sheet. The results showed that both teachers and students assessed the second compositions higher than the first compositions. However, there was not the development of the consistency in coherence.Keywords: feedback, self-assessment, topic development, high school students
Procedia PDF Downloads 50210497 Determinants of Risk Perceptions and Risk Attitude among Flue-Cured Virginia Tobacco Growers: A Case Study of Pakistan
Authors: Wencong Lu, Abdul Latif, Raza Ullah, Subhan Ullah
Abstract:
Agricultural production is subject to risk and the attitudes of producers toward risk, in turn, may be affected by certain socioeconomic characteristics of producers. Although, it is important to assess the risk attitude of farmers and their perception towards different calamitous risk sources for better understanding of their risk management adoption decisions, to the best of our knowledge no studies have been carried out to analyze the risk attitude and risk perceptions in the context of tobacco production in Pakistan. Therefore the study in hand is conducted with an attempt to overcome the gap in existing literature by analyzing different catastrophic risk sources faced by tobacco growers, their attitude towards risk and the effect of socioeconomic and demographic characteristics, farmers’ participation in contract farming and off-farm diversification on their risk attitude and risk perception. Around 78% of Pakistan’s entire tobacco crop and nearly all of the country’s Flue-Cured Virginia (FCV) tobacco is produced in Khyber Pakhtunkhwa (KPK) province alone. The yield/hectare of tobacco produced in KPK province is 14% higher than the global average and 22 % higher than national average. Khyber Pakhtunkhwa province was selected as main study area as nearly all of the country’s Flue-Cured Virginia (FCV) tobacco is produced in Khyber Pakhtunkhwa (KPK) province alone. Six districts were purposely selected based on their contribution in overall production for the last five years which accounts for more than 94.84% of the tobacco production in KPK province. Specific objectives taken into considerations for this study are the risk attitude of the farmers for growing FCV tobacco crop, farmers’ risk perception for different risk sources related to tobacco production (as far as the incidence and severity of each risk source is concerned) and the effect of socioeconomic characteristics, contract farming participation and off-farm diversification (income) on the risk attitude and risk perception of FCV tobacco growers.Keywords: risk attitude, risk perception, contract farming, off-farm diversification, probit model
Procedia PDF Downloads 36310496 Ecological Risk Assessment of Informal E-Waste Processing in Alaba International Market, Lagos, Nigeria
Authors: A. A. Adebayo, O. Osibanjo
Abstract:
Informal electronic waste (e-waste) processing is a crude method of recycling, which is on the increase in Nigeria. The release of hazardous substances such as heavy metals (HMs) into the environment during informal e-waste processing has been a major concern. However, there is insufficient information on environmental contamination from e-waste recycling, associated ecological risk in Alaba International Market, a major electronic market in Lagos, Nigeria. The aims of this study were to determine the levels of HMs in soil, resulting from the e-waste recycling; and also assess associated ecological risks in Alaba international market. Samples of soils (334) were randomly collected seasonally for three years from fourteen selected e-waste activity points and two control sites. The samples were digested using standard methods and HMs analysed by inductive coupled plasma optical emission. Ecological risk was estimated using Ecological Risk index (ER), Potential Ecological Risk index (RI), Index of geoaccumulation (Igeo), Contamination factor (Cf) and degree of contamination factor (Cdeg). The concentrations range of HMs (mg/kg) in soil were: 16.7-11200.0 (Pb); 14.3-22600.0 (Cu); 1.90-6280.0 (Ni), 39.5-4570.0 (Zn); 0.79-12300.0 (Sn); 0.02-138.0 (Cd); 12.7-1710.0 (Ba); 0.18-131.0 (Cr); 0.07-28.0 (V), while As was below detection limit. Concentrations range in control soils were 1.36-9.70 (Pb), 2.06-7.60 (Cu), 1.25-5.11 (Ni), 3.62-15.9 (Zn), BDL-0.56 (Sn), BDL-0.01 (Cd), 14.6-47.6 (Ba), 0.21–12.2 (Cr) and 0.22-22.2 (V). The trend in ecological risk index was in the order Cu > Pb > Ni > Zn > Cr > Cd > Ba > V. The potential ecological risk index with respect to informal e-waste activities were: burning > dismantling > disposal > stockpiling. The index of geo accumulation indices revealed that soils were extremely polluted with Cd, Cu, Pb, Zn and Ni. The contamination factor indicated that 93% of the studied areas have very high contamination status for Pb, Cu, Ba, Sn and Co while Cr and Cd were in the moderately contaminated status. The degree of contamination decreased in the order of Sn > Cu > Pb >> Zn > Ba > Co > Ni > V > Cr > Cd. Heavy metal contamination of Alaba international market environment resulting from informal e-waste processing was established. Proper management of e-waste and remediation of the market environment are recommended to minimize the ecological risks.Keywords: Alaba international market, ecological risk, electronic waste, heavy metal contamination
Procedia PDF Downloads 19810495 Real Activities Manipulation vs. Accrual Earnings Management: The Effect of Political Risk
Authors: Heba Abdelmotaal, Magdy Abdel-Kader
Abstract:
Purpose: This study explores whether a firm’s effective political risk management is preventing real and accrual earnings management . Design/methodology/approach: Based on a sample of 130 firms operating in Egypt during the period 2008-2013, two hypotheses are tested using the panel data regression models. Findings: The empirical findings indicate a significant relation between real and accrual earnings management and political risk. Originality/value: This paper provides a statistically evidence on the effects of the political risk management failure on the mangers’ engagement in the real and accrual earnings management practices, and its impact on the firm’s performance.Keywords: political risk, risk management failure, real activities manipulation, accrual earnings management
Procedia PDF Downloads 43910494 Youth Health Promotion Project for Indigenous People in Canada: Together against Bullying and Cyber-Dependence
Authors: Mohamed El Fares Djellatou, Fracoise Filion
Abstract:
The Ashukin program that means bridge in Naskapi or Atikamekw language, has been designed to offer a partnership between nursing students and an indigenous community. The students design a health promotion project tailored to the needs of the community. The issues of intimidation in primary school and cyber-dependence in high school were some concerns in a rural Atikamekw community. The goal of the project was to have a conversation with indigenous youths, aged 10-16 years old, on the challenges presented by intimidation and cyber dependence as well as promoting healthy relationships online and within the community. Methods: Multiple progressive inquiry questions (PIQs) were used to assess the feasibility and importance of this project for the Atikamekw nation, and to determine a plan to follow. The theoretical foundations to guide the conception of the project were the Population Health Promotion Model (PHPM), the First Nations Holistic Lifelong Learning Model, and the Medicine Wheel. A broad array of social determinants of health were addressed, including healthy childhood development, personal health practices, and coping skills, and education. The youths were encouraged to participate in interactive educational sessions, using PowerPoint presentations and pamphlets as the main effective strategies. Additional tools such as cultural artworks and physical activities were introduced to strengthen the inter-relational and team spirit within the Indigenous population. A quality assurance tool (QAT) was developed specifically to determine the appropriateness of these health promotion tools. Improvements were guided by the feedback issued by the indigenous schools’ teachers and social workers who filled the QATs. Post educational sessions, quantitative results have shown that 93.48% of primary school students were able to identify the different types of intimidation, 72.65% recognized more than two strategies, and 52.1% were able to list at least four resources to diffuse intimidation. On the other hand, around 75% of the adolescents were able to name at least three negative effects, and 50% listed three strategies to reduce cyber-dependence. This project was meant to create a bridge with the First Nation through health promotion, a population that is known to be disadvantaged due to systemic health inequity and disparities. Culturally safe care was proposed to deal with the two identified priority issues, and an educational toolkit was given to both schools to ensure the sustainability of the project. The project was self-financed through fundraising activities, and it yielded better results than expected.Keywords: indigenous, first nation, bullying, cyber-dependence, internet addiction, intimidation, youth, adolescents, school, community nursing, health promotion
Procedia PDF Downloads 9810493 Risk Screening in Digital Insurance Distribution: Evidence and Explanations
Authors: Finbarr Murphy, Wei Xu, Xian Xu
Abstract:
The embedding of digital technologies in the global economy has attracted increasing attention from economists. With a large and detailed dataset, this study examines the specific case where consumers have a choice between offline and digital channels in the context of insurance purchases. We find that digital channels screen consumers with lower unobserved risk. For the term life, endowment, and disease insurance products, the average risk of the policies purchased through digital channels was 75%, 21%, and 31%, respectively, lower than those purchased offline. As a consequence, the lower unobserved risk leads to weaker information asymmetry and higher profitability of digital channels. We highlight three mechanisms of the risk screening effect: heterogeneous marginal influence of channel features on insurance demand, the channel features directly related to risk control, and the link between the digital divide and risk. We also find that the risk screening effect mainly comes from the extensive margin, i.e., from new consumers. This paper contributes to three connected areas in the insurance context: the heterogeneous economic impacts of digital technology adoption, insurer-side risk selection, and insurance marketing.Keywords: digital economy, information asymmetry, insurance, mobile application, risk screening
Procedia PDF Downloads 7310492 Cyberbullying among College Students: Prevalence and Effects on Psychological Well-Being
Authors: Jeyaseelan Maria Michael
Abstract:
This study investigated the prevalence of cyberbullying among college female students and its effects on their psychological well-being. The respondents were from the age group of 17 and 18, doing the first-year college in Tamilnadu, India. In this study, 110 participants were selected through simple random sampling. The standardized questionnaire of David Alvare-Garcia’s Cybervictimization Questionnaire for Adolescents (CYVIC) and Ryff’s Psychological Well-Being (PWB) were administered for data collection. CYVIC has four subdomains namely, impersonation, visual-sexual cybervictimization, written-verbal cybervictimization, online exclusion. Ryff’s PWB has six domains namely, autonomy, environmental mastery, personal growth, positive relations with others, purpose in life, and self- acceptance. The collected data were analyzed by SPSS v.23. The results indicate that cyberbullying prevails among college female students (M=1.24, SD= .21). Among the participants, 17 are scored one standard deviation above the mean (1.45). Among the subdomains of the CYVIC, the respondents have the highest score (M=1.40, SD= .38) in written-verbal cybervictimization. Cyber victimization has a significant correlation at the 0.01 level with psychological well-being.Keywords: college students, cyberbullying, cyber victimization, psychological well-being
Procedia PDF Downloads 12710491 Distribution and Ecological Risk Assessment of Trace Elements in Sediments along the Ganges River Estuary, India
Authors: Priyanka Mondal, Santosh K. Sarkar
Abstract:
The present study investigated the spatiotemporal distribution and ecological risk assessment of trace elements of surface sediments (top 0 - 5 cm; grain size ≤ 0.63 µm) in relevance to sediment quality characteristics along the Ganges River Estuary, India. Sediment samples were collected during ebb tide from intertidal regions covering seven sampling sites of diverse environmental stresses. The elements were analyzed with the help of ICPAES. This positive, mixohaline, macro-tidal estuary has global significance contributing ecological and economic services. Presence of fine-clayey particle (47.03%) enhances the adsorption as well as transportation of trace elements. There is a remarkable inter-metallic variation (mg kg-1 dry weight) in the distribution pattern in the following manner: Al (31801± 15943) > Fe (23337± 7584) > Mn (461±147) > S(381±235) > Zn(54 ±18) > V(43 ±14) > Cr(39 ±15) > As (34±15) > Cu(27 ±11) > Ni (24 ±9) > Se (17 ±8) > Co(11 ±3) > Mo(10 ± 2) > Hg(0.02 ±0.01). An overall trend of enrichment of majority of trace elements was very much pronounced at the site Lot 8, ~ 35km upstream of the estuarine mouth. In contrast, the minimum concentration was recorded at site Gangasagar, mouth of the estuary, with high energy profile. The prevalent variations in trace element distribution are being liable for a set of cumulative factors such as hydrodynamic conditions, sediment dispersion pattern and textural variations as well as non-homogenous input of contaminants from point and non-point sources. In order to gain insight into the trace elements distribution, accumulation, and their pollution status, geoaccumulation index (Igeo) and enrichment factor (EF) were used. The Igeo indicated that surface sediments were moderately polluted with As (0.60) and Mo (1.30) and strongly contaminated with Se (4.0). The EF indicated severe pollution of Se (53.82) and significant pollution of As (4.05) and Mo (6.0) and indicated the influx of As, Mo and Se in sediments from anthropogenic sources (such as industrial and municipal sewage, atmospheric deposition, agricultural run-off, etc.). The significant role of the megacity Calcutta in relevance to the untreated sewage discharge, atmospheric inputs and other anthropogenic activities is worthwhile to mention. The ecological risk for different trace elements was evaluated using sediment quality guidelines, effects range low (ERL), and effect range median (ERM). The concentration of As, Cu and Ni at 100%, 43% and 86% of the sampling sites has exceeded the ERL value while none of the element concentration exceeded ERM. The potential ecological risk index values revealed that As at 14.3% of the sampling sites would pose relatively moderate risk to benthic organisms. The effective role of finer clay particles for trace element distribution was revealed by multivariate analysis. The authors strongly recommend regular monitoring emphasizing on accurate appraisal of the potential risk of trace elements for effective and sustainable management of this estuarine environment.Keywords: pollution assessment, sediment contamination, sediment quality, trace elements
Procedia PDF Downloads 25710490 Clinical Experience and Perception of Risk affect the Acceptance and Trust of using AI in Medicine
Authors: Schulz Peter, Kee Kalya, Lwin May, Goh Wilson, Chia Kendrikck, Chueng Max, Lam Thomas, Sung Joseph
Abstract:
As Artificial Intelligence (AI) is progressively making inroads into clinical practice, questions have arisen as to whether acceptance of AI is skewed toward certain medical practitioner segments, even within particular specializations. This study examines distinct AI acceptance among gastroenterologists with contrasting levels of seniority/experience when interacting with AI typologies. Data from 319 gastroenterologists show the presence of four distinct clusters of clinicians based on experience levels and perceived risk typologies. Analysis of cluster-based responses further revealed that acceptance of AI was not uniform. Our findings showed that clinician experience and risk perspective have an interactive role in influencing AI acceptance. Senior clinicians with low-risk perceptions were highly accepting of AI, but those with high-risk perceptions of AI were substantially less accepting. In contrast, junior clinicians were more inclined to embrace AI when they perceived high risk, yet they hesitated to adopt AI when the perceived risk was minimal.Keywords: risk perception, acceptance, trust, medicine
Procedia PDF Downloads 1410489 Risk Management Practices In The Construction Industry In Malawi
Authors: Taonga Temwani Chibaka
Abstract:
This qualitative research study was conducted to identify the common risk factors that affect the construction industry in Malawi in the building and infrastructure (civil works) projects. The study then evaluates the possible risk responses that are done to mitigate the various risk factors that were identified. I addition the research also established the barriers to risk management implementation with lastly mapping out as where the identified risk factors fall on which stage of the project and then also map out the knowledge areas that need to be worked on the cases on Malawian construction industry in order to mitigate most of the identified risk factors. The study involved the interviewing the professionals from the construction industry in Malawi where insights and ideas were collected, analysed and interpreted. The key study findings show that risks related to clients group are perceived as most critical followed by the contractor related, consultant related and then external group related factors respectively where preventive measures are the most applied risk response technique where the aim to avoid most of the risk factors from happening. Most of the risk factors identified were internal risks and in managerial category which suggested that risk planning was to be emphasized at pre-contract stage to minimize these risks since a bigger percentage of the risk factors were mapped out at implementation stage. Furthermore, barriers to risk management were identified and the key barriers were lack of awareness; lack of knowledge; lack of formal policies in place; regarded as costly and limited time which resulted in proposing that regulating authorities to purposefully introduce intense training on risk management to make known of this new knowledge area. The study then recommends that organisation should formally implement risk management where policies should be introduced to enforce all parties to undertake this. Risk planning was regarded as paramount and this to be done from pre-contract phase so as to mitigate 80% of the risk factors. Finally, training should be done on all project management knowledge areas.Keywords: risk management, risk factors, risks, malawi
Procedia PDF Downloads 32310488 Features of Formation and Development of Possessory Risk Management Systems of Organization in the Russian Economy
Authors: Mikhail V. Khachaturyan, Inga A. Koryagina, Maria Nikishova
Abstract:
The study investigates the impact of the ongoing financial crisis, started in the 2nd half of 2014, on marketing budgets spent by Fast-moving consumer goods companies. In these conditions, special importance is given to efficient possessory risk management systems. The main objective for establishing and developing possessory risk management systems for FMCG companies in a crisis is to analyze the data relating to the external environment and consumer behavior in a crisis. Another important objective for possessory risk management systems of FMCG companies is to develop measures and mechanisms to maintain and stimulate sales. In this regard, analysis of risks and threats which consumers define as the main reasons affecting their level of consumption become important. It is obvious that in crisis conditions the effective risk management systems responsible for development and implementation of strategies for consumer demand stimulation, as well as the identification, analysis, assessment and management of other types of risks of economic security will be the key to sustainability of a company. In terms of financial and economic crisis, the problem of forming and developing possessory risk management systems becomes critical not only in the context of management models of FMCG companies, but for all the companies operating in other sectors of the Russian economy. This study attempts to analyze the specifics of formation and development of company possessory risk management systems. In the modern economy, special importance among all the types of owner’s risks has the risk of reduction in consumer activity. This type of risk is common not only for the consumer goods trade. Study of consumer activity decline is especially important for Russia due to domestic market of consumer goods being still in the development stage, despite its significant growth. In this regard, it is especially important to form and develop possessory risk management systems for FMCG companies. The authors offer their own interpretation of the process of forming and developing possessory risk management systems within owner’s management models of FMCG companies as well as in Russian economy in general. Proposed methods and mechanisms of problem analysis of formation and development of possessory risk management systems in FMCG companies and the results received can be helpful for researchers interested in problems of consumer goods market development in Russia and overseas.Keywords: FMCG companies, marketing budget, risk management, owner, Russian economy, organization, formation, development, system
Procedia PDF Downloads 37710487 An Empirical Assessment of Indoor Environmental Quality in Developing Sub-Saharan Countries: Evaluation of Existing Gaps and Potential Risk
Authors: Jean-Paul Kapuya Bulaba Nyembwe, John Omomoluwa Ogundiran, Manuel Carlos Gameiro da Silva
Abstract:
Indoor environmental quality (IEQ) remains a global concern because it impacts people's comfort, health, performance, and general well-being. People spend a significant amount of time in buildings or while commuting, hence ensuring the minimal risk in indoor spaces by ensuring suitable IEQ. IEQ studies are limited regarding developing sub-Saharan countries, whereas there is also a huge risk and concern for the current population and geometric growth as many cities in the region will become mega-cities by 2040 (World Bank report). The absence of suitable IEQ regulations and energy poverty are reasons to assess the IEQ gaps for increased awareness of sustainable interventions to minimize the associated risk. This study evaluates the gaps and potential hazards that exist in the IEQ of sub-Saharan countries using empirical studies of hospital occupants and BRT bus passengers and drivers. The Surveys were conducted in 3 cities of the Democratic Republic of Congo and Lagos metropolis of Nigeria. The results suggest that gaps exist in IEQ for these regions. The gaps indicate existential risk to people’s health, comfort, and well-being. The inferential conclusions are that there is a need for further scientific studies, improvement in IEQ conditions, and ensuring suitable regulations for developing sub-Saharan countries.Keywords: health hazards, hospitals indoor environmental quality, indoor spaces, occupants, sub-Saharan countries, vehicles
Procedia PDF Downloads 7110486 A Supply Chain Risk Management Model Based on Both Qualitative and Quantitative Approaches
Authors: Henry Lau, Dilupa Nakandala, Li Zhao
Abstract:
In today’s business, it is well-recognized that risk is an important factor that needs to be taken into consideration before a decision is made. Studies indicate that both the number of risks faced by organizations and their potential consequences are growing. Supply chain risk management has become one of the major concerns for practitioners and researchers. Supply chain leaders and scholars are now focusing on the importance of managing supply chain risk. In order to meet the challenge of managing and mitigating supply chain risk (SCR), we must first identify the different dimensions of SCR and assess its relevant probability and severity. SCR has been classified in many different ways, and there are no consistently accepted dimensions of SCRs and several different classifications are reported in the literature. Basically, supply chain risks can be classified into two dimensions namely disruption risk and operational risk. Disruption risks are those caused by events such as bankruptcy, natural disasters and terrorist attack. Operational risks are related to supply and demand coordination and uncertainty, such as uncertain demand and uncertain supply. Disruption risks are rare but severe and hard to manage, while operational risk can be reduced through effective SCM activities. Other SCRs include supply risk, process risk, demand risk and technology risk. In fact, the disorganized classification of SCR has created confusion for SCR scholars. Moreover, practitioners need to identify and assess SCR. As such, it is important to have an overarching framework tying all these SCR dimensions together for two reasons. First, it helps researchers use these terms for communication of ideas based on the same concept. Second, a shared understanding of the SCR dimensions will support the researchers to focus on the more important research objective: operationalization of SCR, which is very important for assessing SCR. In general, fresh food supply chain is subject to certain level of risks, such as supply risk (low quality, delivery failure, hot weather etc.) and demand risk (season food imbalance, new competitors). Effective strategies to mitigate fresh food supply chain risk are required to enhance operations. Before implementing effective mitigation strategies, we need to identify the risk sources and evaluate the risk level. However, assessing the supply chain risk is not an easy matter, and existing research mainly use qualitative method, such as risk assessment matrix. To address the relevant issues, this paper aims to analyze the risk factor of the fresh food supply chain using an approach comprising both fuzzy logic and hierarchical holographic modeling techniques. This novel approach is able to take advantage the benefits of both of these well-known techniques and at the same time offset their drawbacks in certain aspects. In order to develop this integrated approach, substantial research work is needed to effectively combine these two techniques in a seamless way, To validate the proposed integrated approach, a case study in a fresh food supply chain company was conducted to verify the feasibility of its functionality in a real environment.Keywords: fresh food supply chain, fuzzy logic, hierarchical holographic modelling, operationalization, supply chain risk
Procedia PDF Downloads 24310485 Emerging Threats and Adaptive Defenses: Navigating the Future of Cybersecurity in a Hyperconnected World
Authors: Olasunkanmi Jame Ayodeji, Adebayo Adeyinka Victor
Abstract:
In a hyperconnected world, cybersecurity faces a continuous evolution of threats that challenge traditional defence mechanisms. This paper explores emerging cybersecurity threats like malware, ransomware, phishing, social engineering, and the Internet of Things (IoT) vulnerabilities. It delves into the inadequacies of existing cybersecurity defences in addressing these evolving risks and advocates for adaptive defence mechanisms that leverage AI, machine learning, and zero-trust architectures. The paper proposes collaborative approaches, including public-private partnerships and information sharing, as essential to building a robust defence strategy to address future cyber threats. The need for continuous monitoring, real-time incident response, and adaptive resilience strategies is highlighted to fortify digital infrastructures in the face of escalating global cyber risks.Keywords: cybersecurity, hyperconnectivity, malware, adaptive defences, zero-trust architecture, internet of things vulnerabilities
Procedia PDF Downloads 2010484 Information Technology Service Management System Measurement Using ISO20000-1 and ISO15504-8
Authors: Imam Asrowardi, Septafiansyah Dwi Putra, Eko Subyantoro
Abstract:
Process assessments can improve IT service management system (IT SMS) processes but the assessment method is not always transparent. This paper outlines a project to develop a solution- mediated process assessment tool to enable transparent and objective SMS process assessment. Using the international standards for SMS and process assessment, the tool is being developed following the International standard approach in collaboration and evaluate by expert judgment from committee members and ITSM practitioners.Keywords: SMS, tools evaluation, ITIL, ISO service
Procedia PDF Downloads 48010483 A Saudi Woman with Tokophobia: A Case Report
Authors: Wid Kattan, Rahaf Albarraq
Abstract:
Background: Tokophobia is a pathological fear of pregnancy that can lead to the avoidance of childbirth. It is classified as primary or secondary. This report describes a patient with tokophobia, as well as her presentation, risk factors, comorbidities, and treatment. Case Presentation: A 43-year-old Saudi woman experienced tokophobia upon becoming pregnant for the fifth time. She was assessed in two clinical interviews by a consultant psychiatrist specializing in women’s mental health. In addition, she completed several questionnaires for assessment of different aspects of her mental health: overall depression, perinatal depression, generalized anxiety, maternal functioning, and fear of childbirth (FOC). Several risk factors and comorbidities that may have contributed to the development of tokophobia in this patient were discussed, including traumatic experiences in previous deliveries, the unplanned nature of the pregnancy, perinatal depression, and pronounced symptoms of anxiety. A collaborative decision to perform a C-section was made, in line with obstetric guidelines and good mental health practice. Full symptomatic recovery was achieved immediately after delivery. Conclusions: We hope to increase clinical awareness of the assessment and management of tokophobia, which is a relatively new concept and, as yet, understudied.Keywords: tokophobia, fear of childbirth, mental health, anxiety, case report, depression, fear of delivery, psychiatry, cesarean section, perinatal depression
Procedia PDF Downloads 14310482 Fall Prevention: Evidence-Based Intervention in Exercise Program Implementation for Keeping Older Adults Safe and Active
Authors: Jennifer Holbein, Maritza Wiedel
Abstract:
Background: Aging is associated with an increased risk of falls in older adults, and as a result, falls have become public health crises. However, the incidence of falls can be reduced through healthy aging and the implementation of a regular exercise and strengthening program. Public health and healthcare professionals authorize the use of evidence‐based, exercise‐focused fall interventions, but there are major obstacles to translating and disseminating research findings into healthcare practices. The purpose of this study was to assess the feasibility of an intervention, A Matter of Balance, in terms of demand, acceptability, and implementation into current exercise programs. Subjects: Seventy-five participants from rural communities, above the age of sixty, were randomized to an intervention or attention-control of the standardized senior fitness test. Methods: Subject completes the intervention, which combines two components: (1) motivation and (2) fall-reducing physical activities with protocols derived from baseline strength and balanced assessments. Participants (n=75) took part in the program after completing baseline functional assessments as well as evaluations of their personal knowledge, health outcomes, demand, and implementation interventions. After 8-weeks of the program, participants were invited to complete follow-up assessments with results that were compared to their baseline functional analyses. Out of all the participants in the study who complete the initial assessment, approximately 80% are expected to maintain enrollment in the implemented prescription. Furthermore, those who commit to the program should show mitigation of fall risk upon completion of their final assessment.Keywords: aging population, exercise, falls, functional assessment, healthy aging
Procedia PDF Downloads 10310481 Tracing Back the Bot Master
Authors: Sneha Leslie
Abstract:
The current situation in the cyber world is that crimes performed by Botnets are increasing and the masterminds (botmaster) are not detectable easily. The botmaster in the botnet compromises the legitimate host machines in the network and make them bots or zombies to initiate the cyber-attacks. This paper will focus on the live detection of the botmaster in the network by using the strong framework 'metasploit', when distributed denial of service (DDOS) attack is performed by the botnet. The affected victim machine will be continuously monitoring its incoming packets. Once the victim machine gets to know about the excessive count of packets from any IP, that particular IP is noted and details of the noted systems are gathered. Using the vulnerabilities present in the zombie machines (already compromised by botmaster), the victim machine will compromise them. By gaining access to the compromised systems, applications are run remotely. By analyzing the incoming packets of the zombies, the victim comes to know the address of the botmaster. This is an effective and a simple system where no specific features of communication protocol are considered.Keywords: bonet, DDoS attack, network security, detection system, metasploit framework
Procedia PDF Downloads 25410480 Evaluation of Aggregate Risks in Sustainable Manufacturing Using Fuzzy Multiple Attribute Decision Making
Authors: Gopinath Rathod, Vinod Puranik
Abstract:
Sustainability is regarded as a key concept for survival in the competitive scenario. Industrial risk and diversification of risk type’s increases with industrial developments. In the context of sustainable manufacturing, the evaluation of risk is difficult because of the incomplete information and multiple indicators. Fuzzy Multiple Attribute Decision Method (FMADM) has been used with a three level hierarchical decision making model to evaluate aggregate risk for sustainable manufacturing projects. A case study has been presented to reflect the risk characteristics in sustainable manufacturing projects.Keywords: sustainable manufacturing, decision making, aggregate risk, fuzzy logic, fuzzy multiple attribute decision method
Procedia PDF Downloads 51910479 Self-Disclosure and Suicide
Authors: Netta Horesh Reinman
Abstract:
The inability to communicate feelings and thoughts to people close to oneself may be an important risk factor for suicidal behavior. This inability has been operationalized in the concept of “self-disclosure.” The purpose of this paper was to evaluate the correlation of self-disclosure with suicidal behavior in adolescents. Eighty consecutive admissions to an adolescent psychiatric inpatient unit were evaluated. Thirty-four were suicide attempters, 18 were suicidal ideators, and 18 were non-suicidal. Assessment measures included the Child Suicide Potential Scale, the Suicide Intent Scale, the Suicide Ideation Scale, and the Self-Disclosure Scale. The results show that low self-disclosure levels are associated with suicidal thinking, suicide attempts and suicidal attitudes. Thus, low self-disclosure may well be a risk factor worthy of further evaluation in the attempt to understand adolescent suicidal behavior.Keywords: self disclosure, suicide, adolescents, treatment
Procedia PDF Downloads 122