Search results for: risk intelligence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7332

Search results for: risk intelligence

6882 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 122
6881 The Cultural Persona of Artificial Intelligence: An Analysis of Anthropological Challenges to Public Communication

Authors: Abhivardhan, Ritu Agarwal

Abstract:

The role of entrepreneurial ethics is connected with materializing the core components of human life, and the flexible and gullible attributions dominate the materialization of human lifestyle and outreach in the age of the internet and globalization. One of the key bi-products of the age of information – Artificial Intelligence has become a relevant mechanism to materialize and understand human empathy and originality via various algorithmic policing methodologies with specific intricacies. Since it has a special connection with ethnocentrism – it has the potential to influence the approach of international law and politics owed to the rise of and approach towards perception and communication via populism in progressive and third world countries. The paper argues about the cultural persona of artificial intelligence, and its ontological resemblance in human life is connected with the ethnocentric treatment of cyberspace, with an analysis of the influence of the ethics of entrepreneurship in international politics. The paper further provides an analysis of fake news and misinformation as the sub-strata of communication strategies involving populism determined as a communication strategy and about the legal case of constitutional redemption in recent legislative developments in Europe, the U.S, and Asia with reference to certain important strategies, policy documentation, declarations, and legal instruments. The paper concludes that the capillaries of the anthropomorphic developments of cultural perception via towards artificial intelligence have a hidden and unstable connection with the common approach of entrepreneurial ethics, which influences populism to disrupt the peaceful order of international politics via some minor backlashes in the technological, legal and social realm of human life. Suggestions with the conclusion are hereby provided.

Keywords: ethnocentrism, perception politics, populism, international law, slacktivism, artificial intelligence ethics, enculturation

Procedia PDF Downloads 125
6880 Impact of Construction Risk Factors into Actual Construction Price in PPP Projects

Authors: Saleh Alzahrani, Halim Boussabaine

Abstract:

The majority of Public Private Partnership (PPP) are developed based on the rationale that the design, construction, operation, and financing of a public project is to be awarded to a private party within a single contractual framework. PPP project risks normally include the development and construction of a new asset as well as its operation for decades. Undoubtedly the most serious consequences of risks during the construction period are price and time overruns. These events are amongst the most broadly used scenarios in value for money analysis risks. The sources of risk change over the life cycle of a PPP project. In traditional procurement, the public sector normally has to cover all price distress from these risks. At least there is plenty evidence to suggest that price distress is a norm in some of the projects that are delivered under traditional procurement. This paper will find the impact of construction risk factors into actual construction price into PPP projects. The paper will present a brief literature review on PPP risk pricing strategies, and then using system dynamics (SD) to analyses of the risks associated with the estimated project price. Based on the finding from these analyses a risk pricing association model is presented and discussed. The paper concludes with thoughts for future research.

Keywords: Public Private Partnership (PPP), Risk, Risk Pricing, System Dynamics (SD), construction price

Procedia PDF Downloads 561
6879 Risk Propagation in Electricity Markets: Measuring the Asymmetric Transmission of Downside and Upside Risks in Energy Prices

Authors: Montserrat Guillen, Stephania Mosquera-Lopez, Jorge Uribe

Abstract:

An empirical study of market risk transmission between electricity prices in the Nord Pool interconnected market is done. Crucially, it is differentiated between risk propagation in the two tails of the price variation distribution. Thus, the downside risk from upside risk spillovers is distinguished. The results found document an asymmetric nature of risk and risk propagation in the two tails of the electricity price log variations. Risk spillovers following price increments in the market are transmitted to a larger extent than those after price reductions. Also, asymmetries related to both, the size of the transaction area and related to whether a given area behaves as a net-exporter or net-importer of electricity, are documented. For instance, on the one hand, the bigger the area of the transaction, the smaller the size of the volatility shocks that it receives. On the other hand, exporters of electricity, alongside countries with a significant dependence on renewable sources, tend to be net-transmitters of volatility to the rest of the system. Additionally, insights on the predictive power of positive and negative semivariances for future market volatility are provided. It is shown that depending on the forecasting horizon, downside and upside shocks to the market are featured by a distinctive persistence, and that upside volatility impacts more on net-importers of electricity, while the opposite holds for net-exporters.

Keywords: electricity prices, realized volatility, semivariances, volatility spillovers

Procedia PDF Downloads 171
6878 Credit Risk and Financial Stability

Authors: Zidane Abderrezzaq

Abstract:

In contrast to recent successful developments in macro monetary policies, the modelling, measurement and management of systemic financial stability has remained problematical. Indeed, the focus of most effort has been on improving individual, rather than systemic, bank risk management; the Basel II objective has been to bring regulatory bank capital into line with the (sophisticated) banks’ assessment of their own economic capital. Even at the individual bank level there are concerns over appropriate diversification allowances, differing objectives of banks and regulators, the need for a buffer over regulatory minima, and the distinction between expected and unexpected losses (EL and UL). At the systemic level the quite complex and prescriptive content of Basel II raises dangers of ‘endogenous risk’ and procyclicality. Simulations suggest that this latter could be a serious problem. In an extension to the main analysis we study how liquidity effects interact with banking structure to produce a greater chance of systemic breakdown. We finally consider how the risk of contagion might depend on the degree of asymmetry (tiering) inherent in the structure of the banking system. A number of our results have important implications for public policy, which this paper also draws out.

Keywords: systemic stability, financial regulation, credit risk, systemic risk

Procedia PDF Downloads 371
6877 The Role of the Basel Accords in Mitigating Systemic Risk

Authors: Wassamon Kun-Amornpong

Abstract:

When a financial crisis occurs, there will be a law and regulatory reform in order to manage the turmoil and prevent a future crisis. One of the most important regulatory efforts to help cope with systemic risk and a financial crisis is the third version of the Basel Accord. Basel III has introduced some measures and tools (e.g., systemic risk buffer, countercyclical buffer, capital conservation buffer and liquidity risk) in order to mitigate systemic risk. Nevertheless, the effectiveness of these measures in Basel III in adequately addressing the problem of contagious runs that can quickly spread throughout the financial system is questionable. This paper seeks to contribute to the knowledge regarding the role of the Basel Accords in mitigating systemic risk. The research question is to what extent the Basel Accords can help control systemic risk in the financial markets? The paper tackles this question by analysing the concept of systemic risk. It will then examine the weaknesses of the Basel Accords before and after the Global financial crisis in 2008. Finally, it will suggest some possible solutions in order to improve the Basel Accord. The rationale of the study is the fact that academic works on systemic risk and financial crises are largely studied from economic or financial perspective. There is comparatively little research from the legal and regulatory perspective. The finding of the paper is that there are some problems in all of the three pillars of the Basel Accords. With regards to Pillar I, the risk model is excessively complex while the benefits of its complexity are doubtful. Concerning Pillar II, the effectiveness of the risk-based supervision in preventing systemic risk still depends largely upon its design and implementation. Factors such as organizational culture of the regulator and the political context within which the risk-based supervision operates might be a barrier against the success of Pillar II. Meanwhile, Pillar III could not provide adequate market discipline as market participants do not always act in a rational way. In addition, the too-big-to-fail perception reduced the incentives of the market participants to monitor risks. There has been some development in resolution measure (e.g. TLAC and MREL) which might potentially help strengthen the incentive of the market participants to monitor risks. However, those measures have some weaknesses. The paper argues that if the weaknesses in the three pillars are resolved, it can be expected that the Basel Accord could contribute to the mitigation of systemic risk in a more significant way in the future.

Keywords: Basel accords, financial regulation, risk-based supervision, systemic risk

Procedia PDF Downloads 121
6876 Artificial Intelligence and Liability within Healthcare: A South African Analysis

Authors: M. Naidoo

Abstract:

AI in healthcare can have a massive positive effect in low-resource states like South Africa, where patients outnumber personnel greatly. However, the complexity and ‘black box’ aspects of these technologies pose challenges for the liability regimes of states. This is currently being discussed at the international level. This research finds that within the South African medical negligence context, the current common law fault-based inquiry proves to be wholly inadequate for patient redress. As a solution to this, this research paper culminates in legal reform recommendations designed to solve these issues.

Keywords: artificial intelligence, law, liability, policy

Procedia PDF Downloads 115
6875 Relative Influence of Self-Regulation, Emotional Intelligence, Self-Efficacy, and Goal Orientation on School Engagement among Public Secondary School Students in Ibadan, Nigeria

Authors: Ogunremi Beatrice, Oluwole David Adebayo

Abstract:

Public secondary school students are face with some challenges from the parents, government and teachers in school. Some of the challenges that arises from the parents are lack of attention and adequate communication. From the government are unavailability of useful instructional materials, competent and professionally trained teachers for each subject the students do in school. The challenges that arise from the teachers most often are mismanagement of time, inability to understand the capacity of the student and lack class management and follow up. This study investigated self-regulation, emotional intelligence, self-efficacy and goal orientation as predictors of school engagement among public secondary school students in Ibadan. A structured questionnaire was administered on 258 students from six mixed secondary schools in Ibadan. Pearson Product Moment Correlation method was used for data analysis. Four hypothesis were raised and answered, the results showed there is positive and significant relationships between school engagement among public secondary school students and each of the independent variable: Self-regulation, Emotional intelligence, Self-efficacy, Goal orientation. On the basis of these findings, it was recommended that the parents have to encourage their children on how to be goal oriented ,build their self-efficacy skill, to be self-regulated and emotionally intelligent in order to be effective in school and be able to increase their intellectual ability.

Keywords: emotional intelligence, self-efficacy, goal orientation, school engagement, self-regulation

Procedia PDF Downloads 478
6874 The Relationship among EFL Learners’ Creativity, Emotional Intelligence and Self-Efficacy

Authors: Behdoukht Mall Amiri, Zohreh Gheydar

Abstract:

The thrust of the current study was to investigate the relationship among EFL learners' creativity (CR), emotional intelligence (EI), and self-efficacy (SE). To this end, a group of 120 male and female learners, between the ages of 19 and 35 studying BA in English Translation and MA in Teaching English at Islamic Azad University, Central Tehran were selected using convenient sampling and were given three questionnaires: Bar-On’s EQ-I questionnaire by Bar-On (1997), the General Self-Efficacy Scale questionnaire (SGSES) by Sherer et al. (1982), and a questionnaire of creativity (CR) by O'Neil, Abedi, and Spielberger (1992). Analysis of the results through Pearson Moment Correlation Coefficient showed that there was not a significant relationship between students’ CR and EI, and EI and SE. In addition, CR and SE were correlated significantly but negatively. Multiple regressions revealed that CR could significantly predict SE. Regarding the findings of the study, the obtained results may help EFL teachers, teacher trainers, materials developers, and educational policy makers to possess a broader perspective and heightened degree knowledge toward the TEFL practice and to take practical steps toward the attainments of the desired objectives of the profession.

Keywords: creativity, emotional intelligence, self-efficacy, learning

Procedia PDF Downloads 440
6873 Prevalence, Level and Health Risk Assessment of Mycotoxins in the Fried Poultry Eggs from Jordan

Authors: Sharaf S. Omar

Abstract:

In the current study, level and prevalence of deoxynivalenol (DON), aflatoxin B1 AFB1), zearalenone (ZEN), and ochratoxin A (OTA) in fried poultry eggs in Jordan was investigated. Poultry egg samples (n = 250) were collected. The level of DON, AFB1, ZEN and OTA in the white and yolk of poultry eggs was measured using LC-MS-MS. The health risk assessment was calculated using Margin of Exposures (MOEs) for AFB1 and OTA and hazard index (HI) for ZEN and DON. The highest prevalence in yolk and white of eggs was related to ZEN (96.56%) and OTA (97.44%), respectively. Also, the highest level in white and yolk was related to DON (1.07µg/kg) and DON (1.65 µg/kg), respectively. Level of DON in the yolk of eggs was significantly higher than white of eggs (P-value < 0.05). Risk assessment indicated that exposed population are at high risk of AFB1 (MOEs < 10,000) in fried poultry eggs.

Keywords: mycotoxins 2, aflatoxin b1, risk assessment, poultry egg

Procedia PDF Downloads 114
6872 Risk and Vulnerability Assessment of Agriculture on Climate Change: Bangnampriao District, Thailand

Authors: Charuvan Kasemsap

Abstract:

This research was studied in Bangnampriao District, Chachernsao Province, Thailand. The primary data relating to flooding, drought, and saline intrusion problem on agriculture were collected by surveying, focus group, and in-depth interview with agricultural officers, technical officers of irrigation department, and local government leader of Bangnampriao District. The likelihood and consequence of risk were determined the risk index by risk assessment matrix. In addition, the risk index and the total coping capacity scores were investigated the vulnerability index by vulnerability matrix. It was found that the high-risk drought and saline intrusion was dramatically along Bang Pakong River owing to the end destination of Chao Phraya Irrigation system of Central Thailand. This leads yearly the damage of rice paddy, mango tree, orchard, and fish pond. Therefore, some agriculture avoids rice growing during January to May, and also pumps fresh water from a canal into individual storage pond. However, Bangnampriao District will be strongly affected by the impacts of climate change. Monthly precipitations are expected to decrease in number; dry seasons are expected to be more in number and longer in duration. Thus, the risk and vulnerability of agriculture are also increasing. Adaptation strategies need to be put in place in order to enhance the resilience of the agriculture.

Keywords: agriculture, bangnampriao, climate change, risk assessment

Procedia PDF Downloads 425
6871 Accessing Motional Quotient for All Round Development

Authors: Zongping Wang, Chengjun Cui, Jiacun Wang

Abstract:

The concept of intelligence has been widely used to access an individual's cognitive abilities to learn, form concepts, understand, apply logic, and reason. According to the multiple intelligence theory, there are eight distinguished types of intelligence. One of them is the bodily-kinaesthetic intelligence that links to the capacity of an individual controlling his body and working with objects. Motor intelligence, on the other hand, reflects the capacity to understand, perceive and solve functional problems by motor behavior. Both bodily-kinaesthetic intelligence and motor intelligence refer directly or indirectly to bodily capacity. Inspired by these two intelligence concepts, this paper introduces motional intelligence (MI). MI is two-fold. (1) Body strength, which is the capacity of various organ functions manifested by muscle activity under the control of the central nervous system during physical exercises. It can be measured by the magnitude of muscle contraction force, the frequency of repeating a movement, the time to finish a movement of body position, the duration to maintain muscles in a working status, etc. Body strength reflects the objective of MI. (2) Level of psychiatric willingness to physical events. It is a subjective thing and determined by an individual’s self-consciousness to physical events and resistance to fatigue. As such, we call it subjective MI. Subjective MI can be improved through education and proper social events. The improvement of subjective MI can lead to that of objective MI. A quantitative score of an individual’s MI is motional quotient (MQ). MQ is affected by several factors, including genetics, physical training, diet and lifestyle, family and social environment, and personal awareness of the importance of physical exercise. Genes determine one’s body strength potential. Physical training, in general, makes people stronger, faster and swifter. Diet and lifestyle have a direct impact on health. Family and social environment largely affect one’s passion for physical activities, so does personal awareness of the importance of physical exercise. The key to the success of the MQ study is developing an acceptable and efficient system that can be used to assess MQ objectively and quantitatively. We should apply different accessing systems to different groups of people according to their ages and genders. Field test, laboratory test and questionnaire are among essential components of MQ assessment. A scientific interpretation of MQ score is part of an MQ assessment system as it will help an individual to improve his MQ. IQ (intelligence quotient) and EQ (emotional quotient) and their test have been studied intensively. We argue that IQ and EQ study alone is not sufficient for an individual’s all round development. The significance of MQ study is that it offsets IQ and EQ study. MQ reflects an individual’s mental level as well as bodily level of intelligence in physical activities. It is well-known that the American Springfield College seal includes the Luther Gulick triangle with the words “spirit,” “mind,” and “body” written within it. MQ, together with IQ and EQ, echoes this education philosophy. Since its inception in 2012, the MQ research has spread rapidly in China. By now, six prestigious universities in China have established research centers on MQ and its assessment.

Keywords: motional Intelligence, motional quotient, multiple intelligence, motor intelligence, all round development

Procedia PDF Downloads 158
6870 A Transformer-Based Question Answering Framework for Software Contract Risk Assessment

Authors: Qisheng Hu, Jianglei Han, Yue Yang, My Hoa Ha

Abstract:

When a company is considering purchasing software for commercial use, contract risk assessment is critical to identify risks to mitigate the potential adverse business impact, e.g., security, financial and regulatory risks. Contract risk assessment requires reviewers with specialized knowledge and time to evaluate the legal documents manually. Specifically, validating contracts for a software vendor requires the following steps: manual screening, interpreting legal documents, and extracting risk-prone segments. To automate the process, we proposed a framework to assist legal contract document risk identification, leveraging pre-trained deep learning models and natural language processing techniques. Given a set of pre-defined risk evaluation problems, our framework utilizes the pre-trained transformer-based models for question-answering to identify risk-prone sections in a contract. Furthermore, the question-answering model encodes the concatenated question-contract text and predicts the start and end position for clause extraction. Due to the limited labelled dataset for training, we leveraged transfer learning by fine-tuning the models with the CUAD dataset to enhance the model. On a dataset comprising 287 contract documents and 2000 labelled samples, our best model achieved an F1 score of 0.687.

Keywords: contract risk assessment, NLP, transfer learning, question answering

Procedia PDF Downloads 128
6869 Nonparametric Estimation of Risk-Neutral Densities via Empirical Esscher Transform

Authors: Manoel Pereira, Alvaro Veiga, Camila Epprecht, Renato Costa

Abstract:

This paper introduces an empirical version of the Esscher transform for risk-neutral option pricing. Traditional parametric methods require the formulation of an explicit risk-neutral model and are operational only for a few probability distributions for the returns of the underlying. In our proposal, we make only mild assumptions on the pricing kernel and there is no need for the formulation of the risk-neutral model for the returns. First, we simulate sample paths for the returns under the physical distribution. Then, based on the empirical Esscher transform, the sample is reweighted, giving rise to a risk-neutralized sample from which derivative prices can be obtained by a weighted sum of the options pay-offs in each path. We compare our proposal with some traditional parametric pricing methods in four experiments with artificial and real data.

Keywords: esscher transform, generalized autoregressive Conditional Heteroscedastic (GARCH), nonparametric option pricing

Procedia PDF Downloads 484
6868 Portfolio Restructuring of Banks: The Impact on Performance and Risk

Authors: Hannes Koester

Abstract:

Driven by difficult market conditions and increasing regulations, many banks are making the strategic decision to restructure their portfolio by divesting several business segments. Using a unique dataset of 727 portfolio restructuring announcements by 161 international listed banks over the period 1999 to 2015, we investigate the impact of restructuring measurements on the stock performance as well as on the banks’ profitability and risk. Employing the event study methodology, we detect positive stock market reactions on the announcement of restructuring measurements. These positive stock market reactions indicate that shareholders reward banks’ specialization activities. However, the results of the system GMM regressions show a negative relation between restructuring measurements and banks’ return on assets and a positive relation towards the individual and systemic risk of banks. These empirical results indicate that there is no guarantee that portfolio restructurings will result in a more profitable and less risky institution.

Keywords: bank performance, bank risk, divestiture, restructuring, systemic risk

Procedia PDF Downloads 314
6867 An Investigation Into an Essential Property of Creativity, Which Is the First-Person Experience

Authors: Ukpaka Paschal

Abstract:

Margret Boden argues that a creative product is one that is new, surprising, and valuable as a result of the combination, exploration, or transformation involved in producing it. Boden uses examples of artificial intelligence systems that fit all of these criteria and argues that real creativity involves autonomy, intentionality, valuation, emotion, and consciousness. This paper provides an analysis of all these elements in order to try to understand whether they are sufficient to account for creativity, especially human creativity. This paper focuses on Generative Adversarial Networks (GANs), which is a class of artificial intelligence algorithms that are said to have disproved the common perception that creativity is something that only humans possess. This paper will then argue that Boden’s listed properties of creativity, which capture the creativity exhibited by GANs, are not sufficient to account for human creativity, and this paper will further identify “first-person phenomenological experience” as an essential property of human creativity. The rationale behind the proposed essential property is that if creativity involves comprehending our experience of the world around us into a form of self-expression, then our experience of the world really matters with regard to creativity.

Keywords: artificial intelligence, creativity, GANs, first-person experience

Procedia PDF Downloads 128
6866 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 146
6865 Metrology-Inspired Methods to Assess the Biases of Artificial Intelligence Systems

Authors: Belkacem Laimouche

Abstract:

With the field of artificial intelligence (AI) experiencing exponential growth, fueled by technological advancements that pave the way for increasingly innovative and promising applications, there is an escalating need to develop rigorous methods for assessing their performance in pursuit of transparency and equity. This article proposes a metrology-inspired statistical framework for evaluating bias and explainability in AI systems. Drawing from the principles of metrology, we propose a pioneering approach, using a concrete example, to evaluate the accuracy and precision of AI models, as well as to quantify the sources of measurement uncertainty that can lead to bias in their predictions. Furthermore, we explore a statistical approach for evaluating the explainability of AI systems based on their ability to provide interpretable and transparent explanations of their predictions.

Keywords: artificial intelligence, metrology, measurement uncertainty, prediction error, bias, machine learning algorithms, probabilistic models, interlaboratory comparison, data analysis, data reliability, measurement of bias impact on predictions, improvement of model accuracy and reliability

Procedia PDF Downloads 103
6864 Comparison between Deterministic and Probabilistic Stability Analysis, Featuring Consequent Risk Assessment

Authors: Isabela Moreira Queiroz

Abstract:

Slope stability analyses are largely carried out by deterministic methods and evaluated through a single security factor. Although it is known that the geotechnical parameters can present great dispersal, such analyses are considered fixed and known. The probabilistic methods, in turn, incorporate the variability of input key parameters (random variables), resulting in a range of values of safety factors, thus enabling the determination of the probability of failure, which is an essential parameter in the calculation of the risk (probability multiplied by the consequence of the event). Among the probabilistic methods, there are three frequently used methods in geotechnical society: FOSM (First-Order, Second-Moment), Rosenblueth (Point Estimates) and Monte Carlo. This paper presents a comparison between the results from deterministic and probabilistic analyses (FOSM method, Monte Carlo and Rosenblueth) applied to a hypothetical slope. The end was held to evaluate the behavior of the slope and consequent risk analysis, which is used to calculate the risk and analyze their mitigation and control solutions. It can be observed that the results obtained by the three probabilistic methods were quite close. It should be noticed that the calculation of the risk makes it possible to list the priority to the implementation of mitigation measures. Therefore, it is recommended to do a good assessment of the geological-geotechnical model incorporating the uncertainty in viability, design, construction, operation and closure by means of risk management. 

Keywords: probabilistic methods, risk assessment, risk management, slope stability

Procedia PDF Downloads 381
6863 Emotional Intelligence: A Panacea in the Management and Marketing of Hospitality and Tourism Good and Services

Authors: M. Azugama, P. Okoro Ugo Chigozie, A. O. Nnamocha

Abstract:

Emotional Intelligence constitutes powerful psychological forces that can strongly influence performance in behaviour, interaction and relationship management. Surprisingly how emotions are interpreted and employed in marketing of hospitality experience have had limited comprehension. Marketing of hospitality experiences have important emotional dimensions which the traditional marketing techniques tend to underplay. Guest and host relationship are challenged by mutual hospitableness obligations; suggesting that the commercial practice of delivering satisfactory guest experience has much to gain from traditional understanding of hospitality. By understanding the emotion-based hospitality transaction between guests and hosts, customers’ experiences can be delivered over and against competitor pressure. In this paper, marketing strategies and tactics in hospitality and tourism are principally concerned with adjusting each of the 6P & T elements (i.e. product, place, price and promotion; and adding people, processes and Time in service contexts), to provide a competitive offer (experience) to customers.

Keywords: Emotional intelligence, hospitality and tourism, relationship management, marketing

Procedia PDF Downloads 468
6862 Assessing the Risk of Condensation and Moisture Accumulation in Solid Walls: Comparing Different Internal Wall Insulation Options

Authors: David Glew, Felix Thomas, Matthew Brooke-Peat

Abstract:

Improving the thermal performance of homes is seen as an essential step in achieving climate change, fuel security, fuel poverty targets. One of the most effective thermal retrofits is to insulate solid walls. However, it has been observed that applying insulation to the internal face of solid walls reduces the surface temperature of the inner wall leaf, which may introduce condensation risk and may interrupt seasonal moisture accumulation and dissipation. This research quantifies the extent to which the risk of condensation and moisture accumulation in the wall increases (which can increase the risk of timber rot) following the installation of six different types of internal wall insulation. In so doing, it compares how risk is affected by both the thermal resistance, thickness, and breathability of the insulation. Thermal bridging, surface temperatures, condensation risk, and moisture accumulation are evaluated using hygrothermal simulation software before and after the thermal upgrades. The research finds that installing internal wall insulation will always introduce some risk of condensation and moisture. However, it identifies that risks were present prior to insulation and that breathable materials and insulation with lower resistance have lower risks than alternative insulation options. The implications of this may be that building standards that encourage the enhanced thermal performance of solid walls may be introducing moisture risks into homes.

Keywords: condensation risk, hygrothermal simulation, internal wall insulation, thermal bridging

Procedia PDF Downloads 158
6861 Risk Assessment and Management Using Machine Learning Models

Authors: Lagnajeet Mohanty, Mohnish Mishra, Pratham Tapdiya, Himanshu Sekhar Nayak, Swetapadma Singh

Abstract:

In the era of global interconnectedness, effective risk assessment and management are critical for organizational resilience. This review explores the integration of machine learning (ML) into risk processes, examining its transformative potential and the challenges it presents. The literature reveals ML's success in sectors like consumer credit, demonstrating enhanced predictive accuracy, adaptability, and potential cost savings. However, ethical considerations, interpretability issues, and the demand for skilled practitioners pose limitations. Looking forward, the study identifies future research scopes, including refining ethical frameworks, advancing interpretability techniques, and fostering interdisciplinary collaborations. The synthesis of limitations and future directions highlights the dynamic landscape of ML in risk management, urging stakeholders to navigate challenges innovatively. This abstract encapsulates the evolving discourse on ML's role in shaping proactive and effective risk management strategies in our interconnected and unpredictable global landscape.

Keywords: machine learning, risk assessment, ethical considerations, financial inclusion

Procedia PDF Downloads 66
6860 Determination of the Bank's Customer Risk Profile: Data Mining Applications

Authors: Taner Ersoz, Filiz Ersoz, Seyma Ozbilge

Abstract:

In this study, the clients who applied to a bank branch for loan were analyzed through data mining. The study was composed of the information such as amounts of loans received by personal and SME clients working with the bank branch, installment numbers, number of delays in loan installments, payments available in other banks and number of banks to which they are in debt between 2010 and 2013. The client risk profile was examined through Classification and Regression Tree (CART) analysis, one of the decision tree classification methods. At the end of the study, 5 different types of customers have been determined on the decision tree. The classification of these types of customers has been created with the rating of those posing a risk for the bank branch and the customers have been classified according to the risk ratings.

Keywords: client classification, loan suitability, risk rating, CART analysis

Procedia PDF Downloads 334
6859 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 504
6858 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 290
6857 Gender Differences in Adolescent Avatars: Gender Consistency and Masculinity-Femininity of Nicknames and Characters

Authors: Monika Paleczna, Małgorzata Holda

Abstract:

Choosing an avatar's gender in a computer game is one of the key elements in the process of creating an online identity. The selection of a male or female avatar can define the entirety of subsequent decisions regarding both appearance and behavior. However, when the most popular games available for the Nintendo console in 1998 were analyzed, it turned out that 41% of computer games did not have female characters. Nowadays, players create their avatars based mainly on binary gender classification, with male and female characters to choose from. The main aim of the poster is to explore gender differences in adolescent avatars. 130 adolescents aged 15-17 participated in the study. They created their avatars and then played a computer game. The creation of the avatar was based on the choice of gender, then physical and mental characteristics. Data on gender consistency (consistency between participant’s sex and gender selected for the avatar) and masculinity-femininity of avatar nicknames and appearance will be presented. The masculinity-femininity of avatar nicknames and appearance was assessed by expert raters on a very masculine to very feminine scale. Additionally, data on the relationships of the perceived levels of masculinity-femininity with hostility-friendliness and the intelligence of avatars will be shown. The dimensions of hostility-friendliness and intelligence were also assessed by expert raters on scales ranging from very hostile to very friendly and from very low intelligence to very high intelligence.

Keywords: gender, avatar, adolescence, computer games

Procedia PDF Downloads 211
6856 Modeling and Analyzing Controversy in Large-Scale Cyber-Argumentation

Authors: Najla Althuniyan

Abstract:

Online discussions take place across different platforms. These discussions have the potential to extract crowd wisdom and capture the collective intelligence from a different perspective. However, certain phenomena, such as controversy, often appear in online argumentation that makes the discussion between participants heated. Heated discussions can be used to extract new knowledge. Therefore, detecting the presence of controversy is an essential task to determine if collective intelligence can be extracted from online discussions. This paper uses existing measures for estimating controversy quantitatively in cyber-argumentation. First, it defines controversy in different fields, and then it identifies the attributes of controversy in online discussions. The distributions of user opinions and the distance between opinions are used to calculate the controversial degree of a discussion. Finally, the results from each controversy measure are discussed and analyzed using an empirical study generated by a cyber-argumentation tool. This is an improvement over the existing measurements because it does not require ground-truth data or specific settings and can be adapted to distribution-based or distance-based opinions.

Keywords: online argumentation, controversy, collective intelligence, agreement analysis, collaborative decision-making, fuzzy logic

Procedia PDF Downloads 114
6855 Artificial Intelligance Features in Canva

Authors: Amira Masood, Zainah Alshouri, Noor Bantan, Samira Kutbi

Abstract:

Artificial intelligence is continuously becoming more advanced and more widespread and is present in many of our day-to-day lives as a means of assistance in numerous different fields. A growing number of people, companies, and corporations are utilizing Canva and its AI tools as a method of quick and easy media production. Hence, in order to test the integrity of the rapid growth of AI, this paper will explore the usefulness of Canva's advanced design features as well as their accuracy by determining user satisfaction through a survey-based research approach and by investigating whether or not AI is successful enough that it eliminates the need for human alterations.

Keywords: artificial intelligence, canva, features, users, satisfaction

Procedia PDF Downloads 100
6854 Role of Desire in Risk-Perception: A Case Study of Syrian Refugees’ Migration towards Europe

Authors: Lejla Sunagic

Abstract:

The aim of the manuscript is to further the understanding of risky decision-making in the context of forced and irregular migration. The empirical evidence is collected through interviews with Syrian refugees who arrived in Europe via irregular pathways. Analytically, it has been approached through the juxtaposition between risk perception and the notion of desire. As different frameworks have been developed to address differences in risk perception, the common thread was the understanding that individual risk-taking has been addressed in terms of benefits outweighing risks. However, this framework cannot explain a big risk an individual takes because of an underprivileged position and due to a lack of positive alternatives, termed as risk-taking from vulnerability. The accounts of the field members of this study that crossed the sea in rubber boats to arrive in Europe make an empirical fit to such a postulate by reporting that the risk they have taken was not the choice but the only coping strategy. However, the vulnerability argument falls short of explaining why the interviewees, thinking retrospectively, find the risky journey they have taken to be worth it, while they would strongly advise others to restrain from taking such a huge risk. This inconsistency has been addressed by adding the notion of desire to migrate to the elements of risk perception. Desire, as a subjective experience, was what made the risk appear smaller in cost-benefit analysis at the time of decision-making of those who have realized migration. However, when they reflect on others in the context of potential migration via the same pathway, the interviewees addressed the others’ lack of capacity to avoid the same obstacles that they themselves were able to circumvent while omitting to reflect on others’ desire to migrate. Thus, in the risk-benefit analysis performed for others, the risk remains unblurred and tips over the benefits, given the inability to take into account the desire of others. If desire, as the transformative potential of migration, is taken out of the cost-benefit analysis of irregular migration, refugees might not have taken the risky journey. By casting the theoretical argument in the language of configuration, the study is filling in the gap of knowledge on the combination of migration drivers and the way they interact and produce migration outcomes.

Keywords: refugees, risk perception, desire, irregular migration

Procedia PDF Downloads 95
6853 Risk Assessment of Heavy Rainfall and Development of Damage Prediction Function for Gyeonggi-Do Province

Authors: Jongsung Kim, Daegun Han, Myungjin Lee, Soojun Kim, Hung Soo Kim

Abstract:

Recently, the frequency and magnitude of natural disasters are gradually increasing due to climate change. Especially in Korea, large-scale damage caused by heavy rainfall frequently occurs due to rapid urbanization. Therefore, this study proposed a Heavy rain Damage Risk Index (HDRI) using PSR (Pressure – State - Response) structure for heavy rain risk assessment. We constructed pressure index, state index, and response index for the risk assessment of each local government in Gyeonggi-do province, and the evaluation indices were determined by principal component analysis. The indices were standardized using the Z-score method then HDRIs were obtained for 31 local governments in the province. The HDRI is categorized into three classes, say, the safest class is 1st class. As the results, the local governments of the 1st class were 15, 2nd class 7, and 3rd class 9. From the study, we were able to identify the risk class due to the heavy rainfall for each local government. It will be useful to develop the heavy rainfall prediction function by risk class, and this was performed in this issue. Also, this risk class could be used for the decision making for efficient disaster management. Acknowledgements: This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2017R1A2B3005695).

Keywords: natural disaster, heavy rain risk assessment, HDRI, PSR

Procedia PDF Downloads 194