Search results for: attack risk
6048 Risk of Cardiovascular Diseases: Evaluation of Serum Lipid Profiles in Urban and Rural Population of Sindh
Authors: Mohsin Ali Baloch, Saira Baloch
Abstract:
Objective: The aim of this study was to evaluate the levels of serum lipid profiles in Urban and Rural Population of Sindh, to indicate the existing risk of cardiovascular diseases. Material and Methods: Study was conducted at Liaquat University of Medical & Health Sciences, in the cities of Jamshoro and Hyderabad of Sindh. Blood samples from 300 healthy individuals were collected in fasting condition, out them 100 were from rural population, 100 were urban while 100 were used as control group. The biochemistry of these samples was obtained by the analysis of total Cholesterol, high density lipoprotein Cholesterol (HDL), low-density lipoprotein Cholesterol (LDL) and Triglycerides using kit method on Analyzer Clinical Chemistry. Results and Conclusion: Serum levels of total cholesterol, Triglycerides, and LDL cholesterol were significantly raised in the rural and urban males, whereas HDL cholesterol was decreased as compared to the Healthy controls that indicated significant risk of CVD. Urban population was with more risk of CVD and male gender in both groups was at more risk. The worst lipid profile in gender wise distribution was observed in male gender of urban population with highest Total Cholesterol/HDL Ratio while female gender also shown moderate risk of CVD with highest LDL/HDL Ratio.Keywords: cardiovascular diseases, lipid profiles, urban and rural population, LDL/HDL Ratio
Procedia PDF Downloads 4086047 Reducing Flood Risk through Value Capture and Risk Communication: A Case Study in Cocody-Abidjan
Authors: Dedjo Yao Simon, Takahiro Saito, Norikazu Inuzuka, Ikuo Sugiyama
Abstract:
Abidjan city (Republic of Ivory Coast) is an emerging megacity and an urban coastal area where the number of floods reported is on a rapid increase due to climate change and unplanned urbanization. However, comprehensive disaster mitigation plans, policies, and financial resources are still lacking as the population ignores the extent and location of the flood zones; making them unprepared to mitigate the damages. Considering the existing condition, this paper aims to discuss an approach for flood risk reduction in Cocody Commune through value capture strategy and flood risk communication. Using geospatial techniques and hydrological simulation, we start our study by delineating flood zones and depths under several return periods in the study area. Then, through a questionnaire a field survey is conducted in order to validate the flood maps, to estimate the flood risk and to collect some sample of the opinion of residents on how the flood risk information disclosure could affect the values of property located inside and outside the flood zones. The results indicate that the study area is highly vulnerable to 5-year floods and more, which can cause serious harm to human lives and to properties as demonstrated by the extent of the 5-year flood of 2014. Also, it is revealed there is a high probability that the values of property located within flood zones could decline, and the values of surrounding property in the safe area could increase when risk information disclosure commences. However in order to raise public awareness of flood disaster and to prevent future housing promotion in high-risk prospective areas, flood risk information should be disseminated through the establishment of an early warning system. In order to reduce the effect of risk information disclosure and to protect the values of property within the high-risk zone, we propose that property tax increments in flood free zones should be captured and be utilized for infrastructure development and to maintain the early warning system that will benefit people living in flood prone areas. Through this case study, it is shown that combination of value capture strategy and risk communication could be an effective tool to educate citizen and to invest in flood risk reduction in emerging countries.Keywords: Cocody-Abidjan, flood, geospatial techniques, risk communication, value capture
Procedia PDF Downloads 2736046 Development of Risk Index and Corporate Governance Index: An Application on Indian PSUs
Authors: M. V. Shivaani, P. K. Jain, Surendra S. Yadav
Abstract:
Public Sector Undertakings (PSUs), being government-owned organizations have commitments for the economic and social wellbeing of the society; this commitment needs to be reflected in their risk-taking, decision-making and governance structures. Therefore, the primary objective of the study is to suggest measures that may lead to improvement in performance of PSUs. To achieve this objective two normative frameworks (one relating to risk levels and other relating to governance structure) are being put forth. The risk index is based on nine risks, such as, solvency risk, liquidity risk, accounting risk, etc. and each of the risks have been scored on a scale of 1 to 5. The governance index is based on eleven variables, such as, board independence, diversity, risk management committee, etc. Each of them are scored on a scale of 1 to five. The sample consists of 39 PSUs that featured in Nifty 500 index and, the study covers a 10 year period from April 1, 2005 to March, 31, 2015. Return on assets (ROA) and return on equity (ROE) have been used as proxies of firm performance. The control variables used in the model include, age of firm, growth rate of firm and size of firm. A dummy variable has also been used to factor in the effects of recession. Given the panel nature of data and possibility of endogeneity, dynamic panel data- generalized method of moments (Diff-GMM) regression has been used. It is worth noting that the corporate governance index is positively related to both ROA and ROE, indicating that with the improvement in governance structure, PSUs tend to perform better. Considering the components of CGI, it may be suggested that (i). PSUs ensure adequate representation of women on Board, (ii). appoint a Chief Risk Officer, and (iii). constitute a risk management committee. The results also indicate that there is a negative association between risk index and returns. These results not only validate the framework used to develop the risk index but also provide a yardstick to PSUs benchmark their risk-taking if they want to maximize their ROA and ROE. While constructing the CGI, certain non-compliances were observed, even in terms of mandatory requirements, such as, proportion of independent directors. Such infringements call for stringent penal provisions and better monitoring of PSUs. Further, if the Securities and Exchange Board of India (SEBI) and Ministry of Corporate Affairs (MCA) bring about such reforms in the PSUs and make mandatory the adherence to the normative frameworks put forth in the study, PSUs may have more effective and efficient decision-making, lower risks and hassle free management; all these ultimately leading to better ROA and ROE.Keywords: PSU, risk governance, diff-GMM, firm performance, the risk index
Procedia PDF Downloads 1576045 The Role of Risk Attitudes and Networks on the Migration Decision: Empirical Evidence from the United States
Authors: Tamanna Rimi
Abstract:
A large body of literature has discussed the determinants of migration decision. However, the potential role of individual risk attitudes on migration decision has so far been overlooked. The research on migration literature has studied how the expected income differential influences migration flows for a risk neutral individual. However, migration takes place when there is no expected income differential or even the variability of income appears as lower than in the current location. This migration puzzle motivates a recent trend in the literature that analyzes how attitudes towards risk influence the decision to migrate. However, the significance of risk attitudes on migration decision has been addressed mostly in a theoretical perspective in the mainstream migration literature. The efficient outcome of labor market and overall economy are largely influenced by migration in many countries. Therefore, attitudes towards risk as a determinant of migration should get more attention in empirical studies. To author’s best knowledge, this is the first study that has examined the relationship between relative risk aversion and migration decision in US market. This paper considers movement across United States as a means of migration. In addition, this paper also explores the network effect due to the increasing size of one’s own ethnic group to a source location on the migration decision and how attitudes towards risk vary with network effect. Two ethnic groups (i.e. Asian and Hispanic) have been considered in this regard. For the empirical estimation, this paper uses two sources of data: 1) U.S. census data for social, economic, and health research, 2010 (IPUMPS) and 2) University of Michigan Health and Retirement Study, 2010 (HRS). In order to measure relative risk aversion, this study uses the ‘Two Sample Two-Stage Instrumental Variable (TS2SIV)’ technique. This is a similar method of Angrist (1990) and Angrist and Kruegers’ (1992) ‘Two Sample Instrumental Variable (TSIV)’ technique. Using a probit model, the empirical investigation yields the following results: (i) risk attitude has a significantly large impact on migration decision where more risk averse people are less likely to migrate; (ii) the impact of risk attitude on migration varies by other demographic characteristics such as age and sex; (iii) people with higher concentration of same ethnic households living in a particular place are expected to migrate less from their current place; (iv) the risk attitudes on migration vary with network effect. The overall findings of this paper relating risk attitude, migration decision and network effect can be a significant contribution addressing the gap between migration theory and empirical study in migration literature.Keywords: migration, network effect, risk attitude, U.S. market
Procedia PDF Downloads 1626044 Successful Management of a Boy with Mild Persistent Asthma: A Longitudinal Case
Authors: A. Lubis, L. Setiawati, A. R. Setyoningrum, A. Suryawan, Irwanto
Abstract:
Asthma is a condition that causing chronic health problems in children. In addition to basic therapy against disease, we must try to reduce the impact of chronic health problems and also optimize their medical aspect of growth and development. A boy with mild asthma attack frequent episode did not showed any improvement with medical treatment and his asthma control test was 11. From radiologic examination he got hyperaerated lung and billateral sinusitis maxillaris; skin test results were house dust, food and pet allergy; an overweight body; bad school grades; psychological and environmental problem. We followed and evaluated this boy in 6 months, treated holistically. Even we could not do much on environmental but no more psychological and school problems, his on a good bodyweight and his asthma control test was 22. A case of a child with mild asthma attack frequent episode was reported. Asthma clinical course show no significant improvement when other predisposing factor is not well-controlled and a child’s growth and development may be affected. Improving condition of the patient can be created with the help of loving and caring way of nurturing from the parents and supportive peer group. Therefore, continuous and consistent monitoring is required because prognosis of asthma is generally good when regularly and properly controlled.Keywords: asthma, chronic health problems, growth, development
Procedia PDF Downloads 2296043 Dynamic Risk Model for Offshore Decommissioning Using Bayesian Belief Network
Authors: Ahmed O. Babaleye, Rafet E. Kurt
Abstract:
The global oil and gas industry is beginning to witness an increase in the number of installations moving towards decommissioning. Decommissioning of offshore installations is a complex, costly and hazardous activity, making safety one of the major concerns. Among existing removal options, complete and partial removal options pose the highest risks. Therefore, a dynamic risk model of the accidents from the two options is important to assess the risks on an overall basis. In this study, a risk-based safety model is developed to conduct quantitative risk analysis (QRA) for jacket structure systems failure. Firstly, bow-tie (BT) technique is utilised to model the causal relationship between the system failure and potential accident scenarios. Subsequently, to relax the shortcomings of BT, Bayesian Belief Networks (BBNs) were established to dynamically assess associated uncertainties and conditional dependencies. The BBN is developed through a similitude mapping of the developed bow-tie. The BBN is used to update the failure probabilities of the contributing elements through diagnostic analysis, thus, providing a case-specific and realistic safety analysis method when compared to a bow-tie. This paper presents the application of dynamic safety analysis to guide the allocation of risk control measures and consequently, drive down the avoidable cost of remediation.Keywords: Bayesian belief network, offshore decommissioning, dynamic safety model, quantitative risk analysis
Procedia PDF Downloads 2806042 Testicular Dose and Associated Risk from Common Pelvis Radiation Therapy in Iran
Authors: Ahmad Shanei, Milad Baradaran-Ghahfarokhi
Abstract:
This study aimed to investigate testicular dose (TD) and the associated risk of heritable disease from common pelvis radiotherapy of male patients in Iran. In this work, the relation between TD and changes in beam energy, pelvis size, source to skin distance (SSD) and beam directions (anterior or posterior) were also evaluated. The values of TDs were measured on 67 randomly selected male patients during common pelvis radiotherapy using 1.17 and 1.33 MeV, Theratron Cobalt-60 unit at SSD of 80 cm and 9 MV, Neptun 10 PC and 18 MV, GE Saturne 20 at SSD of 100 cm at Seyed-Al Shohada Hospital, Isfahan, Iran. Results showed that the maximum TD was up to 12% of the tumor dose. Considering the risk factor for radiation-induced heritable disorders of 0.1% per Sv, an excess risk of hereditary disorders of 72 per 10000 births was conservatively calculated. There was a significant difference in the measured TD using different treatment machines and energies (P < 0.001). The TD at 100 cm SSD were much less than that for 80 cm SSD (P <0.001). The Pearson Correlation test showed that, as expected, there was a strong correlation between TD and patient’s pelvis size (r = 0.275, P <0.001). Using the student’s t-tests, it was found that, there was not a significant difference between TD and beam direction (P = 0.231). Iranian male patients undergoing pelvic radiotherapy have the potential of receiving a TD of more than 1 Gy which might result in temporary azoospermia. The risk for induction of hereditary disorders in future generations should be considered as low but not negligible in comparison with the correspondent nominal risk.Keywords: pelvis radiotherapy, testicular dose, infertility, hereditary effects
Procedia PDF Downloads 5456041 Work-Related Risk Factors and Preventive Measures among Nurses and Dentists at Faculty of Oral and Dental Medicine
Authors: Marwa Mamdouh Shaban, Nagat Saied Habib, Shireen Ezz El-Din Taha, Eman Mahmoud Seif El-Naser
Abstract:
Background: Dental nurses and dentists were constantly exposed to a number of specific work related health risk factors which develop and intensify with years. Awareness regarding these work-related health risk factors and implementation of preventive health care measures could provide a safe work environment for all dental nurses and dentists. Aim of the study: to assess the work-related health risk factors among dental nurses and dentists and preventive health care measures applied among dental nurses and dentists. Research design: A descriptive design was utilized. Sample: Convenience sample of 50 dental nurses and 150 dentists were included in the current study. Setting: This study was conducted at the dental clinics at faculty of oral and dental medicine, Al-Kasr Al Ainy Hospital. Tools of data collection: Three tools were developed, tested for clarity, and feasibility: a-Socio-demographic data sheet, b-Work-related health risk factors questionnaire, and c-structured observational checklist. Results: The most common work risk factors prevailing among dental nurses were emotional exhaustion (82%), low back pain (76%) and latex allergy (62%) and the most common work risk factors prevailing among dentists were percutaneous exposure incident (100%), emotional exhaustion (100%) and low back pain (93.3%). Also, statistically significant negative correlation (r=-0.274, at p = 0.045) between the incidence of chemical health risk factors and application of chemical preventive measures among dental nurses. A statistically significant negative correlation (r=-0.177, at p = 0.030) between the incidences of mechanical health risk factors among dentists and application of mechanical preventive measures. Conclusion: The studied dental nurses and dentists exposed to many work related health risk factors as latex allergy, percutaneous exposure incidents, low back pain and emotional exhaustion related to inappropriate application of preventive health care measures. Recommendation: Raise awareness of dental nurses and dentists about work-related health risk factors, design and implement health education program for preventive health care measures.Keywords: work-related risk factors, preventive measures, nurses, dentists
Procedia PDF Downloads 4016040 Disclosure of Financial Risk on Sharia Banks in Indonesia
Authors: Renny Wulandari
Abstract:
This study aims to determine how the influence of Non Performing Financing, Financing Deposit Ratio, Operating Expenses and Operating Revenue and Net Income Margin on the disclosure of financial risk in Sharia banks. To achieve these objectives conducted associative research method with data source in the form of secondary data that is annual report data with period 2013-2016. The population in this study is the sharia banking industry in Indonesia and who issued the annual financial statements. A method of sampling use probability sampling. Analysis in this research is with SEM-PLS. The result is Net Income Margin has a significant effect on financial risk disclosure while Non Performing Financing (NPF) Financing to Deposit Ratio (FDR), Operating Expenses and Operating Revenue (OEOR) have no effect on the disclosure of financial risk in sharia bank.Keywords: Sharia banks, disclosure of risk financial, non performing financing, financing deposit ratio, operating expenses and operating revenue, net income margin
Procedia PDF Downloads 2346039 Threat Analysis: A Technical Review on Risk Assessment and Management of National Testing Service (NTS)
Authors: Beenish Urooj, Ubaid Ullah, Sidra Riasat
Abstract:
National Testing Service-Pakistan (NTS) is an agency in Pakistan that conducts student success appraisal examinations. In this research paper, we must present a security model for the NTS organization. The security model will depict certain security countermeasures for a better defense against certain types of breaches and system malware. We will provide a security roadmap, which will help the company to execute its further goals to maintain security standards and policies. We also covered multiple aspects in securing the environment of the organization. We introduced the processes, architecture, data classification, auditing approaches, survey responses, data handling, and also training and awareness of risk for the company. The primary contribution is the Risk Survey, based on the maturity model meant to assess and examine employee training and knowledge of risks in the company's activities.Keywords: NTS, risk assessment, threat factors, security, services
Procedia PDF Downloads 706038 An MrPPG Method for Face Anti-Spoofing
Authors: Lan Zhang, Cailing Zhang
Abstract:
In recent years, many face anti-spoofing algorithms have high detection accuracy when detecting 2D face anti-spoofing or 3D mask face anti-spoofing alone in the field of face anti-spoofing, but their detection performance is greatly reduced in multidimensional and cross-datasets tests. The rPPG method used for face anti-spoofing uses the unique vital information of real face to judge real faces and face anti-spoofing, so rPPG method has strong stability compared with other methods, but its detection rate of 2D face anti-spoofing needs to be improved. Therefore, in this paper, we improve an rPPG(Remote Photoplethysmography) method(MrPPG) for face anti-spoofing which through color space fusion, using the correlation of pulse signals between real face regions and background regions, and introducing the cyclic neural network (LSTM) method to improve accuracy in 2D face anti-spoofing. Meanwhile, the MrPPG also has high accuracy and good stability in face anti-spoofing of multi-dimensional and cross-data datasets. The improved method was validated on Replay-Attack, CASIA-FASD, Siw and HKBU_MARs_V2 datasets, the experimental results show that the performance and stability of the improved algorithm proposed in this paper is superior to many advanced algorithms.Keywords: face anti-spoofing, face presentation attack detection, remote photoplethysmography, MrPPG
Procedia PDF Downloads 1786037 Evaluating the Impact of Extreme Weather (Flooding) Experience on Climate Change Perceptions in Accra, Ghana
Authors: Bright Annang Baah
Abstract:
Evaluating public perceptions of climate change risk and the elements that impact them has been shown to be critical in developing support for climate change action. Previous research has found a variety of elements, including the experience of extreme weather events, that impact public perceptions and worries about climate change. However, little is known about the public's perception of climate change risks and the variables that influence them in developing countries. Using a household survey, this study attempted to evaluate respondents' risk perceptions of climate change, as well as the impact of flooding experience on such beliefs. The findings demonstrate that flood victims have a greater risk perception and are more concerned about climate change than non-victims. Concerns regarding the effects of climate change, on the other hand, were found to be the lowest when compared to other pressing challenges confronting the country. This study's findings contribute to the understanding of climate change risk perception and the impact of extreme weather events from the perspective of a developing nation.Keywords: climate change risk perception, harsh weather, perceived concern, Accra, Ghana
Procedia PDF Downloads 486036 Development of a Risk Governance Index and Examination of Its Determinants: An Empirical Study in Indian Context
Authors: M. V. Shivaani, P. K. Jain, Surendra S. Yadav
Abstract:
Risk management has been gaining extensive focus from international organizations like Committee of Sponsoring Organizations and Financial Stability Board, and, the foundation of such an effective and efficient risk management system lies in a strong risk governance structure. In view of this, an attempt (perhaps a first of its kind) has been made to develop a risk governance index, which could be used as proxy for quality of risk governance structures. The index (normative framework) is based on eleven variables, namely, size of board, board diversity in terms of gender, proportion of executive directors, executive/non-executive status of chairperson, proportion of independent directors, CEO duality, chief risk officer (CRO), risk management committee, mandatory committees, voluntary committees and existence/non-existence of whistle blower policy. These variables are scored on a scale of 1 to 5 with the exception of the variables, namely, status of chairperson and CEO duality (which have been scored on a dichotomous scale with the score of 3 or 5). In case there is a legal/statutory requirement in respect of above-mentioned variables and there is a non-compliance with such requirement a score of one has been envisaged. Though there is no legal requirement, for the larger part of study, in context of CRO, risk management committee and whistle blower policy, still a score of 1 has been assigned in the event of their non-existence. Recognizing the importance of these variables in context of risk governance structure and the fact that the study basically focuses on risk governance, the absence of these variables has been equated to non-compliance with a legal/statutory requirement. Therefore, based on this the minimum score is 15 and the maximum possible is 55. In addition, an attempt has been made to explore the determinants of this index. For this purpose, the sample consists of non-financial companies (429) that constitute S&P CNX500 index. The study covers a 10 years period from April 1, 2005 to March 31, 2015. Given the panel nature of data, Hausman test was applied, and it suggested that fixed effects regression would be appropriate. The results indicate that age and size of firms have significant positive impact on its risk governance structures. Further, post-recession period (2009-2015) has witnessed significant improvement in quality of governance structures. In contrast, profitability (positive relationship), leverage (negative relationship) and growth (negative relationship) do not have significant impact on quality of risk governance structures. The value of rho indicates that about 77.74% variation in risk governance structures is due to firm specific factors. Given the fact that each firm is unique in terms of its risk exposure, risk culture, risk appetite, and risk tolerance levels, it appears reasonable to assume that the specific conditions and circumstances that a company is beset with, could be the biggest determinants of its risk governance structures. Given the recommendations put forth in the paper (particularly for regulators and companies), the study is expected to be of immense utility in an important yet neglected aspect of risk management.Keywords: corporate governance, ERM, risk governance, risk management
Procedia PDF Downloads 2526035 Potential Ecological Risk Assessment of Selected Heavy Metals in Sediments of Tidal Flat Marsh, the Case Study: Shuangtai Estuary, China
Authors: Chang-Fa Liu, Yi-Ting Wang, Yuan Liu, Hai-Feng Wei, Lei Fang, Jin Li
Abstract:
Heavy metals in sediments can cause adverse ecological effects while it exceeds a given criteria. The present study investigated sediment environmental quality, pollutant enrichment, ecological risk, and source identification for copper, cadmium, lead, zinc, mercury, and arsenic in the sediments collected from tidal flat marsh of Shuangtai estuary, China. The arithmetic mean integrated pollution index, geometric mean integrated pollution index, fuzzy integrated pollution index, and principal component score were used to characterize sediment environmental quality; fuzzy similarity and geo-accumulation Index were used to evaluate pollutant enrichment; correlation matrix, principal component analysis, and cluster analysis were used to identify source of pollution; environmental risk index and potential ecological risk index were used to assess ecological risk. The environmental qualities of sediment are classified to very low degree of contamination or low contamination. The similar order to element background of soil in the Liaohe plain is region of Sanjiaozhou, Honghaitan, Sandaogou, Xiaohe by pollutant enrichment analysis. The source identification indicates that correlations are significantly among metals except between copper and cadmium. Cadmium, lead, zinc, mercury, and arsenic will be clustered in the same clustering as the first principal component. Copper will be clustered as second principal component. The environmental risk assessment level will be scaled to no risk in the studied area. The order of potential ecological risk is As > Cd > Hg > Cu > Pb > Zn.Keywords: ecological risk assessment, heavy metals, sediment, marsh, Shuangtai estuary
Procedia PDF Downloads 3476034 Risk Association of RANKL and OPG Gene Polymorphism with Breast to Bone Metastasis
Authors: Najeeb Ullah Khan
Abstract:
Background: The receptor activator NF-κβ ligand (RANKL) and Osteoprotegerin (OPG) polymorphisms have been associated with the progression of breast cancer to bone metastasis. Here, we aimed to investigate the association of RANKL and OPG gene polymorphism with breast to bone metastasis in the Pashtun population, Pakistan. Methods: Genomic DNA was obtained from all the study subjects (106 breast cancer, 58 breast to bone metastasis, and 51 healthy controls). RANKL (rs9533156) and OPG (rs2073618, rs3102735) polymorphisms were genotyped using Tetra-ARMS PCR. Results: Our results indicated that the frequencies of OPG (rs3102735) risk allele and genotypes carrying risk allele in breast cancer vs healthy control (C- p=0.005; CC- p=0.0208; TC- p=0.0181), bone metastasis vs healthy control (C- p=0.0211; CC- p=0.0153; TC- p=0.0775), and breast cancer vs breast to bone metastasis (C- p=0.0001; CC- p=0.0001; TC- p=0.001) were found significantly associated with disease risk. However, there was no significant association observed for OPG (rs2073618) risk allele and risk allele containing genotypes in all study groups. Similarly, RANKL (rs9533156) risk alleles and corresponding genotypes in breast cancer vs healthy control (C- p=0.0001; CC- p=0.0001; TC- p=0.0084), bone metastasis vs healthy control (C- p=0.0001; CC- p=0.0001; TC- p=0.5593), and breast cancer vs breast to bone metastasis (C- p=0.0185; CC- p=0.6077; TC- p=0.1436) showed significant association except for the risk allele carrying genotypes in breast cancer to bone metastasis (TC, p=0.1436; CC, p=0.6077). Conclusion: OPG (rs3102735) and RANKL (rs9533156) showed significant association with breast to bone metastasis, while OPG (rs2073618) didn’t show a significant association with breast to bone metastasis in Pashtun population of Pakistan. However, more investigation will be required to disseminate the results while gene sequencing or whole-exome sequencing.Keywords: breast cancer, bone metastasis, OPG, RANKL, polymorphism
Procedia PDF Downloads 1916033 Performativity and Valuation Techniques: Evidence from Investment Banks in the Wake of the Global Financial Crisis
Authors: Alicja Reuben, Amira Annabi
Abstract:
In this paper, we explore the relationship between the selection of valuation techniques by investment banks and the banks’ risk perceptions and performance in the context of the theory of performativity. We use inferential statistics to study these relationships by building a unique dataset based on the disclosure of 12 investment banks’ 2012-2015 annual financial statements. Moreover, we create two constructs, namely intensity of use and risk perception. We measure the intensity of use as a frequency metric of how often a particular bank adopts valuation techniques for a particular asset or liability. We measure risk perception based on disclosed ranges of values for unobservable inputs. Our results are twofold: we find a significant negative correlation between (1) intensity of use and investment bank performance and (2) intensity of use and risk perception. These results indicate that a performative process takes place, and the valuation techniques are enacting their environment.Keywords: language, linguistics, performativity, financial techniques
Procedia PDF Downloads 1606032 Maternal Smoking and Risk of Childhood Overweight and Obesity: A Meta-Analysis
Authors: Martina Kanciruk, Jac J. W. Andrews, Tyrone Donnon
Abstract:
The purpose of this study was to determine the significance of maternal smoking for the development of childhood overweight and/or obesity. Accordingly, a systematic literature review of English-language studies published from 1980 to 2012 using the following data bases: MEDLINE, PsychINFO, Cochrane Database of Systematic Reviews, and Dissertation Abstracts International was conducted. The following terms were used in the search: pregnancy, overweight, obesity, smoking, parents, childhood, risk factors. Eighteen studies of maternal smoking during pregnancy and obesity conducted in Europe, Asia, North America, and South America met the inclusion criteria. A meta-analysis of these studies indicated that maternal smoking during pregnancy is a significant risk factor for overweight and obesity; mothers who smoke during pregnancy are at a greater risk for developing obesity or overweight; the quantity of cigarettes consumed by the mother during pregnancy influenced the odds of offspring overweight and/or obesity. In addition, the results from moderator analyses suggest that part of the heterogeneity discovered between the studies can be explained by the region of world that the study occurred in and the age of the child at the time of weight assessment.Keywords: childhood obesity, overweight, smoking, parents, risk factors
Procedia PDF Downloads 5236031 Examining the Dynamics of FDI Inflows in Both BRICS and G7 Economies: Dissecting the Influence of Geopolitical Risk versus Economic Policy Uncertainty
Authors: Adelakun O. Johnson
Abstract:
The quest to mitigate the probable adverse effects of geopolitical risk on FDI inflows tends to result in more frequent changes in economic policies and, as a result, heightened policy uncertainty. In this regard, we extend the literature on the dynamics of FDI inflows to include the hypothesis of the possibility of geopolitical risk escalating the adverse effects of economic policy uncertainty on FDI inflows. To test the robustness of this hypothesis, we use the cases of different economic groups characterized by different levels of economic development and varying degrees of FDI confidence. Employing an ARDL-based dynamic panel data model that accounts for both non-stationarity and heterogeneity effects, we show result that suggests GPR and EPU retard the inflows of FDI in both economies but mainly in the short-run situation. In the long run, however, higher EPU not attributed to GPR is likely to boost the inflows of FDI rather than retarding, at least in the case of the G7 economy.Keywords: FDI inflows, geopolitical risk, economic policy uncertainty, panel ARDL model
Procedia PDF Downloads 246030 Dynamic Correlations and Portfolio Optimization between Islamic and Conventional Equity Indexes: A Vine Copula-Based Approach
Authors: Imen Dhaou
Abstract:
This study examines conditional Value at Risk by applying the GJR-EVT-Copula model, and finds the optimal portfolio for eight Dow Jones Islamic-conventional pairs. Our methodology consists of modeling the data by a bivariate GJR-GARCH model in which we extract the filtered residuals and then apply the Peak over threshold model (POT) to fit the residual tails in order to model marginal distributions. After that, we use pair-copula to find the optimal portfolio risk dependence structure. Finally, with Monte Carlo simulations, we estimate the Value at Risk (VaR) and the conditional Value at Risk (CVaR). The empirical results show the VaR and CVaR values for an equally weighted portfolio of Dow Jones Islamic-conventional pairs. In sum, we found that the optimal investment focuses on Islamic-conventional US Market index pairs because of high investment proportion; however, all other index pairs have low investment proportion. These results deliver some real repercussions for portfolio managers and policymakers concerning to optimal asset allocations, portfolio risk management and the diversification advantages of these markets.Keywords: CVaR, Dow Jones Islamic index, GJR-GARCH-EVT-pair copula, portfolio optimization
Procedia PDF Downloads 2566029 The Role of Social Media in the Rise of Islamic State in India: An Analytical Overview
Authors: Yasmeen Cheema, Parvinder Singh
Abstract:
The evolution of Islamic State (acronym IS) has an ultimate goal of restoring the caliphate. IS threat to the global security is main concern of international community but has also raised a factual concern for India about the regular radicalization of IS ideology among Indian youth. The incident of joining Arif Ejaz Majeed, an Indian as ‘jihadist’ in IS has set strident alarm in law & enforcement agencies. On 07.03.2017, many people were injured in an Improvised Explosive Device (IED) blast on-board of Bhopal Ujjain Express. One perpetrator of this incident was killed in encounter with police. But, the biggest shock is that the conspiracy was pre-planned and the assailants who carried out the blast were influenced by the ideology perpetrated by the Islamic State. This is the first time name of IS has cropped up in a terror attack in India. It is a red indicator of violent presence of IS in India, which is spreading through social media. The IS have the capacity to influence the younger Muslim generation in India through its brutal and aggressive propaganda videos, social media apps and hatred speeches. It is a well known fact that India is on the radar of IS, as well on its ‘Caliphate Map’. IS uses Twitter, Facebook and other social media platforms constantly. Islamic State has used enticing videos, graphics, and articles on social media and try to influence persons from India & globally that their jihad is worthy. According to arrested perpetrator of IS in different cases in India, the most of Indian youths are victims to the daydreams which are fondly shown by IS. The dreams that the Muslim empire as it was before 1920 can come back with all its power and also that the Caliph and its caliphate can be re-established are shown by the IS. Indian Muslim Youth gets attracted towards these euphemistic ideologies. Islamic State has used social media for disseminating its poisonous ideology, recruitment, operational activities and for future direction of attacks. IS through social media inspired its recruits & lone wolfs to continue to rely on local networks to identify targets and access weaponry and explosives. Recently, a pro-IS media group on its Telegram platform shows Taj Mahal as the target and suggested mode of attack as a Vehicle Born Improvised Explosive Attack (VBIED). Islamic State definitely has the potential to destroy the Indian national security & peace, if timely steps are not taken. No doubt, IS has used social media as a critical mechanism for recruitment, planning and executing of terror attacks. This paper will therefore examine the specific characteristics of social media that have made it such a successful weapon for Islamic State. The rise of IS in India should be viewed as a national crisis and handled at the central level with efficient use of modern technology.Keywords: ideology, India, Islamic State, national security, recruitment, social media, terror attack
Procedia PDF Downloads 2306028 Detecting Venomous Files in IDS Using an Approach Based on Data Mining Algorithm
Authors: Sukhleen Kaur
Abstract:
In security groundwork, Intrusion Detection System (IDS) has become an important component. The IDS has received increasing attention in recent years. IDS is one of the effective way to detect different kinds of attacks and malicious codes in a network and help us to secure the network. Data mining techniques can be implemented to IDS, which analyses the large amount of data and gives better results. Data mining can contribute to improving intrusion detection by adding a level of focus to anomaly detection. So far the study has been carried out on finding the attacks but this paper detects the malicious files. Some intruders do not attack directly, but they hide some harmful code inside the files or may corrupt those file and attack the system. These files are detected according to some defined parameters which will form two lists of files as normal files and harmful files. After that data mining will be performed. In this paper a hybrid classifier has been used via Naive Bayes and Ripper classification methods. The results show how the uploaded file in the database will be tested against the parameters and then it is characterised as either normal or harmful file and after that the mining is performed. Moreover, when a user tries to mine on harmful file it will generate an exception that mining cannot be made on corrupted or harmful files.Keywords: data mining, association, classification, clustering, decision tree, intrusion detection system, misuse detection, anomaly detection, naive Bayes, ripper
Procedia PDF Downloads 4146027 An Effective Decision-Making Strategy Based on Multi-Objective Optimization for Commercial Vehicles in Highway Scenarios
Authors: Weiming Hu, Xu Li, Xiaonan Li, Zhong Xu, Li Yuan, Xuan Dong
Abstract:
Maneuver decision-making plays a critical role in high-performance intelligent driving. This paper proposes a risk assessment-based decision-making network (RADMN) to address the problem of driving strategy for the commercial vehicle. RADMN integrates two networks, aiming at identifying the risk degree of collision and rollover and providing decisions to ensure the effectiveness and reliability of driving strategy. In the risk assessment module, risk degrees of the backward collision, forward collision and rollover are quantified for hazard recognition. In the decision module, a deep reinforcement learning based on multi-objective optimization (DRL-MOO) algorithm is designed, which comprehensively considers the risk degree and motion states of each traffic participant. To evaluate the performance of the proposed framework, Prescan/Simulink joint simulation was conducted in highway scenarios. Experimental results validate the effectiveness and reliability of the proposed RADMN. The output driving strategy can guarantee the safety and provide key technical support for the realization of autonomous driving of commercial vehicles.Keywords: decision-making strategy, risk assessment, multi-objective optimization, commercial vehicle
Procedia PDF Downloads 1346026 Examining Risk Based Approach to Financial Crime in the Charity Sector: The Challenges and Solutions, Evidence from the Regulation of Charities in England and Wales
Authors: Paschal Ohalehi
Abstract:
Purpose - The purpose of this paper, which is part of a PhD thesis is to examine the role of risk based approach in minimising financial crime in the charity sector as well as offer recommendations to improving the quality of charity regulation whilst still retaining risk based approach as a regulatory framework and also making a case for a new regulatory model. Increase in financial crimes in the charity sector has put the role of regulation in minimising financial crime up for debates amongst researchers and practitioners. Although previous research has addressed the regulation of charities, research on the role of risk based approach to minimising financial crime in the charity sector is limited. Financial crime is a concern for all organisation including charities. Design/methodology/approach - This research adopts a social constructionist’s epistemological position. This research is carried out using semi structured in-depth interviews amongst randomly selected 24 charity trustees divided into three classes: 10 small charities, 10 medium charities and 4 large charities. The researcher also interviewed 4 stakeholders (NFA, Charity Commission and two different police forces in terms of size and area of coverage) in the charity sector. Findings - The results of this research show that reliance on risk based approach to financial crime in the sector is weak and fragmented with the research pointing to a clear evidence of disconnect between the regulator and the regulated leading to little or lack of regulation of trustees’ activities, limited monitoring of charities and lack of training and awareness on financial crime in the sector. Originality – This paper shows how regulation of charities in general and risk based approach in particular can be improved in order to meet the expectations of the stakeholders, the public, the regulator and the regulated.Keywords: risk, risk based approach, financial crime, fraud, self-regulation
Procedia PDF Downloads 3756025 Supply Chain Risk Management (SCRM): A Simplified Alternative for Implementing SCRM for Small and Medium Enterprises
Authors: Paul W. Murray, Marco Barajas
Abstract:
Recent changes in supply chains, especially globalization and collaboration, have created new risks for enterprises of all sizes. A variety of complex frameworks, often based on enterprise risk management strategies have been presented under the heading of Supply Chain Risk Management (SCRM). The literature on promotes the benefits of a robust SCRM strategy; however, implementing SCRM is difficult and resource demanding for Large Enterprises (LEs), and essentially out of reach for Small and Medium Enterprises (SMEs). This research debunks the idea that SCRM is necessary for all enterprises and instead proposes a simple and effective Vendor Selection Template (VST). Empirical testing and a survey of supply chain practitioners provide a measure of validation to the VST. The resulting VSTis a valuable contribution because is easy to use, provides practical results, and is sufficiently flexible to be universally applied to SMEs.Keywords: multiple regression analysis, supply chain management, risk assessment, vendor selection
Procedia PDF Downloads 4656024 Parental Perceptions and Practices toward Childhood Asthma
Authors: Amani K. Abu-Shaheen, Abdullah Nofal, Humariya Heena
Abstract:
Introduction: Parental perceptions and practices are important for improving the asthma outcomes in children; indeed, evidence shows that parents of asthmatic children harbor considerable misperceptions of the disease. Objective: To identify the prevalence of asthma and to investigate the perceptions and practices of parents toward asthma and its management in Saudi children. Methods: A two-stage cross-sectional survey of 2000 parents of children aged 3–15 years from schools located in all five districts of Riyadh province located in central Saudi Arabia, was conducted. Data collection was accomplished using a self-administered questionnaire based on information obtained from the literature. Results: Of 1450 children whose parents participated in the study, 600 had asthma, dyspnea, or chest allergy. The overall number of children with parental reports of ever having been diagnosed with asthma was 478 (32.9%). The majority of parents (321, 53.5%) believed that asthma was a hereditary disease. Of these parents, 361 (60.3%) were concerned about side effects of inhaled steroids, and 192 (32%) about development of dependency on asthma medications. Three hundred sixty seven (61.2%) parents reported that they could treat the asthma attack at home and almost 76% of parents went to pediatric emergency department during asthma attack. Conclusions: In this study, the overall prevalence of children whose parents reported that they were diagnosed with asthma was high (32.9%). Furthermore, parents of children with asthma had misperceptions regarding asthma and exhibited ineffective practices in its management. To improve asthma care and compliance, adequate education should be provided to parents.Keywords: asthma, management, parents, quality of life
Procedia PDF Downloads 2746023 Risk of Fractures at Different Anatomic Sites in Patients with Irritable Bowel Syndrome: A Nationwide Population-Based Cohort Study
Authors: Herng-Sheng Lee, Chi-Yi Chen, Wan-Ting Huang, Li-Jen Chang, Solomon Chih-Cheng Chen, Hsin-Yi Yang
Abstract:
A variety of gastrointestinal disorders, such as Crohn’s disease, ulcerative colitis, and coeliac disease, are recognized as risk factors for osteoporosis and osteoporotic fractures. One recent study suggests that individuals with irritable bowel syndrome (IBS) might also be at increased risk of osteoporosis and osteoporotic fractures. Up to now, the association between IBS and the risk of fractures at different anatomic sites occurrences is not completely clear. We conducted a population-based cohort analysis to investigate the fracture risk of IBS in comparison with non-IBS group. We identified 29,505 adults aged ≥ 20 years with newly diagnosed IBS using the Taiwan National Health Insurance Research Database in 2000-2012. A comparison group was constructed of patients without IBS who were matched according to gender and age. The occurrence of fracture was monitored until the end of 2013. We analyzed the risk of fracture events to occur in IBS by using Cox proportional hazards regression models. Patients with IBS had a higher incidence of osteoporotic fractures compared with non-IBS group (12.34 versus 9.45 per 1,000 person-years) and an increased risk of osteoporotic fractures (adjusted hazard ratio [aHR] = 1.27, 95 % confidence interval [CI] = 1.20 – 1.35). Site specific analysis showed that the IBS group had a higher risk of fractures for spine, forearm, hip and hand than did the non-IBS group. With further stratification for gender and age, a higher aHR value for osteoporotic fractures in IBS group was seen across all age groups in males, but seen in elderly females. In addition, female, elderly, low income, hypertension, coronary artery disease, cerebrovascular disease, and depressive disorders as independent osteoporotic fracture risk factors in IBS patients. The IBS is considered as a risk factor for osteoporotic fractures, particularly in female individuals and fracture sites located at the spine, forearm, hip and hand.Keywords: irritable bowel syndrome, fracture, gender difference, longitudinal health insurance database, public health
Procedia PDF Downloads 2296022 Comparison of Risk Analysis Methodologies Through the Consequences Identification in Chemical Accidents Associated with Dangerous Flammable Goods Storage
Authors: Daniel Alfonso Reséndiz-García, Luis Antonio García-Villanueva
Abstract:
As a result of the high industrial activity, which arises from the search to satisfy the needs of products and services for society, several chemical accidents have occurred, causing serious damage to different sectors: human, economic, infrastructure and environmental losses. Historically, with the study of this chemical accidents, it has been determined that the causes are mainly due to human errors (inexperienced personnel, negligence, lack of maintenance and deficient risk analysis). The industries have the aim to increase production and reduce costs. However, it should be kept in mind that the costs involved in risk studies, implementation of barriers and safety systems is much cheaper than paying for the possible damages that could occur in the event of an accident, without forgetting that there are things that cannot be replaced, such as human lives.Therefore, it is of utmost importance to implement risk studies in all industries, which provide information for prevention and planning. The aim of this study is to compare risk methodologies by identifying the consequences of accidents related to the storage of flammable, dangerous goods for decision making and emergency response.The methodologies considered in this study are qualitative and quantitative risk analysis and consequence analysis. The latter, by means of modeling software, which provides radius of affectation and the possible scope and magnitude of damages.By using risk analysis, possible scenarios of occurrence of chemical accidents in the storage of flammable substances are identified. Once the possible risk scenarios have been identified, the characteristics of the substances, their storage and atmospheric conditions are entered into the software.The results provide information that allows the implementation of prevention, detection, control, and combat elements for emergency response, thus having the necessary tools to avoid the occurrence of accidents and, if they do occur, to significantly reduce the magnitude of the damage.This study highlights the importance of risk studies applying tools that best suited to each case study. It also proves the importance of knowing the risk exposure of industrial activities for a better prevention, planning and emergency response.Keywords: chemical accidents, emergency response, flammable substances, risk analysis, modeling
Procedia PDF Downloads 916021 Risk Assessment of Heavy Metals in Soils at Electronic Waste Activity Sites within the Vicinity of Alaba International Market, Nigeria
Authors: A. A. Adebayo, A. O. Ogunkeyede, A. O. Adeigbe
Abstract:
Digital globalisation and yarn of Nigeria society to overcome the digital divide have resulted in contamination of soil by heavy metals (HMs) from e-waste activities at Alaba international market, Lagos, Nigeria. The aim of this research was to determine the concentration of various metals {Cadmium (Cd), Chromium (Cr), Copper (Cu), and Lead (Pb)} and identify their ecological and health risks for the people within the study area. A total of 60 soil samples were collected at Alaba market study area. Two types of samples were collected from each sampling points: topsoil (0-15 cm), subsoil (15 -30 cm). The metal concentration results showed that the soils were heavily contaminated by HMs at topsoil and subsoil. The geoaccummulation and ecological risk indices revealed high pollution level from all studied site. The health risk assessment results suggested that there is high possibility of carcinogenic risk to humans because the carcinogenic risk via corresponding exposure pathways exceeded the safety limit of 10-6 (the acceptable level of carcinogenic risk for human). Furthermore, inhalation of soil particles is the main exposure pathway for Cr to enter the human body for all ages. Children in the vicinity are exposed more to ingestion of Pb since they tend to eat earth (pica) and repeatedly suck their fingers. This study provides basic information to create awareness for a need to introduce pollution control measures and the need to protect the ecosystem and human health within the study area at Alaba international market.Keywords: contaminated soil, ecological risk, hazard index, risk factor, exposure pathways, heavy metals
Procedia PDF Downloads 2526020 Role of Cryptocurrency in Portfolio Diversification
Authors: Onur Arugaslan, Ajay Samant, Devrim Yaman
Abstract:
Financial advisors and investors seek new assets which could potentially increase portfolio returns and decrease portfolio risk. Cryptocurrencies represent a relatively new asset class which could serve in both these roles. There has been very little research done in the area of the risk/return tradeoff in a portfolio consisting of fixed income assets, stocks, and cryptocurrency. The objective of this study is a rigorous examination of this issue. The data used in the study are the monthly returns on 4-week US Treasury Bills, S&P Investment Grade Corporate Bond Index, Bitcoin and the S&P 500 Stock Index. The methodology used in the study is the application Modern Portfolio Theory to evaluate the risk-adjusted returns of portfolios with varying combinations of these assets, using Sharpe, Treynor and Jensen Indexes, as well as the Sortino and Modigliani measures. The results of the study would include the ranking of various investment portfolios based on their risk/return characteristics. The conclusions of the study would include objective empirical inference for investors who are interested in including cryptocurrency in their asset portfolios but are unsure of the risk/return implications.Keywords: financial economics, portfolio diversification, fixed income securities, cryptocurrency, stock indexes
Procedia PDF Downloads 736019 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks
Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner
Abstract:
Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.Keywords: USB, device, cyber security, attack, detection
Procedia PDF Downloads 397