Search results for: security program
6001 VCloud: A Security Framework for VANET
Authors: Wiseborn Manfe Danquah, D. Turgay Altilar
Abstract:
Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)
Procedia PDF Downloads 3576000 A Folk’s Theory of the MomConnect (mHealth) Initiative in South Africa
Authors: Eveline Muika Kabongo, Peter Delobelle, Ferdinand Mukumbang, Edward Nicol
Abstract:
Introduction: Studies have been conducted to establish the effect of the MomConnect program in South Africa, but these studies did not focus on the stakeholders' and implementers' perspectives and the underlying program theory of the MomConnect initiative program. We strived to obtain stakeholders’ perspectives and assumptions on the MomConnect program and develop an initial program theory (IPT) of how the MomConnect initiative was expected to work. Methods: A realist-informed explanatory design used. The interviewer was performed with 10 key informants selected purposively among MomConnect key informants at the a national level of NDoH South Africa. The interview was done via zoom and lasted for 30 to 60 minutes. Introduction and abduction inferencing approaches were applied. The deductive and inductive approaches were performed during the analysis. ICAMO hereustic framework was used to analysed the data in order to get key informants expectations on how the MomConnect will work or not. Results: We developed three folk’s theories illustrating how the key informants’ expected the MomConnect to work. These theories showed that the MomConnect intended to provide users with health information and education that will empower and motivate them with knowledge which will allow the improvement of health services delivery among HCPs and improvement of the uptake of MCH services among pregnant women and mothers and decrease the rate of maternal and child mortality in the country. The lack of an updated mechanism to link women to the outcome was an issue. Another problem enlightened was the introduction of the WhatsApp program instead of SMS messaging, which was free of charge to women. Conclusion: The Folk’s theory developed from this study provided an insight into how the MomConnect was expected to work and what did not work. The folk’s theory will be merged with information from candidate theories on synthesis review and document review to develop our initial program theory of the MomConnect initiative.Keywords: mHealth, MomConnect program, realist evaluation, maternal and child health, maternal and child health services, introduction, theory-driven
Procedia PDF Downloads 2055999 Rehabilitation Approach for Cancer Patients: Indication, Management and Outcome
Authors: Juliani Rianto, Emma Lumby, Tracey Smith
Abstract:
Cancer patients’ survival are growing with the new approach and therapy in oncology medicine. Cancer is now a new chronic disease, and rehabilitation program has become an ongoing program as part of cancer care. The focus of Cancer rehabilitation is maximising person’s physical and emotional function, stabilising general health and reducing unnecessary hospital admission. In Australia there are 150000 newly diagnosed cancer every year, and the most common Cancer are prostate, Breast, Colorectal, Melanoma and Lung Cancer. Through referral from the oncology team, we recruited cancer patient into our cancer rehabilitation program. Patients are assessed by our multi-disciplinary team including rehabilitation specialist, physiotherapist, occupational therapist, dietician, exercise physiologist, and psychologist. Specific issues are identified, including pain, side effect of chemo and radiation therapy and mental well-being. The goals were identified and reassessed every fortnight. Common goals including nutritional status, improve endurance and exercise performance, working on balance and mobility, improving emotional and vocational state, educational program for insomnia and tiredness, and reducing hospitalisation are identified and assessed. Patients are given 2 hours exercise program twice a week for 6 weeks with focus on aerobic and weight exercises and education sessions. Patients are generally benefited from the program. The quality of life is improved, support and interaction from the therapist has played an important factor in directing patient for their goals.Keywords: cancer, exercises, benefit, mental health
Procedia PDF Downloads 625998 The Effects of a Circuit Training Program on Muscle Strength, Agility, Anaerobic Performance and Cardiovascular Endurance
Authors: Wirat Sonchan, Pratoom Moungmee, Anek Sootmongkol
Abstract:
This study aimed to examine the effects of a circuit training program on muscle strength, agility, anaerobic performance and cardiovascular endurance. The study involved 24 freshmen (age 18.87+0.68 yr.) male students of the Faculty of Sport Science, Burapha University. They sample study were randomly divided into two groups: Circuit Training group (CT; n=12) and a Control group (C; n=12). Baseline data on height, weight, muscle strength (hand grip dynamometer and leg strength dynamometer), agility (agility T-Test), and anaerobic performance (Running-based Anaerobic Sprint Test) and cardiovascular endurance (20 m Endurance Shuttle Run Test) were collected. The circuit training program included one circuit of eight stations of 30/60 seconds of work/rest interval with two cycles in Week 1-4, and 60/90 seconds of work/rest interval with three cycles in Week 5-8, performed three times per week. Data were analyzed using paired t-tests and independent sample t-test. Statistically significance level was set at 0.05. The results show that after 8 weeks of a training program, muscle strength, agility, anaerobic capacity and cardiovascular endurance increased significantly in the CT Group (p < 0.05), while significant increase was not observed in the C Group (p < 0.05). The results of this study suggest that the circuit training program improved muscle strength, agility, anaerobic capacity and cardiovascular endurance of the study subjects. This program may be used as a guideline for selecting a set of exercise to improve physical fitness.Keywords: circuit training, physical fitness, cardiovascular endurance, anaerobic performance
Procedia PDF Downloads 4955997 Developing Artistic Concepts for Kindergarten Children in Egypt Using Graphic Activities
Authors: Mona Yacoub, Ahmed Amin Mousa
Abstract:
The current work presents a program for children in Egypt. This program involved a collection of artistic activities that purposes to improve some language, artistic skills of kindergarten children. The researchers have prepared a questionnaire for the link between the target group and the content. The questionnaire has been presented to experts for adjudicating. The program was applied to a group of 30 children. Another questionnaire has been prepared by the researchers for measuring the activities’ effect on the children. The second questionnaire was considered as the pre-test and post-test. Finally, after applying the activities and the questionnaire, the researchers detected a significant difference in favor of the post-test results.Keywords: Developing, concepts, kindergarten, children, graphic activities
Procedia PDF Downloads 1655996 Status of Hospitality and Tourism Management Progam of Selected Private Higher Education Institutions: Basis for Internationalization
Authors: Ruth Estrada Javier - Reyes
Abstract:
The study assessed the status of HTM program of selected private higher education institutions for internationalization across the eleven regions of the country. The descriptive survey method of research was used in this study. A devised survey questionnaire was utilized to gather information about the status of Philippine Higher Education Institutions’ internationalization of hospitality and tourism management education programs. The respondents were 12 administrators, 17 deans and program heads, 104 faculty members and 860 HTM students. Frequency, percentage, mean, standard deviation, t-test and F-test were used to treat the data. The results of the study are as follows: HEIs’ HTM education had complied with the policies/standards of CHED as per CMO No. 30 S. 2006. The respondents of the HTM education program were qualified for internationalization as assessed both by administrators and faculty. The private HEIs are ready to apply for international certification of their HTM education programs. The curriculum of HTM education programs in private HEIs are enriched by internationalization requirements. The administrators and faculty of HTM education programs are qualified educators but have limited participation in collaborative international research and linkages. The HEIs are qualified to apply for the internationalization of the Hospitality and Tourism Management education program in preparation to the ASEAN 2015.Keywords: status, Hospitality and Tourism Management Program, internationalization, Private Higher Education Institutions
Procedia PDF Downloads 4215995 Influence of Javascript Programming on the Developement of Web and Mobile Application
Authors: Abdul Basit Kiani
Abstract:
Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.Keywords: java script, react, nodejs, htmlcsss
Procedia PDF Downloads 1305994 Enhancing Healthcare Data Protection and Security
Authors: Joseph Udofia, Isaac Olufadewa
Abstract:
Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.Keywords: cloud security, healthcare, cybersecurity, policy and standard
Procedia PDF Downloads 955993 The Effects of an Intervention Program on Psychosocial Factors and Consequences during the COVID-19 Pandemic in a Chilean Technology Services Company: A Quasi-Experimental Study
Authors: Julio Lavarello-Salinas, Verónica Kramm-Vergara, Pedro Gil-La Orden
Abstract:
During the COVID-19 pandemic, mental health became a relevant factor in people’s performance within organizations. The aim of this study was to analyze the effects of an organizational intervention program on the psychosocial factors of demands, resources, and the consequences of psychosocial risks in a technology services company during the COVID-19 pandemic. A quasi-experimental study was carried out with 105 employees who took part in an eight-week intervention program divided into two large stages. Pre- and post- measurements were collected using the UNIPSICO Questionnaire, considering its factors of demands, resources, and consequences of psychosocial risks. The Spanish Burnout Inventory (SBI) was also included. The results showed significant improvements in the perception of some psychosocial demand factors, all the resource factors, and all the consequences of psychosocial risks, except the guilt dimension of the SBI. Thus, we can conclude that the program was effective and that the study limitations should be improved in future studies.Keywords: UNIPSICO questionnaire, occupational health, work stress, work psychosocial risk
Procedia PDF Downloads 1105992 Exercise program’s Effectiveness on Hepatic Fat Mobilization among Nonalcoholic Fatty Liver Patients
Authors: Taher Eid Shaaban Ahmed Mousa
Abstract:
Non-Alcoholic fatty liver disease (NAFLD) is a major cause of multiple liver disorders, which strongly linked to a poor lifestyle. This study aiming to elucidate the exercise program’s effectiveness on hepatic fat mobilization among nonalcoholic fatty liver patients. Subjects: A purposive sample of 150 adult male & female patients. Setting: National institute of liver out patient's clinics of Menoufia University. Tools: three tools I: An interviewing structured questionnaire, II: International Physical Activity Questionnaire, III: compliance assessment sheet. Results: There was statistically significant difference pre and post exercise program regarding total body weight, physical activity level and compliance that prevent new fat development with resolution of existing one. Conclusion: regular exercise is the best implemented approach as an initial step for the prevention, treatment and management of NAFLD. Recommendation: It is highly important to unravel the mechanism and dose by which each exercise specifically resolve various stages of liver diseases.Keywords: exercise program, hebatic fat mobilization, nonalcoholic fatty liver patients, sport science
Procedia PDF Downloads 895991 The Role of Community Gardens in Urban Food Security: A Case Study of the Thulubukele Community Farm in Newlands West
Authors: Nadine Ponnusamy
Abstract:
Reducing risks to food security resulting from climate change is recognized as one of the major challenges of the 21st century. The risks to food security have intensified, primarily due to globalization, a growing population, rapid urbanization, and the constantly evolving urban environment. One of the key challenges facing cities is the need to supply sufficient food to households amid increasing demand, which necessitates a continuous effort to enhance food production. Given the severity of climate change, it is imperative to adopt solutions to address food insecurity. Communities and individuals must explore sustainable livelihood options that do not harm the environment. Urban agriculture represents one of the many strategies that can be employed to improve household food security. The objective of this research is to establish the extent to which community gardens can enhance urban food security, focusing on the Thulubukele Community Farm in Newlands West, Durban. The researcher utilized a qualitative case study approach to gain insight into urban agriculture and food security within this context, while also examining the long-term impacts on food security and community development. The sampling method utilized for selecting participants and gathering information included purposive sampling. Since the study centers on urban agriculture, key stakeholders were specifically targeted. Participants were selected for interviews based on their involvement in the food garden. In-depth interviews were conducted to collect and analyze data. Secondary data from the literature facilitated a comparative analysis of similar case studies through precedent studies. This study demonstrates that growing food not only improves the nutritional value of the produce but also enhances household food security, enables individuals to generate disposable income, and facilitates significant contributions to the local community and other organizations in need.Keywords: community gardens, food security, South Africa, urban agriculture
Procedia PDF Downloads 205990 Implications on the Training Program for Clinical Psychologists in South Korea
Authors: Chorom Baek, Sungwon Choi
Abstract:
The purpose of this study is to analyze the supervision system, and the training and continuing education of mental health professionals in USA, UK, Australia (New Zealand), Japan, and so on, and to deduce the implications of Korean mental health service system. In order to accomplish the purpose of this study, following methodologies were adopted: review on the related literatures, statistical data, the related manuals, online materials, and previous studies concerning issues in those countries for the past five years. The training program in Korea was compared with the others’ through this literature analysis. The induced matters were divided with some parts such as training program, continuing education, educational procedure, and curriculum. Based on the analysis, discussion and implications, the conclusion and further suggestion of this study are as follows: First, Korean Clinical Psychology of Association (KCPA) should become more powerful health main training agency for quality control. Second, actual authority of health main training agency should be a grant to training centers. Third, quality control of mental health professionals should be through standardization and systemization of promotion and qualification management. Fourth, education and training about work of supervisors and unification of criteria for supervision should be held. Fifth, the training program for mental health license should be offered by graduate schools. Sixth, legitimated system to protect the right of mental health trainees is needed. Seventh, regularly continuing education after licensed should be compulsory to keep the certification. Eighth, the training program in training centers should meet KCPA requirement. If not, KCPA can cancel the certification of the centers.Keywords: clinical psychology, Korea, mental health system, training program
Procedia PDF Downloads 2305989 Developing a Health Promotion Program to Prevent and Solve Problem of the Frailty Elderly in the Community
Authors: Kunthida Kulprateepunya, Napat Boontiam, Bunthita Phuasa, Chatsuda Kankayant, Bantoeng Polsawat, Sumran Poontong
Abstract:
Frailty is the thin line between good health and illness. The syndrome is more common in the elderly who transition from strong to weak. (Vulnerability). Fragility can prevent and promote healthy recovery before it goes into disability. This research and development aim to analyze the situation analysis of frailty of the elderly, develop a program, and evaluate the effect of a health promotion program to prevent and solve the problem of frailty among the elderly. The research consisted of 3 phases: 1) analysis of the frailty situation, 2) development of a model, 3) evaluation of the effectiveness of the model. Samples were 328, 122 elderlies using the multi-stage random sampling method. The research instrument was a frailty questionnaire use of the five symptoms, the main characteristics were muscle weakness, slow walking, low physical activity. Fatigue and unintentional weight loss, criteria frailty use more than or equal to three or more symptoms are frailty. Data were analyzed by descriptive and t-test dependent test statistics. The findings showed three parts. First, frailty in the elderly was 23.05 percentage and 56.70% pre-frailty. Second, it was development of a health promotion program to prevent and solve the problem of frailty the elderly with a combination of Nine-Square Exercise, Elastic Band Exercise, Elastic Coconut Shell. Third, evaluation of the effectiveness of the model by comparison of the elderly's get up and go test, the average time before using the program was 14.42 and after using the program was 8.57. It was statistically significant at the .05 level. In conclusion, the findings can used to develop guidelines to promote the health of the frailty elderly.Keywords: elderly, fragile, nine-square exercise, elastic coconut shell
Procedia PDF Downloads 1085988 An Extended Model for Sustainable Food and Nutrition Security in the Agrifood Sector
Authors: Ioannis Manikas
Abstract:
The increased consumer demand for environmentally friendly production and distribution practices and the stricter environmental regulations turned environmental aspects into important criteria in business decision-making. On the other hand, Food and Nutrition Security (FNS) has evolved dramatically during the last decades in theory and practice serving as a reference point for exchanging experiences among all agents involved in programs and projects to fostering policy and strategy development. Global pressures make it more important than ever to gain a better understanding of the contribution that agrifood businesses make to FNS and to examine ways to make them more resilient in an increasingly globalized and uncertain world. This study extends the standard three-dimensional model of sustainability to include two more dimensions: A technological dimension and a policy/political dimension. Apart from the economic, environmental and social dimensions regularly used in sustainability literature, the extended model will accurately represent the measures and policies addressing food and nutrition security.Keywords: food and nutrition security, sustainability, food safety, resilience
Procedia PDF Downloads 3425987 Learning Academic Skills through Movement: A Case Study in Evaluation
Authors: Y. Salfati, D. Sharef Bussel, J. Zamir
Abstract:
In this paper, we present an Evaluation Case Study implementing the eight principles of Collaborative Approaches to Evaluation (CAE) as designed by Brad Cousins in the past decade. The focus of this paper is sharing a rich experience in which we achieved two main goals. The first was the development of a valuable and meaningful new teacher training program, and the second was a successful implementation of the CAE principles. The innovative teacher training program is based on the idea of including physical movement during the process of teaching and learning academic themes. The program is called Learning through Movement. This program is a response to a call from the Ministry of Education, claiming that today children sit in front of screens and do not exercise any physical activity. In order to contribute to children’s health, physical, and cognitive development, the Ministry of Education promotes learning through physical activities. Research supports the idea that sports and physical exercise improve academic achievements. The Learning through Movement program is operated by Kaye Academic College. Students in the Elementary School Training Program, together with students in the Physical Education Training Program, implement the program in collaboration with two mentors from the College. The program combines academic learning with physical activity. The evaluation began at the beginning of the program. During the evaluation process, data was collected by means of qualitative tools, including interviews with mentors, observations during the students’ collaborative planning, class observations at school and focus groups with students, as well as the collection of documentation related to the teamwork and to the program itself. The data was analyzed using content analysis and triangulation. The preliminary results show outcomes relating to the Teacher Training Programs, the student teachers, the pupils in class, the role of Physical Education teachers, and the evaluation. The Teacher Training Programs developed a collaborative approach to lesson planning. The students' teachers demonstrated a change in their basic attitudes towards the idea of integrating physical activities during the lessons. The pupils indicated higher motivation through full participation in classes. These three outcomes are indicators of the success of the program. An additional significant outcome of the program relates to the status and role of the physical education teachers, changing their role from marginal to central in the school. Concerning evaluation, a deep sense of trust and confidence was achieved, between the evaluator and the whole team. The paper includes the perspectives and challenges of the heads and mentors of the two programs as well as the evaluator’s conclusions. The evaluation unveils challenges in conducting a CAE evaluation in such a complex setting.Keywords: collaborative evaluation, training teachers, learning through movement
Procedia PDF Downloads 1495986 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications
Authors: Chieh-Fu Chang, Wan-Hsin Hsieh
Abstract:
We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.Keywords: security, IWE, cliff effect, space communications
Procedia PDF Downloads 4305985 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income
Authors: M. Koray Cetin, Mehmet Mert
Abstract:
The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.Keywords: exchange rate, panel data analysis, security, tourism revenues
Procedia PDF Downloads 3555984 Ensuring Cyber Security Using Kippo Honeypots
Authors: S. Vivekananda Pandian
Abstract:
A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.Keywords: attackers, security, Kippo Honeypots, virtual machine
Procedia PDF Downloads 4285983 Power System Cyber Security Risk in the Era of Digital Transformation
Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim
Abstract:
Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.Keywords: supply chain, cybersecurity, maturity model, risk, smart grid
Procedia PDF Downloads 1205982 Countering Terrorism and Defending Human Right after 9/11: The European Perspective
Authors: Anita Blagojević
Abstract:
It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights
Procedia PDF Downloads 3825981 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks
Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar
Abstract:
Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.Keywords: mobile operating system, security, privacy, Malware
Procedia PDF Downloads 925980 Outcome of Bowel Management Program in Patient with Spinal Cord Injury
Authors: Roongtiwa Chobchuen, Angkana Srikhan, Pattra Wattanapan
Abstract:
Background: Neurogenic bowel is common condition after spinal cord injury. Most of spinal cord injured patients have motor weakness, mobility impairment which leads to constipation. Moreover, the neural pathway involving bowel function is interrupted. Therefore, the bowel management program should be implemented in nursing care in the earliest time after the onset of the disease to prevent the morbidity and mortality. Objective: To study the outcome of bowel management program of the patients with spinal cord injury who admitted for rehabilitation program. Study design: Descriptive study. Setting: Rehabilitation ward in Srinagarind Hospital. Populations: patients with subacute to chronic spinal cord injury who admitted at rehabilitation ward, Srinagarind hospital, aged over 18 years old. Instrument: The neurogenic bowel dysfunction score (NBDS) was used to determine the severity of neurogenic bowel. Procedure and statistical analysis: All participants were asked to complete the demographic data; age gender, duration of disease, diagnosis. The individual bowel function was assessed using NBDS at admission. The patients and caregivers were trained by nurses about the bowel management program which consisted of diet modification, abdominal massage, digital stimulation, stool evacuation including medication and physical activity. The outcome of the bowel management program was assessed by NBDS at discharge. The chi-square test was used to detect the difference in severity of neurogenic bowel at admission and discharge. Results: Sixteen spinal cord injured patients were enrolled in the study (age 45 ± 17 years old, 69% were male). Most of them (50%) were tetraplegia. On the admission, 12.5%, 12.5%, 43.75% and 31.25% were categorized as very minor (NBDS 0-6), minor (NBDS 7-9), moderate (NBDS 10-13) and severe (NBDS 14+) respectively. The severity of neurogenic bowel was decreased significantly at discharge (56.25%, 18.755%, 18.75% and 6.25% for very minor, minor, moderate and severe group respectively; p < 0.001) compared with NBDS at admission. Conclusions: Implementation of the effective bowel program decrease the severity of the neurogenic bowel in patient with spinal cord injury.Keywords: neurogenic bowel, NBDS, spinal cord injury, bowel program
Procedia PDF Downloads 2475979 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment
Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu
Abstract:
Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization
Procedia PDF Downloads 4655978 Labor Welfare and Social Security
Authors: Shoaib Alvi
Abstract:
Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.Keywords: labor welfare, internal social responsibility, social security, international conventions
Procedia PDF Downloads 5785977 Effectiveness of Enhancing Positive Emotion Program of Patients with Lung Cancer
Authors: Pei-Fan Mu
Abstract:
Background: Lung cancer is the most common cancer with the highest mortality rate. Patients with lung cancer under chemotherapy treatment experience life-threatening uncertainty. This study was based on the broaden-and-build theory using intentionality reflection of the body and internalization of positive prioritization strategies to enhance positive emotions of patients with lung cancer. Purpose: The purpose of this study was to use a quasi-experimental research design to examine the effectiveness of the enhancing positive emotion program. Method: Data were collected from a medical center in Taiwan. Fifty-four participants with lung cancer were recruited. Thirty participants were in the experiential group receiving the two weeks program. The content of the program includes awareness and understanding of the symptom experience, co-existing with illness and establishing self-identity, cognitive-emotion adjustment and establishing a new body schema, and symptom management to reach spiritual well-being. Twenty-four participants were in the control group receiving regular nursing care. Baseline, one month later and two months later, programmed measurements of symptoms of distress, positive emotion, and psychological well-being. Results: These two weeks of enhancing the positive emotion program resulted in a significantly improved positive emotion score for the experimental group compared to the control group. The findings of this study indicated that the positive emotion had significant differences between the two groups. There were no differences in symptom distress between the two groups. Discussion: The findings indicated that the enhancing positive emotion program could help patients enhance their life-threatening facing conditions.Keywords: positive emotion, lung cancer, experimental design, symptom distress
Procedia PDF Downloads 1025976 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application
Authors: Senthuran Manoharan, Rathesan Sivagananalingam
Abstract:
One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.Keywords: authentication, adaptive authentication, machine learning, security
Procedia PDF Downloads 2595975 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures
Authors: Zeinab Ranjbar
Abstract:
Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security
Procedia PDF Downloads 3885974 The Effect of Spark Physical Program (Sports, Play and Active Recreation for Kids) on Quality of Life and Spirometry in 6-18-Year-Old Children with Cystic Fibrosis
Authors: Saeedeh Eshkil, Seyedeh Farnaz Mousavi, Hamid Reza Kianifar, Seyed Java Sayyedi, Mehdi Sohrabi, Elham Bakhtiari, Morteza Mashoughi, Ezzat Khodashenas
Abstract:
Background: The effect of the SPARK physical education program on lung function in cystic fibrosis patients is not yet determined.).SPARK is Sports, play and active recreation for kids, including moving skills, aerobic games, jogging or walking, aerobic dance and jump rope. Regarding the high prevalence of cystic fibrosis and its destructive effects on the lungs, the aim of this study is to evaluate lung function and quality of life before and after undergoing the SPARK physical education program in children with cystic fibrosis. Method: In this quasi-experimental study, all patients with cystic fibrosis aged 6-18 years referred to the cystic fibrosis clinic of Dr. Sheikh Hospital were enrolled. The patients went under 12 weeks of SPARK training program (3 sessions per week, each session 45 minutes). The quality of life questionnaire ( Cystic Fibrosis Questionnaire includes self-examination, parental ) for patients with cystic fibrosis and spirometry indices (FEV1, FVC, FEV1/FVC, FEF25-75) was filled out before and after intervention for all patients. Results The mean and standard deviation of patients' age were 9.85±2.67 years, and 65% of patients were female. The FEV1 was significantly different before and after the SPARK physical education program (P=0.03), and the respiratory component of quality of life significantly increased after intervention (P=0.002). The overall score of quality of life from parents’ point of view was 2.87 ± 0.38, which increased to 2.99 ± 0.38 after the intervention. Conclusion: The SPARK training program may improve the spirometric parameters in children with cystic fibrosis. It also had a significant effect on improving the quality of life of patients, especially in the respiratory component.Keywords: cystic fibrosis, pediatrics, SPARK motor program, spirometry
Procedia PDF Downloads 265973 Cooperative Jamming for Implantable Medical Device Security
Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed
Abstract:
Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing
Procedia PDF Downloads 1265972 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes
Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana
Abstract:
The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes
Procedia PDF Downloads 251