Search results for: cyber victims
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 704

Search results for: cyber victims

164 Multi-Objective Multi-Period Allocation of Temporary Earthquake Disaster Response Facilities with Multi-Commodities

Authors: Abolghasem Yousefi-Babadi, Ali Bozorgi-Amiri, Aida Kazempour, Reza Tavakkoli-Moghaddam, Maryam Irani

Abstract:

All over the world, natural disasters (e.g., earthquakes, floods, volcanoes and hurricanes) causes a lot of deaths. Earthquakes are introduced as catastrophic events, which is accident by unusual phenomena leading to much loss around the world. Such could be replaced by disasters or any other synonyms strongly demand great long-term help and relief, which can be hard to be managed. Supplies and facilities are very important challenges after any earthquake which should be prepared for the disaster regions to satisfy the people's demands who are suffering from earthquake. This paper proposed disaster response facility allocation problem for disaster relief operations as a mathematical programming model. Not only damaged people in the earthquake victims, need the consumable commodities (e.g., food and water), but also they need non-consumable commodities (e.g., clothes) to protect themselves. Therefore, it is concluded that paying attention to disaster points and people's demands are very necessary. To deal with this objective, both commodities including consumable and need non-consumable commodities are considered in the presented model. This paper presented the multi-objective multi-period mathematical programming model regarding the minimizing the average of the weighted response times and minimizing the total operational cost and penalty costs of unmet demand and unused commodities simultaneously. Furthermore, a Chebycheff multi-objective solution procedure as a powerful solution algorithm is applied to solve the proposed model. Finally, to illustrate the model applicability, a case study of the Tehran earthquake is studied, also to show model validation a sensitivity analysis is carried out.

Keywords: facility location, multi-objective model, disaster response, commodity

Procedia PDF Downloads 236
163 Technology Futures in Global Militaries: A Forecasting Method Using Abstraction Hierarchies

Authors: Mark Andrew

Abstract:

Geopolitical tensions are at a thirty-year high, and the pace of technological innovation is driving asymmetry in force capabilities between nation states and between non-state actors. Technology futures are a vital component of defence capability growth, and investments in technology futures need to be informed by accurate and reliable forecasts of the options for ‘systems of systems’ innovation, development, and deployment. This paper describes a method for forecasting technology futures developed through an analysis of four key systems’ development stages, namely: technology domain categorisation, scanning results examining novel systems’ signals and signs, potential system-of systems’ implications in warfare theatres, and political ramifications in terms of funding and development priorities. The method has been applied to several technology domains, including physical systems (e.g., nano weapons, loitering munitions, inflight charging, and hypersonic missiles), biological systems (e.g., molecular virus weaponry, genetic engineering, brain-computer interfaces, and trans-human augmentation), and information systems (e.g., sensor technologies supporting situation awareness, cyber-driven social attacks, and goal-specification challenges to proliferation and alliance testing). Although the current application of the method has been team-centred using paper-based rapid prototyping and iteration, the application of autonomous language models (such as GPT-3) is anticipated as a next-stage operating platform. The importance of forecasting accuracy and reliability is considered a vital element in guiding technology development to afford stronger contingencies as ideological changes are forecast to expand threats to ecology and earth systems, possibly eclipsing the traditional vulnerabilities of nation states. The early results from the method will be subjected to ground truthing using longitudinal investigation.

Keywords: forecasting, technology futures, uncertainty, complexity

Procedia PDF Downloads 94
162 Early Marriage and Women's Empowerment: The Case of Chil-bride in East Hararghe Zone of Oromia National Regional State, Ethiopia

Authors: Emad Mohammed Sani

Abstract:

Women encounter exclusion and discrimination in varying degrees, particularly those who marry as minors. The detrimental custom of getting married young is still prevalent worldwide and affects millions of people. It has been less common over time, although it is still widespread in underdeveloped nations. Oromia Regional State is the region in Ethiopia with the highest proportion of child brides. This study aimed at evaluating the effects of early marriage on its survivors’ life conditions – specifically, empowerment and household decision-making – in Eastern Hararghe Zone of Oromia Region. This study employed community-based cross-sectional study design. It adopted mixed method approach – survey, in-depth interview and focus group discussion (FGD) – to collect, analyses and interpret data on early marriage and its effects on household decision-making processes. Narratives and analytical descriptions were integrated to substantiate and/or explain observed quantitative results, or generate contextual themes. According to this study, married women who were married at or after the age of eighteen participated more in household decision-making than child brides. Child brides were more likely to be victims of violence and other types of spousal abuse in their marriages. These changes are mostly caused by an individual's age at first marriage. Delaying marriage had a large positive impact on women's empowerment at the household level, and age at first marriage had a considerable negative impact. In order to advance women's welfare and emancipation, we advise more research to concentrate on the relationship between the home and the social-structural forms that appear at the individual and communal levels.

Keywords: child-bride, early marriage, women, ethiopia

Procedia PDF Downloads 47
161 A Critique of Contemporary Sexual Liberation: A Third Way Analysis

Authors: Sydelle Barreto

Abstract:

Sexual liberation has been thought of as a movement, an idea, and an antithesis of material oppression. Within feminism it has consistently resisted definition - different feminist schools of thought had entirely different constructions of what liberated feminine sexuality could look like and how we might get there. This paper will critique the current definition of sexual liberation as being limited and carceral in its perspectives of sexual assault and extremely reductive in its imaginings of sexual liberation. The ultimate goal of this assessment is to potentially outline what true sexual liberation might look like in a way that is inclusive but not ignorant of the realities of the patriarchy. The first critique of sexual liberation included in the paper centers around the limits of consent, carceral feminism and sexual subjectivity. The argument will build off the traditionally sex-negative critiques of consent as being limited in scope by explaining how a lack of nuance is even more dangerous to victims of sexual violations. The discussion will also expand an interrogant of consent to an interrogation of wantedness and desire. If we understand that critiquing the conditions of consent is important, we must also critique the way patriarchy and compulsory sexuality have affected desire. Using the aforementioned concept of compulsory sexuality, the paper will argue that while sexual liberation has begun to include queer and transgender individuals, it is still overwhelmingly allonormative. Sex positivity and its opponents both fail to include asexuality. This ultimately leads to a conflation of sexual liberation with genuine material liberation. Just as we cannot divorce our constructions of sexual liberation from the realities of the patriarchy and rape culture, we should consider compulsory sexuality as its own system of social regulation. The conclusion will begin to construct an alternative vision of sexual liberation, leveraging concepts of sexual subjectivity, including a rejection of carceral feminism as a response to sexual violence, and finally, leading to the beginnings of a deconstruction of compulsory sexuality. The paper concludes with a vision of sexual liberation that does not confuse itself with material liberation or mere sexual oppression, but rather a key way stops on the road to constructing our most authentic sexual selves.

Keywords: feminism, sexual assault, sexual liberation, consent

Procedia PDF Downloads 230
160 Frank Norris’ McTeague: An Entropic Melodrama

Authors: Mohsen Masoomi, Fazel Asadi Amjad, Monireh Arvin

Abstract:

According to Naturalistic principles, human destiny in the form of blind chance and determinism, entraps the individual, so man is a defenceless creature unable to escape from the ruthless paws of a stoical universe. In Naturalism; nonetheless, melodrama mirrors a conscious alternative with a peculiar function. A typical American Naturalistic character thus cannot be a subject for social criticism of American society since they are not victims of the ongoing virtual slavery, capitalist system, nor of a ruined milieu, but of their own volition, and more importantly, their character frailty. Through a Postmodern viewpoint, each Naturalistic work can encompass some entropic trends and changes culminating in an entire failure and devastation. Frank Norris in McTeague displays the futile struggles of ordinary men and how they end up brutes. McTeague encompasses intoxication, abuse, violation, and ruthless homicides. Norris’ depictions of the falling individual as a demon represent the entropic dimension of Naturalistic novels. McTeague’s defeat is somewhat his own fault, the result of his own blunders and resolution, not the result of sheer accident. Throughout the novel, each character is a kind of insane quester indicating McTeague’s decadence and, by inference, the decadence of Western civilisation. McTeague seems to designate Norris’ solicitude for a community fabricated by the elements of human negative demeanours and conducts hauling acute symptoms of infectious dehumanisation. The aim of this article is to illustrate how one specific negative human disposition gradually, like a running fire, can spread everywhere and burn everything in itself. The author applies the concept of entropy metaphorically to describe the individual devolutions that necessarily comprise community entropy in McTeague, a dying universe.

Keywords: animal imagery, entropy, Gypsy, melodrama

Procedia PDF Downloads 260
159 Injury Patterns and Outcomes in Alcohol Intoxicated Trauma Patients Admitted at Level I Apex Trauma Centre of a Developing Nation

Authors: G. Kaushik, A. Gupta, S. Lalwani, K. D. Soni, S. Kumar, S. Sagar

Abstract:

Objective: Alcohol is a leading risk factor associated with the disability and death due to RTI. Present study aims to demonstrate the demographic profile, injury pattern, physiological parameters of victims of trauma following alcohol consumption arriving in the emergency department (ED) and mortality in alcohol intoxicated trauma patients admitted to Apex Trauma Center in Delhi. Design and Methods: Present study was performed in randomly selected 182 alcohol breath analyzer tested RTI patients from the emergency department of Jai Prakash Narayan Apex Trauma Center (JPNATC), All India Institute of Medical Sciences, New Delhi for over a period of 3 months started from September 2013 to November 2013. Results: A total 182 RTI patients with blunt injury were selected between 30-40 years of age and equally distributed to male and female group. Of these, 93 (51%) were alcohol negative and 89 (49%) were alcohol positive. In 89 alcohol positive patients, 47 (53%) had Artificial Airway as compared to 17 (18%), (p < 0.001) in the other group. The Glasgow Coma Scale (GCS) score was lower (p < 0.001) and higher Injury Severity Score (ISS) was observed in alcohol positive group as compared to other group (p < 0.03). Increased number of patients (58%) were admitted to Intensive Care Unit (ICU), in alcohol positive group (p < 0.001) and they were in ICU for longer time compare to other group (p < 0.001). The alcohol positive patients were on ventilator support for longer duration as compared to non-alcoholic group (p < 0.001). Mortality rate was higher in alcohol intoxicated patients as compared to non-alcoholic RTI patients, however, the difference was not statistically significant. Conclusion: This study revealed that GCS, mean ISS, ICU stay, ventilation time etc. might have considerable impact on mortality in alcohol intoxicated patients as compared to non-alcoholic group.

Keywords: road traffic injuries, alcohol, trauma, emergency department

Procedia PDF Downloads 296
158 A Preliminary Investigation on Factors That Influence Road Users' Speeding Behaviour on Selected Roads in Peninsular Malaysia

Authors: Farah Fazlinda Binti Mohamad, Ahmad Saifizul Abdullah, Mohamed Rehan Karim , Jamilah Mohamad, Siti Hikmah Musthar

Abstract:

Road safety is an important issue in Malaysia. It become important as it is discussed widely throughout printed and electronic media. Most of the news portrays on road accident and fatalities have increased the concern of everyone. This issue affects everyone's life as everyone shares the roads. The most vulnerable victims are the road user who uses the roads every day. It is appalling when World Health Organization (WHO) reported that in every 100,000 of population in Malaysia, 23 fatalities recorded due to road accident alone. This figure is quite alarming and requires serious attention. Furthermore, research by Malaysian Institute of Road Safety Research concluded that that speeding has contributed to 60% of all road accident in the country. Therefore, this study aims to elucidate the factors that influence road users’ speeding behaviour on selected roads in Peninsular Malaysia. To achieve this, set of questionnaires has distributed to 500 respondents on selected roads in Peninsular Malaysia. The respondents came from various demographic backgrounds in order to have a fair opinion on the issue. Using descriptive analysis, the results have indicated that psychological factors such as emotion and attitude of road user are the prominent factors that influence the road user’s speeding behaviour. Furthermore, the results have shown that male road users were dominant in speeding compared to female, which led to increased vulnerability to road injuries and fatalities. These findings are very useful in order for us to understand road users’ driving behaviour. Relevant authorities should also revise the existing countermeasures and find ways to reduce road accident. Engineers and road experts could cooperate in designing new road specifications for the road user. Nevertheless, it is important to comprehend this speeding issue and factors associated with it. Each road user should take this matter seriously and responsibly as road safety is a responsibility of all.

Keywords: countermeasures, psychological, road safety, speeding

Procedia PDF Downloads 507
157 Real-Time Hybrid Simulation for a Tuned Liquid Column Damper Implementation

Authors: Carlos Riascos, Peter Thomson

Abstract:

Real-time hybrid simulation (RTHS) is a modern cyber-physical technique used for the experimental evaluation of complex systems, that treats the system components with predictable behavior as a numerical substructure and the components that are difficult to model as an experimental substructure. Therefore it is an attractive method for evaluation of the response of civil structures under earthquake, wind and anthropic loads. Another practical application of RTHS is the evaluation of control systems, as these devices are often nonlinear and their characterization is an important step in the design of controllers with the desired performance. In this paper, the response of three-story shear frame controlled by a tuned liquid column damper (TLCD) and subject to base excitation is considered. Both passive and semi-active control strategies were implemented and are compared. While the passive TLCD achieved a reduction of 50% in the acceleration response of the main structure in comparison with the structure without control, the semi-active TLCD achieved a reduction of 70%, and was robust to variations in the dynamic properties of the main structure. In addition, a RTHS was implemented with the main structure modeled as a linear, time-invariant (LTI) system through a state space representation and the TLCD, with both control strategies, was evaluated on a shake table that reproduced the displacement of the virtual structure. Current assessment measures for RTHS were used to quantify the performance with parameters such as generalized amplitude, equivalent time delay between the target and measured displacement of the shake table, and energy error using the measured force, and prove that the RTHS described in this paper is an accurate method for the experimental evaluation of structural control systems.

Keywords: structural control, hybrid simulation, tuned liquid column damper, semi-active sontrol strategy

Procedia PDF Downloads 279
156 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 522
155 Effect of Information and Communication Technology (ICT) Usage by Cassava Farmers in Otukpo Local Government Area of Benue State, Nigeria

Authors: O. J. Ajayi, J. H. Tsado, F. Olah

Abstract:

The study analyzed the effect of information and communication technology (ICT) usage on cassava farmers in Otukpo local government area of Benue state, Nigeria. Primary data was collected from 120 randomly selected cassava farmers using multi-stage sampling technique. A structured questionnaire and interview schedule was employed to generate data. Data were analyzed using descriptive (frequency, mean and percentage) and inferential statistics (OLS (ordinary least square) and Chi-square). The result revealed that majority (78.3%) were within the age range of 21-50 years implying that the respondents were within the active age for maximum production. 96.8% of the respondents had one form of formal education or the other. The sources of ICT facilities readily available in area were radio(84.2%), television(64.2%) and mobile phone(90.8%) with the latter being the most relied upon for cassava farming. Most of the farmers were aware (98.3%) and had access (95.8%) to these ICT facilities. The dependence on mobile phone and radio were highly relevant in cassava stem selection, land selection, land preparation, cassava planting technique, fertilizer application and pest and disease management. The value of coefficient of determination (R2) indicated an 89.1% variation in the output of cassava farmers explained by the inputs indicated in the regression model implying that, there is a positive and significant relationship between the inputs and output. The results also indicated that labour, fertilizer and farm size were significant at 1% level of probability while ICT use was significant at 10%. Further findings showed that finance (78.3%) was the major constraint associated with ICT use. Recommendations were made on strengthening the use of ICT especially contemporary ones like the computer and internet among farmers for easy information sourcing which can boost agricultural production, improve livelihood and subsequently food security. This may be achieved by providing credit or subsidies and information centres like telecentres and cyber cafes through government assistance or partnership.

Keywords: ICT, cassava farmers, inputs, output

Procedia PDF Downloads 288
154 The Role of Pharmacist in The Community: A Study of Methanol Toxicity Disaster in Tripoli Libya During March 2013

Authors: Abdurrauf M. Gusbi, Mahmud H. Arhima, Abdurrahim A. Elouzi, Ebtisam A. Benomran, Salsabeela Elmezwghi, Aram Elhatan, Nafesa Elgusbi

Abstract:

Mass poisonings with methanol are rare but occur regularly both in developed and in non-developing countries. As a result of the tragedy that happened in the city of Tripoli Libya in March during year 2013 a number of patients were admitted to Tripoli Medical Center and Tripoli Central Hospital suffering from poisoning following ingestion of methanol by mistake. Our aims have been formulated to collect Information about those cases as much as we can from the archiving departments from the two hospitals including the number of cases that had been admitted, recovered patients and died victims. This retrospective study was planned to find out the reasons which allow those patients to drink methanol in our Muslim community and also the role of pharmacist to prevent such a disaster that claimed the lives of many people. During this tragedy 291 ospitalized patients their ages between 16-32 years old were admitted to both hospitals, total number of died 189 (121 at Tripoli medical center) and (68 at Tripoli central hospital), demographic data also shows that most of them are male (97%) and (3% female), about 4% of the patients foreigners and 96% were Libyans. There were a lot of obstacles and poor facilities at the time of patient admission as recognized in many cases including lack of first line of treatment. The morbidity was high due to the lack of antidote and availability of dialysis machines at this two main hospitals in Tripoli also according to survey done to the medical staff and also a random number of medical students shows about 28% have no idea about the first aid procedure used for methanol poisoning cases and this due to the absence of continuing education for all medical staff through the establishment of training courses on first aid, rapid diagnosis of poisoning and follow the written procedures to dealing with such cases.

Keywords: ethanol, fomepizole, methanol, poisoning

Procedia PDF Downloads 346
153 The Nexus between Child Marriage and Women Empowerment with Physical Violence in Two Culturally Distinct States of India

Authors: Jayakant Singh, Enu Anand

Abstract:

Background: Child marriage is widely prevalent in India. It is a form of gross human right violation that succumbs a child bride to be subservient to her husband within a marital relation. We investigated the relationship between age at marriage of women and her level of empowerment with physical violence experienced 12 months preceding the survey among young women aged 20-24 in two culturally distinct states- Bihar and Tamil Nadu of India. Methods: We used the information collected from 10514 young married women (20-24 years) at all India level, 373 in Bihar and 523 in Tamil Nadu from the third round of National Family Health Survey. Empowerment index was calculated using different parameters such as mobility, economic independence and decision making power of women using Principal Component Analysis method. Bivariate analysis was performed primarily using chi square for the test of significance. Logistic regression was carried out to assess the effect of age at marriage and empowerment on physical violence. Results: Lower level of women empowerment was significantly associated with physical violence in Tamil Nadu (OR=2.38, p<0.01) whereas child marriage (marriage before age 15) was associated with physical violence in Bihar (OR=3.27, p<0.001). The mean difference in age at marriage between those who experienced physical violence and those who did not experience varied by 7 months in Bihar and 10 months in Tamil Nadu. Conclusion: Culture specific intervention may be a key to reduction of violence against women as the results showed association of different factors contributing to physical violence in Bihar and Tamil Nadu. Marrying at an appropriate age perhaps is protective of abuse because it equips a woman to assert her rights effectively. It calls for an urgent consideration to curb both violence and child marriage with stricter involvement of family, civil society and the government. In the meanwhile physical violence may be recognized as a public health problem and integrate appropriate treatment to the victims within the health care institution.

Keywords: child marriage, empowerment, India, physical violence

Procedia PDF Downloads 288
152 A Novel Study Contrasting Traditional Autopsy with Post-Mortem Computed Tomography in Falls Leading to Death

Authors: Balaji Devanathan, Gokul G., Abilash S., Abhishek Yadav, Sudhir K. Gupta

Abstract:

Background: As an alternative to the traditional autopsy, a virtual autopsy is carried out using scanning and imaging technologies, mainly post-mortem computed tomography (PMCT). This facility aims to supplement traditional autopsy results and reduce or eliminate internal dissection in subsequent autopsies. For emotional and religious reasons, the deceased's relatives have historically disapproved such interior dissection. The non-invasive, objective, and preservative PMCT is what friends and family would rather have than a traditional autopsy. Additionally, it aids in the examination of the technologies and the benefits and drawbacks of each, demonstrating the significance of contemporary imaging in the field of forensic medicine. Results: One hundred falls resulting in fatalities was analysed by the writers. Before the autopsy, each case underwent a PMCT examination using a 16-slice Multi-Slice CT spiral scanner. By using specialised software, MPR and VR reconstructions were carried out following the capture of the raw images. The accurate detection of fractures in the skull, face bones, clavicle, scapula, and vertebra was better observed in comparison to a routine autopsy. The interpretation of pneumothorax, Pneumoperitoneum, pneumocephalus, and hemosiuns are much enhanced by PMCT than traditional autopsy. Conclusion. It is useful to visualise the skeletal damage in fall from height cases using a virtual autopsy based on PMCT. So, the ideal tool in traumatising patients is a virtual autopsy based on PMCT scans. When assessing trauma victims, PMCT should be viewed as an additional helpful tool to traditional autopsy. This is because it can identify additional bone fractures in body parts that are challenging to examine during autopsy, such as posterior regions, which helps the pathologist reconstruct the victim's life and determine the cause of death.

Keywords: PMCT, fall from height, autopsy, fracture

Procedia PDF Downloads 18
151 A Deluge of Disaster, Destruction, Death and Deception: Negative News and Empathy Fatigue in the Digital Age

Authors: B. N. Emenyeonu

Abstract:

Initially identified as sensationalism in the eras of yellow journalism and tabloidization, the inclusion of news which shocks or provokes strong emotional responses among readers, viewers, and browsers has not only remained a persistent feature of journalism but has also seemingly escalated in the current climate of digital and social media. Whether in the relentless revelation of scandals in high places, profiles on people displaced by sporadic wars or natural disasters, gruesome accounts of trucks plowing into pedestrians in a city centre, or the coverage of mourners paying tributes to victims of a mass shooting, mainstream, and digital media are often awash with tragedy, tears, and trauma. While it may aim at inspiring sympathy, outrage, or even remedial reactions, it would appear that the deluge of grief and misery in the news merely generates in the audience a feeling that borders on hearing or seeing too much to care or act. This feeling also appears to be accentuated by the dizzying diffusion of social media news and views, most of whose authenticity is not easily verifiable. Through a survey of 400 regular consumers of news and an in-depth interview of 10 news managers in selected media organizations across the Middle East, this study therefore investigates public attitude to the profusion of bad news in mainstream and digital media. Among other targets, it examines whether the profusion of bad news generates empathy fatigue among the audience and, if so, whether there is any association between biographic variables (profession, age, and gender) and an inclination to empathy fatigue. It also seeks to identify which categories of bad news and media are most likely to drag the audience into indifference. In conclusion, the study discusses the implications of the findings for mass-mediated advocacies such as campaigns against conflicts, corruption, nuclear threats, terrorism, gun violence, sexual crimes, and human trafficking, among other threats to humanity.

Keywords: digital media, empathy fatigue, media campaigns, news selection

Procedia PDF Downloads 37
150 The Relationship Between Cyberbullying Victimization, Parent and Peer Attachment and Unconditional Self-Acceptance

Authors: Florina Magdalena Anichitoae, Anca Dobrean, Ionut Stelian Florean

Abstract:

Due to the fact that cyberbullying victimization is an increasing problem nowadays, affecting more and more children and adolescents around the world, we wanted to take a step forward analyzing this phenomenon. So, we took a look at some variables which haven't been studied together before, trying to develop another way to view cyberbullying victimization. We wanted to test the effects of the mother, father, and peer attachment on adolescent involvement in cyberbullying as victims through unconditional self acceptance. Furthermore, we analyzed each subscale of the IPPA-R, the instrument we have used for parents and peer attachment measurement, in regards to cyberbullying victimization through unconditional self acceptance. We have also analyzed if gender and age could be taken into consideration as moderators in this model. The analysis has been performed on 653 adolescents aged 11-17 years old from Romania. We used structural equation modeling, working in R program. For the fidelity analysis of the IPPA-R subscales, USAQ, and Cyberbullying Test, we have calculated the internal consistency index, which varies between .68-.91. We have created 2 models: the first model including peer alienation, peer trust, peer communication, self acceptance and cyberbullying victimization, having CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07, and the second model including parental alienation, parental trust, parental communication, self acceptance and cyberbullying victimization and had CFI=0.97, RMSEA=0.02, 90%CI [0.02, 0.03] and SRMR=0.07. Our results were interesting: on one hand, cyberbullying victimization is predicted by peer alienation and peer communication through unconditional self acceptance. Peer trust directly, significantly, and negatively predicted the implication in cyberbullying. In this regard, considering gender and age as moderators, we found that the relationship between unconditional self acceptance and cyberbullying victimization is stronger in girls, but age does not moderate the relationship between unconditional self acceptance and cyberbullying victimization. On the other hand, regarding the degree of cyberbullying victimization as being predicted through unconditional self acceptance by parental alienation, parental communication, and parental trust, this hypothesis was not supported. Still, we could identify a direct path to positively predict victimization through parental alienation and negatively through parental trust. There are also some limitations to this study, which we've discussed in the end.

Keywords: adolescent, attachment, cyberbullying victimization, parents, peers, unconditional self-acceptance

Procedia PDF Downloads 183
149 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 60
148 Human Factors Interventions for Risk and Reliability Management of Defence Systems

Authors: Chitra Rajagopal, Indra Deo Kumar, Ila Chauhan, Ruchi Joshi, Binoy Bhargavan

Abstract:

Reliability and safety are essential for the success of mission-critical and safety-critical defense systems. Humans are part of the entire life cycle of defense systems development and deployment. The majority of industrial accidents or disasters are attributed to human errors. Therefore, considerations of human performance and human reliability are critical in all complex systems, including defense systems. Defense systems are operating from the ground, naval and aerial platforms in diverse conditions impose unique physical and psychological challenges to the human operators. Some of the safety and mission-critical defense systems with human-machine interactions are fighter planes, submarines, warships, combat vehicles, aerial and naval platforms based missiles, etc. Human roles and responsibilities are also going through a transition due to the infusion of artificial intelligence and cyber technologies. Human operators, not accustomed to such challenges, are more likely to commit errors, which may lead to accidents or loss events. In such a scenario, it is imperative to understand the human factors in defense systems for better systems performance, safety, and cost-effectiveness. A case study using Task Analysis (TA) based methodology for assessment and reduction of human errors in the Air and Missile Defense System in the context of emerging technologies were presented. Action-oriented task analysis techniques such as Hierarchical Task Analysis (HTA) and Operator Action Event Tree (OAET) along with Critical Action and Decision Event Tree (CADET) for cognitive task analysis was used. Human factors assessment based on the task analysis helps in realizing safe and reliable defense systems. These techniques helped in the identification of human errors during different phases of Air and Missile Defence operations, leading to meet the requirement of a safe, reliable and cost-effective mission.

Keywords: defence systems, reliability, risk, safety

Procedia PDF Downloads 113
147 A National Systematic Review on Determining Prevalence of Mobbing Exposure in Turkish Nurses

Authors: Betül Sönmez, Aytolan Yıldırım

Abstract:

Objective: This systematic review aims to methodically analyze studies regarding mobbing behavior prevalence, individuals performing this behavior and the effects of mobbing on Turkish nurses. Background: Worldwide reports on mobbing cases have increased in the past years, a similar trend also observable in Turkey. It has been demonstrated that among healthcare workers, mobbing is significantly widespread in nurses. The number of studies carried out in this regard has also increased. Method: The main criteria for choosing articles in this systematic review were nurses located in Turkey, regardless of any specific date. In November 2014, a search using the keywords 'mobbing, bullying, psychological terror/violence, emotional violence, nurses, healthcare workers, Turkey' in PubMed, Science Direct, Ebscohost, National Thesis Centre database and Google search engine led to 71 studies in this field. 33 studies were not met the inclusion criteria specified for this study. Results: The findings were obtained using the results of 38 studies carried out in the past 13 years in Turkey, a large sample consisting of 8,877 nurses. Analysis of the incidences of mobbing behavior revealed a broad spectrum, ranging from none-slight experiences to 100% experiences. The most frequently observed mobbing behaviors include attacking personality, blocking communication and attacking professional and social reputation. Victims mostly experienced mobbing from their managers, the most common consequence of these actions being psychological effects. Conclusions: The results of studies with various scales indicate exposure of nurses to similar mobbing behavior. The high frequency of exposure of nurses to mobbing behavior in such a large sample highlights the importance of considering this issue in terms of individual and institutional consequences that adversely affect the performance of nurses.

Keywords: mobbing, bullying, workplace violence, nurses, Turkey

Procedia PDF Downloads 254
146 The Effect of Sexual Assault on Sport Participation Trajectories from Adolescence through Young Adulthood

Authors: Chung Gun Lee

Abstract:

Objectives: Certain life change events were shown to have strong effects on physical activity-related behavior, but more research is needed to investigate the longer-term effects of different life change events on physical activity-related behaviors. The purpose of this study is to examine the effect of experiencing physically or non-physically forced sexual activity on sports participation from adolescence to young adulthood. Methods: This study used the National Longitudinal Study of Adolescent Health (Add Health) data. Group-based trajectory modeling was utilized to examine the effect of experiencing sexual assault on trajectories of sports participation from adolescence to young adulthood. Results: Male participants were divided into three trajectory groups (i.e., Low-stable, High-decreasing, and High-stable) and female participants were divided into two trajectory groups (i.e., Low-stable and High-decreasing). The main finding of this study is that women who experienced non-physically forced sexual activity significantly decreases sports participation throughout the trajectory in ‘High-decreasing group.’ The effect of non-physically forced sexual activity on women’s sports participation was considerably weakened and became insignificant after including psychological depression in the model as a potential mediator. Discussion: Special attention should be paid to sport participation among women victims of non-physically forced sexual activity. Further studies are needed to examine other potential mediators in addition to psychological depression when examining the effect of non-physically forced sexual activity on sport participation in women.

Keywords: adolescent, group-based trajectory modeling, sexual assault, young adult

Procedia PDF Downloads 145
145 The Effect of Second Victim-Related Distress on Work-Related Outcomes in Tertiary Care, Kelantan, Malaysia

Authors: Ahmad Zulfahmi Mohd Kamaruzaman, Mohd Ismail Ibrahim, Ariffin Marzuki Mokhtar, Maizun Mohd Zain, Saiful Nazri Satiman, Mohd Najib Majdi Yaacob

Abstract:

Background: Aftermath any patient safety incidents, the involved healthcare providers possibly sustained second victim-related distress (second victim distress and reduced their professional efficacy), with subsequent negative work-related outcomes or vice versa cultivating resilience. This study aimed to investigate the factors affecting negative work-related outcomes and resilience, with the triad of support; colleague, supervisor, and institutional support as the hypothetical mediators. Methods: This was a cross sectional study recruiting a total of 733 healthcare providers from three tertiary care in Kelantan, Malaysia. Three steps of hierarchical linear regression were developed for each outcome; negative work-related outcomes and resilience. Then, four multiple mediator models of support triad were analyzed. Results: Second victim distress, professional efficacy, and the support triad contributed significantly for each regression model. In the pathway of professional efficacy on each negative work-related outcomes and resilience, colleague support partially mediated the relationship. As for second victim distress on negative work related outcomes, colleague and supervisor support were the partial mediator, and on resilience; all support triad also produced a similar effect. Conclusion: Second victim distress, professional efficacy, and the support triad influenced the relationship with the negative work-related outcomes and resilience. Support triad as the mediators ameliorated the effect in between and explained the urgency of having good support for recovery post encountering patient safety incidents.

Keywords: second victims, patient safety incidents, hierarchical linear regression, mediation, support

Procedia PDF Downloads 83
144 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 64
143 A Perspective on Emergency Care of Gunshot Injuries in Northern Taiwan

Authors: Liong-Rung Liu, Yu-Hui Chiu, Wen-Han Chang

Abstract:

Firearm injuries are high-energy injuries. The ballistic pathways could cause severe burns or chemical damages to vessels, musculoskeletal or other major organs. The high mortality rate is accompanied by complications such as sepsis. As laws prohibit gun possession, civilian gunshot wounds (GSW) are relatively rare in Taiwan. Our hospital, Mackay Memorial Hospital, located at the center of Taipei city is surrounded by nightclubs and red-light districts. Due to this unique location, our hospital becomes the first-line trauma center managing gunshot victims in Taiwan. To author’s best knowledge, there are few published research articles regarding this unique situation. We hereby analyze the distinct characteristics and length of stay (LOS) of GSW patients in the emergency room (ER) at Mackay Memorial Hospital. A 6-year retrospective analysis of 27 patients treated for GSW injuries from January 2012 to December 2017 was performed. The patients’ records were reviewed for the following analyses, 1) wound position and the correlated clinical presentations; 2) the LOS in ED of patients receiving emergency surgery for major organ or vascular injuries. We found males (96.3%) were injured by guns more often than females (3.7%) in all age groups. The most common injured site was in the extremities. With regards to the ER LOS, the average time were 72.2 ± 34.5 minutes for patients with triage I and 207.4 ± 143.9 minutes for patients with triage II. The ED LOS of patients whose ISS score were more than 15 was 59.9 ± 25.6 minutes, and 179.4 ± 119.8 minutes for patients whose ISS score were between 9 to 15, respectively. Among these 27 patients, 10 patients had emergency surgery and their average ED stay time was 104.5 ± 33.3 minutes. Even more, the average ED stay time could be shortened to 88.8 ± 32.3 minutes in the 5 patients with trauma team activation. In conclusion, trauma team activation in severe GSW patients indeed shortens the ED LOS and might initially improve the quality of patient care. This is the result of better trauma systems, including advances in care from emergency medical services and acute care surgical management.

Keywords: gunshot, length of stay, trauma, mortality

Procedia PDF Downloads 115
142 The Role of Non-Governmental Organizations in Combating Human Trafficking in South India: An Overview

Authors: Kumudini Achchi

Abstract:

India, being known for its rich cultural values has given a special place to women who are also been victims of humiliation, torture, and exploitation. The major share of Human Trafficking goes to sex trafficking which is recognised as world’s second most huge social evil. The original form of sex trafficking in India is prostitution with and without religious sanction. Today the situation of such women reached as an issue of human rights where they rights are denied severely. This situation demanded intervention to protect them from the exploitative situation. NGO are the proactive initiatives which offer support to the exploited women in sex trade. To understand the intervention programs of NGOs in South India, a study was conducted covering four states and a union territory considering 32 NGOs based on their preparedness to participate in the research study. Descriptive and diagnostic research design was adopted along with interview schedule as a tool for collecting data. The study reveals that these NGOs believes in the possibility of mainstreaming commercially sexually exploited women and found adopted seven different programs in the process such as rescue, rehabilitation, reintegration, prevention, developmental, advocacy and research. Each area involves different programs to reach and prepare the exploited women towards mainstreamed society which has been discussed in the paper. Implementation of these programs is not an easy task for the organizations rather they are facing hardships in the areas such as social, legal, financial, political which are hindering the successful operations. Rescue, advocacy, and research are the least adopted areas by the NGOs because of lack of support as well as knowledge in the area. Rehabilitation stands as the most adopted area in implementation. The paper further deals with the challenges in the implementation of the programs as well as the remedial measures in social work point of view having Indian cultural background.

Keywords: NGOs, commercially sexually exploited women, programmes, South India

Procedia PDF Downloads 235
141 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda

Authors: Seember Susan Aondoakura

Abstract:

This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.

Keywords: conflict, protection, security, SGBV

Procedia PDF Downloads 77
140 Resistances among Sexual Offenders on Specific Stage of Change

Authors: Chang Li Yu

Abstract:

Resistances commonly happened during sexual offenders treatment program (SOTP), and removing resistances was one of the treatment goals on it. Studies concerning treatment effectiveness relied on pre- and post-treatment evaluations, however, no significant difference on resistance revealed after treatment, and the above consequences generally contributed to the low motivation for change instead. Therefore, the aim of this study was to investigate the resistance across each stage of change among sexual offenders (SO). The present study recruited prisoned SO in Taiwan, excluding those with literacy difficulties; finally, 272 participants were included. Of all participants completed revised version of URICA (University of Rhode Island Change Assessment) and resistance scale specifically for SO. The former included four stages of change: pre-contemplation (PC), contemplation (C), action (A), and maintain (M); the later composed eight types of resistance: system blaming, victims blaming, problems with treatment alliance, social justification, hopelessness, isolation, psychological reactance, and passive reactance. Both of the instruments were with well reliability and validity. Descriptive statistics and ANOVA were performed. All of 272 participants, age under 25 were 18(6.6%), 25-39 were 133(48.9%), 40-54 were 102(37.5%), and age over 55 were 19(7.0%); college level and above were 53(19.5%), high school level were 110(40.4%), and under high school level were 109(40.1%); first offended were 117(43.0%), and recidivist were 23(8.5%). Further deleting data with missing values and invalid questionnaires, SO with stage of change on PC were 43(18.9%), C were 109(47.8%), A were 70(30.7%), and on M were 6(2.6%). One-way ANOVA showed significant differences on every kind of resistances, excepting isolation and passive reactance. Post-hoc analysis showed that SO with different stages had their main resistance. There are two contributions to the present study. First, this study provided a clinical and theoretical measurement of evaluation that was never used in the past. Second, this study used an evidence-based methodology to prove a clinical perspective differed from the past, suggesting that resistances to treatment on SO appear the whole therapeutic process, when SO progress into the next stage of change, clinicians have to deal with their main resistance for working through the therapy.

Keywords: resistance, sexual offenders treatment program (SOTP), motivation for change, prisoned sexual offender

Procedia PDF Downloads 224
139 E-Government Development in Nigeria, 'Bank Verification No': An Anti-Corruption Tool

Authors: Ernest C. Nwadinobi, Amanda Peart, Carl Adams

Abstract:

The leading countries like the USA, UK and some of the European countries have moved their focus away from just developing the e-government platform towards just the electronic services which aim at providing access to information to its citizens or customers, but they have gone to make significant backroom changes that can accommodate this electronic service being provided to its customers or citizens. E-government has moved from just providing electronic information to citizens and customers alike to serving their needs. In developing countries like Nigeria, the enablement of e-government is being used as an anti-corruption tool. The introduction of the Bank verification number (BVN) scheme by the Central Bank of Nigeria, has helped the government in not just saving money but also protecting customer’s transaction and enhancing confidence in the banking sector. This has helped curtail the high rate of cyber and financial crime that has been part of the system. The use of BVN as an anti-corruption tool in Nigeria came at a time there was need for openness, accountability, and discipline, after years of robbing the treasury and recklessness in handling finances. As there has not been a defined method for measuring the strength or success of e-government development, in this case BVN, in Nigeria, progress will remain at the same level. The implementation strategy of the BVN in Nigeria has mostly been a quick fix, quick win solution. In fact, there is little or no indication to show evidence of a framework for e-government. Like other leading countries, there is the need for proper implementation of strategy and framework especially towards a customer orientated process, which will accommodate every administrative body of the government institution including private business rather than focusing on a non-flexible organisational structure. The development of e-government must have a strategy and framework for it to work, and this strategy must enclose every public administration and will not be limited to any individual bodies or organization. A defined framework or monitoring method must be put in place to help evaluate and benchmark government development in e-government. This framework must follow the same concept or principles. In censorious analyses of the existing methods, this paper will denote areas that must be included in the existing approach to be able to channel e-government development towards its defined strategic objectives.

Keywords: Bank Verification No (BVN), quick-fix, anti-corruption, quick-win

Procedia PDF Downloads 141
138 The Effect of General Data Protection Regulation on South Asian Data Protection Laws

Authors: Sumedha Ganjoo, Santosh Goswami

Abstract:

The rising reliance on technology places national security at the forefront of 21st-century issues. It complicates the efforts of emerging and developed countries to combat cyber threats and increases the inherent risk factors connected with technology. The inability to preserve data securely might have devastating repercussions on a massive scale. Consequently, it is vital to establish national, regional, and global data protection rules and regulations that penalise individuals who participate in immoral technology usage and exploit the inherent vulnerabilities of technology. This study paper seeks to analyse GDPR-inspired Bills in the South Asian Region and determine their suitability for the development of a worldwide data protection framework, considering that Asian countries are much more diversified than European ones. In light of this context, the objectives of this paper are to identify GDPR-inspired Bills in the South Asian Region, identify their similarities and differences, as well as the obstacles to developing a regional-level data protection mechanism, thereby satisfying the need to develop a global-level mechanism. Due to the qualitative character of this study, the researcher did a comprehensive literature review of prior research papers, journal articles, survey reports, and government publications on the aforementioned topics. Taking into consideration the survey results, the researcher conducted a critical analysis of the significant parameters highlighted in the literature study. Many nations in the South Asian area are in the process of revising their present data protection measures in accordance with GDPR, according to the primary results of this study. Consideration is given to the data protection laws of Thailand, Malaysia, China, and Japan. Significant parallels and differences in comparison to GDPR have been discussed in detail. The conclusion of the research analyses the development of various data protection legislation regimes in South Asia.

Keywords: data privacy, GDPR, Asia, data protection laws

Procedia PDF Downloads 61
137 Utilization, Barriers and Determinants of Emergency Medical Services in Mekelle City, Tigray, Ethiopia: A Community-Based Cross-Sectional Study

Authors: Goitom Molalign Takele, Tsegalem Hailemariam Ballo, Kiros Belay Gebrekidan, Birhan Gebresilassie Gebregiorgis

Abstract:

Background: Emergency medical services (EMS) are services that provide out-of-hospital emergency medical care to injured or ill peoples, and transporting to definitive care. EMS is an integral part of the emergency medical system and has been associated with decreased morbidity and mortality related to emergency cases. The aim of this study was to assess the utilization, barriers, and determinants of EMS in Mekelle, Ethiopia. Methods: A community-based cross-sectional study was conducted in selected sub-cities of Mekelle. A multistage sampling method was employed to recruit study participants, and data were collected by trained data collectors using an interviewer-administered questionnaire. Multivariate logistic regression analysis was used to examine the statistical association of the determinants of EMS utilization. Results: Half (50.5%) of the respondents had experienced or witnessed an emergency incident in the past year. The common means of transportations used were Bajaj’s (39.2%) and ambulances (22.7%). Majority (88.1%) of the respondents did not knew the EMS access phone number of an ambulance. As their preferred mode of transportation in case of emergency conditions, 42.2% of the participants reported an ambulance, followed by Bajaj 33.7%. Where participants who had gynecologic emergencies were 9.4 times (AOR=9.4, 95% CI: 1.04, 85, p=0.046), and those who knew any ambulance numbers were 3.6 times (AOR=3.6, 95% CI: 1.22, 10.8, p=0.02) more likely to use ambulance services in case of emergencies. Conclusion: The ambulance utilization level in Mekelle city was low and victims of emergency conditions were being transported mainly using public transports such as Bajaj’s and taxis. Even though the perception of the public towards EMS services is favorable, lack of awareness of EMS access, and lack of integrated EMS system in the city are the barriers that may have contributed to the low utilization. Actions to improve EMS access and integrating the system are warranted to promote the services utilization.

Keywords: emergency medical services, utilization, Mekelle, barriers

Procedia PDF Downloads 45
136 Music Educators for Peace: Synchronizing Music and Pedagogical Experiences to Re-Build Social Fabric in Colombia's Post-Conflict

Authors: Julian Dario Castro Cifuentes

Abstract:

In Colombia, the armed conflict has lasted for more than sixty years bringing poverty, internal displacement of people, deaths from both government and insurgent forces and other violence-related problems that has damaged its social fabric. In 2016, the peace process between the Colombian government and the FARC rebels brought the possibility of ending this war and a new set of challenges to Colombian society in order to achieve pacific coexistence and reconciliation. In this scenario, there have been different efforts from diverse social actors in order to build peace and reconciliation mainly within the victims of the armed conflict. In the case of music, there have been multiple programs for social transformation through music and pedagogical experiences. Nevertheless, the need to strengthen this initiative by giving ‘peace building oriented’ pedagogical tools to the musicians that lead this experiences and understanding which aspects make this practices ‘musically meaningful’, has been recognized. For this reason, the purpose of this study is to discuss the convergences and divergences of music, and educational experiences applied to peacebuilding in the context of Colombia’s post-conflict. In this research, the hermeneutic phenomenology paradigm is applied in a case study of a peace building music education experience in the department of Nariño, Colombia articulated with the program ‘Manos a la Paz’. Two particular experiences, one on musical practice and another on music education are taken as a unit of analysis to understand its essence and structure in order to find ways to articulate efforts in peace building actions from music. This study shows how the existent gap between music experience and its subjacent pedagogical knowledge, can be reduced through deconstruction of the music and pedagogical experience. The ‘Manos a la Paz’ program showed how a peace building approach to music education can make major contributions to Pacific Coexistence and Reconciliation in Colombia’s Post-Conflict.

Keywords: music education, music for peace, music pedagogy, peace building, social fabric

Procedia PDF Downloads 204
135 Pre-Experimental Research to Investigate the Retention of Basic and Advanced Life Support Measures Knowledge and Skills by Qualified Nurses Following a Course in Professional Development in a Tertiary Teaching Hospital

Authors: Ram Sharan Mehta, Gayanandra Malla, Anita Gurung, Anu Aryal, Divya Labh, Hricha Neupane

Abstract:

Objectives: Lack of resuscitation skills of nurses and doctors in basic life support (BLS) and advanced life support (ALS) has been identified as a contributing factor to poor outcomes of cardiac arrest victims. The objective of this study was to examine retention of life support measures (BLS/ALS) knowledge and skills of nurses following education intervention programme. Materials and Methods: Pre-experimental research design was used to conduct the study among the nurses working in medical units of B.P Koirala Institute of Health Sciences, where CPR is very commonly performed. Using convenient sampling technique total of 20 nurses agreed to participate and give consent were included in the study. The theoretical, demonstration and re-demonstration were arranged involving the trained doctors and nurses during the three hours educational session. Post-test was carried out after two week of education intervention programme. The 2010 BLS & ALS guidelines were used as guide for the study contents. The collected data were analyzed using SPSS-15 software. Results: It was found that there is significant increase in knowledge after education intervention in the components of life support measures (BLS/ALS) i.e. ratio of chest compression to ventilation in BLS (P=0.001), correct sequence of CPR (p <0.001), rate of chest compression in ALS (P=0.001), the depth of chest compression in adult CPR (p<0.001), and position of chest compression in CPR (P=0.016). Nurses were well appreciated the programme and request to continue in future for all the nurses. Conclusions: At recent BLS/ALS courses (2010), a significant number of nurses remain without any such training. Action is needed to ensure all nurses receive BLS training and practice this skill regularly in order to retain their knowledge.

Keywords: pre-experimental, basic and advance life support, nurses, sampling technique

Procedia PDF Downloads 240