Search results for: Advanced Persistent Threat (APT)
3699 Strategic Cyber Sentinel: A Paradigm Shift in Enhancing Cybersecurity Resilience
Authors: Ayomide Oyedele
Abstract:
In the dynamic landscape of cybersecurity, "Strategic Cyber Sentinel" emerges as a revolutionary framework, transcending traditional approaches. This paper pioneers a holistic strategy, weaving together threat intelligence, machine learning, and adaptive defenses. Through meticulous real-world simulations, we demonstrate the unprecedented resilience of our framework against evolving cyber threats. "Strategic Cyber Sentinel" redefines proactive threat mitigation, offering a robust defense architecture poised for the challenges of tomorrow.Keywords: cybersecurity, resilience, threat intelligence, machine learning, adaptive defenses
Procedia PDF Downloads 833698 Childhood Adversity and Delinquency in Youth: Self-Esteem and Depression as Mediators
Authors: Yuhui Liu, Lydia Speyer, Jasmin Wertz, Ingrid Obsuth
Abstract:
Childhood adversities refer to situations where a child's basic needs for safety and support are compromised, leading to substantial disruptions in their emotional, cognitive, social, or neurobiological development. Given the prevalence of adversities (8%-39%), their impact on developmental outcomes is challenging to completely avoid. Delinquency is an important consequence of childhood adversities, given its potential causing violence and other forms of victimisation, influencing victims, delinquents, their families, and the whole of society. Studying mediators helps explain the link between childhood adversity and delinquency, which aids in designing effective intervention programs that target explanatory variables to disrupt the path and mitigate the effects of childhood adversities on delinquency. The Dimensional Model of Adversity and Psychopathology suggests that threat-based adversities influence outcomes through emotion processing, while deprivation-based adversities do so through cognitive mechanisms. Thus, considering a wide range of threat-based and deprivation-based adversities and their co-occurrence and their associations with delinquency through cognitive and emotional mechanisms is essential. This study employs the Millennium Cohort Study, tracking the development of approximately 19,000 individuals born across England, Scotland, Wales and Northern Ireland, representing a nationally representative sample. Parallel mediation models compare the mediating roles of self-esteem (cognitive) and depression (affective) in the associations between childhood adversities and delinquency. Eleven types of childhood adversities were assessed both individually and through latent class analysis, considering adversity experiences from birth to early adolescence. This approach aimed to capture how threat-based, deprived-based, or combined threat and deprived-based adversities are associated with delinquency. Eight latent classes were identified: three classes (low adversity, especially direct and indirect violence; low childhood and moderate adolescent adversities; and persistent poverty with declining bullying victimisation) were negatively associated with delinquency. In contrast, three classes (high parental alcohol misuse, overall high adversities, especially regarding household instability, and high adversity) were positively associated with delinquency. When mediators were included, all classes showed a significant association with delinquency through depression, but not through self-esteem. Among the eleven single adversities, seven were positively associated with delinquency, with five linked through depression and none through self-esteem. The results imply the importance of affective variables, not just for threat-based but also deprivation-based adversities. Academically, this suggests exploring other mechanisms linking adversities and delinquency since some adversities are linked through neither depression nor self-esteem. Clinically, intervention programs should focus on affective variables like depression to mitigate the effects of childhood adversities on delinquency.Keywords: childhood adversity, delinquency, depression, self-esteem
Procedia PDF Downloads 323697 A Machine Learning-Assisted Crime and Threat Intelligence Hunter
Authors: Mohammad Shameel, Peter K. K. Loh, James H. Ng
Abstract:
Cybercrime is a new category of crime which poses a different challenge for crime investigators and incident responders. Attackers can mask their identities using a suite of tools and with the help of the deep web, which makes them difficult to track down. Scouring the deep web manually takes time and is inefficient. There is a growing need for a tool to scour the deep web to obtain useful evidence or intel automatically. In this paper, we will explain the background and motivation behind the research, present a survey of existing research on related tools, describe the design of our own crime/threat intelligence hunting tool prototype, demonstrate its capability with some test cases and lastly, conclude with proposals for future enhancements.Keywords: cybercrime, deep web, threat intelligence, web crawler
Procedia PDF Downloads 1733696 Sharing Experience in Authentic Learning for Mobile Security
Abstract:
Mobile devices such as smartphones are getting more and more popular in our daily lives. The security vulnerability and threat attacks become a very emerging and important research and education topic in computing security discipline. There is a need to have an innovative mobile security hands-on laboratory to provide students with real world relevant mobile threat analysis and protection experience. This paper presents an authentic teaching and learning mobile security approach with smartphone devices which covers most important mobile threats in most aspects of mobile security. Each lab focuses on one type of mobile threats, such as mobile messaging threat, and conveys the threat analysis and protection in multiple ways, including lectures and tutorials, multimedia or app-based demonstration for threats analysis, and mobile app development for threat protections. This authentic learning approach is affordable and easily-adoptable which immerse students in a real world relevant learning environment with real devices. This approach can also be applied to many other mobile related courses such as mobile Java programming, database, network, and any security relevant courses so that can learn concepts and principles better with the hands-on authentic learning experience.Keywords: mobile computing, Android, network, security, labware
Procedia PDF Downloads 4063695 On the Principles of Self-determination, Remedial Secession, and Responsibility to Protect: The Case of Nagorno Karabakh
Authors: Sara Melkonyan
Abstract:
Over the past decades, the political (and partly legal) doctrine of remedial secession has emerged on the basis of the development of internationally recognized human rights and rights of peoples stemming from various multilateral treaties, which stipulates that aggrieved and persecuted nations have the right to secede from the parent state as a remedy for their continuous and unstoppable grievances. The 44-day war in Nagorno-Karabakh and the following events posed severe challenges for Nagorno-Karabakh and its people. Constant aggression and threat, the humanitarian crisis caused by the closure of the Lachin Corridor, the persistent threat of ethnic cleansing of Artsakhi Armenians, and the state policy that has been executed towards Artsakhi people by the Azerbaijani authorities come to prove that the Artsakhi people cannot survive under Azerbaijani control and secession may be the last resort for ending oppression. The paper tries to make parallels with similar cases and discuss the doctrine of remedial secession applied selectively among different cases. This paper aims to figure out why in some cases the secessionist movements succeeded to gain independence based on the doctrine of remedial secession, in other cases, they refused to gain recognition from the international community. Through analyzing the domestic-level and then international-level factors, the study concluded that the doctrine of remedial secession is inherently in the political realm and almost impossible to draw substantial “recipes” for warranting secession, and the latter is not applied similarly among the cases, so its success mainly depends on the geopolitical interests of the great powers involved.Keywords: R2P, remedial secession, self-determination, conflicts
Procedia PDF Downloads 793694 Effects of Swimming Exercise Training on Persistent Pain in Rats after Thoracotomy
Authors: Shao-Cyuan Yewang, Yu-Wen Chen
Abstract:
Background: Exercise training is well known to alleviate chronic pain syndromes improve of chronic pain. This study investigated the effect of swimming exercise training on thoracotomy and rib retraction-induced allodynia. Methods: Male Sprague Dawley rats that received animal model of persistent postthoracotomy pain. All rats were divided into three groups: sham operations group (Sham), thoracotomy and rib retraction group (TRR), and TRR with swimming exercise training for 90min/day, 7 days a week for 4 weeks (TRR-SEW). The sham group did not receive retraction of the ribs. Thus, they received a pleural incision. The levels of mechanical and cold allodynia were measured by von Frey and acetone test. Results: In von Frey test, the level of mechanical allodynia in the TRR group was significantly higher than the sham group. The level of mechanical allodynia in the TRR-SEW group was significantly lower than the TRR group. In acetone test, the level of cold allodynia in the TRR group was significantly higher than the sham group. The level of cold allodynia in the TRR-SEW group was significantly lower than the TRR group. Conclusions: These results suggest that swimming exercise training decreases persistent postthoracotomy pain caused by TRR surgery. It may provide one of the new therapeutic effects of swimming exercise training could alleviate persistent postthoracotomy pain.Keywords: chronic pain, thoracotomy pain, swimming, von Frey test, acetone test
Procedia PDF Downloads 2183693 Hierarchical Filtering Method of Threat Alerts Based on Correlation Analysis
Authors: Xudong He, Jian Wang, Jiqiang Liu, Lei Han, Yang Yu, Shaohua Lv
Abstract:
Nowadays, the threats of the internet are enormous and increasing; however, the classification of huge alert messages generated in this environment is relatively monotonous. It affects the accuracy of the network situation assessment, and also brings inconvenience to the security managers to deal with the emergency. In order to deal with potential network threats effectively and provide more effective data to improve the network situation awareness. It is essential to build a hierarchical filtering method to prevent the threats. In this paper, it establishes a model for data monitoring, which can filter systematically from the original data to get the grade of threats and be stored for using again. Firstly, it filters the vulnerable resources, open ports of host devices and services. Then use the entropy theory to calculate the performance changes of the host devices at the time of the threat occurring and filter again. At last, sort the changes of the performance value at the time of threat occurring. Use the alerts and performance data collected in the real network environment to evaluate and analyze. The comparative experimental analysis shows that the threat filtering method can effectively filter the threat alerts effectively.Keywords: correlation analysis, hierarchical filtering, multisource data, network security
Procedia PDF Downloads 2013692 Cross-Country Differences in Homeownership: A Cultural Phenomenon?
Authors: Stefanie J. Huber, Tobias Schmidt
Abstract:
Cross-country differences in homeownership rates are large and very persistent over time, ranging between 35% in Switzerland to 80% in Spain. In this project, we test the hypothesis that these cross-country differences are driven by cultural tastes. To isolate the effect of culture from the effects of institutions and economic factors, we investigate the homeownership attitudes of second-generation immigrants in the United States. We find robust evidence that cross-country differences in cultural preferences are an important explanatory factor for the observed persistent differences in homeownership rates across countries.Keywords: housing markets, homeownership rates, country heterogeneity, preferences, cultural transmission, migration
Procedia PDF Downloads 2763691 Short-Term Exposing Effects of 4,4'-DDT on Mitochondrial Electron Transport Complexes in Eyes of Zebrafish
Authors: Eun Ko, Moonsung Choi, Sooim Shin
Abstract:
4,4’-Dichlorodiphenyltrichloroethane (4,4’-DDT) is colorless, odorless organochlorine and known as persistent toxic organic pollutant accumulated in organs. In this study, effects of 4,4’-DDT on activities of mitochondrial electron transport chain system was analyzed. 4,4’-DDT is directly treated to isolated mitochondria from eyes of zebrafish and then activities of mitochondrial complex I, II, III, IV were measured spectrophotometrically. The reaction was proceeded immediately after adding 4,4’-DDT to examine the short-term exposing effects of persistent organic pollutant. As a result, high concentration of 4,4’-DDT treated mitochondria exhibited slightly enhanced activity in all complexes than non-treated one except complex III in male. Particularly, 4,4’-DDT was more effective on enzymatic activity in mitochondria isolated from eyes of male zebrafish. These results represented that 4,4’-DDT might temporarily induce to open up ion channel on isolated mitochondria resulting in increasing the functional activity of mitochondrial electron transport chain system.Keywords: electron transport chain, mitochondrial function, persistent organic pollutant, spectrophotometric assay, zebrafish
Procedia PDF Downloads 2283690 Modification of the Risk for Incident Cancer with Changes in the Metabolic Syndrome Status: A Prospective Cohort Study in Taiwan
Authors: Yung-Feng Yen, Yun-Ju Lai
Abstract:
Background: Metabolic syndrome (MetS) is reversible; however, the effect of changes in MetS status on the risk of incident cancer has not been extensively studied. We aimed to investigate the effects of changes in MetS status on incident cancer risk. Methods: This prospective, longitudinal study used data from Taiwan’s MJ cohort of 157,915 adults recruited from 2002–2016 who had repeated MetS measurements 5.2 (±3.5) years apart and were followed up for the new onset of cancer over 8.2 (±4.5) years. A new diagnosis of incident cancer in study individuals was confirmed by their pathohistological reports. The participants’ MetS status included MetS-free (n=119,331), MetS-developed (n=14,272), MetS-recovered (n=7,914), and MetS-persistent (n=16,398). We used the Fine-Gray sub-distribution method, with death as the competing risk, to determine the association between MetS changes and the risk of incident cancer. Results: During the follow-up period, 7,486 individuals had new development of cancer. Compared with the MetS-free group, MetS-persistent individuals had a significantly higher risk of incident cancer (adjusted hazard ratio [aHR], 1.10; 95% confidence interval [CI], 1.03-1.18). Considering the effect of dynamic changes in MetS status on the risk of specific cancer types, MetS persistence was significantly associated with a higher risk of incident colon and rectum, kidney, pancreas, uterus, and thyroid cancer. The risk of kidney, uterus, and thyroid cancer in MetS-recovered individuals was higher than in those who remained MetS but lower than MetS-persistent individuals. Conclusions: Persistent MetS is associated with a higher risk of incident cancer, and recovery from MetS may reduce the risk. The findings of our study suggest that it is imperative for individuals with pre-existing MetS to seek treatment for this condition to reduce the cancer risk.Keywords: metabolic syndrome change, cancer, risk factor, cohort study
Procedia PDF Downloads 783689 On Mathematical Modelling and Optimization of Emerging Trends Processes in Advanced Manufacturing
Authors: Agarana Michael C., Akinlabi Esther T., Pule Kholopane
Abstract:
Innovation in manufacturing process technologies and associated product design affects the prospects for manufacturing today and in near future. In this study some theoretical methods, useful as tools in advanced manufacturing, are considered. In particular, some basic Mathematical, Operational Research, Heuristic, and Statistical techniques are discussed. These techniques/methods are very handy in many areas of advanced manufacturing processes, including process planning optimization, modelling and analysis. Generally the production rate requires the application of Mathematical methods. The Emerging Trends Processes in Advanced Manufacturing can be enhanced by using Mathematical Modelling and Optimization techniques.Keywords: mathematical modelling, optimization, emerging trends, advanced manufacturing
Procedia PDF Downloads 2973688 Release of Legacy Persistent Organic Pollutants and Mitigating Their Effects in Downstream Communities
Authors: Kimberley Rain Miner, Karl Kreutz, Larry LeBlanc
Abstract:
During the period of 1950-1970 persistent organic pollutants such as DDT, dioxin and PCB were released in the atmosphere and distributed through precipitation into glaciers throughout the world. Recent abrupt climate change is increasing the melt rate of these glaciers, introducing the toxins to the watershed. Studies have shown the existence of legacy pollutants in glacial ice, but neither the impact nor quantity of these toxins on downstream populations has been assessed. If these pollutants are released at toxic levels it will be necessary to create a mitigation plan to lower their impact on the affected communities.Keywords: climate change, adaptation, mitigation, risk management
Procedia PDF Downloads 3613687 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network
Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono
Abstract:
There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.Keywords: Bayesian network, decision analysis, national security system, text mining
Procedia PDF Downloads 3923686 Relationship between Different Heart Rate Control Levels and Risk of Heart Failure Rehospitalization in Patients with Persistent Atrial Fibrillation: A Retrospective Cohort Study
Authors: Yongrong Liu, Xin Tang
Abstract:
Background: Persistent atrial fibrillation is a common arrhythmia closely related to heart failure. Heart rate control is an essential strategy for treating persistent atrial fibrillation. Still, the understanding of the relationship between different heart rate control levels and the risk of heart failure rehospitalization is limited. Objective: The objective of the study is to determine the relationship between different levels of heart rate control in patients with persistent atrial fibrillation and the risk of readmission for heart failure. Methods: We conducted a retrospective dual-centre cohort study, collecting data from patients with persistent atrial fibrillation who received outpatient treatment at two tertiary hospitals in central and western China from March 2019 to March 2020. The collected data included age, gender, body mass index (BMI), medical history, and hospitalization frequency due to heart failure. Patients were divided into three groups based on their heart rate control levels: Group I with a resting heart rate of less than 80 beats per minute, Group II with a resting heart rate between 80 and 100 beats per minute, and Group III with a resting heart rate greater than 100 beats per minute. The readmission rates due to heart failure within one year after discharge were statistically analyzed using propensity score matching in a 1:1 ratio. Differences in readmission rates among the different groups were compared using one-way ANOVA. The impact of varying levels of heart rate control on the risk of readmission for heart failure was assessed using the Cox proportional hazards model. Binary logistic regression analysis was employed to control for potential confounding factors. Results: We enrolled a total of 1136 patients with persistent atrial fibrillation. The results of the one-way ANOVA showed that there were differences in readmission rates among groups exposed to different levels of heart rate control. The readmission rates due to heart failure for each group were as follows: Group I (n=432): 31 (7.17%); Group II (n=387): 11.11%; Group III (n=317): 90 (28.50%) (F=54.3, P<0.001). After performing 1:1 propensity score matching for the different groups, 223 pairs were obtained. Analysis using the Cox proportional hazards model showed that compared to Group I, the risk of readmission for Group II was 1.372 (95% CI: 1.125-1.682, P<0.001), and for Group III was 2.053 (95% CI: 1.006-5.437, P<0.001). Furthermore, binary logistic regression analysis, including variables such as digoxin, hypertension, smoking, coronary heart disease, and chronic obstructive pulmonary disease as independent variables, revealed that coronary heart disease and COPD also had a significant impact on readmission due to heart failure (p<0.001). Conclusion: The correlation between the heart rate control level of patients with persistent atrial fibrillation and the risk of heart failure rehospitalization is positive. Reasonable heart rate control may significantly reduce the risk of heart failure rehospitalization.Keywords: heart rate control levels, heart failure rehospitalization, persistent atrial fibrillation, retrospective cohort study
Procedia PDF Downloads 743685 Personal Identity and Group Identity under Threat following Exclusion: A Study in Singapore and in the Netherlands
Authors: Z. N. Huwaë, E.M. W. Tong, Y. H. M. See
Abstract:
In the present study, the researchers examined whether people from collectivistic cultures perceive a more group identity threat following social exclusion, whereas a more personal identity threat would be the case for those from individualistic cultures. In doing so, they investigated whether threatened identities depend on whether people are excluded by ingroup members (same ethnic background) or outgroup members (another ethnic background), as exclusion studies have shown mixed results when it comes to being excluded by ingroup versus outgroup members. For this purpose, students in Singapore and in the Netherlands participated in an online ball-tossing game (Cyberball) where they were excluded or included by other players with either the same or other ethnicity. Tentative results showed that both Singaporean and Dutch participants reported a more threat to their group identity than to their personal identity following exclusion and this did not depend on who excluded them. These tentative findings suggest that threatened identities following exclusion may not depend on cultural factors or on the source of exclusion.Keywords: cultures, exclusion, experiment, group membership, identities
Procedia PDF Downloads 1163684 Cognitive and Environmental Factors Affecting Graduate Student Perception of Mathematics
Authors: Juanita Morris
Abstract:
The purpose of this study will examine the mediating relationships between the theories of intelligence, mathematics anxiety, gender stereotype threat, meta-cognition and math performance through the use of eye tracking technology, affecting student perception and problem-solving abilities. The participants will consist of (N=80) female graduate students. Test administered were the Abbreviated Math Anxiety Scale, Tobii Eye Tracking software, gender stereotype threat through Google images, and they will be asked to describe their problem-solving approach allowed to measure metacognition. Participants will be administered mathematics problems while having gender stereotype threat shown to them through online images while being directed to look at the eye tracking software Tobii. We will explore this by asking ‘Is mathematics anxiety associated with the theories of intelligence and gender stereotype threat and how does metacognition and math performance place a role in mediating those perspectives?’. It is hypothesized that math-anxious students are more likely affected by the gender stereotype threat and that may play a role in their performance? Furthermore, we also want to explore whether math anxious students are more likely to be an entity theorist than incremental theorist and whether those who are math anxious will be more likely to be fixated on variables associated with coefficients? Path analysis and independent samples t-test will be used to generate results for this study. We hope to conclude that both the theories of intelligence and metacognition mediate the relationship between mathematics anxiety and gender stereotype threat.Keywords: math anxiety, emotions, affective domains fo learning, cognitive underlinings
Procedia PDF Downloads 2693683 Surface Deformation Studies in South of Johor Using the Integration of InSAR and Resistivity Methods
Authors: Sirajo Abubakar, Ismail Ahmad Abir, Muhammad Sabiu Bala, Muhammad Mustapha Adejo, Aravind Shanmugaveloo
Abstract:
Over the years, land subsidence has been a serious threat mostly to urban areas. Land subsidence is the sudden sinking or gradual downward settling of the ground’s surface with little or no horizontal motion. In most areas, land subsidence is a slow process that covers a large area; therefore, it is sometimes left unnoticed. South of Johor is the area of interest for this project because it is going through rapid urbanization. The objective of this research is to evaluate and identify potential deformations in the south of Johor using integrated remote sensing and 2D resistivity methods. Synthetic aperture radar interferometry (InSAR) which is a remote sensing technique has the potential to map coherent displacements at centimeter to millimeter resolutions. Persistent scatterer interferometry (PSI) stacking technique was applied to Sentinel-1 data to detect the earth deformation in the study area. A dipole-dipole configuration resistivity profiling was conducted in three areas to determine the subsurface features in that area. This subsurface features interpreted were then correlated with the remote sensing technique to predict the possible causes of subsidence and uplifts in the south of Johor. Based on the results obtained, West Johor Bahru (0.63mm/year) and Ulu Tiram (1.61mm/year) are going through uplift due to possible geological uplift. On the other end, East Johor Bahru (-0.26mm/year) and Senai (-1.16mm/year) undergo subsidence due to possible fracture and granitic boulders loading. Land subsidence must be taken seriously as it can cause serious damages to infrastructures and human life. Monitoring land subsidence and taking preventive actions must be done to prevent any disasters.Keywords: interferometric synthetic aperture radar, persistent scatter, minimum spanning tree, resistivity, subsidence
Procedia PDF Downloads 1473682 Case Report: Cap Polyposis with Advanced Pelvic Floor Dysfunction: Stronger Evidence of Mechanical Prolapse-related Pathology
Authors: Adrian Sebastian, Chris Gillespie
Abstract:
We describe a case of diffuse rectal involvement with cap polyposis, manifesting with a protein-losing colopathy and occurring in the setting of advanced mechanical pelvic floor dysfunction. A 59-year-old male with a 5-year history of persistent excessive flatulence, defecatory difficulties, and diarrhea. He had extensive cap polyposis of the entire rectum endoscopically. His symptoms progressed to severe fecal incontinence with mucus leakage, pelvic pain, weight loss, and hypoalbuminemia. Clinical examination exhibited severe perineal descent, a large rectocele, poor anal squeeze, and a poor defecatory technique. After a trial of nonoperative therapies addressing his defecatory dysfunction, and Helicobacter pylori eradication, surgical resection was offered due to severe symptoms with ongoing incontinence and protein loss with no other reasonable options. A robotic abdominoperineal resection with a permanent colostomy was performed, followed by an uncomplicated recovery. Our observation of coexisting mechanical pelvic floor changes in this patient lends weight to the concept of a prolapse-related phenomenon in the pathophysiology of this rare condition.Keywords: cap polyposis, pelvic dysfunction, fecal incontinence, case report
Procedia PDF Downloads 793681 Environmental Impacts on Urban Agriculture in Algiers
Authors: Sara Bouzekri, Said Madani
Abstract:
In many Mediterranean cities such as Algiers, the human activity, the strong mobility the urban sprawl, the air pollution, the problems of waste management, the wasting of the resources and the degradation of the environment weaken in an unquestionable way the farming. The question of sustainable action vis-a-vis these threats arises then in order to maintain a level of desired local development. The methodology is based on a multi-criteria method based on the AFOM diagnosis, which classifies agricultural strength indicators and those of threat, according to an analytical approach. In a sustainable development perspective, it will be appropriate to link the threat factors of the case study with the factors of climate change to see their impact on the future of agriculture. This will be accompanied by a SWOT analysis, which crosses the most significant criteria to arrive at the necessary recommendations based on future projects for urban agriculture.Keywords: Algiers, environment, urban agriculture, threat factors
Procedia PDF Downloads 2993680 The Role of Information and Communication Technology in Curbing Electoral Malpractices in Nigeria
Authors: Fred Fudah Moveh, Muhammad Abba Jallo
Abstract:
Electoral fraud remains a persistent threat to democracy in Nigeria, undermining public trust and stalling political development. This study explores the role of Information and Communication Technology (ICT) in curbing electoral fraud, focusing on its application in recent Nigerian elections. The paper identifies the main forms of electoral fraud, evaluates the effectiveness of ICT-based interventions like the Permanent Voter Card (PVC) and the Bi-modal Voter Accreditation System (BVAS), and discusses challenges such as poor infrastructure, voter intimidation, and legal inadequacies. Data was collected through structured questionnaires and interviews and analyzed using SPSS software. Results reveal that while ICT has mitigated some forms of fraud, systemic issues continue to hinder its full potential. The study concludes with recommendations for enhancing the application of ICT in Nigeria’s electoral process.Keywords: ICT, electoral fraud, election process, Nigeria, political instability
Procedia PDF Downloads 253679 INCIPIT-CRIS: A Research Information System Combining Linked Data Ontologies and Persistent Identifiers
Authors: David Nogueiras Blanco, Amir Alwash, Arnaud Gaudinat, René Schneider
Abstract:
At a time when the access to and the sharing of information are crucial in the world of research, the use of technologies such as persistent identifiers (PIDs), Current Research Information Systems (CRIS), and ontologies may create platforms for information sharing if they respond to the need of disambiguation of their data by assuring interoperability inside and between other systems. INCIPIT-CRIS is a continuation of the former INCIPIT project, whose goal was to set up an infrastructure for a low-cost attribution of PIDs with high granularity based on Archival Resource Keys (ARKs). INCIPIT-CRIS can be interpreted as a logical consequence and propose a research information management system developed from scratch. The system has been created on and around the Schema.org ontology with a further articulation of the use of ARKs. It is thus built upon the infrastructure previously implemented (i.e., INCIPIT) in order to enhance the persistence of URIs. As a consequence, INCIPIT-CRIS aims to be the hinge between previously separated aspects such as CRIS, ontologies and PIDs in order to produce a powerful system allowing the resolution of disambiguation problems using a combination of an ontology such as Schema.org and unique persistent identifiers such as ARK, allowing the sharing of information through a dedicated platform, but also the interoperability of the system by representing the entirety of the data as RDF triplets. This paper aims to present the implemented solution as well as its simulation in real life. We will describe the underlying ideas and inspirations while going through the logic and the different functionalities implemented and their links with ARKs and Schema.org. Finally, we will discuss the tests performed with our project partner, the Swiss Institute of Bioinformatics (SIB), by the use of large and real-world data sets.Keywords: current research information systems, linked data, ontologies, persistent identifier, schema.org, semantic web
Procedia PDF Downloads 1353678 Terrorism: A Threat in Constant Evolution Still Misunderstood
Authors: M. J. Gazapo Lapayese
Abstract:
It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.Keywords: responses, resilience, security, terrorism
Procedia PDF Downloads 4523677 The Temperature Influence for Gasification in the Advanced Biomass Gasifier
Authors: Narsimhulu Sanke, D. N. Reddy
Abstract:
The paper is to discuss about the influence of the temperature in the advanced biomass gasifier for gasification, when tested four different biomass fuels individually in the gasification laboratory of Centre for Energy Technology (CET). The gasifier is developed in CET to test any kind of biomass fuel for gasification without changing the gasifier. The gasifier can be used for batch operations and observed and found that there were no operational problems.Keywords: biomass fuels, temperature, advanced downdraft gasifier, tar, renewable energy sources
Procedia PDF Downloads 4943676 Transient and Persistent Efficiency Estimation for Electric Grid Utilities Based on Meta-Frontier: Comparative Analysis of China and Japan
Authors: Bai-Chen Xie, Biao Li
Abstract:
With the deepening of international exchanges and investment, the international comparison of power grid firms has become the focus of regulatory authorities. Ignoring the differences in the economic environment, resource endowment, technology, and other aspects of different countries or regions may lead to efficiency bias. Based on the Meta-frontier model, this paper divides China and Japan into two groups by using the data of China and Japan from 2006 to 2020. While preserving the differences between the two countries, it analyzes and compares the efficiency of the transmission and distribution industries of the two countries. Combined with the four-component stochastic frontier model, the efficiency is divided into transient and persistent efficiency. We found that there are obvious differences between the transmission and distribution sectors in China and Japan. On the one hand, the inefficiency of the two countries is mostly caused by long-term and structural problems. The key to improve the efficiency of the two countries is to focus more on solving long-term and structural problems. On the other hand, the long-term and structural problems that cause the inefficiency of the two countries are not the same. Quality factors have different effects on the efficiency of the two countries, and this different effect is captured by the common frontier model but is offset in the overall model. Based on these findings, this paper proposes some targeted policy recommendations.Keywords: transmission and distribution industries, transient efficiency, persistent efficiency, meta-frontier, international comparison
Procedia PDF Downloads 1003675 Religious Insurgency in Nigeria: A Bane to National Unity
Authors: Ayoola Adediran Amos
Abstract:
Nigeria as a secular state that is characterized with various religions namely: Christianity, Islam and African Religion. Each of the religion adherents often claim that their religion is the only means of gaining eternity while others who do not belong to their sect may not be opportuned. Religious doctrine within those religious sects is another source of insurgency which serves as a threat to the unity of Nigeria. Similarly, Boko Haram Religious group has become a threat to the unity of the country in which its root has both political and religious undertones. Primary and secondary sources of collecting data were used. Historical method allowed enquiry into the past events and improvement to the current experience. Both published and unpublished theses were used. Interview was also conducted as part of the secondary sources. It was observed that all aspects of the system in Nigeria were affected with this scourge of religious unrest. i.e. education, political, economic and a host of others. Finally, it was recommended that religious leaders should be given adequate orientation on the needs not to preach against other religious groups. Government of Nigeria should not give priority to one religion at the expense of others.Keywords: insurgency, national unity, religious, threat
Procedia PDF Downloads 3313674 Understanding the Programming Techniques Using a Complex Case Study to Teach Advanced Object-Oriented Programming
Authors: M. Al-Jepoori, D. Bennett
Abstract:
Teaching Object-Oriented Programming (OOP) as part of a Computing-related university degree is a very difficult task; the road to ensuring that students are actually learning object oriented concepts is unclear, as students often find it difficult to understand the concept of objects and their behavior. This problem is especially obvious in advanced programming modules where Design Pattern and advanced programming features such as Multi-threading and animated GUI are introduced. Looking at the students’ performance at their final year on a university course, it was obvious that the level of students’ understanding of OOP varies to a high degree from one student to another. Students who aim at the production of Games do very well in the advanced programming module. However, the students’ assessment results of the last few years were relatively low; for example, in 2016-2017, the first quartile of marks were as low as 24.5 and the third quartile was 63.5. It is obvious that many students were not confident or competent enough in their programming skills. In this paper, the reasons behind poor performance in Advanced OOP modules are investigated, and a suggested practice for teaching OOP based on a complex case study is described and evaluated.Keywords: complex programming case study, design pattern, learning advanced programming, object oriented programming
Procedia PDF Downloads 2213673 Context Aware Anomaly Behavior Analysis for Smart Home Systems
Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu
Abstract:
The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.Keywords: Internet of Things, network security, context awareness, intrusion detection
Procedia PDF Downloads 1913672 Persistent Toxicity of Imidacloprid to Aphis gossypii Glover and Amarasca biguttula biguttula Ishida on Okra
Authors: M. A. Pawar, C. S. Patil
Abstract:
Investigations were carried out to evaluate the persistent toxicity of imidacloprid, thiamethoxam and dimethoate to Aphis gossypii and Amrasca biguttula biguttula under laboratory condition during 2012. The experiment was conducted in a completely randomized block design with three replications in the glass house of department of Entomology M. P. K. V. Rahuri. Okra plants were raised in glass house following all recommended agronomic practices. The 21 days old plants were used for assessing the effect of insecticides on aphids and jassids. The insecticides were diluted with distilled water to make desired concentrations and used for foliar application. The insecticides included in the study were imidacloprid 17.8 SL, imidacloprid 70 WG, thiamethoxam 25 WG and dimethoate 30 EC. Untreated check was maintained by spraying with distilled water. The mortality of aphids and jassids on treated leaf were recorded at 1, 3, 5, 7, 9, 11, 13, 15, 17, 21, and 25 days after spray till zero per cent mortality observed for each treatment. Treated leaves from the glasshouse were brought to laboratory and were put in tube with moist cotton swab at the bottom of leaf and sucking apparatus was fit to the tube. Ten jassids were sucked in each tube from the plants in the field. Evaluated insecticides differed in their persistence and index of persistence toxicity against both insects of different treatments. Recommended dose of imidacloprid (25 g a.i/ha) persisted for 21 days against both aphids and jassids. However dimethoate, a conventional insecticide persisted for 11 days.Keywords: Amrasca biguttula biguttula, Aphis gossypii, imidacloprid, persistent toxicity
Procedia PDF Downloads 1903671 An Exploration of Why Insider Fraud Is the Biggest Threat to Your Business
Authors: Claire Norman-Maillet
Abstract:
Insider fraud, otherwise known as occupational, employee, or internal fraud, is a financial crime threat. Perpetrated by defrauding (or attempting to defraud) one’s current, prospective, or past employer, an ‘employee’ covers anyone employed by the company, including board members and contractors. The Coronavirus pandemic has forced insider fraud into the spotlight, and it isn’t dimming. As the focus of most academics and practitioners has historically been on that of ‘external fraud’, insider fraud is often overlooked or not considered to be a real threat. However, since COVID-19 changed the working world, pushing most of us into remote or hybrid working, employers cannot easily keep an eye on what their staff are doing, which has led to reliance on trust and transparency. This, therefore, brings about an increased risk of insider fraud perpetration. The objective of this paper is to explore why insider fraud is, therefore, now the biggest threat to a business. To achieve the research objective, participating individuals within the financial crime sector (either as a practitioner or consultants) attended semi-structured interviews with the researcher. The principal recruitment strategy for these individuals was via the researcher’s LinkedIn network. The main findings in the research suggest that insider fraud has been ignored and rejected as a threat to a business, owing to a reluctance to admit that a colleague may perpetrate. A positive of the Coronavirus pandemic is that it has forced insider fraud into a more prominent position and giving it more importance on a business’ agenda and risk register. Despite insider fraud always having been a possibility (and therefore a risk) within any business, it is very rare that a business has given it the attention it requires until now, if at all. The research concludes that insider fraud needs to prioritised by all businesses, and even ahead of external fraud. The research also provides advice on how a business can add new or enhance existing controls to mitigate the risk.Keywords: insider fraud, occupational fraud, COVID-19, COVID, coronavirus, pandemic, internal fraud, financial crime, economic crime
Procedia PDF Downloads 643670 The Impact of Globalization on the Development of Israel Advanced Changes
Authors: Erez Cohen
Abstract:
The study examines the socioeconomic impact of development of an advanced industry in Israel. The research method is based on data collected from the Israel Central Bureau of Statistics and from the National Insurance Institute (NII) databases, which provided information that allows to examine the Economic and Social Changes during the 1990s. The study examined the socioeconomic effects of the development of advanced industry in Israel. The research findings indicate that as a result of globalization processes, the weight of traditional industry began to diminish as a result of factory closures and the laying off of workers. These circumstances led to growing unemployment among the weaker groups in Israeli society, detracting from their income and thus increasing inequality among different socioeconomic groups in Israel and enhancement of social disparities.Keywords: globalization, Israeli advanced industry, public policy, socio-economic indicators
Procedia PDF Downloads 164