Search results for: cyber liability insurance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 760

Search results for: cyber liability insurance

190 Health Trajectory Clustering Using Deep Belief Networks

Authors: Farshid Hajati, Federico Girosi, Shima Ghassempour

Abstract:

We present a Deep Belief Network (DBN) method for clustering health trajectories. Deep Belief Network (DBN) is a deep architecture that consists of a stack of Restricted Boltzmann Machines (RBM). In a deep architecture, each layer learns more complex features than the past layers. The proposed method depends on DBN in clustering without using back propagation learning algorithm. The proposed DBN has a better a performance compared to the deep neural network due the initialization of the connecting weights. We use Contrastive Divergence (CD) method for training the RBMs which increases the performance of the network. The performance of the proposed method is evaluated extensively on the Health and Retirement Study (HRS) database. The University of Michigan Health and Retirement Study (HRS) is a nationally representative longitudinal study that has surveyed more than 27,000 elderly and near-elderly Americans since its inception in 1992. Participants are interviewed every two years and they collect data on physical and mental health, insurance coverage, financial status, family support systems, labor market status, and retirement planning. The dataset is publicly available and we use the RAND HRS version L, which is easy to use and cleaned up version of the data. The size of sample data set is 268 and the length of the trajectories is equal to 10. The trajectories do not stop when the patient dies and represent 10 different interviews of live patients. Compared to the state-of-the-art benchmarks, the experimental results show the effectiveness and superiority of the proposed method in clustering health trajectories.

Keywords: health trajectory, clustering, deep learning, DBN

Procedia PDF Downloads 348
189 Cyberstalking as an Online Sexual Harassment: Evidence from Experience from Female University Students in Tanzanian Institutions of Higher Learning

Authors: Angela Mathias Kavishe

Abstract:

Sexual harassment directed at women is reported in many societies, including in Tanzania. The advent of ICT technology, especially in universities, seems to aggravate the situation by extending harassment to cyberspace in various forms, including cyberstalking. Evidence shows that online violence is more dangerous than physical one due to the ability to access multiple private information, attack many victims, mask the perpetrator's identity, suspend the threat for a long time and spread over time and space. The study aimed to measure the magnitude of cyber harassment in Tanzanian higher learning institutions and to assess institutional sensitivity to ICT-mediated gender-based violence. It was carried out in 4 higher learning institutions in Tanzania: Mwalimu Nyerere Memorial Academy and Institute of Finance Management in Dar es Salaam and SAUT, and the University of Dodoma, where a survey questionnaire was distributed to 400 students and 40 key informants were interviewed. It was found that in each institution, the majority of female students experienced online harassment on social media perpetrated by ex-partners, male students, and university male teaching staff. The perpetrators compelled the female students to post nude pictures, have sexual relations with them, or utilize the posted private photographs to force female students to practice online or offline sexual relations. These threats seem to emanate from social-cultural beliefs about the subordinate position of women in society and that women's bodies are perceived as sex objects. It is therefore concluded that cyberspace provides an alternative space for perpetrators to exercise violence towards women.

Keywords: cyberstalking, embodiment, gender-based violence, internet

Procedia PDF Downloads 14
188 A Novel Methodology for Browser Forensics to Retrieve Searched Keywords from Windows 10 Physical Memory Dump

Authors: Dija Sulekha

Abstract:

Nowadays, a good percentage of reported cybercrimes involve the usage of the Internet, directly or indirectly for committing the crime. Usually, Web Browsers leave traces of browsing activities on the host computer’s hard disk, which can be used by investigators to identify internet-based activities of the suspect. But criminals, who involve in some organized crimes, disable browser file generation feature to hide the evidence while doing illegal activities through the Internet. In such cases, even though browser files were not generated in the storage media of the system, traces of recent and ongoing activities were generated in the Physical Memory of the system. As a result, the analysis of Physical Memory Dump collected from the suspect's machine retrieves lots of forensically crucial information related to the browsing history of the Suspect. This information enables the cyber forensic investigators to concentrate on a few highly relevant selected artefacts while doing the Offline Forensics analysis of storage media. This paper addresses the reconstruction of web browsing activities by conducting live forensics to identify searched terms, downloaded files, visited sites, email headers, email ids, etc. from the physical memory dump collected from Windows 10 Systems. Well-known entry points are available for retrieving all the above artefacts except searched terms. The paper describes a novel methodology to retrieve the searched terms from Windows 10 Physical Memory. The searched terms retrieved in this way can be used for doing advanced file and keyword search in the storage media files reconstructed from the file system recovery in offline forensics.

Keywords: browser forensics, digital forensics, live Forensics, physical memory forensics

Procedia PDF Downloads 99
187 Safety Climate Assessment and Its Impact on the Productivity of Construction Enterprises

Authors: Krzysztof J. Czarnocki, F. Silveira, E. Czarnocka, K. Szaniawska

Abstract:

Research background: Problems related to the occupational health and decreasing level of safety occur commonly in the construction industry. Important factor in the occupational safety in construction industry is scaffold use. All scaffolds used in construction, renovation, and demolition shall be erected, dismantled and maintained in accordance with safety procedure. Increasing demand for new construction projects unfortunately still is linked to high level of occupational accidents. Therefore, it is crucial to implement concrete actions while dealing with scaffolds and risk assessment in construction industry, the way on doing assessment and liability of assessment is critical for both construction workers and regulatory framework. Unfortunately, professionals, who tend to rely heavily on their own experience and knowledge when taking decisions regarding risk assessment, may show lack of reliability in checking the results of decisions taken. Purpose of the article: The aim was to indicate crucial parameters that could be modeling with Risk Assessment Model (RAM) use for improving both building enterprise productivity and/or developing potential and safety climate. The developed RAM could be a benefit for predicting high-risk construction activities and thus preventing accidents occurred based on a set of historical accident data. Methodology/Methods: A RAM has been developed for assessing risk levels as various construction process stages with various work trades impacting different spheres of enterprise activity. This project includes research carried out by teams of researchers on over 60 construction sites in Poland and Portugal, under which over 450 individual research cycles were carried out. The conducted research trials included variable conditions of employee exposure to harmful physical and chemical factors, variable levels of stress of employees and differences in behaviors and habits of staff. Genetic modeling tool has been used for developing the RAM. Findings and value added: Common types of trades, accidents, and accident causes have been explored, in addition to suitable risk assessment methods and criteria. We have found that the initial worker stress level is more direct predictor for developing the unsafe chain leading to the accident rather than the workload, or concentration of harmful factors at the workplace or even training frequency and management involvement.

Keywords: safety climate, occupational health, civil engineering, productivity

Procedia PDF Downloads 291
186 An Assessment of Factors Affecting the Cost and Time Performance of Subcontractors

Authors: Adedayo Jeremiah Adeyekun, Samuel Oluwagbemiga Ishola,

Abstract:

This paper is an assessment of factors influencing the cost and time performance of subcontractors and the need for effective performance of subcontractors at the project sites. The factors influencing the performance of subcontractors are grouped, similar to those identified with the project or an organization and on another hand, there are significant factors influencing the performance of the subcontractors. These factors incorporate management level leadership, time required to complete the project, profit, staff capability/expertise, reputation, installment method, organization history, and project procurement method strategy, security, bidding technique, insurance, bond and relationship with the major contractors. The factors influencing the management of subcontractors in building development projects includes performance of significant past projects, standard of workmanship, consistence with guidelines, regular payment to labourers, adherence to program, regularity and viability of communication with main contractor, adherence to subcontract necessities. Other factors comprise adherence to statutory environmental regulations, number of experienced sites administrative staff, inspection and maintenance of good workplace, number of artisans and workers, quality of as-built and shop drawings and ability to carry out the quantity of work and so on. This study also aimed to suggest a way forward to improve the performance of subcontractors which is the reason for exceeding budget at the project sites. To carry out this study, a questionnaire was drafted to derive information on the causes of low performance of subcontractors and the implication to cost.

Keywords: performance, contractor, subcontractors, construction

Procedia PDF Downloads 58
185 Ownership, Management Responsibility and Corporate Performance of the Listed Firms in Kazakhstan

Authors: Gulnara Moldasheva

Abstract:

The research explores the relationship between management responsibility and corporate governance of listed companies in Kazakhstan. This research employs firm level data of randomly selected listed non-financial firms and firm level data “operational” financial sector, consisted from banking sector, insurance companies and accumulated pension funds using multivariate regression analysis under fixed effect model approach. Ownership structure includes institutional ownership, managerial ownership and private investor’s ownership. Management responsibility of the firm is expressed by the decision of the firm on amount of leverage. Results of the cross sectional panel study for non-financial firms showed that only institutional shareholding is significantly negatively correlated with debt to equity ratio. Findings from “operational” financial sector show that leverage is significantly affected only by the CEO/Chair duality and the size of financial institutions, and insignificantly affected by ownership structure. Also, the findings show, that there is a significant negative relationship between profitability and the debt to equity ratio for non-financial firms, which is consistent with pecking order theory. Generally, the found results suggest that corporate governance and a management responsibility play important role in corporate performance of listed firms in Kazakhstan.

Keywords: ownership, corporate governance, debt to equity ratio, corporate performance

Procedia PDF Downloads 322
184 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction

Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui

Abstract:

Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.

Keywords: BIM, cybersecurity, digital twins, IoT, urban cities

Procedia PDF Downloads 145
183 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases

Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee

Abstract:

Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.

Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements

Procedia PDF Downloads 209
182 Radio Frequency Identification Device Based Emergency Department Critical Care Billing: A Framework for Actionable Intelligence

Authors: Shivaram P. Arunachalam, Mustafa Y. Sir, Andy Boggust, David M. Nestler, Thomas R. Hellmich, Kalyan S. Pasupathy

Abstract:

Emergency departments (EDs) provide urgent care to patients throughout the day in a complex and chaotic environment. Real-time location systems (RTLS) are increasingly being utilized in healthcare settings, and have shown to improve safety, reduce cost, and increase patient satisfaction. Radio Frequency Identification Device (RFID) data in an ED has been shown to compute variables such as patient-provider contact time, which is associated with patient outcomes such as 30-day hospitalization. These variables can provide avenues for improving ED operational efficiency. A major challenge with ED financial operations is under-coding of critical care services due to physicians’ difficulty reporting accurate times for critical care provided under Current Procedural Terminology (CPT) codes 99291 and 99292. In this work, the authors propose a framework to optimize ED critical care billing using RFID data. RFID estimated physician-patient contact times could accurately quantify direct critical care services which will help model a data-driven approach for ED critical care billing. This paper will describe the framework and provide insights into opportunities to prevent under coding as well as over coding to avoid insurance audits. Future work will focus on data analytics to demonstrate the feasibility of the framework described.

Keywords: critical care billing, CPT codes, emergency department, RFID

Procedia PDF Downloads 114
181 Intellectual Property Rights as a Tool to Enhance and Sustain Museums

Authors: Nayira Ahmed Galal Elden Hassan

Abstract:

The management of Intellectual Property (IP) in museums can be complex and challenging, as it requires balancing access and control. On the one hand, museums must ensure that they have balanced permissions to display works in their collections and make them accessible to the public. On the other hand, they must also protect the rights of creators and owners of works and ensure that they are not infringing on IP rights. Intellectual property has become an increasingly important aspect of museum operations in the digital age. Museums hold a vast array of cultural assets in their collections, many of which have significant value as IP assets. The balanced management of IP in museums can help generate additional revenue and promote cultural heritage while also protecting the rights of the museum and its collections. Digital technologies have greatly impacted the way museums manage IP, providing new opportunities for revenue generation through e-commerce and licensing while also presenting new challenges related to IP protection and management. Museums must take a comprehensive approach to IP management, leveraging digital technologies, protecting IP rights, and engaging in licensing and e-commerce activities to maximize income and the economy of countries through the strong management of cultural institutions. Overall, the balanced management of IP in museums is crucial for ensuring the sustainability of museum operations and for preserving cultural heritage for future generations. By taking a balanced approach to identifying museum IP assets, museums can generate revenues and secure their financial sustainability to ensure the long-term preservation of their cultural heritage. We can divide IP assets in museums into two kinds: collection IP and museum-generated IP. Certain museums become confused and lose sight of their mission when trying to leverage collections-based IP. This was the case at the German State Museum in Berlin when the museum made 100 replicas from the Nefertiti bust and wrote under the replicas all rights reserved to the Berlin Museum and issued a certificate to prevent any person or Institution from reproducing any replica from this bust. The implications of IP in museums are far-reaching and can have significant impacts on the preservation of cultural heritage, the dissemination of information, and the development of educational programs. As such, it is important for museums to have a comprehensive understanding of IP laws and regulations and to properly manage IP to avoid legal liability, damage to reputation, and loss of revenue. The research aims to highlight the importance and role of intellectual property in museums and provide some illustrative examples of this.

Keywords: intellectual property, museum, cultural assets, sustainability, IP management

Procedia PDF Downloads 11
180 Association of Alcohol Consumption with Active Tuberculosis in Taiwanese Adults: A Nationwide Population-Based Cohort Study

Authors: Yung-Feng Yen, Yun-Ju Lai

Abstract:

Background: Animal studies have shown that alcohol exposure may cause immunosuppression and increase the susceptibility to tuberculosis (TB) infection. However, the temporality of alcohol consumption with subsequent TB development remains unclear. This nationwide population-based cohort study aimed to investigate the impact of alcohol exposure on TB development in Taiwanese adults. Methods: We included 46 196 adult participants from three rounds (2001, 2005, 2009) of the Taiwan National Health Interview Survey. Alcohol consumption was classified into heavy, regular, social, or never alcohol use. Heavy alcohol consumption was defined as intoxication at least once/week. Alcohol consumption and other covariates were collected by in-person interviews at baseline. Incident cases of active TB were identified from the National Health Insurance database. Multivariate logistic regression was used to estimate the association between alcohol consumption and active TB, with adjustment for age, sex, smoking, socioeconomic status, and other covariates. Results: A total of 279 new cases of active TB occurred during the study follow-up period. Heavy (adjusted odds ratio [AOR], 5.21; 95% confident interval [CI], 2.41-11.26) and regular alcohol use (AOR, 1.73; 95% CI, 1.26-2.38) were associated with higher risks of incident TB after adjusting for the subject demographics and comorbidities. Moreover, a strong dose-response effect was observed between increasing alcohol consumption and incident TB (AOR, 2.26; 95% CI, 1.59-3.21; P <.001). Conclusion: Heavy and regular alcohol consumption were associated with higher risks of active TB. Future TB control programs should consider strategies to lower the overall level of alcohol consumption to reduce the TB disease burden.

Keywords: alcohol consumption, tuberculosis, risk factor, cohort study

Procedia PDF Downloads 214
179 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 60
178 Association of Human Immunodeficiency Virus with Incident Autoimmune Hemolytic Anemia: A Population-Based Cohort Study in Taiwan

Authors: Yung-Feng Yen, I-an Jen, Yi-Ming Arthur Chen

Abstract:

The molecular mimicry between human immunodeficiency virus (HIV) protein and red blood cell (RBC) antigens could induce the production of anti-RBC autoantibodies. However, the association between HIV infection and subsequent development of autoimmune hemolytic anemia (AIHA) remains unclear. This nationwide population-based cohort study aimed to determine the association between incident AIHA and HIV in Taiwan. From 2000–2012, we identified adult people living with HIV/AIDS (PLWHA) from the Taiwan centers for disease control HIV Surveillance System. HIV-infected individuals were defined by positive HIV-1 western blot. Age- and sex-matched controls without HIV infection were selected from the Taiwan National Health Insurance Research Database for comparison. All patients were followed until Dec. 31, 2012, and observed for occurrence of AIHA. Of 171,468 subjects (19,052 PLWHA, 152,416 controls), 30 (0.02%) had incident AIHA during a mean follow-up of 5.45 years, including 23 (0.12%) PLWHA and 7 (0.01%) controls. After adjusting for potential confounders, HIV infection was found to be an independent risk factor of incident AIHA (adjusted hazard ratio [AHR], 20.9; 95% confidence interval [CI], 8.34-52.3). Moreover, PLWHA receiving HAART were more likely to develop AIHA than those not receiving HAART (AHR, 10.8; 95% CI, 2.90-40.1). Additionally, the risk of AIHA was significantly increased in those taking efavirenz (AHR, 3.15; 95% CI, 1.18-8.43) or atazanavir (AHR, 6.58; 95% CI, 1.88-22.9) component of the HAART. In conclusion, HIV infection is an independent risk factor for incident AIHA. Clinicians need to be aware of the higher risk of AIHA in PLWHA.

Keywords: autoimmune disease , hemolytic anemia, HIV, highly active antiretroviral treatment

Procedia PDF Downloads 218
177 Space Debris: An Environmental Hazard

Authors: Anwesha Pathak

Abstract:

Space law refers to all legal provisions that may regulate or apply to space travel, as well as to space-related activity. Although there is undoubtedly a core corpus of “space law,” rather than designating a conceptually distinct single kind of law, the phrase can be seen as a label applied to a bucket that includes a variety of different laws and regulations. Similar to ‘family law' or ‘environmental law' "space law" refers to a variety of laws that are identified by the subject matter they address rather than by the logical extension of a single legal concept. The word "space law" refers to the Law of Space, which can cover anything from the specifics of an insurance agreement for a specific space launch to the most general guidelines that direct state behaviour in space. Space debris, often referred to as space junk, space pollution, space waste, space trash, or space garbage, is a term used to describe abandoned human-made objects in space, primarily in Earth orbit. These include disused spacecraft, discarded launch vehicle stages, mission-related detritus, and fragmentation material from the destruction of disused rocket bodies and spacecraft, which is particularly prevalent in Earth orbit. Other types of space debris, besides abandoned human-made objects in orbit, include pieces left over from collisions, erosion, and disintegration, or even paint specks, solidified liquids ejected from spacecraft, and unburned components from solid rocket engines. The initial action of launching or using a spacecraft in near-Earth orbit imposes an external cost on others that is typically not taken into account or fully accounted for in the cost by the launcher or payload owner.

Keywords: space, outer space treaty, geostationary orbit, satellites, spacecrafts

Procedia PDF Downloads 68
176 Issues of Accounting of Lease and Revenue according to International Financial Reporting Standards

Authors: Nadezhda Kvatashidze, Elena Kharabadze

Abstract:

It is broadly known that lease is a flexible means of funding enterprises. Lease reduces the risk related to access and possession of assets, as well as obtainment of funding. Therefore, it is important to refine lease accounting. The lease accounting regulations under the applicable standard (International Accounting Standards 17) make concealment of liabilities possible. As a result, the information users get inaccurate and incomprehensive information and have to resort to an additional assessment of the off-balance sheet lease liabilities. In order to address the problem, the International Financial Reporting Standards Board decided to change the approach to lease accounting. With the deficiencies of the applicable standard taken into account, the new standard (IFRS 16 ‘Leases’) aims at supplying appropriate and fair lease-related information to the users. Save certain exclusions; the lessee is obliged to recognize all the lease agreements in its financial report. The approach was determined by the fact that under the lease agreement, rights and obligations arise by way of assets and liabilities. Immediately upon conclusion of the lease agreement, the lessee takes an asset into its disposal and assumes the obligation to effect the lease-related payments in order to meet the recognition criteria defined by the Conceptual Framework for Financial Reporting. The payments are to be entered into the financial report. The new lease accounting standard secures supply of quality and comparable information to the financial information users. The International Accounting Standards Board and the US Financial Accounting Standards Board jointly developed IFRS 15: ‘Revenue from Contracts with Customers’. The standard allows the establishment of detailed revenue recognition practical criteria such as identification of the performance obligations in the contract, determination of the transaction price and its components, especially price variable considerations and other important components, as well as passage of control over the asset to the customer. IFRS 15: ‘Revenue from Contracts with Customers’ is very similar to the relevant US standards and includes requirements more specific and consistent than those of the standards in place. The new standard is going to change the recognition terms and techniques in the industries, such as construction, telecommunications (mobile and cable networks), licensing (media, science, franchising), real property, software etc.

Keywords: assessment of the lease assets and liabilities, contractual liability, division of contract, identification of contracts, contract price, lease identification, lease liabilities, off-balance sheet, transaction value

Procedia PDF Downloads 300
175 Effect of Atrial Flutter on Alcoholic Cardiomyopathy

Authors: Ibrahim Ahmed, Richard Amoateng, Akhil Jain, Mohamed Ahmed

Abstract:

Alcoholic cardiomyopathy (ACM) is a type of acquired cardiomyopathy caused by chronic alcohol consumption. Frequently ACM is associated with arrhythmias such as atrial flutter. Our aim was to characterize the patient demographics and investigate the effect of atrial flutter (AF) on ACM. This was a retrospective cohort study using the Nationwide Inpatient Sample database to identify admissions in adults with principal and secondary diagnoses of alcoholic cardiomyopathy and atrial flutter from 2019. Multivariate linear and logistic regression models were adjusted for age, gender, race, household income, insurance status, Elixhauser comorbidity score, hospital location, bed size, and teaching status. The primary outcome was all-cause mortality, and secondary outcomes were the length of stay (LOS) and total charge in USD. There was a total of 21,855 admissions with alcoholic cardiomyopathy, of which 1,635 had atrial flutter (AF-ACM). Compared to Non-AF-ACM cohort, AF-ACM cohort had fewer females (4.89% vs 14.54%, p<0.001), were older (58.66 vs 56.13 years, p<0.001), fewer Native Americans (0.61% vs2.67%, p<0.01), had fewer smaller (19.27% vs 22.45%, p<0.01) & medium-sized hospitals (23.24% vs28.98%, p<0.01), but more large-sized hospitals (57.49% vs 48.57%, p<0.01), more Medicare (40.37% vs 34.08%, p<0.05) and fewer Medicaid insured (23.55% vs 33.70%, p=<0.001), fewer hypertension (10.7% vs 15.01%, p<0.05), and more obesity (24.77% vs 16.35%, p<0.001). Compared to Non-AF-ACM cohort, there was no difference in AF-ACM cohort mortality rate (6.13% vs 4.20%, p=0.0998), unadjusted mortality OR 1.49 (95% CI 0.92-2.40, p=0.102), adjusted mortality OR 1.36 (95% CI 0.83-2.24, p=0.221), but there was a difference in LOS 1.23 days (95% CI 0.34-2.13, p<0.01), total charge $28,860.30 (95% CI 11,883.96-45,836.60, p<0.01). In patients admitted with ACM, the presence of AF was not associated with a higher all-cause mortality rate or odds of all-cause mortality; however, it was associated with 1.23 days increase in LOS and a $28,860.30 increase in total hospitalization charge. Native Americans, older age and obesity were risk factors for the presence of AF in ACM.

Keywords: alcoholic cardiomyopathy, atrial flutter, cardiomyopathy, arrhythmia

Procedia PDF Downloads 94
174 Analysis of Delays during Initial Phase of Construction Projects and Mitigation Measures

Authors: Sunaitan Al Mutairi

Abstract:

A perfect start is a key factor for project completion on time. The study examined the effects of delayed mobilization of resources during the initial phases of the project. This paper mainly highlights the identification and categorization of all delays during the initial construction phase and their root cause analysis with corrective/control measures for the Kuwait Oil Company oil and gas projects. A relatively good percentage of the delays identified during the project execution (Contract award to end of defects liability period) attributed to mobilization/preliminary activity delays. Data analysis demonstrated significant increase in average project delay during the last five years compared to the previous period. Contractors had delays/issues during the initial phase, which resulted in slippages and progressively increased, resulting in time and cost overrun. Delays/issues not mitigated on time during the initial phase had very high impact on project completion. Data analysis of the delays for the past five years was carried out using trend chart, scatter plot, process map, box plot, relative importance index and Pareto chart. Construction of any project inside the Gathering Centers involves complex management skills related to work force, materials, plant, machineries, new technologies etc. Delay affects completion of projects and compromises quality, schedule and budget of project deliverables. Works executed as per plan during the initial phase and start-up duration of the project construction activities resulted in minor slippages/delays in project completion. In addition, there was a good working environment between client and contractor resulting in better project execution and management. Mainly, the contractor was on the front foot in the execution of projects, which had minimum/no delays during the initial and construction period. Hence, having a perfect start during the initial construction phase shall have a positive influence on the project success. Our research paper studies each type of delay with some real example supported by statistic results and suggests mitigation measures. Detailed analysis carried out with all stakeholders based on impact and occurrence of delays to have a practical and effective outcome to mitigate the delays. The key to improvement is to have proper control measures and periodic evaluation/audit to ensure implementation of the mitigation measures. The focus of this research is to reduce the delays encountered during the initial construction phase of the project life cycle.

Keywords: construction activities delays, delay analysis for construction projects, mobilization delays, oil & gas projects delays

Procedia PDF Downloads 298
173 Technology Futures in Global Militaries: A Forecasting Method Using Abstraction Hierarchies

Authors: Mark Andrew

Abstract:

Geopolitical tensions are at a thirty-year high, and the pace of technological innovation is driving asymmetry in force capabilities between nation states and between non-state actors. Technology futures are a vital component of defence capability growth, and investments in technology futures need to be informed by accurate and reliable forecasts of the options for ‘systems of systems’ innovation, development, and deployment. This paper describes a method for forecasting technology futures developed through an analysis of four key systems’ development stages, namely: technology domain categorisation, scanning results examining novel systems’ signals and signs, potential system-of systems’ implications in warfare theatres, and political ramifications in terms of funding and development priorities. The method has been applied to several technology domains, including physical systems (e.g., nano weapons, loitering munitions, inflight charging, and hypersonic missiles), biological systems (e.g., molecular virus weaponry, genetic engineering, brain-computer interfaces, and trans-human augmentation), and information systems (e.g., sensor technologies supporting situation awareness, cyber-driven social attacks, and goal-specification challenges to proliferation and alliance testing). Although the current application of the method has been team-centred using paper-based rapid prototyping and iteration, the application of autonomous language models (such as GPT-3) is anticipated as a next-stage operating platform. The importance of forecasting accuracy and reliability is considered a vital element in guiding technology development to afford stronger contingencies as ideological changes are forecast to expand threats to ecology and earth systems, possibly eclipsing the traditional vulnerabilities of nation states. The early results from the method will be subjected to ground truthing using longitudinal investigation.

Keywords: forecasting, technology futures, uncertainty, complexity

Procedia PDF Downloads 96
172 The Online Power of Values: Adolescents’ Values as Predicting Factors of Their Online Bystanders’ Behavior While Witnessing Cyberbullying

Authors: Sharon Cayzer-Haller, Shir Ginosar-Yaari, Ariel Knafo-Noam

Abstract:

The 21st century emerged as the digital century, and it is marked by a wide range of technological developments and changes, followed by potential changes in human communication skills. This technological revolution has changed human means of communication in many different ways: children and adolescents are spending much of their time in front of screens, participating in all sorts of online activities (even more so since the outbreak of COVID-19). The current study focuses on the role of values in adolescents' online bystanders' behavior. Values are cognitive, abstract representations of desirable goals that motivate behavior, and we hypothesized finding significant associations between specific values and differential online bystanders' feelings and behavior. Data was collected through online questionnaires that measured the participants' values, using Schwartz's short version of the Portrait Values Questionnaire (Schwartz, 2012). Participants’ online behavior was assessed in a questionnaire addressing reactions to situations of cyber shaming and cyberbullying, and specifically positive feelings and pro-social behavior (e.g., more supportive reactions) toward the victims, as opposed to different offensive behavioral reactions (such as laughing at the victim or ignoring the situation). Participants were recruited with a commercial research panel company, and 308 Israeli adolescents' values and online behavior were examined (mean age 15.2). As hypothesized, results show significant associations between self-transcendence values (universalism and benevolence) and conservation values (conformity, tradition, and security). These two groups of values were positively correlated with pro-social bystanders' feelings and behavior. On the opposite side of the values scale, the value of power was negatively associated with the participants' pro-social behavior, and positively associated with offensive behavioral reactions. Further research is needed, but we conclude that values serve as crucial guiding factors in directing adolescents' online feelings and behavior.

Keywords: adolescents, values, cyberbullying, online behavior, power

Procedia PDF Downloads 46
171 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 145
170 The Bayesian Premium Under Entropy Loss

Authors: Farouk Metiri, Halim Zeghdoudi, Mohamed Riad Remita

Abstract:

Credibility theory is an experience rating technique in actuarial science which can be seen as one of quantitative tools that allows the insurers to perform experience rating, that is, to adjust future premiums based on past experiences. It is used usually in automobile insurance, worker's compensation premium, and IBNR (incurred but not reported claims to the insurer) where credibility theory can be used to estimate the claim size amount. In this study, we focused on a popular tool in credibility theory which is the Bayesian premium estimator, considering Lindley distribution as a claim distribution. We derive this estimator under entropy loss which is asymmetric and squared error loss which is a symmetric loss function with informative and non-informative priors. In a purely Bayesian setting, the prior distribution represents the insurer’s prior belief about the insured’s risk level after collection of the insured’s data at the end of the period. However, the explicit form of the Bayesian premium in the case when the prior is not a member of the exponential family could be quite difficult to obtain as it involves a number of integrations which are not analytically solvable. The paper finds a solution to this problem by deriving this estimator using numerical approximation (Lindley approximation) which is one of the suitable approximation methods for solving such problems, it approaches the ratio of the integrals as a whole and produces a single numerical result. Simulation study using Monte Carlo method is then performed to evaluate this estimator and mean squared error technique is made to compare the Bayesian premium estimator under the above loss functions.

Keywords: bayesian estimator, credibility theory, entropy loss, monte carlo simulation

Procedia PDF Downloads 312
169 Effects of Exhaust Gas Emitted by the Fleet on Public Health in the Region of Annaba (Algeria): Ecotoxicological Test on Durum Wheat (Triticum durum Desf.)

Authors: Aouissi Nora, Meksem Leila

Abstract:

This work focused on the study of air pollution generated by the transport sector in the region of Annaba. Our study is based on two parts: the first one concerns an epidemiological investigation in the area of Annaba situated in the east Algerian coast, which deals with the development of the fleet and its impact on public health. To get a more precise idea of the impact of road traffic on public health, we consulted the computing center office of the National Social Insurance Fund. The information we were given by this office refers to the number of reported asthma and heart disease after medical examination during the period 2006-2010. The second part was devoted to the study of the toxicity of exhaust gases on some physical and biochemical parameters of durum wheat (Triticum durum Desf.). After germination and three-leaf stage, the pots are placed in a box of volume (0,096 m3) having an input which is linked directly to the exhaust pipe of a truck, and an outlet to prevent asphyxiation plant. The experience deals with 30 pots: 10 pots are exposed for 5 minutes to exhaust smoke; the other 10 are exposed for 15 minutes, and the remaining 10 for 30 minutes. The epidemiological study shows that the levels of pollutants emitted by the fleet are responsible for the increase of people respiratory and cardiovascular diseases. As for biochemical analyses of vegetation, they clearly show the toxicity of pollutants emitted by the exhaust gases, with an increase in total protein, proline and stimulation of detoxification enzyme (catalase).

Keywords: air pollution, toxicity, epidemiology, biochemistry

Procedia PDF Downloads 319
168 The Survey of Sports Injuries in Ten Sports

Authors: Najmeh Arabnejad, Mohammad Hossein Yousefi

Abstract:

The risk of injuring is possible in most sports. These injuries are inevitable in contact sports. Since sports injuries result in financial, physical, physiological and social problems for most athletes and endanger their professional future, studying the happening of sports injuries in sports changes to an important issue. This study can be conducted through different aspects including psychological, pathological, social, managerial, etc. Therefore, the present study was designed and conducted with the aim Survey of Sports Injuries In Ten Sports from 2006 to 2011.This descriptive study was carried out in a documentary form. Thus, data related to sports insurance and sport injuries happened in soccer, volleyball, basketball, handball, badminton, karate, track and field, taekwondo, gymnastics and wrestling was collected from Sports Medical Board of Kerman Province, as the largest province in Iran, and then was analyzed. Data collection method was library one. Furthermore, information related to 210406 insured athletes was analyzed using Descriptive Statistical Indexes in the level mean and SPSS20 Software. The research findings showed that the number of male athletes who injured was higher than female athletes in most sports within various years. Soccer, karate, volleyball, wrestling, handball, taekwondo, gymnastics, basketball, track and field, and badminton had the most injuries, respectively. Moreover, the number of injured athletes and their ratio to insured ones during six years were studied; in general, an increase in ratio of sports injuries was observed. Thus, upward movement of sports injuries in different sports, as the results of this study confirm it, is a warning which results in losing young forces and wasting of sports potential in Iran.

Keywords: sports, sports injuries, survey, Kerman

Procedia PDF Downloads 350
167 Social Security Reform and Management: The Case of Three Member Territories of the Organisation of Eastern Caribbean States

Authors: Cleopatra Gittens

Abstract:

It has been recognized that some social security and national insurance systems in the Eastern Caribbean are experiencing ageing populations and economic and other crises that will present a financial challenge of being unable to pay pension benefits in fifteen to twenty years. This has implications for the fiscal and economic positions of the countries themselves. Hence, organizations would need to address the issue urgently. The study adds to the body of knowledge on social security systems and social security reforms in small island developing states (SIDS). It also makes recommendations for the types of reforms that social security systems in other SIDS can implement given their special circumstances. Secondary research is used to gather financial and other related information on three social security schemes in the Eastern Caribbean. Actuarial and financial reports and other documents of the social security systems are analysed to obtain financial and static data on each of the schemes. The findings show that the three schemes studied are experiencing steady increases in benefit expenditure versus contributions and increasing pensioner to insured ratios. The schemes will deplete their reserves between 2038 and 2050. Two of the schemes have increased their retirement age while the other has not embarked on any reforms. One scheme has made changes to its contribution percentages. Due to their small size, small populations and other unique circumstances, the social security schemes in the identified territories are not likely to be able to take advantage of all of the reform initiatives that the developed world embarked on when faced with similar problems. These schemes will need to make incremental changes that align with the timeframes recommended by the actuarial studies.

Keywords: benefits, pension, small island developing states, social security reform

Procedia PDF Downloads 71
166 Impact of Drought in Farm Level Income in the United States

Authors: Anil Giri, Kyle Lovercamp, Sankalp Sharma

Abstract:

Farm level incomes fluctuate significantly due to extreme weather events such as drought. In the light of recent extreme weather events it is important to understand the implications of extreme weather events, flood and drought, on farm level incomes. This study examines the variation in farm level incomes for the United States in drought and no- drought years. Factoring heterogeneity in different enterprises (crop, livestock) and geography this paper analyzes the impact of drought in farm level incomes at state and national level. Livestock industry seems to be affected more by the lag in production of input feed for production, crops, as preliminary results show. Furthermore, preliminary results also show that while crop producers are not affected much due to drought, as price and quantity effect worked on opposite direction with same magnitude, that was not the case for livestock and horticulture enterprises. Results also showed that even when price effect was not as high the crop insurance component helped absorb much of shock for crop producers. Finally, the effect was heterogeneous for different states more on the coastal states compared Midwest region. This study should generate a lot of interest from policy makers across the world as some countries are actively seeking to increase subsidies in their agriculture sector. This study shows how subsidies absorb the shocks for one enterprise more than others. Finally, this paper should also be able to give an insight to economists to design/recommend policies such that it is optimal given the production level of different enterprises in different countries.

Keywords: farm level income, United States, crop, livestock

Procedia PDF Downloads 259
165 Early-Onset Asthma and Early Smoking Increase Risk of Bipolar Disorder in Adolescents and Young Adults

Authors: Meng-Huan Wu, Wei-Er Wang, Tsu-Nai Wang, Wei-Jian Hsu, Vincent Chin-Hung Chen

Abstract:

Objective: Studies have reported a strong link between asthma and bipolar disorder. We conducted a 17-year community-based large cohort study to examine the relationship between asthma, early smoking initiation, and bipolar disorder during adolescence and early adulthood. Methods: A total of 162,766 participants aged 11–16 years were categorized into asthma and non-asthma groups at baseline and compared within the observation period. Covariates during late childhood or adolescence included parental education, cigarette smoking by family members of participants, and participant’s gender, age, alcohol consumption, smoking, and exercise habits. Data for urbanicity, prednisone use, allergic comorbidity, and Charlson comorbidity index were acquired from the National Health Insurance Research Database. The Cox proportional-hazards model was used to evaluate the association between asthma and bipolar disorder. Results: Our findings revealed that asthma increased the risk of bipolar disorder after adjustment for key confounders in the Cox proportional hazard regression model (adjusted HR: 1.31, 95% CI: 1.12-1.53). Hospitalizations or visits to the emergency department for asthma exhibited a dose–response effect on bipolar disorder (adjusted HR: 1.59, 95% CI: 1.22-2.06). Patients with asthma with onset before 20 years of age who smoked during late childhood or adolescence had the greatest risk for bipolar disorder (adjusted HR: 3.10, 95% CI: 1.29-7.44). Conclusions: Patients newly diagnosed with asthma had a 1.3 times higher risk of developing bipolar disorder. Smoking during late childhood or adolescence increases the risk of developing bipolar disorder in patients with asthma.

Keywords: adolescence, asthma, smoking, bipolar disorder, early adulthood

Procedia PDF Downloads 316
164 Incidence and Causes of Elective Surgery Cancellations in Songklanagarind Hospital, Thailand

Authors: A. Kaeotawee, N. Bunmas, W. Chomthong

Abstract:

Background: The cancellation of elective surgery is a major indicator of poor operating room efficiency. Furthermore, it is recognized as a major cause of emotional trauma to patients as well as their families. This study was carried out to assess the incidence and causes of elective surgery cancellation in our setting and to find the appropriate solutions for better quality management. Objective: To determine the incidence and causes of elective surgery cancellations in Songklanagarind Hospital. Material and Method: A prospective survey was conducted from September to November 2012. All patients who had their scheduled elective operations cancelled were assessed. Data was collected on the following 2 components: (1) patient demographics;(2) main reasons for cancellations, which were grouped into patient-related factors and organizational-related factors. Data are reported as a percentage of patients whose operations were cancelled. The association between cancellation status and patient demographics was assessed using univariate logistic regression. Results: 2,395 patients were scheduled for elective surgery and of these 343 (14.3%) had their operations cancelled. Cardiothoracic surgery had the highest rate of cancellations (28.7%) while the least number of cancellations occurred in ophthalmology (10.1%). The main reasons for cancellations were related to the unit's organization (53.6%), due to the surgeon (48.4%). Patient related causes (46.4%), due to non medical reasons (32.1%). The most common cause of cancellation by the surgeon was lack of theater time (21.3%), by patients due to the patient’s nonappearance (25.1%). Cancellation was significantly associated with type of patient, health insurance, type of anesthesia and specialties (p<0.05). Conclusion: Surgery cancellations by surgeons relating to a lack of theater time was a significant problem in our setting. Appropriate solutions for better quality improvement are needed.

Keywords: elective cases, surgery cancellation, quality management, appropriate solutions

Procedia PDF Downloads 242
163 Role and Impact of Artificial Intelligence in Sales and Distribution Management

Authors: Kiran Nair, Jincy George, Suhaib Anagreh

Abstract:

Artificial intelligence (AI) in a marketing context is a form of a deterministic tool designed to optimize and enhance marketing tasks, research tools, and techniques. It is on the verge of transforming marketing roles and revolutionize the entire industry. This paper aims to explore the current dissemination of the application of artificial intelligence (AI) in the marketing mix, reviewing the scope and application of AI in various aspects of sales and distribution management. The paper also aims at identifying the areas of the strong impact of AI in factors of sales and distribution management such as distribution channel, purchase automation, customer service, merchandising automation, and shopping experiences. This is a qualitative research paper that aims to examine the impact of AI on sales and distribution management of 30 multinational brands in six different industries, namely: airline; automobile; banking and insurance; education; information technology; retail and telecom. Primary data is collected by means of interviews and questionnaires from a sample of 100 marketing managers that have been selected using convenient sampling method. The data is then analyzed using descriptive statistics, correlation analysis and multiple regression analysis. The study reveals that AI applications are extensively used in sales and distribution management, with a strong impact on various factors such as identifying new distribution channels, automation in merchandising, customer service, and purchase automation as well as sales processes. International brands have already integrated AI extensively in their day-to-day operations for better efficiency and improved market share while others are investing heavily in new AI applications for gaining competitive advantage.

Keywords: artificial intelligence, sales and distribution, marketing mix, distribution channel, customer service

Procedia PDF Downloads 132
162 Real-Time Hybrid Simulation for a Tuned Liquid Column Damper Implementation

Authors: Carlos Riascos, Peter Thomson

Abstract:

Real-time hybrid simulation (RTHS) is a modern cyber-physical technique used for the experimental evaluation of complex systems, that treats the system components with predictable behavior as a numerical substructure and the components that are difficult to model as an experimental substructure. Therefore it is an attractive method for evaluation of the response of civil structures under earthquake, wind and anthropic loads. Another practical application of RTHS is the evaluation of control systems, as these devices are often nonlinear and their characterization is an important step in the design of controllers with the desired performance. In this paper, the response of three-story shear frame controlled by a tuned liquid column damper (TLCD) and subject to base excitation is considered. Both passive and semi-active control strategies were implemented and are compared. While the passive TLCD achieved a reduction of 50% in the acceleration response of the main structure in comparison with the structure without control, the semi-active TLCD achieved a reduction of 70%, and was robust to variations in the dynamic properties of the main structure. In addition, a RTHS was implemented with the main structure modeled as a linear, time-invariant (LTI) system through a state space representation and the TLCD, with both control strategies, was evaluated on a shake table that reproduced the displacement of the virtual structure. Current assessment measures for RTHS were used to quantify the performance with parameters such as generalized amplitude, equivalent time delay between the target and measured displacement of the shake table, and energy error using the measured force, and prove that the RTHS described in this paper is an accurate method for the experimental evaluation of structural control systems.

Keywords: structural control, hybrid simulation, tuned liquid column damper, semi-active sontrol strategy

Procedia PDF Downloads 282
161 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 523