Search results for: food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5837

Search results for: food security

5267 Food Insecurity and Quality of Life among the Poor Elderly in South Korea

Authors: Jayoung Cho

Abstract:

Poverty has become a social problem in South Korea, given that seven out of ten elderly experience multidimensional poverty. As quality of life is a major social welfare measure of a society, verifying the major factors affecting the quality of life among the elderly in poverty can be used as baseline data for the promotion of welfare. This study aims to investigate the longitudinal relationships between food insecurity and quality of life among the elderly in poverty. In this study, panel regression analysis using 5-year longitudinal panel data were derived from Korea Welfare Panel Study (KWPS, 2011-2015) were used to identify the research question. A total of 1,327 elderly people aged 65 or older with less than 60% of median income was analyzed. The main results of the study are as follows; first, the level of quality of life of the poor elderly was on average of 5, and repeated the increase and decrease over time. Second, food insecurity and quality of life of the elderly in poverty had a longitudinal causal relationship. Furthermore, the statistical significance of food insecurity was the highest despite controlling for major variables affecting the quality of life among the poor elderly. Therefore, political and practical approaches are strongly suggested and considered regarding the food insecurity for the quality of life among the elderly in poverty. In practical intervention, it is necessary to pay attention to food insecurity when assessing the poor elderly. Also, there is a need to build a new delivery system that incorporates segmented health and nutrition-related services. This study has an academic significance in that it brought out the issue of food insecurity of the poor elderly and confirmed the longitudinal relationship between food insecurity and quality of life.

Keywords: food insecurity, longitudinal panel analysis, poor elderly, quality of life

Procedia PDF Downloads 230
5266 Biodiversity and Biotechnology: Some Considerations about the International Regulation of Agriculture and the International Legal System on Access to Genetic Resources

Authors: Leandro Moura da Silva

Abstract:

The international community has strived to create legal mechanisms to protect their biodiversity, but this can represent, sometimes, particularly in the case of regulatory regime on access to genetic resources, an excessive nationalism which transforms itself into a significant obstacle to scientific progress causing damages to the country and to local farmers. Although it has been poorly publicized in the media, the international legal system was marked, in 2014, by the entry into force of the Nagoya Protocol, which regulates the access and benefit sharing of genetic resources of the States Party to that legal instrument. However, it’s not reasonable to think of regulating access to genetic resources without reflecting on the links of this important subject with other related issues, such as family farming and agribusiness, food safety, food security, intellectual property rights (on seeds, genetic material, new plant varieties, etc.), environmental sustainability, biodiversity, and biosafety.

Keywords: international law, regulation on agriculture, agronomy techniques, sustainability, genetic resources and new crop varieties, CBD, Nagoya Protocol, ITPGRFA

Procedia PDF Downloads 497
5265 Effect of Pretreatment on Quality Parameters of Natural Convection Mixed-Mode Solar Dried Potato

Authors: Kshanaprava Dhalsamant, Punyadarshini P. Tripathy, Shanker L. Shrivastava

Abstract:

With present high global population, the need for rising food usage by minimizing food wastage and investment is highly necessary to achieve food security. The purpose of this study is to enlighten the effect of pre-drying treatment on rehydration, color, texture, nanohardness, microstructure and surface morphology of solar dried potato samples dried in the mixed-mode solar dryer. Locally bought potatoes were cleaned and cut into cylindrical pieces and pretreated with sodium metabisulfite (0.5%) for 10 min before placing them in natural convection solar dryer designed and developed in Indian Institute of Technology Kharagpur, India. Advanced quality characteristics were studied using Atomic Force Microscope (AFM), Scanning Electron Microscopy (SEM) and nanoindentation method, along with color, texture and water activity. The rehydration indices of solar dried potatoes were significantly biased by pretreatment followed by rehydration temperature. A lower redness index (a*) with a higher value of yellowness index (b*), chroma (C*) and hue angle (h*) were obtained for pretreated samples. Also, the average nanohardness (H) of untreated samples exhibited substantial lower value (18.46%) compared to pretreated samples. Additionally, a creep displacement of 43.27 nm during 20 s dwell time under constant load of 200

Keywords: pretreatment, nanohardness, microstructure, surface morphology

Procedia PDF Downloads 162
5264 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 156
5263 Potentials and Challenges of Implementing Participatory Irrigation Management, Tanzania

Authors: Pilly Joseph Kagosi

Abstract:

The study aims at assessing challenges observed during implementation of participatory irrigation management (PIM) approach for food security in semi-arid areas of Tanzania. Data were collected through questionnaire, PRA tools, key informants discussion, Focus Group Discussion (FGD), participant observation and literature review. Data collected from questionnaire was analyzed using SPSS while PRA data was analyzed with the help of local communities during PRA exercise. Data from other methods were analyzed using content analysis. The study revealed that PIM approach has contribution in improved food security at household level due to involvement of communities in water management activities and decision making which enhanced availability of water for irrigation and increased crop production. However there were challenges observed during implementation of the approach including; minimum participation of beneficiaries in decision making during planning and designing stages, meaning inadequate devolution of power among scheme owners; Inadequate and lack of transparency on income expenditure in Water Utilization Associations’ (WUAs), water conflict among WUAs members, conflict between farmers and livestock keepers and conflict between WUAs leaders and village government regarding training opportunities and status; WUAs rules and regulation are not legally recognized by the National court and few farmers involved in planting trees around water sources. However it was realized that some of the mentioned challenges were rectified by farmers themselves facilitated by government officials. The study recommends that, the identified challenges need to be rectified for farmers to realize impotence of PIM approach as it was realized by other Asian countries.

Keywords: potentials of implementing participatory approach, challenges of participatory approach, irrigation management, Tanzania

Procedia PDF Downloads 301
5262 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 295
5261 Social Security Reform and Management: The Case of Three Member Territories of the Organisation of Eastern Caribbean States

Authors: Cleopatra Gittens

Abstract:

It has been recognized that some social security and national insurance systems in the Eastern Caribbean are experiencing ageing populations and economic and other crises that will present a financial challenge of being unable to pay pension benefits in fifteen to twenty years. This has implications for the fiscal and economic positions of the countries themselves. Hence, organizations would need to address the issue urgently. The study adds to the body of knowledge on social security systems and social security reforms in small island developing states (SIDS). It also makes recommendations for the types of reforms that social security systems in other SIDS can implement given their special circumstances. Secondary research is used to gather financial and other related information on three social security schemes in the Eastern Caribbean. Actuarial and financial reports and other documents of the social security systems are analysed to obtain financial and static data on each of the schemes. The findings show that the three schemes studied are experiencing steady increases in benefit expenditure versus contributions and increasing pensioner to insured ratios. The schemes will deplete their reserves between 2038 and 2050. Two of the schemes have increased their retirement age while the other has not embarked on any reforms. One scheme has made changes to its contribution percentages. Due to their small size, small populations and other unique circumstances, the social security schemes in the identified territories are not likely to be able to take advantage of all of the reform initiatives that the developed world embarked on when faced with similar problems. These schemes will need to make incremental changes that align with the timeframes recommended by the actuarial studies.

Keywords: benefits, pension, small island developing states, social security reform

Procedia PDF Downloads 86
5260 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 386
5259 Challenges in Developing a World Class Sustainable Food Organization

Authors: Baskar Kotte

Abstract:

Many organizations are constantly striving to implement numerous techniques for long-term sustainability, for food related organizations it is imperative to conceptualize the critical concepts which constitute food safety sustainability. This presentation provides three critical pillars to develop a sustainable organization. Financial sustainability, regulatory sustainability and excellence standards sustainability are the three components which practiced and implemented effectively with process performance metrics defined objectives and targets lead to sustainable and safe food organizations. The participants take away a well-developed concept diagram with all elements impacting sustainability. Proven disciplined path which worked to achieve desired results is presented for effective implementation. Effective implementation of this proven disciplined path positions organizations to achieve world class status with bottomline improvement. Additionally, this presentation highlights critical terms, principles and implementation difficulties related to using the proven disciplined path. This presentation is beneficial for business leaders, food safety compliance managers, food safety practitioners, financial managers, Lean & Six sigma continual improvement managers, BRC/SQF/ IFS / FSSC 22000 practitioners and food manufacturing personnel.

Keywords: food safety, sustainability, regulatory, lean, six sigma, bottom-line improvement disciplined path

Procedia PDF Downloads 276
5258 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 151
5257 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 398
5256 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 137
5255 Revival of Ancient Egyptian Food Habits: Preserving the Past and Living the Present

Authors: Dina M. Ezz El-Din

Abstract:

A variety of sources on Ancient Egypt provides us with knowledge about its agricultural and eating habits. This wealth of information testifies that the ancient Egyptians disposed of a wide variety of food choices. Egyptian agricultural diet was complemented by livestock breeding (Cows, sheep, geese, ducks, quail, pigeons, pelicans, etc). Moreover, the ancient Egyptians planted and harvested large amounts of cereals and vegetables (onions, leeks, lettuces, garlic). They had a varied and well-balanced diet throughout their history. Like in modern times, their eating habits not only changed from one region to the other, but also these also differed according to social classes. The present research is a descriptive-analytical study that tackles eating habits and culinary experience of the ancient Egyptians in an attempt to revive and preserve Egyptians’ food heritage. It focuses on different meals that were prepared and consumed in different occasions, and the habits that can be traced in Egypt in modern times. It also suggests means of bringing to life the ancient Egyptians’ food experience through restaurants and other tourism activities.

Keywords: cultural heritage, ancient Egyptian food, eating habits, preserving food traditions

Procedia PDF Downloads 304
5254 The Impact of Food Inflation on Poverty: An Analysis of the Different Households in the Philippines

Authors: Kara Gianina D. Rosas, Jade Emily L. Tong

Abstract:

This study assesses the vulnerability of households to food price shocks. Using the Philippines as a case study, the researchers aim to understand how such shocks can cause food insecurity in different types of households. This paper measures the impact of actual food price changes during the food crisis of 2006-2009 on poverty in relation to their spatial location. Households are classified as rural or urban and agricultural or non-agricultural. By treating food prices and consumption patterns as heterogeneous, this study differs from conventional poverty analysis as actual prices are used. Merging the Family, Income and Expenditure Survey (FIES) with the Consumer Price Index dataset (CPI), the researchers were able to determine the effects on poverty measures, specifically, headcount index, poverty gap, and poverty severity. The study finds that, without other interventions, food inflation would lead to a significant increase in the number of households that fall below the poverty threshold, except for households whose income is derived from agricultural activities. It also finds that much of the inflation during these years was fueled by the rise in staple food prices. Essentially, this paper aims to broaden the economic perspective of policymakers with regard to the heterogeneity of impacts of inflation through analyzing the deeper microeconomic levels of different subgroups. In hopes of finding a solution to lessen the inequality gap of poverty between the rural and urban poor, this paper aims to aid policymakers in creating projects targeted towards food insecurity.

Keywords: poverty, food inflation, agricultural households, non-agricultural households, net consumption ratio, urban poor, rural poor, head count index, poverty gap, poverty severity

Procedia PDF Downloads 239
5253 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 664
5252 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 474
5251 The Development and Provision of a Knowledge Management Ecosystem, Optimized for Genomics

Authors: Matthew I. Bellgard

Abstract:

The field of bioinformatics has made, and continues to make, substantial progress and contributions to life science research and development. However, this paper contends that a systems approach integrates bioinformatics activities for any project in a defined manner. The application of critical control points in this bioinformatics systems approach may be useful to identify and evaluate points in a pathway where specified activity risk can be reduced, monitored and quality enhanced.

Keywords: bioinformatics, food security, personalized medicine, systems approach

Procedia PDF Downloads 418
5250 Energizing Value Added Farming in Agriculture Economic Aspects towards Sustaining Crop Yield, Quality and Food Safety of Small-Scale Cocoa Farmer in Indonesia

Authors: Burmansyah Muhammad, Supriyoto Supriyoto

Abstract:

Crop yield, quality and food safety are three important components that all estate and food crops must put into consideration to lifting the economic value. These measurements should be evaluated because marketplace demand is simultaneously changing and farmers must adapt quickly to remain competitive. The increase in economic value could be done by producing high quality product that aligns with harvest collector preferences. The purpose of this study is to examine the causal effects of value added farming in agriculture economic aspects towards crop yield, quality and food security. This research is using descriptive survey research by employing data from small-scale cocoa farmers listed to off-taker company, located on Sulawesi area of Indonesia. The questionnaire was obtained from 650 cocoa farmers, selected randomly. Major findings of the study indicate that 78% of respondents agree that agriculture inputs have positive effect on crop yield, quality and food safety. The study recommended that cocoa stakeholders should ensure access to agriculture inputs in first priority and then followed by ensuring access to cocoa supply chain trader and micro-financing. Value Added Farming refers to lifting the economic value of a commodity through particular intervention. Regarding access to agriculture inputs, one of significant intervention is fertilization and plant nutrition management, both organic and inorganic fertilizer. Small-scale cocoa farmers can get access to fertilizer intervention through establishment of demo farm. Ordinary demo farm needs large area, selective requirements, lots of field resources and centralization impact. On the contrary, satellite demo farm is developing to wide-spread the impact of agriculture economic aspects and also the involvement in number of farmers. In Sulawesi Project, we develop leveling strata of small-scale demo farm with group of farmers and local cooperative. With this methodology, all of listed small-scale farmers can get access to agriculture input, micro-financing and how to deliver quality output. PT Pupuk Kaltim is member firm of holding company PT Pupuk Indonesia, private company belongs to the government of Indonesia. The company listed as Indonesia's largest producer of urea fertilizers, besides ammonia, Compound Fertilizer (NPK) and biological fertilizers. To achieve strategic objectives, the company has distinguished award such as SNI Platinum, SGS Award IFA Protect and Sustain Stewardship and Gold Rank of Environment Friendly Company. This achievement has become the strategic foundation for our company to energize value added farming in sustaining food security program. Moreover, to ensure cocoa sustainability farming the company has developed partnership with international companies and Non-Government Organization (NGO).

Keywords: fertilizer and plant nutrition management, good agriculture practices, agriculture economic aspects, value-added farming

Procedia PDF Downloads 94
5249 Literature Analysis of Nutrition in South Africa and How SA Harvest Aims to Improve Nutrition

Authors: Ali Conn, Kimberly Allen

Abstract:

Food and nutrition play a significant role in humans. It helps them function, grow, and develop into better individuals. However, as essential as food may seem to most people, it is not the case for everyone. South Africans, for example, have been suffering from hunger and poverty for the longest time now. With the spread of the COVID-19 virus, their situations have become worse. Millions of children and their families do not have access to food, hence no proper nutrition. They could barely make ends meet, so they make sure to make the most of what little they have for their household. Fortunately, organizations like SA Harvest aim to end hunger in South Africa. However, they still need to know more about how they can help South Africans with their current diet. Currently, most of the diets are composed of maize and rice. They do not have much to spend on fruits, so these commodities are seen as a luxury. With the help of organizations like SA Harvest, South Africans will be educated and more aware of what they need to eat.

Keywords: nutrition, public health, SA Harvest, food

Procedia PDF Downloads 121
5248 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 147
5247 Consumer’ Knowledge, Attitude and Behavior on Food Safety Issues Related to Pesticide Residues in Cabbage

Authors: Dekie Rawung, Abdul L. Abadi, Toto Himawan, Siegfried Berhimpon

Abstract:

A case study on consumer' knowledge, attitude, and behavior on food safety issue related to pesticide residues in cabbage was conducted in the area of Manado and Tomohon city, North Sulawesi. A sample of 150 consumers were selected randomly on location (open market and supermarket) while they were purchasing vegetables. The data on consumers’ perception, knowledge, attitude and behavior on food safety issue regarding pesticide residues were collected using a 5-point, two-section Likert-Scale questionnaire, and the relationship of knowledge, attitude, and behavior on food safety issues were analyzed using Structural Equation Modeling (SEM). It was found that, among many food safety issues, the illegal, non-food chemical preservatives were considered the most important one (by more than 35% respondents), followed by high cholesterol content and textile coloring chemical (> 27% respondents). The pesticide residues issue was only in the 4th place. The same results were seen on the issue of quality factors that determine the product selection during purchasing. The pesticide-free and organic products labels were considered much less important quality factors as compared with freshness and nutrition value which were considered the most and the second most important quality factors (almost 65% of respondents). SEM analysis showed that only knowledge and attitude on food safety that had the significant relation (coefficient value of 0.38), whereas those with behaviors were not significant.

Keywords: cabbage, consumer, food safety, pesticide residues

Procedia PDF Downloads 417
5246 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 529
5245 Factors Predicting Food Insecurity in Older Thai Women

Authors: Noppawan Piaseu, Surat Komindr

Abstract:

This study aimed to determine factors predicting food insecurity in older Thai women living in crowded urban communities. Through purposive sampling, 315 participants were recruited from community dwelling older women in Bangkok, Thailand. Data collection included interview from questionnaires and anthropometric measurement. Results showed that approximately half of the sample were 60-69 years old (51.1%), married (50.6%), obtained primary education (52.3%), had low family income (51.7%), lived in poor physical environment (49.9%) with normal body mass index (51.0%). Logistic regression analysis revealed that older women who were widowed/divorced/separated (OR = 1.804, 95% CI = 1.052-3.092, p = .032), who reported low family income (OR =.654, 95% CI = .523-.817, p < .001), and who had poor physical environment surrounding home (OR = 2.338, 95% CI = 1.057-5.171, p = .036) were more likely to have food insecurity. Results support that social and environmental factors are major factors predicting food insecurity in older women living in the urban community. Health professionals need to identify and monitor psychosocial, economic and environmental dimensions of food insecurity among them.

Keywords: food insecurity, older women, urban communities, Thailand

Procedia PDF Downloads 398
5244 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 127
5243 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 410
5242 Influence of Parent’s Food Habits on Nutrition Behaviours of Children under 7 Years in Tehran, Iran

Authors: Katayoun Bagheri, Farzad Berahmandpour

Abstract:

Several studies about food habits in diverse population show, early living years play significant role in building of current food habits. Suitable nutrition in children is also influenced by parent’s food habits. The aim of study is to survey the role of parent’s food habits to form of nutrition behaviours in children under 7 years in Tehran - Iran. The study is a Descriptive study. The participants were 19 children under 7 years with their mothers from a kindergarten in the central Tehran. The sampling method was random sampling. The data was collected by food habits questionnaires and implementation of consultation meetings with the mothers. The data analysis was qualitative analysis. The findings show that 79% children and their parents have eaten enough and variety breakfast, but food choices of children were depended on food choices of parents. In the other meals, the majority of children enjoyed to eat dinner (58%), because the more families could eat dinner together. According to mother opinions, the children enjoy eating macaroni, chicken, fried potatoes, chips and fruit juices. The researchers argue that mother’s role is unavoidable in the food preferences among children. Fortunately, the results believe that children tend to drink simple milk (79%). Moreover, their parents lead them to chocolate milk consumption (42%) instead of other flavored milk. Finally, despite popular belief claim that mothers influence on nutrition behavior of children, but the study argues that the fathers have more effects on children’s nutrition behaviours. In conclusion, it seems that the general trainings about promoting healthy nutrition behavior for parents by mass media can improve nutrition habits and behaviours of pre school children.

Keywords: food habits, parents, nutrition behaviours, children, promoting nutrition

Procedia PDF Downloads 390
5241 Evaluation of Food Services by the Personnel in Hospitals of Athens, Greece

Authors: I. Mentziou, C. Delezos, D. Krikidis, A. Nestoridou, G. Boskou

Abstract:

Introduction: The systems of production and distribution of meals can have a significant impact on the food intake of hospital patients who are likely to develop malnutrition. In hospitals, the consequences of food borne infections can range from annoying to life-threatening for a patient, since they can lead up to death in vulnerable groups Aim: The aim of the present study was the evaluation of food safety management systems implementation, as well as the general evaluation of the total quality management systems in Greek hospitals. Methods: This is a multifocal study on the implementation and evaluation of the food safety management systems in the Greek hospitals of Attica region. Eleven hospitals from the city of Athens were chosen for this purpose. The sample was derived from the high rank personnel of the nutritional department (dietician, head-chef, food technologist, public health inspector). Tailor made questionnaires on hygiene regulations were used as tools for the interviews. Results: Overall, 30 employees in the field of hospital nutrition participated. Most of the replies implied that almost always the hygiene regulations are implemented. Nevertheless, only 30% stated that there is a Hazard Analysis Critical Control Points HACCP system (HACCP) in the hospital. In a small number of questionnaires there were proposals for changes by the staff. Conclusion: Measurement of the opinion of the personnel about the provided food services within a hospital can further lead to continuous improvement of the hospital nutrition.

Keywords: evaluation, food service, HACCP, hospital, personnel

Procedia PDF Downloads 370
5240 Adoption of Climate-Smart Agriculture Practices Among Farmers and Its Effect on Crop Revenue in Ethiopia

Authors: Fikiru Temesgen Gelata

Abstract:

Food security, adaptation, and climate change mitigation are all problems that can be resolved simultaneously with Climate-Smart Agriculture (CSA). This study examines determinants of climate-smart agriculture (CSA) practices among smallholder farmers, aiming to understand the factors guiding adoption decisions and evaluate the impact of CSA on smallholder farmer income in the study areas. For this study, three-stage sampling techniques were applied to select 230 smallholders randomly. Mann-Kendal test and multinomial endogenous switching regression model were used to analyze trends of decrease or increase within long-term temporal data and the impact of CSA on the smallholder farmer income, respectively. Findings revealed education level, household size, land ownership, off-farm income, climate information, and contact with extension agents found to be highly adopted CSA practices. On the contrary, erosion exerted a detrimental impact on all the agricultural practices examined within the study region. Various factors such as farming methods, the size of farms, proximity to irrigated farmlands, availability of extension services, distance to market hubs, and access to weather forecasts were recognized as key determinants influencing the adoption of CSA practices. The multinomial endogenous switching regression model (MESR) revealed that joint adoption of crop rotation and soil and water conservation practices significantly increased farm income by 1,107,245 ETB. The study recommends that counties and governments should prioritize addressing climate change in their development agendas to increase the adoption of climate-smart farming techniques.

Keywords: climate-smart practices, food security, Oincome, MERM, Ethiopia

Procedia PDF Downloads 17
5239 Use of Indian Food Mascot Design as an Advertising Tool in Maintaining and Growing the Brand Name

Authors: Preeti Yadav, Dandeswar Bisoyi, Debkumar Chakrabarti

Abstract:

Mascots provide memories to viewers, and numerous promotional campaigns with different appearances, continue to trigger viewers and capture their interest. This study investigates the effect of Indian food mascot designs and influence on enhancing communication; thereby, building long-term brand recognition by the consumers. This paper presents a descriptive approach to Indian food mascot design as an advertising tool, and its research adopts a quantitative methodology. The study confirms that mascots have an ability to communicate a message in an effective manner; all though they are simple in terms of design and fashion trend, they have the capability to build positive reactions.

Keywords: food mascot, brand recognitions, advertising, humour

Procedia PDF Downloads 171
5238 Linguistic Codes: Food as a Class Indicator

Authors: Elena Valeryevna Pozhidaeva

Abstract:

This linguistic case study is based on an interaction between the social position and foodways. In every culture there is a social hierarchical system in which there can be means to express and to identify the social status of a person. Food serves as a class indicator. The British being a verbal nation use the words as a preferred medium for signalling and recognising the social status. The linguistic analysis reflects a symbolic hierarchy determined by social groups in the UK. The linguistic class indicators of a British hierarchical system are detectable directly – in speech acts. They are articulated in every aspect of a national identity’s life from preferences of the food and the choice to call it to the names of the meals. The linguistic class indicators can as well be detected indirectly – through symbolic meaning or via the choice of the mealtime, its class (e.g the classes of tea or marmalade), the place to buy food (the class of the supermarket) and consume it (the places for eating out and the frequency of such practices). Under analysis of this study are not only food items and their names but also such categories as cutlery as a class indicator and the act of eating together as a practice of social significance and a class indicator. Current social changes and economic developments are considered and their influence on the class indicators appearance and transformation.

Keywords: linguistic, class, social indicator, English, food class

Procedia PDF Downloads 396