Search results for: cyber liability insurance
184 Space Debris: An Environmental Hazard
Authors: Anwesha Pathak
Abstract:
Space law refers to all legal provisions that may regulate or apply to space travel, as well as to space-related activity. Although there is undoubtedly a core corpus of “space law,” rather than designating a conceptually distinct single kind of law, the phrase can be seen as a label applied to a bucket that includes a variety of different laws and regulations. Similar to ‘family law' or ‘environmental law' "space law" refers to a variety of laws that are identified by the subject matter they address rather than by the logical extension of a single legal concept. The word "space law" refers to the Law of Space, which can cover anything from the specifics of an insurance agreement for a specific space launch to the most general guidelines that direct state behaviour in space. Space debris, often referred to as space junk, space pollution, space waste, space trash, or space garbage, is a term used to describe abandoned human-made objects in space, primarily in Earth orbit. These include disused spacecraft, discarded launch vehicle stages, mission-related detritus, and fragmentation material from the destruction of disused rocket bodies and spacecraft, which is particularly prevalent in Earth orbit. Other types of space debris, besides abandoned human-made objects in orbit, include pieces left over from collisions, erosion, and disintegration, or even paint specks, solidified liquids ejected from spacecraft, and unburned components from solid rocket engines. The initial action of launching or using a spacecraft in near-Earth orbit imposes an external cost on others that is typically not taken into account or fully accounted for in the cost by the launcher or payload owner.Keywords: space, outer space treaty, geostationary orbit, satellites, spacecrafts
Procedia PDF Downloads 94183 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction
Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui
Abstract:
Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.Keywords: BIM, cybersecurity, digital twins, IoT, urban cities
Procedia PDF Downloads 169182 Effect of Atrial Flutter on Alcoholic Cardiomyopathy
Authors: Ibrahim Ahmed, Richard Amoateng, Akhil Jain, Mohamed Ahmed
Abstract:
Alcoholic cardiomyopathy (ACM) is a type of acquired cardiomyopathy caused by chronic alcohol consumption. Frequently ACM is associated with arrhythmias such as atrial flutter. Our aim was to characterize the patient demographics and investigate the effect of atrial flutter (AF) on ACM. This was a retrospective cohort study using the Nationwide Inpatient Sample database to identify admissions in adults with principal and secondary diagnoses of alcoholic cardiomyopathy and atrial flutter from 2019. Multivariate linear and logistic regression models were adjusted for age, gender, race, household income, insurance status, Elixhauser comorbidity score, hospital location, bed size, and teaching status. The primary outcome was all-cause mortality, and secondary outcomes were the length of stay (LOS) and total charge in USD. There was a total of 21,855 admissions with alcoholic cardiomyopathy, of which 1,635 had atrial flutter (AF-ACM). Compared to Non-AF-ACM cohort, AF-ACM cohort had fewer females (4.89% vs 14.54%, p<0.001), were older (58.66 vs 56.13 years, p<0.001), fewer Native Americans (0.61% vs2.67%, p<0.01), had fewer smaller (19.27% vs 22.45%, p<0.01) & medium-sized hospitals (23.24% vs28.98%, p<0.01), but more large-sized hospitals (57.49% vs 48.57%, p<0.01), more Medicare (40.37% vs 34.08%, p<0.05) and fewer Medicaid insured (23.55% vs 33.70%, p=<0.001), fewer hypertension (10.7% vs 15.01%, p<0.05), and more obesity (24.77% vs 16.35%, p<0.001). Compared to Non-AF-ACM cohort, there was no difference in AF-ACM cohort mortality rate (6.13% vs 4.20%, p=0.0998), unadjusted mortality OR 1.49 (95% CI 0.92-2.40, p=0.102), adjusted mortality OR 1.36 (95% CI 0.83-2.24, p=0.221), but there was a difference in LOS 1.23 days (95% CI 0.34-2.13, p<0.01), total charge $28,860.30 (95% CI 11,883.96-45,836.60, p<0.01). In patients admitted with ACM, the presence of AF was not associated with a higher all-cause mortality rate or odds of all-cause mortality; however, it was associated with 1.23 days increase in LOS and a $28,860.30 increase in total hospitalization charge. Native Americans, older age and obesity were risk factors for the presence of AF in ACM.Keywords: alcoholic cardiomyopathy, atrial flutter, cardiomyopathy, arrhythmia
Procedia PDF Downloads 112181 A Study of Predicting Judgments on Causes of Online Privacy Invasions: Based on U.S Judicial Cases
Authors: Minjung Park, Sangmi Chai, Myoung Jun Lee
Abstract:
Since there are growing concerns on online privacy, enterprises could involve various personal privacy infringements cases resulting legal causations. For companies that are involving online business, it is important for them to pay extra attentions to protect users’ privacy. If firms can aware consequences from possible online privacy invasion cases, they can more actively prevent future online privacy infringements. This study attempts to predict the probability of ruling types caused by various invasion cases under U.S Personal Privacy Act. More specifically, this research explores online privacy invasion cases which was sentenced guilty to identify types of criminal punishments such as penalty, imprisonment, probation as well as compensation in civil cases. Based on the 853 U.S judicial cases ranged from January, 2000 to May, 2016, which related on data privacy, this research examines the relationship between personal information infringements cases and adjudications. Upon analysis results of 41,724 words extracted from 853 regal cases, this study examined online users’ privacy invasion cases to predict the probability of conviction for a firm as an offender in both of criminal and civil law. This research specifically examines that a cause of privacy infringements and a judgment type, whether it leads a civil or criminal liability, from U.S court. This study applies network text analysis (NTA) for data analysis, which is regarded as a useful method to discover embedded social trends within texts. According to our research results, certain online privacy infringement cases caused by online spamming and adware have a high possibility that firms are liable in the case. Our research results provide meaningful insights to academia as well as industry. First, our study is providing a new insight by applying Big Data analytics to legal cases so that it can predict the cause of invasions and legal consequences. Since there are few researches applying big data analytics in the domain of law, specifically in online privacy, this study suggests new area that future studies can explore. Secondly, this study reflects social influences, such as a development of privacy invasion technologies and changes of users’ level of awareness of online privacy on judicial cases analysis by adopting NTA method. Our research results indicate that firms need to improve technical and managerial systems to protect users’ online privacy to avoid negative legal consequences.Keywords: network text analysis, online privacy invasions, personal information infringements, predicting judgements
Procedia PDF Downloads 229180 Dual Challenges in Host State Regulation on Transnational Corporate Damages: China's Dilemma and Breakthrough
Authors: Xinchao Liu
Abstract:
Regulating environmental and human rights damages caused by transnational corporations in host States is a core issue in the business and human rights discourse. In current regulatory practices, host States, which are territorially based and should bear primary regulation responsibility, face dual challenges at both domestic and international levels, leading to their continued marginalization. Specifically, host States as TNC damage regulators are constrained domestically by territorial jurisdiction limitations and internationally by the neoliberal international economic order exemplified by investment protection mechanisms. Taking China as a sample, it currently lacks a comprehensive regulation system to address TNC damages; while domestic constraints manifest as the marginalization of judicial regulation, the absence of corporate duty of care, and inadequate extraterritorial regulation effectiveness, international constraints are reflected in the absence of foreign investor obligations in investment agreements and the asymmetry of dispute resolution clauses, challenging regulatory sovereignty. As China continues to advance its policy of high-quality opening up, the risks of negative externalities from transnational capital will continue to increase, necessitating a focus on building and perfecting a regulation mechanism for TNC damages within the framework of international law. To address domestic constraints, it is essential to clarify the division of regulation responsibilities between judicial and administrative bodies, promote the normalization of judicial regulation, and enhance judicial oversight of governmental settlements. Improving the choice of law rules for cross-border torts and the standards for parent company liability for omissions, and enhancing extraterritorial judicial effectiveness through transnational judicial dialogue and cooperation mechanisms are also crucial. To counteract international constraints, specifying investor obligations in investment treaties and designing symmetrical dispute resolution clauses are indispensable to eliminate regulatory chill. Additionally, actively advancing the implementation of TNC obligations in business and human rights treaty negotiations will lay an international legal foundation for the regulation sovereignty of host States.Keywords: transnational corporate damages, home state litigation, optimization limit, investor-state dispute settlement
Procedia PDF Downloads 17179 The Bayesian Premium Under Entropy Loss
Authors: Farouk Metiri, Halim Zeghdoudi, Mohamed Riad Remita
Abstract:
Credibility theory is an experience rating technique in actuarial science which can be seen as one of quantitative tools that allows the insurers to perform experience rating, that is, to adjust future premiums based on past experiences. It is used usually in automobile insurance, worker's compensation premium, and IBNR (incurred but not reported claims to the insurer) where credibility theory can be used to estimate the claim size amount. In this study, we focused on a popular tool in credibility theory which is the Bayesian premium estimator, considering Lindley distribution as a claim distribution. We derive this estimator under entropy loss which is asymmetric and squared error loss which is a symmetric loss function with informative and non-informative priors. In a purely Bayesian setting, the prior distribution represents the insurer’s prior belief about the insured’s risk level after collection of the insured’s data at the end of the period. However, the explicit form of the Bayesian premium in the case when the prior is not a member of the exponential family could be quite difficult to obtain as it involves a number of integrations which are not analytically solvable. The paper finds a solution to this problem by deriving this estimator using numerical approximation (Lindley approximation) which is one of the suitable approximation methods for solving such problems, it approaches the ratio of the integrals as a whole and produces a single numerical result. Simulation study using Monte Carlo method is then performed to evaluate this estimator and mean squared error technique is made to compare the Bayesian premium estimator under the above loss functions.Keywords: bayesian estimator, credibility theory, entropy loss, monte carlo simulation
Procedia PDF Downloads 335178 Effects of Exhaust Gas Emitted by the Fleet on Public Health in the Region of Annaba (Algeria): Ecotoxicological Test on Durum Wheat (Triticum durum Desf.)
Authors: Aouissi Nora, Meksem Leila
Abstract:
This work focused on the study of air pollution generated by the transport sector in the region of Annaba. Our study is based on two parts: the first one concerns an epidemiological investigation in the area of Annaba situated in the east Algerian coast, which deals with the development of the fleet and its impact on public health. To get a more precise idea of the impact of road traffic on public health, we consulted the computing center office of the National Social Insurance Fund. The information we were given by this office refers to the number of reported asthma and heart disease after medical examination during the period 2006-2010. The second part was devoted to the study of the toxicity of exhaust gases on some physical and biochemical parameters of durum wheat (Triticum durum Desf.). After germination and three-leaf stage, the pots are placed in a box of volume (0,096 m3) having an input which is linked directly to the exhaust pipe of a truck, and an outlet to prevent asphyxiation plant. The experience deals with 30 pots: 10 pots are exposed for 5 minutes to exhaust smoke; the other 10 are exposed for 15 minutes, and the remaining 10 for 30 minutes. The epidemiological study shows that the levels of pollutants emitted by the fleet are responsible for the increase of people respiratory and cardiovascular diseases. As for biochemical analyses of vegetation, they clearly show the toxicity of pollutants emitted by the exhaust gases, with an increase in total protein, proline and stimulation of detoxification enzyme (catalase).Keywords: air pollution, toxicity, epidemiology, biochemistry
Procedia PDF Downloads 335177 The Survey of Sports Injuries in Ten Sports
Authors: Najmeh Arabnejad, Mohammad Hossein Yousefi
Abstract:
The risk of injuring is possible in most sports. These injuries are inevitable in contact sports. Since sports injuries result in financial, physical, physiological and social problems for most athletes and endanger their professional future, studying the happening of sports injuries in sports changes to an important issue. This study can be conducted through different aspects including psychological, pathological, social, managerial, etc. Therefore, the present study was designed and conducted with the aim Survey of Sports Injuries In Ten Sports from 2006 to 2011.This descriptive study was carried out in a documentary form. Thus, data related to sports insurance and sport injuries happened in soccer, volleyball, basketball, handball, badminton, karate, track and field, taekwondo, gymnastics and wrestling was collected from Sports Medical Board of Kerman Province, as the largest province in Iran, and then was analyzed. Data collection method was library one. Furthermore, information related to 210406 insured athletes was analyzed using Descriptive Statistical Indexes in the level mean and SPSS20 Software. The research findings showed that the number of male athletes who injured was higher than female athletes in most sports within various years. Soccer, karate, volleyball, wrestling, handball, taekwondo, gymnastics, basketball, track and field, and badminton had the most injuries, respectively. Moreover, the number of injured athletes and their ratio to insured ones during six years were studied; in general, an increase in ratio of sports injuries was observed. Thus, upward movement of sports injuries in different sports, as the results of this study confirm it, is a warning which results in losing young forces and wasting of sports potential in Iran.Keywords: sports, sports injuries, survey, Kerman
Procedia PDF Downloads 370176 Social Security Reform and Management: The Case of Three Member Territories of the Organisation of Eastern Caribbean States
Authors: Cleopatra Gittens
Abstract:
It has been recognized that some social security and national insurance systems in the Eastern Caribbean are experiencing ageing populations and economic and other crises that will present a financial challenge of being unable to pay pension benefits in fifteen to twenty years. This has implications for the fiscal and economic positions of the countries themselves. Hence, organizations would need to address the issue urgently. The study adds to the body of knowledge on social security systems and social security reforms in small island developing states (SIDS). It also makes recommendations for the types of reforms that social security systems in other SIDS can implement given their special circumstances. Secondary research is used to gather financial and other related information on three social security schemes in the Eastern Caribbean. Actuarial and financial reports and other documents of the social security systems are analysed to obtain financial and static data on each of the schemes. The findings show that the three schemes studied are experiencing steady increases in benefit expenditure versus contributions and increasing pensioner to insured ratios. The schemes will deplete their reserves between 2038 and 2050. Two of the schemes have increased their retirement age while the other has not embarked on any reforms. One scheme has made changes to its contribution percentages. Due to their small size, small populations and other unique circumstances, the social security schemes in the identified territories are not likely to be able to take advantage of all of the reform initiatives that the developed world embarked on when faced with similar problems. These schemes will need to make incremental changes that align with the timeframes recommended by the actuarial studies.Keywords: benefits, pension, small island developing states, social security reform
Procedia PDF Downloads 91175 Impact of Drought in Farm Level Income in the United States
Authors: Anil Giri, Kyle Lovercamp, Sankalp Sharma
Abstract:
Farm level incomes fluctuate significantly due to extreme weather events such as drought. In the light of recent extreme weather events it is important to understand the implications of extreme weather events, flood and drought, on farm level incomes. This study examines the variation in farm level incomes for the United States in drought and no- drought years. Factoring heterogeneity in different enterprises (crop, livestock) and geography this paper analyzes the impact of drought in farm level incomes at state and national level. Livestock industry seems to be affected more by the lag in production of input feed for production, crops, as preliminary results show. Furthermore, preliminary results also show that while crop producers are not affected much due to drought, as price and quantity effect worked on opposite direction with same magnitude, that was not the case for livestock and horticulture enterprises. Results also showed that even when price effect was not as high the crop insurance component helped absorb much of shock for crop producers. Finally, the effect was heterogeneous for different states more on the coastal states compared Midwest region. This study should generate a lot of interest from policy makers across the world as some countries are actively seeking to increase subsidies in their agriculture sector. This study shows how subsidies absorb the shocks for one enterprise more than others. Finally, this paper should also be able to give an insight to economists to design/recommend policies such that it is optimal given the production level of different enterprises in different countries.Keywords: farm level income, United States, crop, livestock
Procedia PDF Downloads 283174 Early-Onset Asthma and Early Smoking Increase Risk of Bipolar Disorder in Adolescents and Young Adults
Authors: Meng-Huan Wu, Wei-Er Wang, Tsu-Nai Wang, Wei-Jian Hsu, Vincent Chin-Hung Chen
Abstract:
Objective: Studies have reported a strong link between asthma and bipolar disorder. We conducted a 17-year community-based large cohort study to examine the relationship between asthma, early smoking initiation, and bipolar disorder during adolescence and early adulthood. Methods: A total of 162,766 participants aged 11–16 years were categorized into asthma and non-asthma groups at baseline and compared within the observation period. Covariates during late childhood or adolescence included parental education, cigarette smoking by family members of participants, and participant’s gender, age, alcohol consumption, smoking, and exercise habits. Data for urbanicity, prednisone use, allergic comorbidity, and Charlson comorbidity index were acquired from the National Health Insurance Research Database. The Cox proportional-hazards model was used to evaluate the association between asthma and bipolar disorder. Results: Our findings revealed that asthma increased the risk of bipolar disorder after adjustment for key confounders in the Cox proportional hazard regression model (adjusted HR: 1.31, 95% CI: 1.12-1.53). Hospitalizations or visits to the emergency department for asthma exhibited a dose–response effect on bipolar disorder (adjusted HR: 1.59, 95% CI: 1.22-2.06). Patients with asthma with onset before 20 years of age who smoked during late childhood or adolescence had the greatest risk for bipolar disorder (adjusted HR: 3.10, 95% CI: 1.29-7.44). Conclusions: Patients newly diagnosed with asthma had a 1.3 times higher risk of developing bipolar disorder. Smoking during late childhood or adolescence increases the risk of developing bipolar disorder in patients with asthma.Keywords: adolescence, asthma, smoking, bipolar disorder, early adulthood
Procedia PDF Downloads 337173 Partnering with Stakeholders to Secure Digitization of Water
Authors: Sindhu Govardhan, Kenneth G. Crowther
Abstract:
Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.Keywords: cyber security, shared responsibility, IIOT, threat modelling
Procedia PDF Downloads 77172 Incidence and Causes of Elective Surgery Cancellations in Songklanagarind Hospital, Thailand
Authors: A. Kaeotawee, N. Bunmas, W. Chomthong
Abstract:
Background: The cancellation of elective surgery is a major indicator of poor operating room efficiency. Furthermore, it is recognized as a major cause of emotional trauma to patients as well as their families. This study was carried out to assess the incidence and causes of elective surgery cancellation in our setting and to find the appropriate solutions for better quality management. Objective: To determine the incidence and causes of elective surgery cancellations in Songklanagarind Hospital. Material and Method: A prospective survey was conducted from September to November 2012. All patients who had their scheduled elective operations cancelled were assessed. Data was collected on the following 2 components: (1) patient demographics;(2) main reasons for cancellations, which were grouped into patient-related factors and organizational-related factors. Data are reported as a percentage of patients whose operations were cancelled. The association between cancellation status and patient demographics was assessed using univariate logistic regression. Results: 2,395 patients were scheduled for elective surgery and of these 343 (14.3%) had their operations cancelled. Cardiothoracic surgery had the highest rate of cancellations (28.7%) while the least number of cancellations occurred in ophthalmology (10.1%). The main reasons for cancellations were related to the unit's organization (53.6%), due to the surgeon (48.4%). Patient related causes (46.4%), due to non medical reasons (32.1%). The most common cause of cancellation by the surgeon was lack of theater time (21.3%), by patients due to the patient’s nonappearance (25.1%). Cancellation was significantly associated with type of patient, health insurance, type of anesthesia and specialties (p<0.05). Conclusion: Surgery cancellations by surgeons relating to a lack of theater time was a significant problem in our setting. Appropriate solutions for better quality improvement are needed.Keywords: elective cases, surgery cancellation, quality management, appropriate solutions
Procedia PDF Downloads 260171 Role and Impact of Artificial Intelligence in Sales and Distribution Management
Authors: Kiran Nair, Jincy George, Suhaib Anagreh
Abstract:
Artificial intelligence (AI) in a marketing context is a form of a deterministic tool designed to optimize and enhance marketing tasks, research tools, and techniques. It is on the verge of transforming marketing roles and revolutionize the entire industry. This paper aims to explore the current dissemination of the application of artificial intelligence (AI) in the marketing mix, reviewing the scope and application of AI in various aspects of sales and distribution management. The paper also aims at identifying the areas of the strong impact of AI in factors of sales and distribution management such as distribution channel, purchase automation, customer service, merchandising automation, and shopping experiences. This is a qualitative research paper that aims to examine the impact of AI on sales and distribution management of 30 multinational brands in six different industries, namely: airline; automobile; banking and insurance; education; information technology; retail and telecom. Primary data is collected by means of interviews and questionnaires from a sample of 100 marketing managers that have been selected using convenient sampling method. The data is then analyzed using descriptive statistics, correlation analysis and multiple regression analysis. The study reveals that AI applications are extensively used in sales and distribution management, with a strong impact on various factors such as identifying new distribution channels, automation in merchandising, customer service, and purchase automation as well as sales processes. International brands have already integrated AI extensively in their day-to-day operations for better efficiency and improved market share while others are investing heavily in new AI applications for gaining competitive advantage.Keywords: artificial intelligence, sales and distribution, marketing mix, distribution channel, customer service
Procedia PDF Downloads 157170 Issues of Accounting of Lease and Revenue according to International Financial Reporting Standards
Authors: Nadezhda Kvatashidze, Elena Kharabadze
Abstract:
It is broadly known that lease is a flexible means of funding enterprises. Lease reduces the risk related to access and possession of assets, as well as obtainment of funding. Therefore, it is important to refine lease accounting. The lease accounting regulations under the applicable standard (International Accounting Standards 17) make concealment of liabilities possible. As a result, the information users get inaccurate and incomprehensive information and have to resort to an additional assessment of the off-balance sheet lease liabilities. In order to address the problem, the International Financial Reporting Standards Board decided to change the approach to lease accounting. With the deficiencies of the applicable standard taken into account, the new standard (IFRS 16 ‘Leases’) aims at supplying appropriate and fair lease-related information to the users. Save certain exclusions; the lessee is obliged to recognize all the lease agreements in its financial report. The approach was determined by the fact that under the lease agreement, rights and obligations arise by way of assets and liabilities. Immediately upon conclusion of the lease agreement, the lessee takes an asset into its disposal and assumes the obligation to effect the lease-related payments in order to meet the recognition criteria defined by the Conceptual Framework for Financial Reporting. The payments are to be entered into the financial report. The new lease accounting standard secures supply of quality and comparable information to the financial information users. The International Accounting Standards Board and the US Financial Accounting Standards Board jointly developed IFRS 15: ‘Revenue from Contracts with Customers’. The standard allows the establishment of detailed revenue recognition practical criteria such as identification of the performance obligations in the contract, determination of the transaction price and its components, especially price variable considerations and other important components, as well as passage of control over the asset to the customer. IFRS 15: ‘Revenue from Contracts with Customers’ is very similar to the relevant US standards and includes requirements more specific and consistent than those of the standards in place. The new standard is going to change the recognition terms and techniques in the industries, such as construction, telecommunications (mobile and cable networks), licensing (media, science, franchising), real property, software etc.Keywords: assessment of the lease assets and liabilities, contractual liability, division of contract, identification of contracts, contract price, lease identification, lease liabilities, off-balance sheet, transaction value
Procedia PDF Downloads 322169 Strengthening Regulation and Supervision of Microfinance Sector for Development in Ethiopia
Authors: Megersa Dugasa Fite
Abstract:
This paper analyses regulatory and supervisory issues in the Ethiopian micro finance sector, which caters to the needs of those who have been excluded from the formal financial sector. Micro-finance has received increased importance in development because of its grand goal to give credits to the poor to raise their economic and social well-being and improve the quality of lives. The micro-finance at present has been moving towards a credit-plus period through covering savings and insurance functions. It thus helps in reducing the rate of financial exclusion and social segregation, alleviating poverty and, consequently, stimulating development. The Ethiopian micro finance policy has been generally positive and developmental but major regulatory and supervisory limitations such as the absolute prohibition of NGOs to participate in micro credit functions, higher risks for depositors of micro-finance institutions, lack of credit information services with research and development, the unmet demand, and risks of market failures due to over-regulation are disappointing. Therefore, to remove the limited reach and high degree of problems typical in the informal means of financial intermediation plus to deal with the failure of formal banks to provide basic financial services to a significant portion of the country’s population, more needs to be done on micro finance. Certain key regulatory and supervisory revisions hence need to be taken to strengthen the Ethiopian micro finance sector so that it can practically provide majority poor access to a range of high quality financial services that help them work their way out of poverty and the incapacity it imposes.Keywords: micro-finance, micro-finance regulation and supervision, micro-finance institutions, financial access, social segregation, poverty alleviation, development, Ethiopia
Procedia PDF Downloads 397168 Comparative Outcomes of Percutaneous Coronary Intervention in Smokers versus Non Nonsmokers Patients: Observational Studies
Authors: Pratima Tatke, Archana Avhad, Bhanu Duggal, Meeta Rajivlochan, Sujata Saunik, Pradip Vyas, Nidhi Pandey, Aditee Dalvi, Jyothi Subramanian
Abstract:
Background: Smoking is well established risk factor for the development and progression of coronary artery disease. It is strongly related to morbidity and mortality from cardiovascular causes. The aim of this study is to observe effect of smoking status on percutaneous coronary intervention(PCI) after 1 year. Methods: 2527 patients who underwent PCI at different hospital of Maharashtra(India) from 2012 to 2015 under the health insurance scheme which is launched by Health department, Government of Maharashtra for below poverty line(BPL) families which covers cardiology. Informed consent of patients was taken .They were followed by telephonic survey after 6months to 1year of PCI . Outcomes of interest included myocardial infarction, restenosis, cardiac rehospitalization, death, and a composite of events after PCI. Made group of two non smokers-1861 and smokers (including patients who quit at time of PCI )-659. Results: Statistical Analysis using Pearson’s chi square test revealed that there was trend seen of increasing incidence of death, Myocardial infarction and Restenosis in smokers than non smokers .Smokers had a greater death risk compared to nonsmoker; 5.7% and 5.1% respectively p=0.518. Also Repeat procedures (2.1% vs. 1.5% p=0.222), breathlessness (17.8% vs. 18.20% p=0.1) and Myocardial Infarction (7.3% vs. 10%) high in smoker than non smokers. Conclusion: Major adverse cardiovascular events (MACE) were observed even after successful PCI in smokers. Patients undergoing percutaneous coronary intervention should be encouraged to stop smoking.Keywords: coronary artery diseases, major adverse cardiovascular events, percutaneous coronary intervention, smoking
Procedia PDF Downloads 211167 Women's Employment Issues in Georgia and Solutions Based on European Experience
Authors: N. Damenia, E. Kharaishvili, N. Sagareishvili, M. Saghareishvili
Abstract:
Women's Employment is one of the most important issues in the global economy. The article discusses the stated topic in Georgia, through historical content, Soviet experience, and modern perspectives. The paper discusses segmentation insa terms of employment and related problems. Based on statistical analysis, women's unemployment rate and its factors are analyzed. The level of employment of women in Transcaucasia (Georgia, Armenia, and Azerbaijan) is discussed and is compared with Baltic countries (Lithuania, Latvia, and Estonia). The study analyzes women’s level of development, according to the average age of marriage and migration level. The focus is on Georgia's Association Agreement with the EU in 2014, which includes economic, social, trade and political issues. One part of it is gender equality at workplaces. According to the research, the average monthly remuneration of women managers in the financial and insurance sector equaled to 1044.6 Georgian Lari, while in overall business sector average monthly remuneration equaled to 961.1 GEL. Average salaries are increasing; however, the employment rate remains problematic. For example, in 2017, 74.6% of men and 50.8% of women were employed from a total workforce. It is also interesting that the proportion of men and women at managerial positions is 29% (women) to 71% (men). Based on the results, the main recommendation for government and civil society is to consider women as a part of the country’s economic development. In this aspect, the experience of developed countries should be considered. It is important to create additional jobs in urban or rural areas and help migrant women return and use their working resources properly.Keywords: employment of women, segregation in terms of employment, women's employment level in Transcaucasia, migration level
Procedia PDF Downloads 119166 Analysis of Delays during Initial Phase of Construction Projects and Mitigation Measures
Authors: Sunaitan Al Mutairi
Abstract:
A perfect start is a key factor for project completion on time. The study examined the effects of delayed mobilization of resources during the initial phases of the project. This paper mainly highlights the identification and categorization of all delays during the initial construction phase and their root cause analysis with corrective/control measures for the Kuwait Oil Company oil and gas projects. A relatively good percentage of the delays identified during the project execution (Contract award to end of defects liability period) attributed to mobilization/preliminary activity delays. Data analysis demonstrated significant increase in average project delay during the last five years compared to the previous period. Contractors had delays/issues during the initial phase, which resulted in slippages and progressively increased, resulting in time and cost overrun. Delays/issues not mitigated on time during the initial phase had very high impact on project completion. Data analysis of the delays for the past five years was carried out using trend chart, scatter plot, process map, box plot, relative importance index and Pareto chart. Construction of any project inside the Gathering Centers involves complex management skills related to work force, materials, plant, machineries, new technologies etc. Delay affects completion of projects and compromises quality, schedule and budget of project deliverables. Works executed as per plan during the initial phase and start-up duration of the project construction activities resulted in minor slippages/delays in project completion. In addition, there was a good working environment between client and contractor resulting in better project execution and management. Mainly, the contractor was on the front foot in the execution of projects, which had minimum/no delays during the initial and construction period. Hence, having a perfect start during the initial construction phase shall have a positive influence on the project success. Our research paper studies each type of delay with some real example supported by statistic results and suggests mitigation measures. Detailed analysis carried out with all stakeholders based on impact and occurrence of delays to have a practical and effective outcome to mitigate the delays. The key to improvement is to have proper control measures and periodic evaluation/audit to ensure implementation of the mitigation measures. The focus of this research is to reduce the delays encountered during the initial construction phase of the project life cycle.Keywords: construction activities delays, delay analysis for construction projects, mobilization delays, oil & gas projects delays
Procedia PDF Downloads 318165 Technology Futures in Global Militaries: A Forecasting Method Using Abstraction Hierarchies
Authors: Mark Andrew
Abstract:
Geopolitical tensions are at a thirty-year high, and the pace of technological innovation is driving asymmetry in force capabilities between nation states and between non-state actors. Technology futures are a vital component of defence capability growth, and investments in technology futures need to be informed by accurate and reliable forecasts of the options for ‘systems of systems’ innovation, development, and deployment. This paper describes a method for forecasting technology futures developed through an analysis of four key systems’ development stages, namely: technology domain categorisation, scanning results examining novel systems’ signals and signs, potential system-of systems’ implications in warfare theatres, and political ramifications in terms of funding and development priorities. The method has been applied to several technology domains, including physical systems (e.g., nano weapons, loitering munitions, inflight charging, and hypersonic missiles), biological systems (e.g., molecular virus weaponry, genetic engineering, brain-computer interfaces, and trans-human augmentation), and information systems (e.g., sensor technologies supporting situation awareness, cyber-driven social attacks, and goal-specification challenges to proliferation and alliance testing). Although the current application of the method has been team-centred using paper-based rapid prototyping and iteration, the application of autonomous language models (such as GPT-3) is anticipated as a next-stage operating platform. The importance of forecasting accuracy and reliability is considered a vital element in guiding technology development to afford stronger contingencies as ideological changes are forecast to expand threats to ecology and earth systems, possibly eclipsing the traditional vulnerabilities of nation states. The early results from the method will be subjected to ground truthing using longitudinal investigation.Keywords: forecasting, technology futures, uncertainty, complexity
Procedia PDF Downloads 115164 The Online Power of Values: Adolescents’ Values as Predicting Factors of Their Online Bystanders’ Behavior While Witnessing Cyberbullying
Authors: Sharon Cayzer-Haller, Shir Ginosar-Yaari, Ariel Knafo-Noam
Abstract:
The 21st century emerged as the digital century, and it is marked by a wide range of technological developments and changes, followed by potential changes in human communication skills. This technological revolution has changed human means of communication in many different ways: children and adolescents are spending much of their time in front of screens, participating in all sorts of online activities (even more so since the outbreak of COVID-19). The current study focuses on the role of values in adolescents' online bystanders' behavior. Values are cognitive, abstract representations of desirable goals that motivate behavior, and we hypothesized finding significant associations between specific values and differential online bystanders' feelings and behavior. Data was collected through online questionnaires that measured the participants' values, using Schwartz's short version of the Portrait Values Questionnaire (Schwartz, 2012). Participants’ online behavior was assessed in a questionnaire addressing reactions to situations of cyber shaming and cyberbullying, and specifically positive feelings and pro-social behavior (e.g., more supportive reactions) toward the victims, as opposed to different offensive behavioral reactions (such as laughing at the victim or ignoring the situation). Participants were recruited with a commercial research panel company, and 308 Israeli adolescents' values and online behavior were examined (mean age 15.2). As hypothesized, results show significant associations between self-transcendence values (universalism and benevolence) and conservation values (conformity, tradition, and security). These two groups of values were positively correlated with pro-social bystanders' feelings and behavior. On the opposite side of the values scale, the value of power was negatively associated with the participants' pro-social behavior, and positively associated with offensive behavioral reactions. Further research is needed, but we conclude that values serve as crucial guiding factors in directing adolescents' online feelings and behavior.Keywords: adolescents, values, cyberbullying, online behavior, power
Procedia PDF Downloads 66163 Criminal Law and Internet of Things: Challenges and Threats
Authors: Celina Nowak
Abstract:
The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.Keywords: criminal law, internet of things, privacy, security threats
Procedia PDF Downloads 164162 Attitudes of Young Adults with Physical Disabilities towards Occupational Preferences
Authors: Limor Gadot, Orly Sarid
Abstract:
Integration of young adults with disabilities (YAWD) into workplaces provides an opportunity for social and occupational mobility, enabling them to financial independence. To enhance integration, it is important to understand their occupational preferences as well as the factors that influencing it such as demographic variables, self-assessed health, beliefs about work, subjective norms, and self-efficacy. Planned behavior theory was chosen as a basis for this study. A cross-sectional study, based on preliminary sample of 37 YAWD who have been recognized by the National Insurance Institute and are engaged in a year of national service. The finding shows that most of the participants were single (97%) women (60%); average age was 22(+ 2) years, approximately half were secular. Most of the participants had disabilities resulting from CP (96%). Self-assessed health was correlated positively and significantly with behavioral intentions to work in the free market (r = .33, p = .05), and significant negative correlation with behavioral intentions to work in supported settings (r =.-40, p = .01), and sheltered settings (r =-.36, p = .03): individuals who perceived themselves as having more severe disabilities showed a greater tendency to choose a workplace with more rehabilitative inputs. Furthermore, women showed a greater tendency than men to perceive their disability as impairing their future intention to work: t (36) = 2.23, p < .05. Beliefs about work were positively associated with normative beliefs (r = .308, p = .06). The findings indicate that, especially with women, perceptions of health are related to occupational preferences. Moreover, the findings indicate that the relationship between subjective norms about work and normative beliefs about integrating in a workplace that prevail in the individual's environment affects occupational preferences. The contribution of the study lies in the development of new responses and interventions to encourage adults with disabilities to work.Keywords: young adults, disabilities, work preferences, occupational preferences
Procedia PDF Downloads 262161 Analysis of Risks in Financing Agriculture a Case of Agricultural Cooperatives in Benue State, Nigeria
Authors: Odey Moses Ogah, Felix Terhemba Ikyereve
Abstract:
The study was carried out to analyzed risks in financing agriculture by agricultural cooperatives in Benue State, Nigeria. The study made use of research questionnaires for data collection. A multistage sampling technique was used to select a sample of 210 respondents from 21 agricultural cooperatives. Both descriptive and inferential statistics were employed in data analysis. Loan defaulting (66.7%) and reduction in savings by members (51.4%) were the major causes of risks faced by agricultural cooperatives in financing agriculture in the study area. Other causes include adverse changes in commodity prices (48.6%), disaster (45.7%), among others. It was found that risks adversely influence the profitability and competition of agricultural cooperatives (82.9%). Multiple regression analysis results showed that the coefficient of multiple determinations was 0.67, implying that the explanatory variables included in the model accounted for 67% of the variation in the level of profitability of agricultural cooperatives. The number of loans, average amount of loan and the interest rate were significant and important determinants of profitability of the cooperatives. The majority of the respondents (88.6%) made use of loan guarantors as a strategy of managing loan default/no repayment. It was found that the majority (70%) of the respondents were faced with the challenge of lack of insurance cover. The study recommends that agricultural cooperative officials should be encouraged to undergo formal training and education to easily acquire administrative skills in the management of agricultural loans; Farmer's loan size should be increased and released on time to enable them to use it effectively. Policies that enhance insuring farm activities should be put in place to discourage farmers from risk aversion.Keywords: agriculture, analysis, cooperative, finance, risks
Procedia PDF Downloads 113160 Effect of One-Period of SEAS Exercises on Some Spinal Biomechanical and Postural Parameters in the Students with Idiopathic Scoliosis
Authors: Zandi Ahmad, Sokhanguei Yahya, Saboonchi Reza
Abstract:
Objective: The new and modern lifestyle, especially in the twenty-first century and lack of movement in spinal structure have made patients and the physicians in the field of health and also other insurance companies in the developed and developing countries worry more than before about the abnormalities of spinal column- this great healthcare problem. The high prevalence of spinal column in all age groups -from children to adults- and in all professions have led the researchers to the idea of giving an opportunity to all those who worry about the dangers threatening the spinal column. Therefore, one of the corrective methods for these patients is using SEAS exercises. Materials and Methods: This study aims at investigating the effect of one-period of SEAS exercises on some spinal biomechanical and postural parameters in the students with idiopathic scoliosis. According to the nature of the study and research objectives as well as the data collection methods, the current research is a semi-empirical survey. The research population is comprised of students with idiopathic scoliosis. A total number of 30 students were selected using available sampling and divided into two groups of control and SEAS exercises. Scoliometer was used for data collection. Descriptive statistics were used to categorize the findings. Kolmogorov-Smirnov statistical models were used to confirm that the distribution of the data is normal and T-test was used for effectiveness. Hypothesis testing was done using SPSS21. Conclusion: Results show that SEAS exercises have a significant effect in Adam’s Test. Therefore, according to the obtained results, SEAS exercises can be used to recover idiopathic scoliosis among the students. Further studies in larger samples and treatment, periods as well as more follow-up investigations appear to be essential to prove these effects.Keywords: SEAS exercises, idiopathic scoliosis, Adam’s test, exercise
Procedia PDF Downloads 293159 Self-Government Health Policy Programs as a Form of Implementation of Public Health Tasks in Poland
Authors: T. Holecki, J. Wozniak-Holecka, K. Sobczyk
Abstract:
Development, implementation, and evaluation of the effects of health policy programs, resulting from the identified health needs and health status of residents, is the own task of all local government units in Poland. This is due to the obligation to provide access to healthcare services to all residents and the implementation of tasks in the field of health promotion based on specific legal acts. Until the end of 2016 local governments financed health policy programs only with their own funds. Currently, there are additional resources available from the public health insurance subsidising up to 80% of health policy programs costs in cities with a population under 5 thousand people and up to 40% in bigger cities. Changes in legal provisions do not translate automatically to increased involvement of local government units in the implementation of public health tasks. The main objective of the study was to assess the actual impact of the new legal regulation on financing local health policy programs on the engagement of local administration in this area of public health activity. To achieve this aim, we analyzed difference in the number of local governments developing and implementing health policy programs before and after the new law came into force. The aim of the study was also to estimate the level of expenditures incurred by self-government units and the National Health Fund to cover the costs of health policy programs. In the first stage of the project, legal acts concerning the subject of research and financial data published by the National Health Fund were analyzed. The material for the second, main stage of the study was the detailed financial data obtained from the National Health Fund and data obtained from local government units. The results present the situation in Poland in territorial terms, divided into 16 voivodships.Keywords: health care system, health policy programs, local self-governments, public health
Procedia PDF Downloads 158158 The Impact of the Chanpyons Credible Messenger Intervention on Breast Cancer Screening Rates among Haitian Creole Women
Authors: Zachary Bernard, Dorothy Dillard
Abstract:
Background: Haitian Creole women in Sussex County, Delaware, experience significant disparities in breast cancer outcomes, exacerbated by cultural, linguistic, and socioeconomic barriers. The Chanpyons Credible Messenger Intervention was developed to address these disparities through culturally tailored education, logistical support, and the engagement of trusted community members as credible messengers. Method: This mixed-methods study combined quantitative analysis of screening rates pre- and post-intervention, using demographic data from 85 participants, with qualitative interviews to explore participants' perceptions, barriers, and experiences. Results: Of the participants, 22.35% had received a mammogram before the program, compared to 50.59% after its implementation, marking a significant increase in screening rates. Women with private insurance had higher up-to-date screening rates (78.95%) compared to uninsured women (36.36%). Qualitative findings revealed that credible messengers effectively built trust, addressed cultural misconceptions, and alleviated fear, empowering women to prioritize preventive care. Conclusion: The study demonstrates the success of culturally specific interventions in increasing breast cancer screening rates and reducing health disparities. The Chanpyons model highlights the importance of integrating community-driven approaches in public health programs, offering a replicable framework for addressing similar challenges in underserved populations.Keywords: breast cancer, community engagement, Haitian Creole women, credible messengers, health disparities, preventive care
Procedia PDF Downloads 3157 Explaining the Role of Iran Health System in Polypharmacy among the Elderly
Authors: Mohsen Shati, Seyede Salehe Mortazavi, Seyed Kazem Malakouti, Hamidreza Khanke Fazlollah Ahmadi
Abstract:
Taking unnecessary or excessive medication or using drugs with no indication (polypharmacy) by people of all ages, especially the elderly, is associated with increased adverse drug reactions (ADR), medical errors, hospitalization and escalating the costs. It may be facilitated or impeded by the healthcare system. In this study, we are going to describe the role of the health system in the practice of polypharmacy in Iranian elderly. In this Inductive qualitative content analysis using Graneheim and Lundman methods, purposeful sample selection until saturation has been made. Participants have been selected from doctors, pharmacists, policy-makers and the elderly. A total of 25 persons (9 men and 16 women) have participated in this study. Data analysis after incorporating codes with similar characteristics revealed 14 subcategories and six main categories of the referral system, physicians’ accessibility, health data management, drug market, laws enforcement, and social protection. Some of the conditions of the healthcare system have given rise to polypharmacy in the elderly. In the absence of a comprehensive specialty and subspecialty referral system, patients may go to any physician office so may well be confused about numerous doctors' prescriptions. Electronic records not being prepared for the patients, failure to comply with laws, lack of robust enforcement for the existing laws and close surveillance are among the contributing factors. Inadequate insurance and supportive services are also evident. Age-specific care providing has not yet been institutionalized, while, inadequate specialist workforce playing a major role. So, one may not ignore the health system as contributing factor in designing effective interventions to fix the problem.Keywords: elderly, polypharmacy, health system, qualitative study
Procedia PDF Downloads 151156 Real-Time Hybrid Simulation for a Tuned Liquid Column Damper Implementation
Authors: Carlos Riascos, Peter Thomson
Abstract:
Real-time hybrid simulation (RTHS) is a modern cyber-physical technique used for the experimental evaluation of complex systems, that treats the system components with predictable behavior as a numerical substructure and the components that are difficult to model as an experimental substructure. Therefore it is an attractive method for evaluation of the response of civil structures under earthquake, wind and anthropic loads. Another practical application of RTHS is the evaluation of control systems, as these devices are often nonlinear and their characterization is an important step in the design of controllers with the desired performance. In this paper, the response of three-story shear frame controlled by a tuned liquid column damper (TLCD) and subject to base excitation is considered. Both passive and semi-active control strategies were implemented and are compared. While the passive TLCD achieved a reduction of 50% in the acceleration response of the main structure in comparison with the structure without control, the semi-active TLCD achieved a reduction of 70%, and was robust to variations in the dynamic properties of the main structure. In addition, a RTHS was implemented with the main structure modeled as a linear, time-invariant (LTI) system through a state space representation and the TLCD, with both control strategies, was evaluated on a shake table that reproduced the displacement of the virtual structure. Current assessment measures for RTHS were used to quantify the performance with parameters such as generalized amplitude, equivalent time delay between the target and measured displacement of the shake table, and energy error using the measured force, and prove that the RTHS described in this paper is an accurate method for the experimental evaluation of structural control systems.Keywords: structural control, hybrid simulation, tuned liquid column damper, semi-active sontrol strategy
Procedia PDF Downloads 299155 Intrusion Detection in SCADA Systems
Authors: Leandros A. Maglaras, Jianmin Jiang
Abstract:
The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection
Procedia PDF Downloads 555