Search results for: safety and security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5709

Search results for: safety and security

5079 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 508
5078 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 329
5077 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 290
5076 Traffic Accident Risk Assessment on National Roads: A Case Study in East Aceh Regency

Authors: Muksalmina

Abstract:

Transportation plays an important role in people's daily activities but is often marred by traffic accidents. In Indonesia, traffic accidents are the third leading cause of death after coronary heart disease and tuberculosis, according to the World Health Organization (2013). Several roads in East Aceh District are strategic access points for economic growth in the Aceh region. There were 446 traffic accidents in 2023, which is the highest case in the last five years. This study aims to analyze black spot locations on national roads in East Aceh District and evaluate road safety deficiencies in the area. The research methodology began by selecting the locations with the highest accident rates based on data from East Aceh Police from 2019-2023. Next, Average Daily Traffic (ADT) was measured by projecting population growth data. The analysis of road safety deficiencies included measurements of road geometrics, traffic signs and markings, and traffic volumes at black spot locations. The study results showed deficiencies in lane width, shoulder width, and inadequate road safety facilities at several locations. Recommendations for improvements include increasing lane and shoulder widths and adding signs and markings to improve safety. This study is expected to serve as a reference for the government and relevant stakeholders in improving traffic safety in East Aceh District.

Keywords: black spot, traffic accident, severity index, road safety

Procedia PDF Downloads 18
5075 Real Time Adaptive Obstacle Avoidance in Dynamic Environments with Different D-S

Authors: Mohammad Javad Mollakazemi, Farhad Asadi

Abstract:

In this paper a real-time obstacle avoidance approach for both autonomous and non-autonomous dynamical systems (DS) is presented. In this approach the original dynamics of the controller which allow us to determine safety margin can be modulated. Different common types of DS increase the robot’s reactiveness in the face of uncertainty in the localization of the obstacle especially when robot moves very fast in changeable complex environments. The method is validated by simulation and influence of different autonomous and non-autonomous DS such as important characteristics of limit cycles and unstable DS. Furthermore, the position of different obstacles in complex environment is explained. Finally, the verification of avoidance trajectories is described through different parameters such as safety factor.

Keywords: limit cycles, nonlinear dynamical system, real time obstacle avoidance, safety margin

Procedia PDF Downloads 435
5074 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 410
5073 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security

Authors: Rhisan Mae Enriquez-Morales

Abstract:

The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.

Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea

Procedia PDF Downloads 379
5072 Exploring Strategies Used by Victims of Intimate Partner Violence to Increase Sense of Safety: A Systematic Review and Quantitative Study

Authors: Thomas Nally, Jane Ireland, Roxanne Khan, Philip Birch

Abstract:

Intimate Partner Violence (IPV), a significant societal problem, affects individuals worldwide. However, the strategies victims use to keep safe are under-researched. IPV is significantly under-reported, and services often are not able to be accessed by all victims. Thus they are likely to use their own strategies to manage their victimization before being able to seek support. Two studies were completed to understand these strategies. A systematic review of the literature and study completed with professionals who work with victims was undertaken to understand this area. In study one, a systematic review of the literature (n=61 papers), were analyzed using Thematic Analysis. The results indicated that victims use a large array of behaviors to increase their sense of safety and coping with emotions but also experience significant barriers to help-seeking. In study 2, sixty-nine professionals completed a measure exploring the likelihood and effectiveness of various victim strategies regarding increasing their sense of safety. Strategies included in the measure were obtained from those identified in study 1. Findings indicated that professionals perceived victims of IPV to be more likely to employ safety strategies and coping behaviors that may be ineffective but not help-seeking behaviors. Further, the responses were analyzed using Cluster Analysis. Safety strategies resulted in five clusters; perpetrator-directed strategies, prevention strategies, cognitive reappraisal, safety planning and avoidance strategies. Help-Seeking resulted in six clusters; information or practical support, abuse-related support, emotional support, secondary support and informal support. Finally, coping resulted in four clusters; emotional coping, self-directed coping, thought recording/change and cognitive coping. Both studies indicate that victims may use a variety of strategies to manage their safety besides seeking help. Professionals working with victims, using a strength-based approach, should understand what is used and is effective for victims who are unable to leave the relationships or access external support.

Keywords: intimate partner violence, help-seeking, professional support, victims, victim coping, victim safety

Procedia PDF Downloads 181
5071 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 339
5070 Filtering Intrusion Detection Alarms Using Ant Clustering Approach

Authors: Ghodhbani Salah, Jemili Farah

Abstract:

With the growth of cyber attacks, information safety has become an important issue all over the world. Many firms rely on security technologies such as intrusion detection systems (IDSs) to manage information technology security risks. IDSs are considered to be the last line of defense to secure a network and play a very important role in detecting large number of attacks. However the main problem with today’s most popular commercial IDSs is generating high volume of alerts and huge number of false positives. This drawback has become the main motivation for many research papers in IDS area. Hence, in this paper we present a data mining technique to assist network administrators to analyze and reduce false positive alarms that are produced by an IDS and increase detection accuracy. Our data mining technique is unsupervised clustering method based on hybrid ANT algorithm. This algorithm discovers clusters of intruders’ behavior without prior knowledge of a possible number of classes, then we apply K-means algorithm to improve the convergence of the ANT clustering. Experimental results on real dataset show that our proposed approach is efficient with high detection rate and low false alarm rate.

Keywords: intrusion detection system, alarm filtering, ANT class, ant clustering, intruders’ behaviors, false alarms

Procedia PDF Downloads 400
5069 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 676
5068 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 87
5067 Concerns, Attitudes and Perceptions of Mothers about Child Vulnerability for Sexual Abuse

Authors: Rukhsana Kausar, Khadija Rasheed

Abstract:

This research explored general concerns, attitudes and perceptions of Pakistani mothers about their children’s vulnerability for sexual abuse and it also examined the effect of education and work status of mothers on their concerns and attitudes about the safety of their children. The sample consisted of 166 mothers comprising of 4 groups i.e. educated-working mothers, uneducated working mothers, educated non-working mothers and uneducated non-working mothers. This research comprised of two studies. Study 1 was carried out to construct two separate scales namely Maternal Concerns and Attitudes Scale for safety of Daughters (MCA-SD) and Maternal Concerns and Attitudes Scale for safety of Sons (MCA-SS) for assessing maternal concerns and attitudes about safety and protection of daughters and sons. These scales were used in study 2 with the objective to explore mothers’ general concerns, attitudes and perceptions of about child vulnerability for sexual abuse. Data were analyzed using two-way analysis of variance and independent-samples t-test. Educated mothers had more sense of responsibility, ensured more safety and provide more information about self-protection to their children as compared to uneducated mothers. Similarly non-working mothers showed more sense of responsibility and provided more information on self-protection to their children as compared to working mothers. Moreover, mothers living in nuclear family system trusted more on their relatives and other people for the protection of their children and ensured more safety of children than those living in joint family system. Findings have very important implications for protecting children from likely sexual abuse.

Keywords: mothers’ concerns, attitudes, perceptions, child vulnerability, child sexual abuse

Procedia PDF Downloads 435
5066 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 457
5065 Health and Safety of Red Cross Workers in Long-Term Homes during Early Days of the COVID-19 Pandemic: A Human Performance Perspective

Authors: Douglas J. Kube

Abstract:

At the beginning of the COVID-19 pandemic, the Canadian Red Cross deployed workers into long-term care homes across Canada to support our most vulnerable citizens. It began by recruiting and training small teams of workers to provide non-clinical services for facilities in outbreak. Deployed workers were trained on an approach based on successful Red Cross deployments used with Ebola in which zones were established, levels of protection used, and strict protocols followed to prevent exposure. This paper addresses aspects of human performance through a safety culture lens. The Red Cross deployments highlight valuable insights and are an excellent case study in the principles of human performance and organizational culture. This paper looks at human performance principles, including human fallibility, predictability of error-likely situations, avoiding events by understanding reasons mistakes occur, and the influence on behaviour by organizational factors. This study demonstrates how the Red Cross’s organizational culture and work design positively influenced performance to protect workers and residents/clients. Lastly, this paper shares lessons that can be applied in many workplaces to improve worker health and safety and safety culture. This critical examination is based on the author’s experience as a Senior Occupational Health and Safety Advisor with the Red Cross during the pandemic as part of the team responsible for developing and implementing biological safety practices in long-term care deployments.

Keywords: COVID, human performance, organizational culture, work design

Procedia PDF Downloads 55
5064 Characterizing Multivariate Thresholds in Industrial Engineering

Authors: Ali E. Abbas

Abstract:

This paper highlights some of the normative issues that might result by setting independent thresholds in risk analyses and particularly with safety regions. A second objective is to explain how such regions can be specified appropriately in a meaningful way. We start with a review of the importance of setting deterministic trade-offs among target requirements. We then show how to determine safety regions for risk analysis appropriately using utility functions.

Keywords: decision analysis, thresholds, risk, reliability

Procedia PDF Downloads 306
5063 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 520
5062 All at Sea: Why OT / IT Infrastructure Is So Complex and the Challenges of Securing These on a Cruise Ship

Authors: Ken Munro

Abstract:

Cruise ships are possibly the most complex collection of systems it is possible to find in one physical, moving location. Propulsion, navigation, power generation and more, combined with a hotel, restaurant, casino, theatre etc, with safety and fire control systems to boot. That complexity creates huge challenges with keeping OT and IT systems apart. Ships engines are often remotely managed, network segregation is often defeated through troubleshooting when at sea. This session will refer to multiple entertaining and informative tales of taking control of ships, including accessing a ships Azipods via a game simulator for passengers. Fortunately, genuine attacks against vessels are very rare, but the effects and impacts to world trade are becoming increasingly obvious.

Keywords: maritime security, cybersecurity, OT, IT, networks

Procedia PDF Downloads 19
5061 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria

Authors: Adebisi A. Sunday, Babajide Adeokin

Abstract:

The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.

Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer

Procedia PDF Downloads 135
5060 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 122
5059 A Review of Process Safety Management for Small and Medium Business in Malaysia

Authors: Muhammad Afiq Anaqi Bin Baharudin, Muhammad Izamuddin Bin Mohd Nasir, Syarifuddin Bin Sujuanda, Muhammad Syahmi Rusyaidi Bin Sham Suddin, Danish Hakimi Bin kamaruzaman, Muhammad Haqimi Nazim Bin Hasmanizam, Mohammad Akmal Zakwan Bin Amran, Muhammad Alparizi Bin Latif

Abstract:

In particular, for small and medium enterprises (SMBs) in Malaysia, process safety management (PSM) is a crucial component of industrial safety. Limited resources, a lack of technical know-how, and linguistic and cultural obstacles are just a few of the difficulties SMBs in Malaysia encounter while putting PSM programmes into practice. A number of studies have emphasised the significance of leadership commitment, hazard identification and assessment, and employee involvement in the execution of effective PSM programmes, which are crucial for preventing accidents and incidents. In the literature, there has been a lot of discussion on the creation of specialised PSM frameworks for SMBs in Malaysia. Several studies have proposed implementation frameworks for PSM programmes that are based on recognised worldwide standards. Despite the significance of PSM in ensuring industrial safety, there are still a number of gaps in the literature on PSM in Malaysian SMBs. These gaps include the need for additional research on the efficiency of PSM programmes in reducing accidents and incidents in SMBs as well as the development of more specialised approaches to implementing PSM programmes in SMBs with limited resources and technical expertise. The goal of this review is to give a thorough overview of the body of research on PSM in Malaysian SMBs while highlighting important findings, points of contention, and knowledge gaps that need to be filled in.

Keywords: process safety management, occupational safety and health (OSH), small businesses, medium businesses, malaysia

Procedia PDF Downloads 113
5058 Attitude of Beef Cattle Farmers toward Biosecurity Practices

Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim

Abstract:

The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.

Keywords: attitude, beef cattle, biosecurity, farmers

Procedia PDF Downloads 290
5057 safeRoute: Information Safety System for Professional Road Driving

Authors: Francisco Toledo-Castillo, Pilar Peiró-Torres, María Josefa Sospedra-Baeza, Sergio Hidalgo-Fuentes

Abstract:

The communication presented is about tasks that are been developed in the research project “safeRoute”, “Information safety system for professional road driving” (IPT-2012-110-370000). This R&D project was proposed by the consortium formed by Fagor Electronica la SEU 3 and the University of Valencia to the Ministry of Economy and Competitiveness, which approved it inside the INNPACTO subprogramme grants. Through this type of calls, the Ministry promote the innovative capacity of the Spanish companies and turn on the mechanism for competing internationally. With this kind of calls, private investments for technological and industrial development join their R & D resources with public entities to implement innovative project that could have an international exposure. Thus INNPACTO subprogramme promotes the creation of research projects with public-private partnerships that create exploitable final products. The “safeRoute” Project pretends develop a tool to help to make more safety the travels of commercial transport vehicles of goods and passengers. To achieve its objectives, the project is focused in three main lines of research: vehicle safety, the safety of the roads that they are using, and the safety which drivers do their job, their behaviour while they are driving. To improve safety, the project gives information about these three factors to all people that are involved in the safety of the professional transport. These three factors have influence to the occurrence of traffic accidents, thanks to the information provided and treated about these factors, we can achieve a significant reduction in occupational accidents in the transport sector. SafeRoute provide information about routes, vehicles, and driver behaviours, and in this manner pretends provide to transport companies a tool which could result in a safer driving results and could reduce their costs related to traffic accidents of their vehicles, in that way, this tool could help them to be more competitive, and give a more reliable service. This paper will focus mainly on the information about routes that drivers use to travel in their professional work, and how the researchers of this project have catalogued and evaluated these routes, and finally how that information will be provided to users.

Keywords: driver support systems, professional drivers, road safety, safeRoute

Procedia PDF Downloads 400
5056 Structural Reliability of Existing Structures: A Case Study

Authors: Z. Sakka, I. Assakkaf, T. Al-Yaqoub, J. Parol

Abstract:

A reliability-based methodology for the analysis assessment and evaluation of reinforced concrete structural elements of concrete structures is presented herein. The results of the reliability analysis and assessment for structural elements are verified by the results obtained from the deterministic methods. The analysis outcomes of reliability-based analysis are compared against the safety limits of the required reliability index β according to international standards and codes. The methodology is based on probabilistic analysis using reliability concepts and statistics of the main random variables that are relevant to the subject matter, and for which they are to be used in the performance-function equation(s) related to the structural elements under study. These methodology techniques can result in reliability index β, which is commonly known as the reliability index or reliability measure value that can be utilized to assess and evaluate the safety, human risk, and functionality of the structural component. Also, these methods can result in revised partial safety factor values for certain target reliability indices that can be used for the purpose of redesigning the reinforced concrete elements of the building and in which they could assist in considering some other remedial actions to improve the safety and functionality of the member.

Keywords: structural reliability, concrete structures, FORM, Monte Carlo simulation

Procedia PDF Downloads 509
5055 Lessons from Implementation of a Network-Wide Safety Huddle in Behavioral Health

Authors: Deborah Weidner, Melissa Morgera

Abstract:

The model of care delivery in the Behavioral Health Network (BHN) is integrated across all five regions of Hartford Healthcare and thus spans the entirety of the state of Connecticut, with care provided in seven inpatient settings and over 30 ambulatory outpatient locations. While safety has been a core priority of the BHN in alignment with High Reliability practices, safety initiatives have historically been facilitated locally in each region or within each entity, with interventions implemented locally as opposed to throughout the network. To address this, the BHN introduced a network wide Safety Huddle during 2022. Launched in January, the BHN Safety Huddle brought together internal stakeholders, including medical and administrative leaders, along with executive institute leadership, quality, and risk management. By bringing leaders together and introducing a network-wide safety huddle into the way we work, the benefit has been an increase in awareness of safety events occurring in behavioral health areas as well as increased systemization of countermeasures to prevent future events. One significant discussion topic presented in huddles has pertained to environmental design and patient access to potentially dangerous items, addressing some of the most relevant factors resulting in harm to patients in inpatient and emergency settings for behavioral health patients. The safety huddle has improved visibility of potential environmental safety risks through the generation of over 15 safety alerts cascaded throughout the BHN and also spurred a rapid improvement project focused on standardization of patient belonging searches to reduce patient access to potentially dangerous items on inpatient units. Safety events pertaining to potentially dangerous items decreased by 31% as a result of standardized interventions implemented across the network and as a result of increased awareness. A second positive outcome originating from the BHN Safety Huddle was implementation of a recommendation to increase the emergency Narcan®(naloxone) supply on hand in ambulatory settings of the BHN after incidents involving accidental overdose resulted in higher doses of naloxone administration. By increasing the emergency supply of naloxone on hand in all ambulatory and residential settings, colleagues are better prepared to respond in an emergency situation should a patient experience an overdose while on site. Lastly, discussions in safety huddle spurred a new initiative within the BHN to improve responsiveness to assaultive incidents through a consultation service. This consult service, aligned with one of the network’s improvement priorities to reduce harm events related to assaultive incidents, was borne out of discussion in huddle in which it was identified that additional interventions may be needed in providing clinical care to patients who are experiencing multiple and/ or frequent safety events.

Keywords: quality, safety, behavioral health, risk management

Procedia PDF Downloads 80
5054 Analysis of Human Mental and Behavioral Models for Development of an Electroencephalography-Based Human Performance Management System

Authors: John Gaber, Youssef Ahmed, Hossam A. Gabbar, Jing Ren

Abstract:

Accidents at Nuclear Power Plants (NPPs) occur due to various factors, notable among them being poor safety management and poor safety culture. During abnormal situations, the likelihood of human error is many-fold higher due to the higher cognitive workload. The most common cause of human error and high cognitive workload is mental fatigue. Electroencephalography (EEG) is a method of gathering the electromagnetic waves emitted by a human brain. We propose a safety system by monitoring brainwaves for signs of mental fatigue using an EEG system. This requires an analysis of the mental model of the NPP operator, changes in brain wave power in response to certain stimuli, and the risk factors on mental fatigue and attention that NPP operators face when performing their tasks. We analyzed these factors and developed an EEG-based monitoring system, which aims to alert NPP operators when levels of mental fatigue and attention hinders their ability to maintain safety.

Keywords: brain imaging, EEG, power plant operator, psychology

Procedia PDF Downloads 96
5053 VCloud: A Security Framework for VANET

Authors: Wiseborn Manfe Danquah, D. Turgay Altilar

Abstract:

Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.

Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)

Procedia PDF Downloads 348
5052 Analysis of Economic Order Quantity, Safety Stock, Maximum Inventory Control, Lot Size and Reorder Point for Engro Polymers and Chemicals

Authors: Ali Akber Jaffri, Asad Naseem, Javeria Khan, Zubair Hamza, Ishtiaq

Abstract:

The purpose of this study is to determine safety stock, maximum inventory level, reordering point, and reordering quantity by rearranging lot sizes for supplier and customer in MRO (maintenance repair operations) warehouse of Engro Polymers & Chemicals. To achieve the aim, physical analysis method and excel commands were carried out to elicit the customer and supplier data provided by the company. Initially, we rearranged the current lot sizes and MOUs (measure of units) in SAP software. Due to change in lot sizes, we have to determine the new quantities for safety stock, maximum inventory, reordering point and reordering quantity as per company's demand. By proposed system, we saved extra cost in terms of reducing time of receiving from vendor and in issuance to customer, ease of material handling in MRO warehouse and also reduce human efforts.

Keywords: maintenance repair operation, maximum inventory, reorder quantity, safety stock

Procedia PDF Downloads 271
5051 Facility Layout Improvement: Based on Safety and Health at Work and Standards of Food Production Facility

Authors: Asifa Fitriani, Galih Prakoso

Abstract:

This study aims to improve the design layout of a Micro, Small and Medium Enterprises (SMEs) to minimize material handling and redesigning the layout of production facilities based on the safety and health and standards of food production facilities. Problems layout in the one of chip making industry mushrooms in Indonesia is cross movement between work stations, work accidents, and the standard of facilities that do not conform with the standards of the food industry. Improvement layout design using CORELAP and 5S method to give recommendation and implementation of occupational health and safety standards of food production facilities. From the analysis, improved layout using CORELAP provide a smaller displacement distance is 155.84 meters from the initial displacement distance of 335.9 meters, and providing a shorter processing time than the original 112.726 seconds to 102.831 seconds. 5S method also has recommended the completion of occupational health and safety issues as well as the standard means of food production by changing the working environment better.

Keywords: Layout Design, Corelap, 5S

Procedia PDF Downloads 528
5050 Reliability-Based Method for Assessing Liquefaction Potential of Soils

Authors: Mehran Naghizaderokni, Asscar Janalizadechobbasty

Abstract:

This paper explores probabilistic method for assessing the liquefaction potential of sandy soils. The current simplified methods for assessing soil liquefaction potential use a deterministic safety factor in order to determine whether liquefaction will occur or not. However, these methods are unable to determine the liquefaction probability related to a safety factor. A solution to this problem can be found by reliability analysis.This paper presents a reliability analysis method based on the popular certain liquefaction analysis method. The proposed probabilistic method is formulated based on the results of reliability analyses of 190 field records and observations of soil performance against liquefaction. The results of the present study show that confidence coefficient greater and smaller than 1 does not mean safety and/or liquefaction in cadence for liquefaction, and for assuring liquefaction probability, reliability based method analysis should be used. This reliability method uses the empirical acceleration attenuation law in the Chalos area to derive the probability density distribution function and the statistics for the earthquake-induced cyclic shear stress ratio (CSR). The CSR and CRR statistics are used in continuity with the first order and second moment method to calculate the relation between the liquefaction probability, the safety factor and the reliability index. Based on the proposed method, the liquefaction probability related to a safety factor can be easily calculated. The influence of some of the soil parameters on the liquefaction probability can be quantitatively evaluated.

Keywords: liquefaction, reliability analysis, chalos area, civil and structural engineering

Procedia PDF Downloads 462