Search results for: household food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6463

Search results for: household food security

5803 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4

Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono

Abstract:

Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.

Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations

Procedia PDF Downloads 130
5802 Drivers for Relationship Building in the Supply Chain: The Case of Luxury Food

Authors: Kateryna Merkulova, Alessio Castello, Maria Kreuzer

Abstract:

This research investigates the drivers of long-term relationship building between customers and suppliers within the luxury food supply chain, a topic that remains largely unexplored in the current state of academic literature. This paper identifies for the first time the key elements that influence the formation and maintenance of effective supply chain relationships, which are crucial for navigating the complexities of the luxury food industry. In particular, it explores the critical role of trust in a business-to-business context, specifically emphasizing its significance in the luxury food supply chain. Empirically, this research is contextualized in the region of the French Riviera, which offers a gastronomic playground for food enthusiasts, making it ideally suited to explore the luxury food sector. Qualitative in-depth interviews with stakeholders along the luxury supply chain (i.e., suppliers, chefs, restaurant owners, and fine food shop managers) allow identifying key drivers of trustful business relationships. Triangulating different perspectives of stakeholders within the luxury supply chain adds validity and robustness to the findings. The findings have important theoretical and managerial implications for the effective functioning of long-term supplier-buyer relationships.

Keywords: luxury food, relationship building, B2B, supply chain, trust

Procedia PDF Downloads 34
5801 Sector-Wide Collaboration to Reduce Food Waste

Authors: Carolyn Cameron

Abstract:

Stop Food Waste Australia is working with the industry to co-design sector action plans to prevent and reduce food waste across the supply chain. We are a public-private partnership, funded in 2021 by the Australian national government under the 2017 National Food Waste Strategy. Our partnership has representatives from all levels of government, industry associations from farm to fork, and food rescue groups. Like many countries, Australia has adopted the Sustainable Development Goal (SDG) target of 12.3 to halve food waste by 2030. A seminal 2021 study, the National Food Waste Feasibility Report, developed a robust national baseline, illustrating hotspots in commodities and across the supply chain. This research found that the consumption stages – households, food service, and institutions - account for over half of all food waste, and 22% of food produced never leaves the farm gate. Importantly the study found it is feasible for Australia to meet SDG 12.3, but it will require unprecedented action by governments, industry, and the community. Sector Action Plans (Plan) are one of the four main initiatives of Stop Food Waste Australia, including a voluntary commitment, a coordinated food waste communications hub, and robust monitoring and reporting framework. These plans provide a systems-based approach to reducing food loss and waste while realising multiple benefits for supply chain partners and other collaborators. Each plan is being co-designed with the key stakeholders most able to directly control or influence the root cause(s) of food waste hotspots and to take action to reduce or eliminate food waste in their value chain.  The initiatives in the Plans are fit-for-purpose, reflecting current knowledge and recognising priorities may refocus over time. To date, sector action plans have been developed with the Food Rescue, Cold Chain, Bread and Bakery, and Dairy Sectors. Work is currently underway on Meat and Horticulture, and we are also developing supply-chain stage plans for food services and institutions. The study will provide an overview of Australia’s food waste baseline and challenges, the important role of sector action plans in reducing food waste, and case studies of implementation outcomes.

Keywords: co-design, horticulture, sector action plans, voluntary

Procedia PDF Downloads 112
5800 Hunger and Health: The Acceptability and Development of Health Coaching in the Food Pantry Environment

Authors: Kelsey Fortin, Susan Harvey

Abstract:

The intersection between hunger and health outcomes is beginning to gain traction among the research community. With new interventions focusing on collaborations between the medical and social service sectors, this study aimed to understand the acceptability and approach of a health coaching intervention within a county-wide Midwest food pantry. Through formative research, the study used mixed methods to review secondary data and conduct surveys and semi-structured interviews with food pantry clients (n=30), staff (n=7), and volunteers (n=10). Supplemental secondary data collected and provided by pantry staff were reviewed to understand the broader pantry context of clientele health and health behaviors, annual food donations, and current pantry programming. Results from secondary data showed that the broader pantry client population reported high rates of chronic disease, low consumption of fruits and vegetables, and poor self-reported health, while annual donation data showed increases in produce availability on pantry shelves. This disconnect between produce availability, client health status, and behaviors was supported in the current study, with pantry staff and volunteers reporting lack of knowledge in produce selection and preparation being amongst the most common client inquiries and barriers to healthy food selection. Additional supports to secondary data came from pantry clients in the current study through self-reported high rates of both individual (60%, n=18) and household (43%, n=13 ) disease diagnosis, low consumption of fruits and vegetables averaging zero to one servings of vegetables (67%, n=20) and fruits (47%, n=14) per day, and low levels of physical activity averaging zero to 120 minutes per week (67%, n=20). Further, pantry clients provided health coaching programmatic recommendations through interviews with feedback such as non-judgmental coaching, accountability measures, and providing participant incentives as considerations for future program design and approach. Volunteers and staff reported the need for client education in food preparation, basic nutrition and physical activity, and the need for additional health expertise to educate and respond to diet related nutrition recommendations. All three stakeholder groups supported hosting a health coach within the pantry to focused on nutrition, physical activity, and health programming, with one client stating, 'I am hoping it really works out [the health coaching program]. I think it would be great for something like this to be offered for someone that isn’t knowledgeable like me.' In conclusion, high rates of chronic disease, partnered with low food, nutrition, and physical activity literacy among pantry clients, demonstrates the need to address health behaviors. With all three stakeholder groups showing acceptability of a health coaching program, partnered with existing literature showing health coaching success as a behavior change intervention, further research should be conducted to pilot the design and implementation of such a program in the pantry setting.

Keywords: food insecurity, formative research, food pantries, health coaching, hunger and health

Procedia PDF Downloads 117
5799 Silver Nanoparticle Application in Food Packaging and Impacts on Food Safety and Consumer’s Health

Authors: Worku Dejene Bekele, András Marczika Csilla Sörös

Abstract:

Silver nanoparticles are silver metal with a size of 1-100nm. The most common source of silver nanoparticles is inorganic salts. Nanoparticles can be ingested through our foods and constitute nanoparticles and silver ions, whether as an additive or by migrants and, in some cases, as a pollutant. Silver nanoparticles are the most widely applicable engineered nanomaterials, especially for antimicrobial function. Ag nanoparticles give different advantages in the case of food safety, quality, and overall acceptability; however, they affect the health of humans and animals, putting them at risk of health problems and environmental pollution. Silver nanoparticles have been used widely in food packaging technologies, especially in water treatments, meat and meat products, fruit, and many other food products. This is for bio-preservation from food products. The primary goal of this review is to determine the safety and health impact of Ag nanoparticles application in food packaging and analysis of the human organs more affected by this preservative technology, to assess the implications of a nanoparticle on food safety, to determine the effects of nanoparticles on consumers health and to determine the impact of nanotechnology on product acceptability. But currently, much research has demonstrated that there is cause to believe that silver nanoparticles may have toxicological effects on biological organs and systems. The silver nanoparticles affect DNA expression, gastrointestinal barriers, lungs, and other breathing organs illness. Silver particles and molecules are very toxic. During its application in food packaging, food industries used the thinnest particle. This particle can potentially affect the gastrointestinal tracts-it suffers from mucus production, DNA, lungs, and other breezing organs. This review is targeted to demonstrate the knowledge gap that industrials use in the application of silver nanoparticles in food packaging and preservation and its health effects on the consumer.

Keywords: food preservatives, health impact, nanoparticle, silver nanoparticle

Procedia PDF Downloads 48
5798 Early Marriage and Women's Empowerment: The Case of Chil-bride in East Hararghe Zone of Oromia National Regional State, Ethiopia

Authors: Emad Mohammed Sani

Abstract:

Women encounter exclusion and discrimination in varying degrees, particularly those who marry as minors. The detrimental custom of getting married young is still prevalent worldwide and affects millions of people. It has been less common over time, although it is still widespread in underdeveloped nations. Oromia Regional State is the region in Ethiopia with the highest proportion of child brides. This study aimed at evaluating the effects of early marriage on its survivors’ life conditions – specifically, empowerment and household decision-making – in Eastern Hararghe Zone of Oromia Region. This study employed community-based cross-sectional study design. It adopted mixed method approach – survey, in-depth interview and focus group discussion (FGD) – to collect, analyses and interpret data on early marriage and its effects on household decision-making processes. Narratives and analytical descriptions were integrated to substantiate and/or explain observed quantitative results, or generate contextual themes. According to this study, married women who were married at or after the age of eighteen participated more in household decision-making than child brides. Child brides were more likely to be victims of violence and other types of spousal abuse in their marriages. These changes are mostly caused by an individual's age at first marriage. Delaying marriage had a large positive impact on women's empowerment at the household level, and age at first marriage had a considerable negative impact. In order to advance women's welfare and emancipation, we advise more research to concentrate on the relationship between the home and the social-structural forms that appear at the individual and communal levels.

Keywords: child-bride, early marriage, women, ethiopia

Procedia PDF Downloads 48
5797 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 246
5796 Analysing Trends in Rice Cropping Intensity and Seasonality across the Philippines Using 14 Years of Moderate Resolution Remote Sensing Imagery

Authors: Bhogendra Mishra, Andy Nelson, Mirco Boschetti, Lorenzo Busetto, Alice Laborte

Abstract:

Rice is grown on over 100 million hectares in almost every country of Asia. It is the most important staple crop for food security and has high economic and cultural importance in Asian societies. The combination of genetic diversity and management options, coupled with the large geographic extent means that there is a large variation in seasonality (when it is grown) and cropping intensity (how often it is grown per year on the same plot of land), even over relatively small distances. Seasonality and intensity can and do change over time depending on climatic, environmental and economic factors. Detecting where and when these changes happen can provide information to better understand trends in regional and even global rice production. Remote sensing offers a unique opportunity to estimate these trends. We apply the recently published PhenoRice algorithm to 14 years of moderate resolution remote sensing (MODIS) data (utilizing 250m resolution 16 day composites from Terra and Aqua) to estimate seasonality and cropping intensity per year and changes over time. We compare the results to the surveyed data collected by International Rice Research Institute (IRRI). The study results in a unique and validated dataset on the extent and change of extent, the seasonality and change in seasonality and the cropping intensity and change in cropping intensity between 2003 and 2016 for the Philippines. Observed trends and their implications for food security and trade policies are also discussed.

Keywords: rice, cropping intensity, moderate resolution remote sensing (MODIS), phenology, seasonality

Procedia PDF Downloads 283
5795 Multi Attribute Failure Mode Analysis of the Catering Systems: A Case Study of Sefako Makgatho Health Sciences University in South Africa

Authors: Mokoena Oratilwe Penwell, Seeletse Solly Matshonisa

Abstract:

The demand for quality products is a vital factor determining the success of a producing company, and the reality of this demand influences customer satisfaction. In Sefako Makgatho Health Sciences University (SMU), concerns over the quality of food being sold have been raised by mostly students and staff who are primary consumers of food being sold by the cafeteria. Suspicions of food poisoning and the occurrence of diarrhea-related to food from the cafeteria, amongst others, have been raised. However, minimal measures have been taken to resolve the issue of food quality. New service providers have been appointed, and still, the same trends are being observed, the quality of food seems to depreciate continuously. This paper uses multi-attribute failure mode analysis (MAFMA) for failure detection and minimization on the machines used for food production by SMU catering company before being sold to both staff, and students so as to improve production plant reliability, and performance. Analytical Hierarchy Process (AHP) will be used for the severity ranking of the weight criterions and development of the hierarchical structure for the cafeteria company. Amongst other potential issues detected, maintenance of the machines and equipment used for food preparations was of concern. Also, the staff lacked sufficient hospitality skills, supervision, and management in the cafeteria needed greater attention to mitigate some of the failures occurring in the food production plant.

Keywords: MAFMA, food quality, maintenance, supervision

Procedia PDF Downloads 109
5794 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 265
5793 Evaluating the Characteristics of Paediatric Accidental Poisonings

Authors: Grace Fangmin Tan, Elaine Yiling Tay, Elizabeth Huiwen Tham, Andrea Wei Ching Yeo

Abstract:

Background: While accidental poisonings in children may seem unavoidable, knowledge of circumstances surrounding such incidents and identification of risk factors is important in the development of secondary prevention strategies. Some risk factors include age of the child, lack of adequate supervision and improper storage of substances. The aim of this study is to assess risk factors and circumstances influencing outcomes in these children. Methodology: A retrospective medical record review of all accidental poisoning cases presenting to the Children’s Emergency at National University Hospital (NUH), Singapore between January 2014 and December 2015 was conducted. Information on demographics, poisoning circumstances and clinical outcomes were collected. Results: Ninety-nine of a total of 186 poisoning cases were accidental ingestions, with a mean age of 4.7 (range 0.4 to 18.3 years). The gender distribution is rather equal with 52(52.5%) females and 47(47.5%) males. Seventy-nine (79.8%) were self-administered by the child and in 20 cases (20.2%), the substance was administered erroneously by caregivers 12/20 (60.0%) of whom were given the wrong drug dose while 8/20 (40.0%) were given the wrong substance. Self-administration was associated with presentation to the ED within 12 hours (p=0.027, OR 6.65, 95% CI 1.24-35.72). Notably, 94.9% of the cases involved substances kept within reach of the child. Sixty-nine (82.1%) had the substance kept in the original container, 3(3.6%) in food containers, 8(9.5%) in other containers and 4(4.8%) without a container. Of the 50 cases with information on labelling, 40/50(80.0%) were accurately labelled, 2/50 (4.0%) wrongly labelled, and 8/50 (16.0%) were unlabelled. Implicated substances included personal care products (11.1%), household cleaning products (3.0%), and different classes of drugs such as paracetamol (22.2%), antihistamines (17.2%) and sympathomimetics (8.1%). Children < 3 years of age were 4.8 times more likely to be poisoned by household substances than children >3 years of age (p=0.009, 95% CI 1.48-15.77). Prehospital interventions were more likely to have been done in poisoning with household substances (p=0.005, OR 6.12 95% CI 1.73-21.68). Fifty-nine (59.6%) were asymptomatic, 34 (34.3%) had a Poisoning Severity Score (PSS) grade of 1 (minor) and 6 (6.1%) grade 2 (moderate). Older children were 9.3 times more likely to be symptomatic (p<0.001, 95% CI 3.15-27.25). Thirty (32%) required admission. Conclusion: A significant proportion of accidental poisoning cases were due to medication administration errors by caregivers, which should be preventable. Risk factors for accidental poisoning included lack of adequate caregiver supervision, improper labelling and young age of the child. There is an urgent need to improve caregiver counselling during medication dispensing as well as to educate caregivers on basic child safety measures in the home to prevent future accidental poisonings.

Keywords: accidental, caregiver, paediatrics, poisoning

Procedia PDF Downloads 192
5792 Food Insecurity Among Afghan Women Refugees in Pakistan

Authors: Farhana Nosheen, Maleeha Fatima

Abstract:

This study on Afghan refugee women living in Punjab, Pakistan, shows a strong relationship between poor socio-economic status and lower nutritional health status. Pakistan is one of the significant countries accepting refugees from the Afghan war. Universally, refugees are vulnerable to food security and basic life necessities. The in-hand study aimed to investigate food insecurity among afghan refugees who recently migrated to Pakistan. Purposive sampling technique was employed to collect the data from afghan women refugees settled in refugee camp settled in Capital city Islamabad, Pakistan. Data was collected through an interview tool. It revealed from data that the majority of women were underweight, about 74.7% in their reproductive years, which is an alarming situation for the forthcoming children and families. It is also shown that There’s a strong impact of their income level, education, dietary habits and food insecurity on their overall health status. It can also be observed in their Body Mass Index and in their physical appearance; they also show extremely poor levels of hemoglobin which is directly indicated anemic condition, especially iron deficiency anemia among the young Afghan refugee women. The illiteracy rate is about 93.33% among the selected participants as well as a majority of this population has 10-12 family size in comparison with their income level of about 10,000-15,000 Pakistani rupees per month, which can hardly meet their daily food expenditure. Adequate food is rarely accessible to young girls and women due to fewer national and international food aids program available in Pakistan. The majority have pale yellowish skin color (due to low iron content) along with clear white eyes (low hemoglobin level), thin hairs (protein deficiency) and spoon-shaped nails (a direct indicator of low iron level). Data showed a significant relation between appetite and BMI as their appetite is very low, which is directly indicated in their underweight body condition. About 56.67% of the participants had Urinary Tract Infections. The main causes included personal unhygienic conditions and lack of washrooms as well as drinking water facilities in their refugee camps. It is suggested that National and international food aid programs should cater to the nutritional demands of women refugees in the world to protect them from food insecurities as well as future researchers should find out better ways of analysis and treatment plans for such kind of communities who are highly prone to nutritional deficiencies and lack of basic supplies.

Keywords: food insecurity, refugees, women, vulnerable

Procedia PDF Downloads 84
5791 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 283
5790 Exploring the Food Environments and Their Influence on Food Choices of Working Adults

Authors: Deepa Shokeen, Bani Tamber Aeri

Abstract:

Food environments are believed to play a significant role in the obesity epidemic and robust research methods are required to establish which factors or aspects of the food environment are relevant to food choice and to adiposity. The relationship between the food environment and obesity is complex. While there is little research linking food access with obesity as an outcome measure in any age group, with the help of this article we will try to understand the relationship between what we eat and the environmental context in which these food choices are made. Methods: A literature search of studies published between January 2000 and December 2013 was undertaken on computerized medical, social science, health, nutrition and education databases including Google, PubMed etc. Reports of organisations such as World Health Organisation (WHO), Centre for Chronic Disease Control (CCDC) were studied to project the data. Results: Studies show that food environments play a significant role in the obesity epidemic and robust research methods are required to establish which factors or aspects of the food environment are relevant to food choice and to adiposity. Evidence indicates that the food environment may help explain the obesity and cardio-metabolic risk factors among young adults. Conclusion: Cardiovascular disease is the ever growing chronic disease, the incidence of which will increase markedly in the coming decades. Therefore, it is the need of the hour to assess the prevalence of various risk factors that contribute to the incidence of cardiovascular diseases especially in the work environment. Research is required to establish how different environments affect different individuals as individuals interact with the environment on a number of levels. We need to ascertain the impact of selected food and nutrition environments (Information, organization, community, consumer) on food choice and dietary intake of the working adults as it is important to learn how these food environments influence the eating perceptions and health behaviour of the adults.

Keywords: food environment, prevalence, cardiovascular disease, India, worksite, risk factors

Procedia PDF Downloads 388
5789 A Practice of Zero Trust Architecture in Financial Transactions

Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu

Abstract:

In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.

Keywords: zero trust, trading terminal, architecture, network security, cybersecurity

Procedia PDF Downloads 142
5788 To Determine the Effects of Regulatory Food Safety Inspections on the Grades of Different Categories of Retail Food Establishments across the Dubai Region

Authors: Shugufta Mohammad Zubair

Abstract:

This study explores the Effect of the new food System Inspection system also called the new inspection color card scheme on reduction of critical & major food safety violations in Dubai. Data was collected from all retail food service establishments located in two zones in the city. Each establishment was visited twice, once before the launch of the new system and one after the launch of the system. In each visit, the Inspection checklist was used as the evaluation tool for observation of the critical and major violations. The old format of the inspection checklist was concerned with scores based on the violations; but the new format of the checklist for the new inspection color card scheme is divided into administrative, general major and critical which gives a better classification for the inspectors to identify the critical and major violations of concerned. The study found that there has been a better and clear marking of violations after the launch of new inspection system wherein the inspectors are able to mark and categories the violations effectively. There had been a 10% decrease in the number of food establishment that was previously given A grade. The B & C grading were also considerably dropped by 5%.

Keywords: food inspection, risk assessment, color card scheme, violations

Procedia PDF Downloads 310
5787 Foodborne Disease Risk Factors Among Women in Riyadh, Saudi Arabia

Authors: Abdullah Alsayeqh

Abstract:

The burden of foodborne diseases in Saudi Arabia is currently unknown. The objective of this study was to identify risk factors associated with these diseases among women in Riyadh. A cross-sectional study was carried out from March to July, 2013 where participants’ responses indicated that they were at risk of these diseases through improper food-holding temperature (45.28%), inadequate cooking (35.47%), cross-contamination (32.23%), and food from unsafe sources (22.39%). The claimed food safety knowledge by 22.04% of participants was not evidenced by their reported behaviors (p > 0.05). This is the first study to identify the gap in food safety knowledge among women in Riyadh which needs to be addressed by the concerned authorities in the country by engaging women more effectively in food safety educational campaigns.

Keywords: foodborne diseases, risk factors, knowledge, women, Saudi Arabia

Procedia PDF Downloads 491
5786 Effects of Irregular Migration from Different Aspects of Security

Authors: Muzaffer Topgul, Hasan Atac

Abstract:

In case of explaining the migration concept, although it is not a new phenomenon, it is easy to understand that communities have migrated for variety of reasons such as natural disasters, famine, wars, economic problems, and several theories have been put forth to define and find solution for migration within its changing nature. Examining of migration theories denotes that the circumstances under which they appear reflect political, social, and economic conditions of the age they appear. In this day and time, security is considered not only from military perspective but also from economic, political, sociological dimensions. Based on the changing security environment new impacts of migration has occurred; the migration is proceed to be conferred as a type of war, qualified as a transnational crime because of its outcomes and interpreted in a different dimension owing to its effects on the health and education areas. Social security dimension in the context of expanding concept of security; when dealing with the safety of people and social groups with the assumption that national unity and identity are threatened, it sees immigrants as a source of threat. The human security assesses the safety of individuals in terms of survival and quality of life. Changes in the standard of living under the influence of immigrants and possible terrorist acts can be seen as a threat source in this type of security. Economic security of the individuals and the regional changes at the micro level created by the immigrants are covered issues of economic security. Due to the factors such as terrorism and civil war, the increasing numbers of displaced people who have taken refugee status affect the countries, whether it is near or far to the crisis areas, in the new and different dimensions of security day by day. In this study, the term of immigration through the eyes of national and international law will be evaluated, the place of the irregular and illegal immigration in the changing security sphere will be revealed and the effects of the irregular migration to short-term, mid-term and long-term security issues will be assessed through human and social security aspects. In order to analyze the threats for the human security; the parameters such as living conditions of the immigrants, the ratio of the genders, birth rate occasions, the education circumstances of the immigrant children and the effects of the illegal passing on the public order will be evaluated. The outcomes of the problem areas for the human security and the demographic alteration resulting from the human flow of displaced people will be discussed thorough social security extent. The fizzling economic diversity, which has shown up by irregular migration, will be presented within the scope of economic dimension of security.

Keywords: irregular migration, the changing dimensions of security, human security, social security

Procedia PDF Downloads 313
5785 Security Analysis and Implementation of Achterbahn-128 for Images Encryption

Authors: Aissa Belmeguenai, Oulaya Berrak, Khaled Mansouri

Abstract:

In this work, efficiency implementation and security evaluation of the keystream generator of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written with MATLAB.7.5. First of all, two different original images are used to validate the proposed design. The developed program is used to transform the original images data into digital image file. Finally, the proposed program is implemented to encrypt and decrypt images data. Several tests are done to prove the design performance, including visual tests and security evaluation.

Keywords: Achterbahn-128, keystream generator, stream cipher, image encryption, security analysis

Procedia PDF Downloads 297
5784 Analysis of Consumer Preferences for Housing in Saudi Arabia

Authors: Mohammad Abdulaziz Algrnas, Emma Mulliner

Abstract:

Housing projects have been established in Saudi Arabia, by both government and private construction companies, to meet the increasing demand from Saudi inhabitants across the country. However, the real estate market supply does not meet consumer preference requirements. Preferences normally differ depending on the consumer’s situation, such as the household’s sociological characteristics (age, household size and composition), resources (income, wealth, information and experience), tastes and priorities. Collecting information about consumer attitudes, preferences and perceptions is important for the real estate market in order to better understand housing demand and to ensure that this is met by appropriate supply. The aim of this paper is to identify consumer preferences for housing in Saudi Arabia. A quantitative closed-ended questionnaire was conducted with housing consumers in Saudi Arabia in order to gain insight into consumer needs, current household situation, preferences for a number of investigated housing attributes and consumers’ perceptions around the current housing problem. 752 survey responses were obtained and analysed in order to describe preferences for housing attributes and make comparisons between groups. Factor analysis was also conducted to identify and reduce the attributes. The results indicate a difference in preference according to the gender of the respondents and depending on their region of residence.

Keywords: housing attributes, Saudi Arabia, consumer preferences, housing preferences

Procedia PDF Downloads 525
5783 Preparation and Characterization of Cellulose Based Antimicrobial Food Packaging Materials

Authors: Memet Vezir Kahraman, Ferhat Sen

Abstract:

This study aimed to develop polyelectrolyte structured antimicrobial food packaging materials that do not contain any antimicrobial agents. Cationic hydroxyethyl cellulose was synthesized and characterized by Fourier Transform Infrared, carbon and proton Nuclear Magnetic Resonance spectroscopy. Its nitrogen content was determined by the Kjeldahl method. Polyelectrolyte structured antimicrobial food packaging materials were prepared using hydroxyethyl cellulose, cationic hydroxyethyl cellulose, and sodium alginate. Antimicrobial activity of materials was defined by inhibition zone method (disc diffusion method). Thermal stability of samples was evaluated by thermal gravimetric analysis and differential scanning calorimetry. Surface morphology of samples was investigated by scanning electron microscope. The obtained results prove that produced food packaging materials have good thermal and antimicrobial properties, and they can be used as food packaging material in many industries.

Keywords: antimicrobial food packaging, cationic hydroxyethyl cellulose, polyelectrolyte, sodium alginate

Procedia PDF Downloads 146
5782 Optimization of Process Parameters and Modeling of Mass Transport during Hybrid Solar Drying of Paddy

Authors: Aprajeeta Jha, Punyadarshini P. Tripathy

Abstract:

Drying is one of the most critical unit operations for prolonging the shelf-life of food grains in order to ensure global food security. Photovoltaic integrated solar dryers can be a sustainable solution for replacing energy intensive thermal dryers as it is capable of drying in off-sunshine hours and provide better control over drying conditions. But, performance and reliability of PV based solar dryers depend hugely on climatic conditions thereby, drastically affecting process parameters. Therefore, to ensure quality and prolonged shelf-life of paddy, optimization of process parameters for solar dryers is critical. Proper moisture distribution within the grains is most detrimental factor to enhance the shelf-life of paddy therefore; modeling of mass transport can help in providing a better insight of moisture migration. Hence, present work aims at optimizing the process parameters and to develop a 3D finite element model (FEM) for predicting moisture profile in paddy during solar drying. Optimization of process parameters (power level, air velocity and moisture content) was done using box Behnken model in Design expert software. Furthermore, COMSOL Multiphysics was employed to develop a 3D finite element model for predicting moisture profile. Optimized model for drying paddy was found to be 700W, 2.75 m/s and 13% wb with optimum temperature, milling yield and drying time of 42˚C, 62%, 86 min respectively, having desirability of 0.905. Furthermore, 3D finite element model (FEM) for predicting moisture migration in single kernel for every time step has been developed. The mean absolute error (MAE), mean relative error (MRE) and standard error (SE) were found to be 0.003, 0.0531 and 0.0007, respectively, indicating close agreement of model with experimental results. Above optimized conditions can be successfully used to dry paddy in PV integrated solar dryer in order to attain maximum uniformity, quality and yield of product to achieve global food and energy security

Keywords: finite element modeling, hybrid solar drying, mass transport, paddy, process optimization

Procedia PDF Downloads 124
5781 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software

Authors: Carlos Gonzalez

Abstract:

This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.

Keywords: internet, secure software, threats, cryptography process

Procedia PDF Downloads 308
5780 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective

Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella

Abstract:

Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.

Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law

Procedia PDF Downloads 365
5779 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security

Authors: Lisdey Espinoza Pedraza

Abstract:

Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.

Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States

Procedia PDF Downloads 401
5778 Changes in Cognition of Elderly People: A Longitudinal Study in Kanchanaburi Province, Thailand

Authors: Natchaphon Auampradit, Patama Vapattanawong, Sureeporn Punpuing, Malee Sunpuwan, Tawanchai Jirapramukpitak

Abstract:

Longitudinal studies related to cognitive impairment in elderly are necessary for health promotion and development. The purposes of this study were (1) to examine changes in cognition of elderly over time and (2) to examine the impacts of changes in social determinants of health (SDH) toward changes in cognition of elderly by using the secondary data derived from the Kanchanaburi Demographic Surveillance System (KDSS) by the Institute for Population and Social Research (IPSR) which contained longitudinal data on individuals, households, and villages. Two selected projects included the Health and Social Support for Elderly in KDSS in 2007 and the Population, Economic, Social, Cultural, and Long-term Care Surveillance for Thai Elderly People’s Health Promotion in 2011. The samples were 586 elderly participated in both projects. SDH included living arrangement, social relationships with children, relatives, and friends, household asset-based wealth index, household monthly income, loans for livings, loans for investment, and working status. Cognitive impairment was measured by category fluency and delayed recall. This study employed Generalized Estimating Equation (GEE) model to investigate changes in cognition by taking SDH and other variables such as age, gender, marital status, education, and depression into the model. The unstructured correlation structure was selected to use for analysis. The results revealed that 24 percent of elderly had cognitive impairment at baseline. About 13 percent of elderly still had cognitive impairment during 2007 until 2011. About 21 percent and 11 percent of elderly had cognitive decline and cognitive improvement, respectively. The cross-sectional analysis showed that household asset-based wealth index, social relationship with friends, working status, age, marital status, education, and depression were significantly associated with cognitive impairment. The GEE model revealed longitudinal effects of household asset-based wealth index and working status against cognition during 2007 until 2011. There was no longitudinal effect of social conditions against cognition. Elderly living with richer household asset-based wealth index, still being employed, and being younger were less likely to have cognitive impairment. The results strongly suggested that poorer household asset-based wealth index and being unemployed were served as a risk factor for cognitive impairment over time. Increasing age was still the major risk for cognitive impairment as well.

Keywords: changes in cognition, cognitive impairment, elderly, KDSS, longitudinal study

Procedia PDF Downloads 123
5777 Alternative Futures for the Middle East

Authors: Dorsa Bakhshandehgeyazdi

Abstract:

This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.

Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group

Procedia PDF Downloads 284
5776 Assessing EU-China Security Interests from Contradiction to Convergence

Authors: Julia Gurol

Abstract:

Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.

Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security

Procedia PDF Downloads 265
5775 A Study of Food Safety Perception of Undergraduate Students in Taiwan

Authors: K. Y. Shih, H. M. Lin, S. Y. Lee, T. L. Hong

Abstract:

Recently a number of food safety scandals have been on the news. In view of the fact that in Taiwan the majority of undergraduate college students reside in the dorms and dine out, the problem of restaurant sanitation is of utmost importance in their lives. The purpose of this study is to analyze students' dining habit and their perception of food safety. Four universities in the city of Tainan were randomly selected, and from each selected university a class was then chosen to receive 50 questionnaires. The total of 200 questionnaires yielded 144 usable returns. Students were asked to respond to questions, and each question was graded on a scale from 1 to 5 according to the importance. There were 32 questions ranging over various aspects: cleanliness of surroundings, washroom, food sanitation, serving temperature, kitchen sanitation, and service personnel cleanliness. It is found that the food sanitation received the highest score, while the service personnel ranked the lowest. An incidental finding is that the students tend to dine out in groups and as such their choice of restaurants are mostly dictated by consensus.

Keywords: food safety, restaurant, risk perception, sanitation

Procedia PDF Downloads 144
5774 Exploring the Sources of Innovation in Food Processing SMEs of Kerala

Authors: Bhumika Gupta, Jeayaram Subramanian, Hardik Vachhrajani, Avinash Shivdas

Abstract:

Indian food processing industry is one of the largest in the world in terms of production, consumption, exports and growth opportunities. SMEs play a crucial role within this. Large manufacturing firms largely dominate innovation studies in India. Innovation sources used by SMEs are often different from that of large firms. This paper focuses on exploring various sources of innovation adopted by food processing SMEs in Kerala, South India. Outcome suggests that SMEs use various sources like suppliers, competitors, employees, government/research institutions and customers to get new ideas.

Keywords: food processing, innovation, SMEs, sources of innovation

Procedia PDF Downloads 395