Search results for: personal cyber insurance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2880

Search results for: personal cyber insurance

2160 A Blockchain-Based Protection Strategy against Social Network Phishing

Authors: Francesco Buccafurri, Celeste Romolo

Abstract:

Nowadays phishing is the most frequent starting point of cyber-attack vectors. Phishing is implemented both via email and social network messages. While a wide scientific literature exists which addresses the problem of contrasting email spam-phishing, no specific countermeasure has been so far proposed for phishing included into private messages of social network platforms. Unfortunately, the problem is severe. This paper proposes an approach against social network phishing, based on a non invasive collaborative information-sharing approach which leverages blockchain. The detection method works by filtering candidate messages, by distilling them by means of a distance-preserving hash function, and by publishing hashes over a public blockchain through a trusted smart contract (thus avoiding denial of service attacks). Phishing detection exploits social information embedded into social network profiles to identify similar messages belonging to disjoint contexts. The main contribution of the paper is to introduce a new approach to contrasting the problem of social network phishing, which, despite its severity, received little attention by both research and industry.

Keywords: phishing, social networks, information sharing, blockchain

Procedia PDF Downloads 328
2159 Exploring Perceptions of Non-Energy Benefits and Energy Efficiency Investment in the Malaysian Industrial Sector

Authors: Siti Noor Baiti Binti Mustafa

Abstract:

Energy management studies regarding energy efficiency investments in Malaysia has yet to address the lack of empirical research that examines pro- sustainability behavior of managers in the industrial sector and how it influences energy efficiency investment decision-making. This study adopts the Theory of Planned Behavior (TPB) to examine the relationship between personal attitude, subjective norms, and perceived behavioral control (PBC), the intention of energy efficiency investments, and how perceptions of Non-Energy Benefits (NEB) influence these intentions among managers in the industrial sector in Malaysia. Managers from various sub-sectors in the industrial sector were selected from a sample of companies that are participants of the Government-led program named the Energy Audit Conditional Grant (EACG) that aimed to promote energy efficiency. Data collection was conducted through an online semi-structured, open-ended questionnaire and then later interviewed. The results of this explorative sequential qualitative study showed that perceived behavioral control was a significant predictor of energy efficiency investment intentions as compared to factors such as attitude and subjective norms. The level of awareness and perceptions towards NEB further played a significant factor in influencing energy efficiency investment decision-making as well. Various measures and policy recommendations are provided together with insights on factors that influence decision-makers intention to invest in energy efficiency, whilst new knowledge on NEB perceptions will be useful to enhance the attractiveness of energy-efficient investments.

Keywords: energy efficiency investments, non-energy benefits, theory of planned behavior, personal attitude, subjective norms, perceived behavioral control, Malaysia industrial sector

Procedia PDF Downloads 124
2158 Predictive Output Feedback Linearization for Safe Control of Collaborative Robots

Authors: Aliasghar Arab

Abstract:

Autonomous robots interacting with humans, as safety-critical nonlinear control systems, are complex closed-loop cyber-physical dynamical machines. Keeping these intelligent yet complicated systems safe and smooth during their operations is challenging. The aim of the safe predictive output feedback linearization control synthesis is to design a novel controller for smooth trajectory following while unsafe situations must be avoided. The controller design should obtain a linearized output for smoothness and invariance to a safety subset. Inspired by finite-horizon nonlinear model predictive control, the problem is formulated as constrained nonlinear dynamic programming. The safety constraints can be defined as control barrier functions. Avoiding unsafe maneuvers and performing smooth motions increases the predictability of the robot’s movement for humans when robots and people are working together. Our results demonstrate the proposed output linearization method obeys the safety constraints and, compared to existing safety-guaranteed methods, is smoother and performs better.

Keywords: robotics, collaborative robots, safety, autonomous robots

Procedia PDF Downloads 97
2157 Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

Authors: Umar Albalawi, Sang C. Suh, Jinoh Kim

Abstract:

As internet continues to expand its usage with an enormous number of applications, cyber-threats have significantly increased accordingly. Thus, accurate detection of malicious traffic in a timely manner is a critical concern in today’s Internet for security. One approach for intrusion detection is to use Machine Learning (ML) techniques. Several methods based on ML algorithms have been introduced over the past years, but they are largely limited in terms of detection accuracy and/or time and space complexity to run. In this work, we present a novel method for intrusion detection that incorporates a set of supervised learning algorithms. The proposed technique provides high accuracy and outperforms existing techniques that simply utilizes a single learning method. In addition, our technique relies on partial flow information (rather than full information) for detection, and thus, it is light-weight and desirable for online operations with the property of early identification. With the mid-Atlantic CCDC intrusion dataset publicly available, we show that our proposed technique yields a high degree of detection rate over 99% with a very low false alarm rate (0.4%).

Keywords: intrusion detection, supervised learning, traffic classification, computer networks

Procedia PDF Downloads 349
2156 Teachers Engagement to Teaching: Exploring Australian Teachers’ Attribute Constructs of Resilience, Adaptability, Commitment, Self/Collective Efficacy Beliefs

Authors: Lynn Sheridan, Dennis Alonzo, Hoa Nguyen, Andy Gao, Tracy Durksen

Abstract:

Disruptions to teaching (e.g., COVID-related) have increased work demands for teachers. There is an opportunity for research to explore evidence-informed steps to support teachers. Collective evidence informs data on teachers’ personal attributes (e.g., self-efficacy beliefs) in the workplace are seen to promote success in teaching and support teacher engagement. Teacher engagement plays a role in students’ learning and teachers’ effectiveness. Engaged teachers are better at overcoming work-related stress, burnout and are more likely to take on active roles. Teachers’ commitment is influenced by a host of personal (e.g., teacher well-being) and environmental factors (e.g., job stresses). The job demands-resources model provided a conceptual basis for examining how teachers’ well-being, and is influenced by job demands and job resources. Job demands potentially evoke strain and exceed the employee’s capability to adapt. Job resources entail what the job offers to individual teachers (e.g., organisational support), helping to reduce job demands. The application of the job demands-resources model involves gathering an evidence-base of and connection to personal attributes (job resources). The study explored the association between constructs (resilience, adaptability, commitment, self/collective efficacy) and a teacher’s engagement with the job. The paper sought to elaborate on the model and determine the associations between key constructs of well-being (resilience, adaptability), commitment, and motivation (self and collective-efficacy beliefs) to teachers’ engagement in teaching. Data collection involved online a multi-dimensional instrument using validated items distributed from 2020-2022. The instrument was designed to identify construct relationships. The participant number was 170. Data Analysis: The reliability coefficients, means, standard deviations, skewness, and kurtosis statistics for the six variables were completed. All scales have good reliability coefficients (.72-.96). A confirmatory factor analysis (CFA) and structural equation model (SEM) were performed to provide measurement support and to obtain latent correlations among factors. The final analysis was performed using structural equation modelling. Several fit indices were used to evaluate the model fit, including chi-square statistics and root mean square error of approximation. The CFA and SEM analysis was performed. The correlations of constructs indicated positive correlations exist, with the highest found between teacher engagement and resilience (r=.80) and the lowest between teacher adaptability and collective teacher efficacy (r=.22). Given the associations; we proceeded with CFA. The CFA yielded adequate fit: CFA fit: X (270, 1019) = 1836.79, p < .001, RMSEA = .04, and CFI = .94, TLI = .93 and SRMR = .04. All values were within the threshold values, indicating a good model fit. Results indicate that increasing teacher self-efficacy beliefs will increase a teacher’s level of engagement; that teacher ‘adaptability and resilience are positively associated with self-efficacy beliefs, as are collective teacher efficacy beliefs. Implications for school leaders and school systems: 1. investing in increasing teachers’ sense of efficacy beliefs to manage work demands; 2. leadership approaches can enhance teachers' adaptability and resilience; and 3. a culture of collective efficacy support. Preparing teachers for now and in the future offers an important reminder to policymakers and school leaders on the importance of supporting teachers’ personal attributes when faced with the challenging demands of the job.

Keywords: collective teacher efficacy, teacher self-efficacy, job demands, teacher engagement

Procedia PDF Downloads 124
2155 Location Detection of Vehicular Accident Using Global Navigation Satellite Systems/Inertial Measurement Units Navigator

Authors: Neda Navidi, Rene Jr. Landry

Abstract:

Vehicle tracking and accident recognizing are considered by many industries like insurance and vehicle rental companies. The main goal of this paper is to detect the location of a car accident by combining different methods. The methods, which are considered in this paper, are Global Navigation Satellite Systems/Inertial Measurement Units (GNSS/IMU)-based navigation and vehicle accident detection algorithms. They are expressed by a set of raw measurements, which are obtained from a designed integrator black box using GNSS and inertial sensors. Another concern of this paper is the definition of accident detection algorithm based on its jerk to identify the position of that accident. In fact, the results convinced us that, even in GNSS blockage areas, the position of the accident could be detected by GNSS/INS integration with 50% improvement compared to GNSS stand alone.

Keywords: driver behavior monitoring, integration, IMU, GNSS, monitoring, tracking

Procedia PDF Downloads 234
2154 Analysis on South Korean Early Childhood Education Teachers’ Stage of Concerns about Software Education According to the Concern-Based Adoption Model

Authors: Sun-Mi Park, Ji-Hyun Jung, Min-Jung Kang

Abstract:

Software (SW) education is scheduled to be included in the National curriculum in South Korea by 2018. However, Korean national kindergarten curriculum has been excepted from the revision of the entire Korean national school curriculum including software education. Even though the SW education has not been considered a part of current national kindergarten curriculum, there is a growing interest of adopting software education into the ECE practice. Teachers might be a key element in introducing and implementing new educational change such as SW education. In preparation for the adoption of SW education in ECE, it might be necessary to figure out ECE teachers’ perception and attitudes toward early childhood software education. For this study, 219 ECE teachers’ concern level in SW education was surveyed by using the Stages of Concern Questionnaire (SoCQ). As a result, the teachers' concern level in SW education is the highest at stage 0-Unconcerned and is high level in stage 1-informational, stage 2-personal, and stage 3-management concern. Thus, a non-user pattern was mostly indicated. However, compared to a typical non-user pattern, the personal and informative concern level is slightly high. The 'tailing up' phenomenon toward stage 6-refocusing was shown. Therefore, the pattern aspect close to critical non-user ever appeared to some extent. In addition, a significant difference in concern level was shown at all stages depending on the awareness of necessity. Teachers with SW training experience showed higher intensity only at stage 0. There was statistically significant difference in stage 0 and 6 depending on the future implementation decision. These results will be utilized as a resource in building ECE teachers’ support system according to his or her concern level of SW education.

Keywords: concerns-based adoption model (CBAM), early childhood education teachers, software education, Stages of Concern (SoC)

Procedia PDF Downloads 207
2153 Conducting Computational Physics Laboratory Course Using Cloud Storage Space

Authors: Ajay Wadhwa

Abstract:

A Laboratory course on computational physics is different from the conventional lab course on other topics of physics like Mechanics, Heat, Optics, etc. because it involves active participation of the teacher as well as one-to-one interaction between teacher and the student. The course content requires the teacher to teach programming language as well as numerical methods along with their applications in physics. The task becomes more daunting when about 90% of the students in the class have no previous experience of any programming language. In the presented work, we have described a methodology for conducting the computational physics course by using the Google Drive and Dropitto.me cloud storage services. We have evaluated the performance in a class of sixty students by dividing them equally into four groups. One of the groups was made the peer group on whom the presented methodology was tested. The other groups were taught by using conventional method of classroom lectures. In order to assess our methodology, we analyzed the performance of students in four class tests. A study of certain statistical parameters like the mean, standard deviation, and Z-test hypothesis revealed that the cyber methodology based on cloud storage is more efficient than the conventional method of teaching.

Keywords: computational Physics, Z-test hypothesis, cloud storage, Google drive

Procedia PDF Downloads 299
2152 Reduction in Hospital Acquire Infections after Intervention of Hand Hygiene and Personal Protective Equipment at COVID Unit Indus Hospital Karachi

Authors: Aisha Maroof

Abstract:

Introduction: Coronavirus Disease 2019 (COVID-19) is spreading rapidly around the world with devastating consequences on patients, health care workers and health systems. Severe 2019 novel coronavirus infectious disease (COVID-19) with pneumonia is associated with high rates of admission to the intensive care unit (ICU) and they are at high risk to obtain the hospital acquire bloodstream infection (HAIs) such as central line associated bloodstream infection (CLABSI), catheter associated urinary tract infections (CAUTI) and laboratory confirm bloodstream infection (LCBSI). The chances of infection transmission increase when healthcare worker’s (HCWs) practice is inappropriate. Risk related to hand hygiene (HH) and personal protective equipment (PPE) as regards multidrug-resistant organism transmission: use of multiple gloving instead of HH and incorrect use of PPE can lead to a significant increase of device-related infections. As it reaches low- and middle-income countries, its effects could be even more, because it will be difficult for them to react aggressively to the pandemic. HAIs are one of the biggest medical concerns, resulting in increased mortality rates. Objective: To assess the effect of intervention on compliance of hand hygiene and PPE among HCWs reduce the rate of HAI in COVID-19 patients. Method: An interventional study was done between July to December, 2020. CLABSI, CAUTI and LCBSI data were collected from the medical record and direct observation. There were total of 50 Nurses, 18 doctors and all patients with laboratory-confirmed severe COVID-19 admitted to the hospital were included in this research study. Respiratory tract specimens were obtained after the first 48 h of ICU admission. Practices were observed after and before intervention. Education was provided based on WHO guidelines. Results: During the six months of study July to December, the rate of CLABSI, CAUTI and LCBSI pre and post intervention was reported. CLABSI rate decreasedd from 22.7 to 0, CAUTI rate was decreased from 1.6 to 0, LCBSI declined from 3.3 to 0 after implementation of intervention. Conclusion: HAIs are an important cause of morbidity and mortality. Most of the device related infections occurs due to lack of correct use of PPE and hand hygiene compliance. Hand hygiene and PPE is the most important measure to protect patients, through education it can be improved the correct use of PPE and hand hygiene compliance and can reduce the bacterial infection in COVID-19 patients.

Keywords: hospital acquire infection, healthcare workers, hand hygiene, personal protective equipment

Procedia PDF Downloads 129
2151 Coping with Incompatible Identities in Russia: Case of Orthodox Gays

Authors: Siuzan Uorner

Abstract:

The era of late modernity is characterized, on the one hand, by social disintegration, values of personal freedom, tolerance, and self-expression. Boundaries between the accessible and the elitist, normal and abnormal are blurring. On the other hand, traditional social institutions, such as religion (especially Russian Orthodox Church), exist, criticizing lifestyle and worldview other than conventionally structured canons. Despite the declared values and opportunities in late modern society, people's freedom is ambivalent. Personal identity and its aspects are becoming a subject of choice. Hence, combinations of identity aspects can be incompatible. Our theoretical framework is based on P. Ricoeur's concept of narrative identity and hermeneutics, E. Goffman’s theory of social stigma, self-presentation, discrepant roles and W. James lectures about varieties of religious experience. This paper aims to reconstruct ways of coping with incompatible identities of Orthodox gays (an extreme sampling of a combination of sexual orientation and religious identity in a heteronormative society). This study focuses on the discourse of Orthodox gay parishioners and ROC gay priests in Russia (sampling ‘hard to reach’ populations because of the secrecy of gay community in ROC and sensitivity of the topic itself). We conducted a qualitative research design, using in-depth personal semi-structured online-interviews. Recruiting of informants took place in 'Nuntiare et Recreare' (Russian movement of religious LGBT) page in VKontakte through the post with an invitation to participate in the research. In this work, we analyzed interview transcripts using axial coding. We chose the Grounded Theory methodology to construct a theory from empirical data and contribute to the growing body of knowledge in ways of harmonizing incompatible identities in late modern societies. The research has found that there are two types of conflicts Orthodox gays meet with: canonic contradictions (postulates of Scripture and its interpretations) and problems in social interaction, mainly with ROC priests and Orthodox parishioners. We have revealed semantic meanings of most commonly used words that appear in the narratives (words such as ‘love’, ‘sin’, ‘religion’ etc.). Finally, we have reconstructed biographical patterns of LGBT social movements’ involvement. This paper argues that all incompatibilities are harmonizing in the narrative itself. As Ricoeur has suggested, the narrative configuration allows the speaker to gather facts and events together and to compose causal relationships between them. Sexual orientation and religious identity are getting along and harmonizing in the narrative.

Keywords: gay priests, incompatible identities, narrative identity, Orthodox gays, religious identity, ROC, sexual orientation

Procedia PDF Downloads 137
2150 Getting to Know the Enemy: Utilization of Phone Record Analysis Simulations to Uncover a Target’s Personal Life Attributes

Authors: David S. Byrne

Abstract:

The purpose of this paper is to understand how phone record analysis can enable identification of subjects in communication with a target of a terrorist plot. This study also sought to understand the advantages of the implementation of simulations to develop the skills of future intelligence analysts to enhance national security. Through the examination of phone reports which in essence consist of the call traffic of incoming and outgoing numbers (and not by listening to calls or reading the content of text messages), patterns can be uncovered that point toward members of a criminal group and activities planned. Through temporal and frequency analysis, conclusions were drawn to offer insights into the identity of participants and the potential scheme being undertaken. The challenge lies in the accurate identification of the users of the phones in contact with the target. Often investigators rely on proprietary databases and open sources to accomplish this task, however it is difficult to ascertain the accuracy of the information found. Thus, this paper poses two research questions: how effective are freely available web sources of information at determining the actual identification of callers? Secondly, does the identity of the callers enable an understanding of the lifestyle and habits of the target? The methodology for this research consisted of the analysis of the call detail records of the author’s personal phone activity spanning the period of a year combined with a hypothetical theory that the owner of said phone was a leader of terrorist cell. The goal was to reveal the identity of his accomplices and understand how his personal attributes can further paint a picture of the target’s intentions. The results of the study were interesting, nearly 80% of the calls were identified with over a 75% accuracy rating via datamining of open sources. The suspected terrorist’s inner circle was recognized including relatives and potential collaborators as well as financial institutions [money laundering], restaurants [meetings], a sporting goods store [purchase of supplies], and airline and hotels [travel itinerary]. The outcome of this research showed the benefits of cellphone analysis without more intrusive and time-consuming methodologies though it may be instrumental for potential surveillance, interviews, and developing probable cause for wiretaps. Furthermore, this research highlights the importance of building upon the skills of future intelligence analysts through phone record analysis via simulations; that hands-on learning in this case study emphasizes the development of the competencies necessary to improve investigations overall.

Keywords: hands-on learning, intelligence analysis, intelligence education, phone record analysis, simulations

Procedia PDF Downloads 14
2149 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 99
2148 The Underground Ecosystem of Credit Card Frauds

Authors: Abhinav Singh

Abstract:

Point Of Sale (POS) malwares have been stealing the limelight this year. They have been the elemental factor in some of the biggest breaches uncovered in past couple of years. Some of them include • Target: A Retail Giant reported close to 40 million credit card data being stolen • Home Depot : A home product Retailer reported breach of close to 50 million credit records • Kmart: A US retailer recently announced breach of 800 thousand credit card details. Alone in 2014, there have been reports of over 15 major breaches of payment systems around the globe. Memory scrapping malwares infecting the point of sale devices have been the lethal weapon used in these attacks. These malwares are capable of reading the payment information from the payment device memory before they are being encrypted. Later on these malwares send the stolen details to its parent server. These malwares are capable of recording all the critical payment information like the card number, security number, owner etc. All these information are delivered in raw format. This Talk will cover the aspects of what happens after these details have been sent to the malware authors. The entire ecosystem of credit card frauds can be broadly classified into these three steps: • Purchase of raw details and dumps • Converting them to plastic cash/cards • Shop! Shop! Shop! The focus of this talk will be on the above mentioned points and how they form an organized network of cyber-crime. The first step involves buying and selling of the stolen details. The key point to emphasize are : • How is this raw information been sold in the underground market • The buyer and seller anatomy • Building your shopping cart and preferences • The importance of reputation and vouches • Customer support and replace/refunds These are some of the key points that will be discussed. But the story doesn’t end here. As of now the buyer only has the raw card information. How will this raw information be converted to plastic cash? Now comes in picture the second part of this underground economy where-in these raw details are converted into actual cards. There are well organized services running underground that can help you in converting these details into plastic cards. We will discuss about this technique in detail. At last, the final step involves shopping with the stolen cards. The cards generated with the stolen details can be easily used to swipe-and-pay for purchased goods at different retail shops. Usually these purchases are of expensive items that have good resale value. Apart from using the cards at stores, there are underground services that lets you deliver online orders to their dummy addresses. Once the package is received it will be delivered to the original buyer. These services charge based on the value of item that is being delivered. The overall underground ecosystem of credit card fraud works in a bulletproof way and it involves people working in close groups and making heavy profits. This is a brief summary of what I plan to present at the talk. I have done an extensive research and have collected good deal of material to present as samples. Some of them include: • List of underground forums • Credit card dumps • IRC chats among these groups • Personal chat with big card sellers • Inside view of these forum owners. The talk will be concluded by throwing light on how these breaches are being tracked during investigation. How are credit card breaches tracked down and what steps can financial institutions can build an incidence response over it.

Keywords: POS mawalre, credit card frauds, enterprise security, underground ecosystem

Procedia PDF Downloads 439
2147 Long-Term Psychosocial Issues Among COVID-19 Survivors in Kathmandu Valley

Authors: Nabin Prasad Joshi, Samiksha Neupane

Abstract:

Since its emergence in December 2019, Corona Virus disease has impacted several countries, affecting many people. The first cases were recorded in Wuhan, China, between December 2019 and January 2020. Italy is one of the affected countries in Europe. The relations between India and Nepal have reverted to the pre-pandemic period as both countries have open borders. The study focused on the overall psychosocial impact among covid-19 survivors in their life what are the changes they are facing after covid also how are their relations with friends and relatives after they have covid in different municipalities of Kathmandu valley, where people from different regions are living in rent and have their own houses. Support from friends and family during a pandemic can prevent it if it is strong enough. Nonetheless, there were risk factors for psychosocial damage, including a lack of or insufficient family and social support, psychiatric assistance, and inadequate insurance or compensation. Poorer mental health outcomes were inversely correlated with social rejection or isolation.

Keywords: stress, anxiety, depression, Kathmandu

Procedia PDF Downloads 102
2146 Multiband Microstrip Slotted Patch Antenna for mmWave 5G Femtocell Applications

Authors: Bhargavi G., Arathi R. Shankar

Abstract:

Transmitter and receiver closer to every other, which creates the twin benefits of better-nice links and more spatial reuse. In a network with nomadic customers, this inevitably includes deploying greater infrastructure, normally in the form of microcells, hot spots, disbursed antennas, or relays. A less pricey alternative is the recent concept of femtocells, additionally known as domestic base stations that are facts get admission to points installed by means of domestic users to get higher indoor voice and records insurance. Femtocells have the potential to offer excessive exceptional community get entry to indoor customers at low cost, even as concurrently reducing the load. gift femtocells that perform in 4G can also be extended for 5G sub-6 GHz band. Designing the femtocell in mmWave band of 5G may have many blessings in terms of bandwidth availability and coverage. Multiband microstrip patch antennas can be considered as a low value and prominent antennas in designing the femtocells because the single antenna helps multiple frequency.

Keywords: 5G, mmWave, antennas, wireless communications, femtocell

Procedia PDF Downloads 72
2145 Premature Departure of Active Women from the Working World: One Year Retrospective Study in the Tunisian Center

Authors: Lamia Bouzgarrou, Amira Omrane, Malika Azzouzi, Asma Kheder, Amira Saadallah, Ilhem Boussarsar, Kamel Rejeb

Abstract:

Introduction: Increasing the women’s labor force participation is a political issue in countries with developed economies and those with low growth prospects. However, in the labor market, women continue to face several obstacles, either for the integration or for the maintenance at work. This study aims to assess the prevalence of premature withdrawal from working life -due to invalidity or medical justified early retirement- among active women in the Tunisian center and to identify its determinants. Material and methods: We conducted a cross-sectional study, over one year, focusing on the agreement for invalidity or early retirement for premature usury of the body- delivered by the medical commission of the National Health Insurance Fund (CNAM) in the central Tunisian district. We exhaustively selected women's files. Data related to Socio-demographic characteristics, professional and medical ones, were collected from the CNAM's administrative and medical files. Results: During the period of one year, 222 women have had an agreement for premature departure of their professional activity. Indeed, 149 women (67.11%) benefit of from invalidity agreement and 20,27% of them from favorable decision for early retirement. The average age was 50 ± 6 years with extremes of 23 and 62 years, and 18.9% of women were under 45 years. Married women accounted for 69.4% and 59.9% of them had at least one dependent child in charge. The average professional seniority in the sector was 23 ± 8 years. The textile-clothing sector was the most affected, with 70.7% of premature departure. Medical reasons for withdrawal from working life were mainly related to neuro-degenerative diseases in 46.8% of cases, rheumatic ones in 35.6% of cases and cardiovascular diseases in 22.1% of them. Psychiatric and endocrine disorders motivated respectively 17.1% and 13.5% of these departures. The evaluation of the sequels induced by these pathologies concluded to an average permanent partial disability equal to 61.4 ± 17.3%. The analytical study concluded that the agreement of disability or early retirement was correlated with the insured ‘age (p = 10-3), the professional seniority (p = 0.003) and the permanent partial incapacity (PPI) rate assessed by the expert physician (p = 0.04). No other social or professional factors were correlated with this decision. Conclusion: Despite many advances in labour law and Tunisian legal text on employability, women still exposed to several social and professional inequalities (payment inequality, precarious work ...). Indeed, women are often pushed to accept working in adverse conditions, thus they are more vulnerable to develop premature wear on the body and being forced to premature departures from the world of work. These premature withdrawals from active life are not only harmful to the concerned women themselves, but also associated with considerable costs for the insurance organism and the society. In order to ensure maintenance at work for women, a political commitment is imperative in the implementation of global prevention strategies and the improvement of working conditions, particularly in our socio-cultural context.

Keywords: Active Women , Early Retirement , Invalidity , Maintenance at Work

Procedia PDF Downloads 152
2144 Mental Imagery as an Auxiliary Tool to the Performance of Elite Competitive Swimmers of the University of the East Manila

Authors: Hillary Jo Muyalde

Abstract:

Introduction: Elite athletes train regularly to enhance their physical endurance, but sometimes, training sessions are not enough. When competition comes, these athletes struggle to find focus. Mental imagery is a psychological technique that helps condition the mind to focus and eventually help improve performance. This study aims to help elite competitive swimmers of the University of the East improve their performance with Mental Imagery as an auxiliary tool. Methodology: The study design used was quasi-experimental with a purposive sampling technique and a within-subject design. It was conducted with a total of 41 participants. The participants were given a Sport Imagery Ability Questionnaire (SIAQ) to measure imagery ability and the Mental Imagery Program. The study utilized a Paired T-test for data analysis where the participants underwent six weeks of no mental imagery training and were compared to six weeks with the Mental Imagery Program (MIP). The researcher recorded the personal best time of participants in their respective specialty stroke. Results: The results of the study showed a t-value of 17.804 for Butterfly stroke events, 9.922 for Backstroke events, 7.787 for Breaststroke events, and 17.440 in Freestyle. This indicated that MIP had a positive effect on participants’ performance. The SIAQ result also showed a big difference where -10.443 for Butterfly events, -5.363 for Backstroke, -7.244 for Breaststroke events, and -10.727 for Freestyle events, which meant the participants were able to image better than before MIP. Conclusion: In conclusion, the findings of this study showed that there is indeed an improvement in the performance of the participants after the application of the Mental Imagery Program. It is recommended from this study that the participants continue to use mental imagery as an auxiliary tool to their training regimen for continuous positive results.

Keywords: mental Imagery, personal best time, SIAQ, specialty stroke

Procedia PDF Downloads 79
2143 The Use of Manipulative Strategies: Machiavellianism among the University Students

Authors: Karla Hrbackova, Anna Petr Safrankova, Jakub Hladik

Abstract:

Machiavellianism as social phenomenon reveals certain methods of communication that man puts in contact with other people in both personal and working life (and work with clients). Especially at the helping-profession students is honesty, openness or low motivation for personal benefit important part of the profession. The aim of a study is to expose intercultural differences influence of Machiavellianism between Czech and Slovak university students and to determine whether these differences manifest themselves differently among students focusing on management and social profession (by helping degrees). The research involved 1120 university students from the Czech Republic and the Slovak Republic. The measurement of Machiavellianism used a test Mach IV. The test contained 20 statements divided into four central dimensions of Machiavellianism: flattery, deception and falsehood, immorality and cynicism. We found out, that Czech and Slovak's student expressed a similar attitude toward Machiavellianism as a means of manipulation in the interpersonal relationship, but this is not true in all dimensions. Czech and Slovak's students perceive differently flattery, deception and falsehood and cynicism too. In addition to specific features of cultural conditionality, we found out differences depending on the helping profession. Students focusing on managerial occupation (lower level of helping) tend towards greater acceptance of the use flattery as a means of communication than students specializing in the social profession (high-grade assisting). If they are an intercultural and interdisciplinary influences combined and effect on the perception of Machiavellianism together, then their significant importance for the perception of flattery and cynicism. The result will help us to reveal certain specific traits that students apply communication and with whom we can continue to work during their training.

Keywords: use of manipulative strategies, Machiavellianism, helping-profession students, professional training of students

Procedia PDF Downloads 383
2142 The Comparison of Community Home-Based Care for the Aged in Kishiwada, Japan and Hangzhou, China

Authors: Zijiao Chai, Wangming Li

Abstract:

Hangzhou is one of the cities with the most serious aging in China. Community home-based care for the aged is an important solution to old-age care in aging society. In this aspect, Europe, the United States and Japan are on the top in the world. As an East Asian country, Japan has similar cultural traditions in pension with China. So, there is much enlightenment China can get from Japan in the mode of community home-based care for the aged. This paper introduces the mode of community home-based care for the aged in Kishiwada, Japan and Hangzhou, China. Then compare the two modes in the aspects of insurance system for the aged, community service and facilities, support system and so on. Thereby the success experience of Kishiwada and weaknesses of Hangzhou are summarized. At last, the improvement strategy of facility plan and service mode of community home-based care for the aged in China are also proposed.

Keywords: community, comparison, elderly-oriented, home-based care for the aged, support system

Procedia PDF Downloads 513
2141 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 129
2140 Content Analysis of Video Translations: Examining the Linguistic and Thematic Approach by Translator Abdullah Khrief on the X Platform

Authors: Easa Almustanyir

Abstract:

This study investigates the linguistic and thematic approach of translator Abdullah Khrief in the context of video translations on the X platform. The sample comprises 15 videos from Khrief's account, covering diverse content categories like science, religion, social issues, personal experiences, lifestyle, and culture. The analysis focuses on two aspects: language usage and thematic representation. Regarding language, the study examines the prevalence of English while considering the inclusion of French and German content, highlighting Khrief's multilingual versatility and ability to navigate cultural nuances. Thematically, the study explores the diverse range of topics covered, encompassing scientific, religious, social, and personal narratives, underscoring Khrief's broad subject matter expertise and commitment to knowledge dissemination. The study employs a mixed-methods approach, combining quantitative data analysis with qualitative content analysis. Statistical data on video languages, presenter genders, and content categories are analyzed, and a thorough content analysis assesses translation accuracy, cultural appropriateness, and overall quality. Preliminary findings indicate a high level of professionalism and expertise in Khrief's translations. The absence of errors across the diverse range of videos establishes his credibility and trustworthiness. Furthermore, the accurate representation of cultural nuances and sensitive topics highlights Khrief's cultural sensitivity and commitment to preserving intended meanings and emotional resonance.

Keywords: audiovisual translation, linguistic versatility, thematic diversity, cultural sensitivity, content analysis, mixed-methods approach

Procedia PDF Downloads 17
2139 An Analysis of Humanitarian Data Management of Polish Non-Governmental Organizations in Ukraine Since February 2022 and Its Relevance for Ukrainian Humanitarian Data Ecosystem

Authors: Renata Kurpiewska-Korbut

Abstract:

Making an assumption that the use and sharing of data generated in humanitarian action constitute a core function of humanitarian organizations, the paper analyzes the position of the largest Polish humanitarian non-governmental organizations in the humanitarian data ecosystem in Ukraine and their approach to non-personal and personal data management since February of 2022. Both expert interviews and document analysis of non-profit organizations providing a direct response in the Ukrainian crisis context, i.e., the Polish Humanitarian Action, Caritas, Polish Medical Mission, Polish Red Cross, and the Polish Center for International Aid and the applicability of theoretical perspective of contingency theory – with its central point that the context or specific set of conditions determining the way of behavior and the choice of methods of action – help to examine the significance of data complexity and adaptive approach to data management by relief organizations in the humanitarian supply chain network. The purpose of this study is to determine how the existence of well-established and accurate internal procedures and good practices of using and sharing data (including safeguards for sensitive data) by the surveyed organizations with comparable human and technological capabilities are implemented and adjusted to Ukrainian humanitarian settings and data infrastructure. The study also poses a fundamental question of whether this crisis experience will have a determining effect on their future performance. The obtained finding indicate that Polish humanitarian organizations in Ukraine, which have their own unique code of conduct and effective managerial data practices determined by contingencies, have limited influence on improving the situational awareness of other assistance providers in the data ecosystem despite their attempts to undertake interagency work in the area of data sharing.

Keywords: humanitarian data ecosystem, humanitarian data management, polish NGOs, Ukraine

Procedia PDF Downloads 92
2138 Temporal Fixed Effects: The Macroeconomic Implications on Industry Return

Authors: Mahdy Elhusseiny, Richard Gearhart, Mariam Alyammahi

Abstract:

In this study we analyse the impact of a number of major macroeconomic variables on industry-specific excess rates of return. In later specifications, we include time and recession fixed effects, to potentially capture time-specific trends that may have been changing over our panel. We have a number of results that bear mentioning. Seasonal and temporal factors found to have very large role in sector-specific excess returns. Increases in M1(money supply) decreases bank, insurance, real estate, and telecommunications, while increases industrial and transportation excess returns. The results indicate that the market return increases every sector-specific rate of return. The 2007 to 2009 recession significantly reduced excess returns in the bank, real estate, and transportation sectors.

Keywords: macroeconomic factors, industry returns, fixed effects, temporal factors

Procedia PDF Downloads 75
2137 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 172
2136 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 185
2135 A Design Framework for an Open Market Platform of Enriched Card-Based Transactional Data for Big Data Analytics and Open Banking

Authors: Trevor Toy, Josef Langerman

Abstract:

Around a quarter of the world’s data is generated by financial with an estimated 708.5 billion global non-cash transactions reached between 2018 and. And with Open Banking still a rapidly developing concept within the financial industry, there is an opportunity to create a secure mechanism for connecting its stakeholders to openly, legitimately and consensually share the data required to enable it. Integration and data sharing of anonymised transactional data are still operated in silos and centralised between the large corporate entities in the ecosystem that have the resources to do so. Smaller fintechs generating data and businesses looking to consume data are largely excluded from the process. Therefore there is a growing demand for accessible transactional data for analytical purposes and also to support the rapid global adoption of Open Banking. The following research has provided a solution framework that aims to provide a secure decentralised marketplace for 1.) data providers to list their transactional data, 2.) data consumers to find and access that data, and 3.) data subjects (the individuals making the transactions that generate the data) to manage and sell the data that relates to themselves. The platform also provides an integrated system for downstream transactional-related data from merchants, enriching the data product available to build a comprehensive view of a data subject’s spending habits. A robust and sustainable data market can be developed by providing a more accessible mechanism for data producers to monetise their data investments and encouraging data subjects to share their data through the same financial incentives. At the centre of the platform is the market mechanism that connects the data providers and their data subjects to the data consumers. This core component of the platform is developed on a decentralised blockchain contract with a market layer that manages transaction, user, pricing, payment, tagging, contract, control, and lineage features that pertain to the user interactions on the platform. One of the platform’s key features is enabling the participation and management of personal data by the individuals from whom the data is being generated. This framework developed a proof-of-concept on the Etheruem blockchain base where an individual can securely manage access to their own personal data and that individual’s identifiable relationship to the card-based transaction data provided by financial institutions. This gives data consumers access to a complete view of transactional spending behaviour in correlation to key demographic information. This platform solution can ultimately support the growth, prosperity, and development of economies, businesses, communities, and individuals by providing accessible and relevant transactional data for big data analytics and open banking.

Keywords: big data markets, open banking, blockchain, personal data management

Procedia PDF Downloads 73
2134 A Passive Digital Video Authentication Technique Using Wavelet Based Optical Flow Variation Thresholding

Authors: R. S. Remya, U. S. Sethulekshmi

Abstract:

Detecting the authenticity of a video is an important issue in digital forensics as Video is used as a silent evidence in court such as in child pornography, movie piracy cases, insurance claims, cases involving scientific fraud, traffic monitoring etc. The biggest threat to video data is the availability of modern open video editing tools which enable easy editing of videos without leaving any trace of tampering. In this paper, we propose an efficient passive method for inter-frame video tampering detection, its type and location by estimating the optical flow of wavelet features of adjacent frames and thresholding the variation in the estimated feature. The performance of the algorithm is compared with the z-score thresholding and achieved an efficiency above 95% on all the tested databases. The proposed method works well for videos with dynamic (forensics) as well as static (surveillance) background.

Keywords: discrete wavelet transform, optical flow, optical flow variation, video tampering

Procedia PDF Downloads 359
2133 Experiences and Coping of Adults with Death of Siblings during Childhood in Chinese Context: Implications for Therapeutic Interventions

Authors: Sze Yee Lee

Abstract:

The death of a sibling in childhood leads to significant impacts on both the personal and family development of the surviving siblings. Yet, the effects of sibling loss in Chinese societies such as Hong Kong have been inadequately documented in the literature. In particular, there is a gap in the literature about the long term impacts on surviving siblings. This paper explores the experience of adult siblings encountering siblings’ death during childhood with the use of in-depth interviews. Through thematic analysis and in-depth interviews, the author explores the impacts on surviving siblings’ emotions, coping styles, struggles and challenges, and personal development. Furthermore, the influences on family dynamics are explored thoroughly, including the changes in a family atmosphere, family roles, family relationships, family communication, and parenting styles. More importantly, the author identifies (i) existing continuing bonds, (ii) crying, (iii) adequate social support, (iv) hiding own emotions as a gesture of protecting parents as the crucial elements pertinent to surviving siblings’ successful adaptation in the face of sibling loss. In addition, 'child-centered' and 'family-centered' interventions for families with siblings' death in a Chinese context are discussed. With the use of age-appropriate language and children’s participation in the preparation of death and after-death arrangements, surviving siblings could be assisted in transforming bereavement into opportunities for growth. In addition, the bereaved family could better cope with grief with open communication platforms, adequate social support, and family education resources. Meanwhile, life-and-death education at both school and community levels could enhance the public’s awareness and understanding of the bereaved individuals to prevent creating further harm to them.

Keywords: children and adolescent bereavement, children-centered, family-centered, sibling’s death

Procedia PDF Downloads 109
2132 Dogmatic Analysis of Legal Risks of Using Artificial Intelligence: The European Union and Polish Perspective

Authors: Marianna Iaroslavska

Abstract:

ChatGPT is becoming commonplace. However, only a few people think about the legal risks of using Large Language Model in their daily work. The main dilemmas concern the following areas: who owns the copyright to what somebody creates through ChatGPT; what can OpenAI do with the prompt you enter; can you accidentally infringe on another creator's rights through ChatGPT; what about the protection of the data somebody enters into the chat. This paper will present these and other legal risks of using large language models at work using dogmatic methods and case studies. The paper will present a legal analysis of AI risks against the background of European Union law and Polish law. This analysis will answer questions about how to protect data, how to make sure you do not violate copyright, and what is at stake with the AI Act, which recently came into force in the EU. If your work is related to the EU area, and you use AI in your work, this paper will be a real goldmine for you. The copyright law in force in Poland does not protect your rights to a work that is created with the help of AI. So if you start selling such a work, you may face two main problems. First, someone may steal your work, and you will not be entitled to any protection because work created with AI does not have any legal protection. Second, the AI may have created the work by infringing on another person's copyright, so they will be able to claim damages from you. In addition, the EU's current AI Act imposes a number of additional obligations related to the use of large language models. The AI Act divides artificial intelligence into four risk levels and imposes different requirements depending on the level of risk. The EU regulation is aimed primarily at those developing and marketing artificial intelligence systems in the EU market. In addition to the above obstacles, personal data protection comes into play, which is very strictly regulated in the EU. If you violate personal data by entering information into ChatGPT, you will be liable for violations. When using AI within the EU or in cooperation with entities located in the EU, you have to take into account a lot of risks. This paper will highlight such risks and explain how they can be avoided.

Keywords: EU, AI act, copyright, polish law, LLM

Procedia PDF Downloads 20
2131 Digital Activism and the Individual: A Utilitarian Perspective

Authors: Tania Mitra

Abstract:

Digital Activism or Cyber Activism uses digital media as a means to disseminate information and mobilize masses towards a specific goal. When digital activism was first born in the early 1990s, it was primarily used by groups of organized political activists. However, with the advent of social media, online activism has filtered down to the individual- one who does not necessarily belong to or identify with an agenda, group, or political party. A large part of digital activism today stems from the individual’s notion of what is right and wrong. This gives rise to a discourse around descriptive ethics and the implications of the independent digital activist. Although digital activism has paved the way for and bolstered support for causes like the MeToo Movement and Black Lives Matter, the lack of a unified, organized body has led to counterintuitive progressions and suspicions regarding the movements. The paper introduces the ideas of 'clout' culture, click baits, and clicktivism (the phenomenon where activism is reduced to a blind following of the online trends), to discuss the impacts of exclusive digital activism. By using Jeremy Bentham's utilitarian approach to ethics, that places emphasis on the best possible outcome for a society, the paper will show how individual online activism reaching for a larger, more common end can sometimes lead to an undermining of that end, not only in the online space but also how it manifests in the real world.

Keywords: digital activism, ethics, independent digital activist, utilitarianism

Procedia PDF Downloads 125