Search results for: household food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6463

Search results for: household food security

5713 The Occurrence of Sporeformers in Processed Milk from Household Refrigerators and The Effect of Heat Treatment on Bacillus Spores Activation

Authors: Sarisha Devnath, Oluwatosin A. Ijabadeniyi

Abstract:

In recent years milk contamination has become a major problem in households; due to the likely occurrence of bacteria, even after the milk has been processed. One such genus of bacteria causing unwanted growth is Bacillus. This research project looks at the presence of spore formers in processed milk from household refrigerators and the effect of pasteurization and high temperature on Bacillus spores activation. 24 samples each of UHT milk and pasteurised milk from 24 households were sampled for the presence of spore formers. While anaerobic spore formers were not found in any of the samples, the average aerobic spore formers in UHT milk and pasteurized milk however were 5.77 cfu/ml and 5.88 cfu/ml respectively. After sequencing, it was detected that the mixed culture contained Bacillus cereus, for both pasteurised and UHT milk samples. For the activation study, raw milk samples were collected and subjected to four different temperatures; 65˚C, 72˚C, 80˚C, 100˚C respectively. Samples were stored for 7 days at 5˚C and 10˚C and analysed daily. The average aerobic spore formers in raw milk for samples stored at 5˚C range between 4.67-6.00 cfu/ml while it ranges between 4.84-6.00 cfu/ml at 10˚C, signifying that the high temperatures could have resulted in germination of dominant spores. Statistical analysis conducted on these results indicated a significant difference between the numbers of colonies present at the different treatment temperatures the bacterium was exposed to. This work showed that household milk may constitute public health risk furthermore; pasteurization and higher temperatures may not be effective to remove aerobic spore formers because of Bacillus spores activation.

Keywords: sporeformers, bacillus, spores, activation, milk

Procedia PDF Downloads 422
5712 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 286
5711 Social Security Reform and Management: The Case of Three Member Territories of the Organisation of Eastern Caribbean States

Authors: Cleopatra Gittens

Abstract:

It has been recognized that some social security and national insurance systems in the Eastern Caribbean are experiencing ageing populations and economic and other crises that will present a financial challenge of being unable to pay pension benefits in fifteen to twenty years. This has implications for the fiscal and economic positions of the countries themselves. Hence, organizations would need to address the issue urgently. The study adds to the body of knowledge on social security systems and social security reforms in small island developing states (SIDS). It also makes recommendations for the types of reforms that social security systems in other SIDS can implement given their special circumstances. Secondary research is used to gather financial and other related information on three social security schemes in the Eastern Caribbean. Actuarial and financial reports and other documents of the social security systems are analysed to obtain financial and static data on each of the schemes. The findings show that the three schemes studied are experiencing steady increases in benefit expenditure versus contributions and increasing pensioner to insured ratios. The schemes will deplete their reserves between 2038 and 2050. Two of the schemes have increased their retirement age while the other has not embarked on any reforms. One scheme has made changes to its contribution percentages. Due to their small size, small populations and other unique circumstances, the social security schemes in the identified territories are not likely to be able to take advantage of all of the reform initiatives that the developed world embarked on when faced with similar problems. These schemes will need to make incremental changes that align with the timeframes recommended by the actuarial studies.

Keywords: benefits, pension, small island developing states, social security reform

Procedia PDF Downloads 71
5710 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 371
5709 Challenges in Developing a World Class Sustainable Food Organization

Authors: Baskar Kotte

Abstract:

Many organizations are constantly striving to implement numerous techniques for long-term sustainability, for food related organizations it is imperative to conceptualize the critical concepts which constitute food safety sustainability. This presentation provides three critical pillars to develop a sustainable organization. Financial sustainability, regulatory sustainability and excellence standards sustainability are the three components which practiced and implemented effectively with process performance metrics defined objectives and targets lead to sustainable and safe food organizations. The participants take away a well-developed concept diagram with all elements impacting sustainability. Proven disciplined path which worked to achieve desired results is presented for effective implementation. Effective implementation of this proven disciplined path positions organizations to achieve world class status with bottomline improvement. Additionally, this presentation highlights critical terms, principles and implementation difficulties related to using the proven disciplined path. This presentation is beneficial for business leaders, food safety compliance managers, food safety practitioners, financial managers, Lean & Six sigma continual improvement managers, BRC/SQF/ IFS / FSSC 22000 practitioners and food manufacturing personnel.

Keywords: food safety, sustainability, regulatory, lean, six sigma, bottom-line improvement disciplined path

Procedia PDF Downloads 263
5708 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 135
5707 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 385
5706 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 124
5705 Revival of Ancient Egyptian Food Habits: Preserving the Past and Living the Present

Authors: Dina M. Ezz El-Din

Abstract:

A variety of sources on Ancient Egypt provides us with knowledge about its agricultural and eating habits. This wealth of information testifies that the ancient Egyptians disposed of a wide variety of food choices. Egyptian agricultural diet was complemented by livestock breeding (Cows, sheep, geese, ducks, quail, pigeons, pelicans, etc). Moreover, the ancient Egyptians planted and harvested large amounts of cereals and vegetables (onions, leeks, lettuces, garlic). They had a varied and well-balanced diet throughout their history. Like in modern times, their eating habits not only changed from one region to the other, but also these also differed according to social classes. The present research is a descriptive-analytical study that tackles eating habits and culinary experience of the ancient Egyptians in an attempt to revive and preserve Egyptians’ food heritage. It focuses on different meals that were prepared and consumed in different occasions, and the habits that can be traced in Egypt in modern times. It also suggests means of bringing to life the ancient Egyptians’ food experience through restaurants and other tourism activities.

Keywords: cultural heritage, ancient Egyptian food, eating habits, preserving food traditions

Procedia PDF Downloads 294
5704 Impact of Water Interventions under WASH Program in the South-west Coastal Region of Bangladesh

Authors: S. M. Ashikur Elahee, Md. Zahidur Rahman, Md. Shofiqur Rahman

Abstract:

This study evaluated the impact of different water interventions under WASH program on access of household's to safe drinking water. Following survey method, the study was carried out in two Upazila of South-west coastal region of Bangladesh namely Koyra from Khulna and Shymnagar from Satkhira district. Being an explanatory study, a total of 200 household's selected applying random sampling technique were interviewed using a structured interview schedule. The predicted probability suggests that around 62 percent household's are out of year-round access to safe drinking water whereby, only 25 percent household's have access at SPHERE standard (913 Liters/per person/per year). Besides, majority (78 percent) of the household's have not accessed at both indicators simultaneously. The distance from household residence to the water source varies from 0 to 25 kilometer with an average distance of 2.03 kilometers. The study also reveals that the increase in monthly income around BDT 1,000 leads to additional 11 liters (coefficient 0.01 at p < 0.1) consumption of safe drinking water for a person/year. As expected, lining up time has significant negative relationship with dependent variables i.e., for higher lining up time, the probability of getting access for both SPHERE standard and year round access variables becomes lower. According to ordinary least square (OLS) regression results, water consumption decreases at 93 liters for per person/year of a household if one member is added to that household. Regarding water consumption intensity, ordered logistic regression (OLR) model shows that one-minute increase of lining up time for water collection tends to reduce water consumption intensity. On the other hand, as per OLS regression results, for one-minute increase of lining up time, the water consumption decreases by around 8 liters. Considering access to Deep Tube Well (DTW) as a reference dummy, in OLR, the household under Pond Sand Filter (PSF), Shallow Tube Well (STW), Reverse Osmosis (RO) and Rainwater Harvester System (RWHS) are respectively 37 percent, 29 percent, 61 percent and 27 percent less likely to ensure year round access of water consumption. In line of health impact, different type of water born diseases like diarrhea, cholera, and typhoid are common among the coastal community caused by microbial impurities i.e., Bacteria, Protozoa. High turbidity and TDS in pond water caused by reduction of water depth, presence of suspended particle and inorganic salt stimulate the growth of bacteria, protozoa, and algae causes affecting health hazard. Meanwhile, excessive growth of Algae in pond water caused by excessive nitrate in drinking water adversely effects on child health. In lieu of ensuring access at SPHERE standard, we need to increase the number of water interventions at reasonable distance, preferably a half kilometer away from the dwelling place, ensuring community peoples involved with its installation process where collectively owned water intervention is found more effective than privately owned. In addition, a demand-responsive approach to supply of piped water should be adopted to allow consumer demand to guide investment in domestic water supply in future.

Keywords: access, impact, safe drinking water, Sphere standard, water interventions

Procedia PDF Downloads 206
5703 The Impact of Food Inflation on Poverty: An Analysis of the Different Households in the Philippines

Authors: Kara Gianina D. Rosas, Jade Emily L. Tong

Abstract:

This study assesses the vulnerability of households to food price shocks. Using the Philippines as a case study, the researchers aim to understand how such shocks can cause food insecurity in different types of households. This paper measures the impact of actual food price changes during the food crisis of 2006-2009 on poverty in relation to their spatial location. Households are classified as rural or urban and agricultural or non-agricultural. By treating food prices and consumption patterns as heterogeneous, this study differs from conventional poverty analysis as actual prices are used. Merging the Family, Income and Expenditure Survey (FIES) with the Consumer Price Index dataset (CPI), the researchers were able to determine the effects on poverty measures, specifically, headcount index, poverty gap, and poverty severity. The study finds that, without other interventions, food inflation would lead to a significant increase in the number of households that fall below the poverty threshold, except for households whose income is derived from agricultural activities. It also finds that much of the inflation during these years was fueled by the rise in staple food prices. Essentially, this paper aims to broaden the economic perspective of policymakers with regard to the heterogeneity of impacts of inflation through analyzing the deeper microeconomic levels of different subgroups. In hopes of finding a solution to lessen the inequality gap of poverty between the rural and urban poor, this paper aims to aid policymakers in creating projects targeted towards food insecurity.

Keywords: poverty, food inflation, agricultural households, non-agricultural households, net consumption ratio, urban poor, rural poor, head count index, poverty gap, poverty severity

Procedia PDF Downloads 219
5702 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 656
5701 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 461
5700 An Application of Contingent Valuation Method in Valuing Protected Area: A Case Study of Pulau Kukup National Parks

Authors: A. Mukrimah, M. Mohd Parid, H. F. Lim

Abstract:

Wetland ecosystem has valuable resources that contribute to national income generation and public well-being, either directly by resources that have a market value or indirectly by resources that have no market value. Economic approach is used to evaluate the resources to determine the best use of wetland resources and should be emphasized in policy development planning. This approach is to prevent imbalance in the allocation of resources and welfare benefits. A case study was conducted in 2016 to assess the economic value of wetland ecosystem services at Pulau Kukup National Parks (PKNP). This study has applied dichotomous choice survey design Contingent Valuation Method (CVM) to investigate empirically the willingness-to-pay (WTP) by the public. The study interviewed 400 household respondents at Pontian, Johor. Analysis showed 81% of household interviewed were willing to contribute to the Wetland Conservation Trust Fund. The results also indicated that on average a household was willing to pay RM87 annually. By taking into account 21,664 households in Pontian district in 2016, public’s contribution to conserves wetland ecosystem at PKNP was calculated to be RM1, 884,334. From the public’s interest to contribute to the conservation of wetland ecosystem services at PKNP, it indicates that more concerted effort is needed by both the federal and state governments to conserve and rehabilitate the mangrove ecosystem in Malaysia.

Keywords: environmental economy, economic valuation, choice experiment, Pulau Kukup national parks

Procedia PDF Downloads 169
5699 Influence of Household Conservation Benefits on the Sustainability of Burunge Wildlife Management Areas in Tanzania

Authors: Gasto Lyakurwa, Glory Bakari, Edwin Sabuhoro

Abstract:

Wildlife Management Areas (WMAs) are established to promote and act as a remedy to the protection of wildlife resources outside the core protected area. WMAs aim to address issues of poverty, ensure sustainable use of wildlife resources, and share benefits from wildlife with the member villages. Successfully managed WMA in Tanzania improves local livelihood and conserves local biodiversity through tourism revenues and the protection of wildlife, respectively. Benefits accrued at household levels as a result of conservation activities in WMA can positively influence attitudes towards wildlife conservation. This research intends to assess the positive socio-economic impacts of WMA benefits on households in Burunge WMA in Tanzania. A questionnaire survey was conducted among four randomly selected villages in the ten villages forming the Burunge WMA to explore the household-level benefits of conservation activities. An example of a question item was whether household heads feel that they are benefiting from WMA and if they could remember some of the benefits. Interviews with leaders from WMA and member villages combined the survey to capture aspects of benefit distribution to households. A total of 80 households were used as samples of the recruited study sites. Moreover, the four WMA leaders and the eight village leaders of the respective study villages were interviewed. The study findings revealed that the shared benefit has mostly reached the community level and is less likely to reach the household level. Economic activities such as agriculture and livestock keeping were found to be more important for households than conservation-related economic activities. Conservation-related economic activities generate marginal direct benefits from WMA benefits to households, with ecotourism accounting for only 19.5%. The study also indicates that a direct share of financial benefits from WMA to households is lacking. Wildlife conservation benefits are less likely to reach household levels in WMAs, with the implication of reducing people's conservation attitudes and impeding community conservation success. WMA can utilize the finances from tourism fees and concessions to establish a Community Considerations Bank, which can lend money to some individuals at no or low interest rates. Considering the importance of education and health to households, WMA stands in a good position to provide health insurance premiums and student scholarships to motivate household participation in conservation activities. Community-based organizations and governments responsible for wildlife conservation should create mechanisms to channel conservation benefits to households in order to ensure the achievement of wildlife conservation objectives through WMA. These findings are expected to contribute to forming more WMAs with enhanced mechanisms for sharing conservation benefits to benefit the conservation of natural resources outside of the core protected areas. Motivated households are expected to respect wildlife and are less likely to engage in illegal activities such as poaching and harvesting conserved natural resources while coexisting with wildlife.

Keywords: social economic benefits, individuals, wildlife management areas, biodiversity, community

Procedia PDF Downloads 48
5698 The Development and Provision of a Knowledge Management Ecosystem, Optimized for Genomics

Authors: Matthew I. Bellgard

Abstract:

The field of bioinformatics has made, and continues to make, substantial progress and contributions to life science research and development. However, this paper contends that a systems approach integrates bioinformatics activities for any project in a defined manner. The application of critical control points in this bioinformatics systems approach may be useful to identify and evaluate points in a pathway where specified activity risk can be reduced, monitored and quality enhanced.

Keywords: bioinformatics, food security, personalized medicine, systems approach

Procedia PDF Downloads 408
5697 Energizing Value Added Farming in Agriculture Economic Aspects towards Sustaining Crop Yield, Quality and Food Safety of Small-Scale Cocoa Farmer in Indonesia

Authors: Burmansyah Muhammad, Supriyoto Supriyoto

Abstract:

Crop yield, quality and food safety are three important components that all estate and food crops must put into consideration to lifting the economic value. These measurements should be evaluated because marketplace demand is simultaneously changing and farmers must adapt quickly to remain competitive. The increase in economic value could be done by producing high quality product that aligns with harvest collector preferences. The purpose of this study is to examine the causal effects of value added farming in agriculture economic aspects towards crop yield, quality and food security. This research is using descriptive survey research by employing data from small-scale cocoa farmers listed to off-taker company, located on Sulawesi area of Indonesia. The questionnaire was obtained from 650 cocoa farmers, selected randomly. Major findings of the study indicate that 78% of respondents agree that agriculture inputs have positive effect on crop yield, quality and food safety. The study recommended that cocoa stakeholders should ensure access to agriculture inputs in first priority and then followed by ensuring access to cocoa supply chain trader and micro-financing. Value Added Farming refers to lifting the economic value of a commodity through particular intervention. Regarding access to agriculture inputs, one of significant intervention is fertilization and plant nutrition management, both organic and inorganic fertilizer. Small-scale cocoa farmers can get access to fertilizer intervention through establishment of demo farm. Ordinary demo farm needs large area, selective requirements, lots of field resources and centralization impact. On the contrary, satellite demo farm is developing to wide-spread the impact of agriculture economic aspects and also the involvement in number of farmers. In Sulawesi Project, we develop leveling strata of small-scale demo farm with group of farmers and local cooperative. With this methodology, all of listed small-scale farmers can get access to agriculture input, micro-financing and how to deliver quality output. PT Pupuk Kaltim is member firm of holding company PT Pupuk Indonesia, private company belongs to the government of Indonesia. The company listed as Indonesia's largest producer of urea fertilizers, besides ammonia, Compound Fertilizer (NPK) and biological fertilizers. To achieve strategic objectives, the company has distinguished award such as SNI Platinum, SGS Award IFA Protect and Sustain Stewardship and Gold Rank of Environment Friendly Company. This achievement has become the strategic foundation for our company to energize value added farming in sustaining food security program. Moreover, to ensure cocoa sustainability farming the company has developed partnership with international companies and Non-Government Organization (NGO).

Keywords: fertilizer and plant nutrition management, good agriculture practices, agriculture economic aspects, value-added farming

Procedia PDF Downloads 80
5696 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 126
5695 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 510
5694 Consumer’ Knowledge, Attitude and Behavior on Food Safety Issues Related to Pesticide Residues in Cabbage

Authors: Dekie Rawung, Abdul L. Abadi, Toto Himawan, Siegfried Berhimpon

Abstract:

A case study on consumer' knowledge, attitude, and behavior on food safety issue related to pesticide residues in cabbage was conducted in the area of Manado and Tomohon city, North Sulawesi. A sample of 150 consumers were selected randomly on location (open market and supermarket) while they were purchasing vegetables. The data on consumers’ perception, knowledge, attitude and behavior on food safety issue regarding pesticide residues were collected using a 5-point, two-section Likert-Scale questionnaire, and the relationship of knowledge, attitude, and behavior on food safety issues were analyzed using Structural Equation Modeling (SEM). It was found that, among many food safety issues, the illegal, non-food chemical preservatives were considered the most important one (by more than 35% respondents), followed by high cholesterol content and textile coloring chemical (> 27% respondents). The pesticide residues issue was only in the 4th place. The same results were seen on the issue of quality factors that determine the product selection during purchasing. The pesticide-free and organic products labels were considered much less important quality factors as compared with freshness and nutrition value which were considered the most and the second most important quality factors (almost 65% of respondents). SEM analysis showed that only knowledge and attitude on food safety that had the significant relation (coefficient value of 0.38), whereas those with behaviors were not significant.

Keywords: cabbage, consumer, food safety, pesticide residues

Procedia PDF Downloads 404
5693 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 113
5692 Factors Predicting Food Insecurity in Older Thai Women

Authors: Noppawan Piaseu, Surat Komindr

Abstract:

This study aimed to determine factors predicting food insecurity in older Thai women living in crowded urban communities. Through purposive sampling, 315 participants were recruited from community dwelling older women in Bangkok, Thailand. Data collection included interview from questionnaires and anthropometric measurement. Results showed that approximately half of the sample were 60-69 years old (51.1%), married (50.6%), obtained primary education (52.3%), had low family income (51.7%), lived in poor physical environment (49.9%) with normal body mass index (51.0%). Logistic regression analysis revealed that older women who were widowed/divorced/separated (OR = 1.804, 95% CI = 1.052-3.092, p = .032), who reported low family income (OR =.654, 95% CI = .523-.817, p < .001), and who had poor physical environment surrounding home (OR = 2.338, 95% CI = 1.057-5.171, p = .036) were more likely to have food insecurity. Results support that social and environmental factors are major factors predicting food insecurity in older women living in the urban community. Health professionals need to identify and monitor psychosocial, economic and environmental dimensions of food insecurity among them.

Keywords: food insecurity, older women, urban communities, Thailand

Procedia PDF Downloads 389
5691 Socio-Demographic, Cause, and Benefit of Internal and International Migration: A Case Study of Mazar-i-Sharif, Balkh Province, Afghanistan

Authors: Baqir Khawari

Abstract:

Migration has a long history in Afghanistan even before, but it has been exacerbated in the last decade. Using actual household data of 1060 in Mazar-i-Sharif, the capital of Balkh province, obtained from a strictly random process, the study examined to evaluate the main causes and benefits of the migration. It is found that the main reasons for internal migration are unemployment and income inequality, in addition to war and poverty as international parameters for migration. Furthermore, the study demonstrated that households receive benefits from their migrants through remittances to increase their income and smooth consumption. Thus, the study suggests that to manage migration in Afghanistan, the government and international organizations should work together for peace and reduction of poverty in Afghanistan otherwise, the crisis of migration will continue in the future as well.

Keywords: migration, remittances, socio-demographic, household, Afghanistan

Procedia PDF Downloads 56
5690 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 399
5689 Influence of Parent’s Food Habits on Nutrition Behaviours of Children under 7 Years in Tehran, Iran

Authors: Katayoun Bagheri, Farzad Berahmandpour

Abstract:

Several studies about food habits in diverse population show, early living years play significant role in building of current food habits. Suitable nutrition in children is also influenced by parent’s food habits. The aim of study is to survey the role of parent’s food habits to form of nutrition behaviours in children under 7 years in Tehran - Iran. The study is a Descriptive study. The participants were 19 children under 7 years with their mothers from a kindergarten in the central Tehran. The sampling method was random sampling. The data was collected by food habits questionnaires and implementation of consultation meetings with the mothers. The data analysis was qualitative analysis. The findings show that 79% children and their parents have eaten enough and variety breakfast, but food choices of children were depended on food choices of parents. In the other meals, the majority of children enjoyed to eat dinner (58%), because the more families could eat dinner together. According to mother opinions, the children enjoy eating macaroni, chicken, fried potatoes, chips and fruit juices. The researchers argue that mother’s role is unavoidable in the food preferences among children. Fortunately, the results believe that children tend to drink simple milk (79%). Moreover, their parents lead them to chocolate milk consumption (42%) instead of other flavored milk. Finally, despite popular belief claim that mothers influence on nutrition behavior of children, but the study argues that the fathers have more effects on children’s nutrition behaviours. In conclusion, it seems that the general trainings about promoting healthy nutrition behavior for parents by mass media can improve nutrition habits and behaviours of pre school children.

Keywords: food habits, parents, nutrition behaviours, children, promoting nutrition

Procedia PDF Downloads 379
5688 Evaluation of Food Services by the Personnel in Hospitals of Athens, Greece

Authors: I. Mentziou, C. Delezos, D. Krikidis, A. Nestoridou, G. Boskou

Abstract:

Introduction: The systems of production and distribution of meals can have a significant impact on the food intake of hospital patients who are likely to develop malnutrition. In hospitals, the consequences of food borne infections can range from annoying to life-threatening for a patient, since they can lead up to death in vulnerable groups Aim: The aim of the present study was the evaluation of food safety management systems implementation, as well as the general evaluation of the total quality management systems in Greek hospitals. Methods: This is a multifocal study on the implementation and evaluation of the food safety management systems in the Greek hospitals of Attica region. Eleven hospitals from the city of Athens were chosen for this purpose. The sample was derived from the high rank personnel of the nutritional department (dietician, head-chef, food technologist, public health inspector). Tailor made questionnaires on hygiene regulations were used as tools for the interviews. Results: Overall, 30 employees in the field of hospital nutrition participated. Most of the replies implied that almost always the hygiene regulations are implemented. Nevertheless, only 30% stated that there is a Hazard Analysis Critical Control Points HACCP system (HACCP) in the hospital. In a small number of questionnaires there were proposals for changes by the staff. Conclusion: Measurement of the opinion of the personnel about the provided food services within a hospital can further lead to continuous improvement of the hospital nutrition.

Keywords: evaluation, food service, HACCP, hospital, personnel

Procedia PDF Downloads 354
5687 Use of Indian Food Mascot Design as an Advertising Tool in Maintaining and Growing the Brand Name

Authors: Preeti Yadav, Dandeswar Bisoyi, Debkumar Chakrabarti

Abstract:

Mascots provide memories to viewers, and numerous promotional campaigns with different appearances, continue to trigger viewers and capture their interest. This study investigates the effect of Indian food mascot designs and influence on enhancing communication; thereby, building long-term brand recognition by the consumers. This paper presents a descriptive approach to Indian food mascot design as an advertising tool, and its research adopts a quantitative methodology. The study confirms that mascots have an ability to communicate a message in an effective manner; all though they are simple in terms of design and fashion trend, they have the capability to build positive reactions.

Keywords: food mascot, brand recognitions, advertising, humour

Procedia PDF Downloads 162
5686 Linguistic Codes: Food as a Class Indicator

Authors: Elena Valeryevna Pozhidaeva

Abstract:

This linguistic case study is based on an interaction between the social position and foodways. In every culture there is a social hierarchical system in which there can be means to express and to identify the social status of a person. Food serves as a class indicator. The British being a verbal nation use the words as a preferred medium for signalling and recognising the social status. The linguistic analysis reflects a symbolic hierarchy determined by social groups in the UK. The linguistic class indicators of a British hierarchical system are detectable directly – in speech acts. They are articulated in every aspect of a national identity’s life from preferences of the food and the choice to call it to the names of the meals. The linguistic class indicators can as well be detected indirectly – through symbolic meaning or via the choice of the mealtime, its class (e.g the classes of tea or marmalade), the place to buy food (the class of the supermarket) and consume it (the places for eating out and the frequency of such practices). Under analysis of this study are not only food items and their names but also such categories as cutlery as a class indicator and the act of eating together as a practice of social significance and a class indicator. Current social changes and economic developments are considered and their influence on the class indicators appearance and transformation.

Keywords: linguistic, class, social indicator, English, food class

Procedia PDF Downloads 383
5685 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia

Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan

Abstract:

This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.

Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia

Procedia PDF Downloads 373
5684 Gendered Economic, Social, and Health Effects of the Mobile Health and Nutritional Services of the International Medical Corps (IMC) in Vulnerable Areas of Ethiopia

Authors: Abdela Zeinu Yasin

Abstract:

The current research aimed to assess the status of IMC in providing treatment for malnourished children and programs in water, sanitation, and hygiene (WASH), food and livelihood security, and comprehensive healthcare through Mobile health and nutrition programs during the last 5 years period. We have conducted 60 in-depth interviews with women during the period from conception to a child’s birthday, health facility staff, and female community health volunteers (FCHVs), as well as 12 focus group discussions with health facility staff and other household decision-makers. We employed thematic analysis using framework matrices and analytical memorandums. The study revealed that 78% of the respondents, of whom 97% were women, have benefited from the selected vulnerable areas. The use of the clear water and sanitization program has reached the 81% of selected households. The use of a modern baby delivery system among the respondent has been 68% of the women and health facilities among the decision-makers/focal person. More than 8 in 10 participants (84%) could read and understand the health facility instructions, and the majority (82%) of women, health facility staff, and male decision-makers can also read and write bulletins and instructions. We found that decision-maker women preferred participative education, whereas health facilities and the IMC desired educational and motivational bulletins. A Mobile Health and Nutrition program intervention by the IMC is acceptable in the conditions of the Ethiopian community and has the potential to improve community health and nutrition service utilization, particularly by providing clean water and sanitization; women’s birth control, and health improvement in the vulnerable regions of the country. The current research findings shall contribute to text IMC Mobile Health and Nutritional intervention design in under-resourced settings.

Keywords: clean water, health and nutrition services, hygiene, IMC, mobile health, sanitation

Procedia PDF Downloads 72