Search results for: cyber hygiene
540 Holistic and Naturalistic Traditions of British Hygiene and Medicine, Reflected in E. W. Lane's Hygienic Medicine, 1859
Authors: Min Bae
Abstract:
Hygiene had traditionally meant ways of healthy and right living. However, the nineteenth century was the time when a gradual shift in medical and hygienic paradigms took place from holism to reductionism. Against this medical and social background, E. W. Lane (MD, Edinburgh, 1853) formulated his own medical philosophies in his book Hydropathy: Or Hygienic Medicine (1859). Until the 1880s when he published his last book on the hygienic medicine, he consistently intended to raise the importance of hygienic holism in medicine, while adopting hydropathy as his main therapeutic measure. Lane’s case reflects the mid-nineteenth century trend in which since the 1840s, the rational and holistic facets in medicine had significantly transferred to hydropathy, which was the most naturalistic healing system in the medical market. Hygiene for Lane was no longer the ancient form of ‘six non-naturals’. He emphasised physiology as the rational grounds for his project of the medicalisation of hygiene. His medical philosophy was profoundly naturalistic and holistic against the opposite trend of the contemporary hygiene and medicine. Conflicting aspects may often be best embodied in persons who stood on the boundaries between inside and outside. Lane’s theories on hygienic medicine did not develop into a new medical system which he believed would reconciliate orthodox medicine and hydropathy of his time had also adopted increasingly reductionist approaches since 1860s. Nevertheless, the naturalistic philosophies and approaches in Lane’s hygienic medicine demonstrates a continuous effort for a theoretical reformulation of hydropathy during its stagnant and declining period to constantly fit into the holistic paradigm of medicine and hygiene. Considering the fact that the nature cure concept in hydropathy and its individualistic approach were succeeded by naturopathy at the end of the century, analysis of Lane’s medical thoughts reveals part of a ‘thin red line’ of naturalism in the battleground between reductionism and holism during the nineteenth century in the history of medicine and hygiene.Keywords: E. W. Lane, hygienic medicine, hydropathy, naturopath
Procedia PDF Downloads 334539 Cyber Bullying Victimization of Elementary School Students and Their Reflections on the Victimization
Authors: Merve Sadetas Sezer, Ismail Sahin, Ahmet Oguz Akturk
Abstract:
With the use of developing technology, mostly in communication and entertainment, students spend considerable time on the internet. In addition to the advantages provided by the internet, social isolation brings problems such as addiction. This is one of the problems of the virtual violence. Cyber-bullying is the common name of the intensities which students are exposed on the internet. The purpose of this study designed as a qualitative research is to find out the cyber bullying varieties and its effects on elementary school students. The participants of this research are 6th, 7th and 8th grade students of a primary school and 24 students agreed to participate in the study. The students were asked to fill an interview with semi-structured open-ended questions. According to the results obtained in the research, the most important statements determined by the participants are breaking passwords on social networking sites, slang insult to blasphemy and taking friendship offers from unfamiliar people. According to participants from the research, the most used techniques to prevent themselves from cyber bullying are to complain to the site administrator, closing accounts on social networking sites and countercharging. Also, suggestions were presented according to the findings.Keywords: bullying, cyber-bullying, elementary, peer-relationship, virtual victimization
Procedia PDF Downloads 349538 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids
Authors: Sami M. Alshareef
Abstract:
The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.Keywords: machine learning, cyber-attacks, automatic generation control, smart grid
Procedia PDF Downloads 85537 The Nexus between Counter Terrorism and Human Rights with a Perspective on Cyber Terrorism
Authors: Allan Munyao Mukuki
Abstract:
The nexus between terrorism and human rights has become a big challenge in the fight against terrorism globally. This is hinged on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognised in the Vienna Declaration and Programme of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, terrorism constitutes an assault on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitisation’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then concludes with recommendations on how to balance counter-terrorism and human rights in the modern age.Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation
Procedia PDF Downloads 403536 Study of Knowledge, Attitudes and Practices of Menstrual Hygiene of Adolescent Girls Aged 12 to 19 Years Old in Secondary School
Authors: Jean Marie Vianney Ininahazwe, Patrick Bitangumutwenzi
Abstract:
Context: The issue of menstrual hygiene is an entry point for demonstrating the gender-specific nature of the needs of women and adolescent girls. Women and girls around the world face many challenges in managing their periods. They may be deprived of certain basic human rights, including those relating to education, work and health. This work describes the Knowledge, Attitudes and Practices of menstrual hygiene among adolescent girls from 12 to 19 years at Lake Tanganyika Secondary School. Method: This is a descriptive cross-sectional study among 384 adolescent girls from Lake Tanganyika secondary school over a period of 2 weeks from September 13 to September 27 and with a purely general objective of describing the Knowledge, Attitudes and Practices of menstrual hygiene in secondary schools. The study was conducted using a non-probability method and the sampling technique was for convenience. The data collection technique used was the survey by questionnaire and the exploitation of the documentary. The data collection tool used was the questionnaire. Microsoft Word 2013, Microsoft Excel 2.13 and EPI INFO7 software were used for this purpose. Results: We noticed that 55.47% of the participants knew that menstruation is a physiological process; 57.55% of the teenage girls surveyed get their information about menstrual hygiene from their mothers; 75.72% use sanitary napkins and 24.02% use fabrics as protective material; 35.16% of respondents have already lacked sanitary napkins since their menarche; 37.29% are absent from classes due to lack of sanitary napkins; 23.82% use soap and other products to wash.Keywords: knowledge, attitudes, practices, menstrual hygiene
Procedia PDF Downloads 73535 Knowledge, Attitudes and Practices of Menstrual Hygiene of Adolescent Girls Aged 12 to 19 Years Old at Lake Tanganyika Lycee
Authors: Yvette Nsabimana, Nadine Misago, Minani Methode
Abstract:
Context: the issue of menstrual hygiene is an entry point for demonstrating the gender-specific nature of the needs of women and adolescent girls. Women and girls around the world face many challenges in managing their periods. They may be deprived of certain basic human rights, including those relating to education, work and health. This work describes the Knowledge, Attitudes and Practices of menstrual hygiene among adolescent girls from 12 to 19 years of Lake Tanganyika Secondary School. Method: This is a descriptive cross-sectional study among 384 adolescent girls from Lake Tanganyika secondary school over a period of 2 weeks from September 13 to September 27 and with a purely general objective of describing the Knowledge, Attitudes and Practices of menstrual hygiene in secondary schools. The study was conducted using a non-probability method and the sampling technique was for convenience. The data collection technique used was the survey by questionnaire and the exploitation of the documentary. The data collection tool used was the questionnaire. Microsoft Word 2013, Microsoft Excel 2.13 and EPI INFO7 software were used for this purpose. Results: We noticed that 55.47% of the participants knew that menstruation is a physiological process; 57.55% of the teenage girls surveyed get their information about menstrual hygiene from their mothers; 75.72% use sanitary napkins and 24.02% use fabrics as protective material; 35.16% of respondents have already lacked sanitary napkins since their menarche; 37.29% are absent from classes due to lack of sanitary napkins; 23.82% use soap and other products to wash.Keywords: knowledge, attitudes, practices, menstrual hygiene
Procedia PDF Downloads 77534 Mechanism of Perceived Behavioral Control, Attitude and Subjective Norms Influence the Safety and Hygiene Control Behavior of Dairy Farmers in Developing Economy
Authors: Andrew Kizito Seruma, Dickson Okello, George Owuor
Abstract:
Low adoption of food safety practices has serious consequences for smallholder dairy farmers’ productivity, profitability, and market access. Farmers’ low levels of knowledge concerning FSMs coupled with a negative perception of it have greatly influenced compliance with food safety standards. Therefore, it is imperative to understand the drivers that influence dairy farmers’ behaviors to perform safety and hygiene control practices at the farm level. Using data obtained from structured questionnaires completed by 757 smallholder farmers in Central Uganda, we construct a theoretical framework based on the theory of planned behavior and structural equation model to capture the mechanisms behind smallholder dairy farmers’ adoption of SHCP. The findings indicate that there was a positive relationship between perceived behavioral control (β = 0.121, p=0.06) and attitude (β = 0.883, p=0.01) with the adoption of safety and hygiene control practices. However, the relationship between subjective norms and the adoption of safety and hygiene control practices was negative (β = -0.533, p=0.02). It is noteworthy that perceived behavioral control and attitudes play a crucial role in increasing farmers’ adoption of SHCP. The result of this study shows that by fully understanding the merits and demerits of performing safety and hygiene control practices at the farm, smallholder farmers can make better decisions on adopting the SHCP at their farms linked to their cognitive behavior. Based on these findings, future policy interventions to promote SHCP should focus on improving farmers’ perception and attitude toward implementing safety and hygiene control practices through capacity building and providing incentives such as better milk prices through a quality-based buying system.Keywords: food-safety, hygiene, behavioral, norms, attitude, smallholder, dairy
Procedia PDF Downloads 2533 Applications of AI, Machine Learning, and Deep Learning in Cyber Security
Authors: Hailyie Tekleselase
Abstract:
Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data
Procedia PDF Downloads 126532 The Effect of Progressive Muscle Relaxation and Sleep Hygiene Education to Change Sleep Quality Index Scores of Patient with Breast Cancer
Authors: Ika Wulansari, Yati Afiyanti, Indang Trihandini
Abstract:
Sleeping disorder experienced by patients with breast cancer can affect the physical, mental, health, and well-being. This study examines the effect of progressive muscle relaxation training and sleep hygiene education to change sleep quality scores of the patient with breast cancer. The study design using quasi-experiment with pre-post test within the control group, involving 62 breast cancer patients using consecutive sampling method in Jakarta. Statistical test results with independent t-test showed a significant difference in score of sleep quality between in intervention group and the control group (6,66±3,815; 9,30±3,334, p-value = 0,005). Progressive muscle relaxation exercise and sleep hygiene education proven to be affective to change the patients sleeping quality, so that it can be an alternative therapeutic option to overcome sleeping disorders.Keywords: sleeping disorders, breast cancer, progressive muscle relaxation, sleep hygiene education
Procedia PDF Downloads 315531 Ensuring Cyber Security Using Kippo Honeypots
Authors: S. Vivekananda Pandian
Abstract:
A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.Keywords: attackers, security, Kippo Honeypots, virtual machine
Procedia PDF Downloads 427530 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance
Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle
Abstract:
Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model
Procedia PDF Downloads 103529 Assessing the Effectiveness of Machine Learning Algorithms for Cyber Threat Intelligence Discovery from the Darknet
Authors: Azene Zenebe
Abstract:
Deep learning is a subset of machine learning which incorporates techniques for the construction of artificial neural networks and found to be useful for modeling complex problems with large dataset. Deep learning requires a very high power computational and longer time for training. By aggregating computing power, high performance computer (HPC) has emerged as an approach to resolving advanced problems and performing data-driven research activities. Cyber threat intelligence (CIT) is actionable information or insight an organization or individual uses to understand the threats that have, will, or are currently targeting the organization. Results of review of literature will be presented along with results of experimental study that compares the performance of tree-based and function-base machine learning including deep learning algorithms using secondary dataset collected from darknet.Keywords: deep-learning, cyber security, cyber threat modeling, tree-based machine learning, function-based machine learning, data science
Procedia PDF Downloads 154528 Challenges in Anti-Counterfeiting of Cyber-Physical Systems
Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier
Abstract:
This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection
Procedia PDF Downloads 498527 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network
Authors: Phillip Garrad, Saritha Unnikrishnan
Abstract:
The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing
Procedia PDF Downloads 110526 Oral Hygiene Behaviors among Pregnant Women with Diabetes Who Attend Primary Health Care Centers at Baghdad City
Authors: Zena F. Mushtaq, Iqbal M. Abbas
Abstract:
Background: Diabetes mellitus during pregnancy is one of the major medical and social problems with increasing prevalence in last decades and may lead to more vulnerable to dental problems and increased risk for periodontal diseases. Objectives: To assess oral hygiene behaviors among pregnant women with diabetes who attended primary health care centers and find out the relationship between oral hygiene behaviors and studied variables. Methodology: A cross sectional design was conducted from 7 July to 30 September 2014 on non probability (convenient sample) of 150 pregnant women with diabetes was selected from twelve Primary Health Care Centers at Baghdad city. Questionnaire format is tool for data collection which had designed and consisted of three main parts including: socio demographic, reproductive characteristics and items of oral hygiene behaviors among pregnant women with diabetes. Reliability of the questionnaire was determined through internal consistency of correlation coefficient (R= 0.940) and validity of content was determined through reviewing it by (12) experts in different specialties and was determined through pilot study. Descriptive and inferential statistics were used to analyze collected data. Result: Result of study revealed that (35.3%) of study sample was (35-39) years old with mean and SD is (X & SD = 33.57 ± 5.54) years, and (34.7%) of the study sample was graduated from primary school and less, half of the study sample was government employment and self employed, (42.7%) of the study sample had moderate socioeconomic status, the highest percentage (70.0%) of the study sample was nonsmokers, The result indicates that oral hygiene behaviors have moderate mean score in all items. There are no statistical significant association between oral hygiene domain and studied variables. Conclusions: All items related to health behavior concerning oral hygiene is in moderate mean of score, which may expose pregnant women with diabetes to high risk of periodontal diseases. Recommendations: Dental care provider should perform a dental examination at least every three months for each pregnant woman with diabetes, explanation of the effect of DM on periodontal health, oral hygiene instruction, oral prophylaxis, professional cleaning and treatment of periodontal diseases(scaling and root planing) when needed.Keywords: diabetes, health behavior, pregnant women, oral hygiene
Procedia PDF Downloads 287525 Effect of Climate Change and Water Sources: Sustainability of Rural Water Sanitation and Hygiene of Tanahun District
Authors: Bharat Sapkota
Abstract:
Nepal is the one of the victim country of climate change. Decreasing snow line, sometimes higher and sometime non-rain fall are common phenomena in hill area. Natural flood disaster and drought is also common every year in certain place of the country. So this paper analyze the effect of climate and natural water sources for sustainability of water sanitation and hygiene of Tanahun district. It is one of the Rural Water Supply and Sanitation Project Western Nepal Phase-II (RWSSP-WN Phase-II) project district out of 14 project districts of western and mid-western Nepal. RWSSP-WN II is a bilateral development cooperation of governments of Nepal and Finland. Big investment is still going on in water sanitation and hygiene sector but sustainability is still a challenge throughout the country. So RWSSP-WN has started the strengthen of the capacity of local Governments to deliver services in water supply, sanitation and hygiene and its sustainability through the implementation of cross cutting approach of climate change and disaster risk reduction. The study shows that the average yield in 685 natural point sources were around 0.045 l/s in 2014 but it was twice as high in 2004 i.e. 0.09 l/s. The maximum measured yield in 2014 was 1.87 l/s, whereas, the maximum yield was 3 l/s in 2004. Likewise, spring source mean and maximum yield measured in 2014 were 0.16 l/s and 3.33 l/s respectively, whereas, mean and maximum yields in 2004 were 0.204 l/s and 3 l/s respectively. Small streams average yield measured in 2014 was 0.32 l/s with the maximum of around 4.99 l/s. In 2004, mean and maximum yields of streams were 0.485 l/s and 5 l/s respectively. The overall climate between years 2002 to 2013 and measured yield data between 2004 and 2014 shows climate as one of the causes of water source decline. The temperature is rising with pace of 0.041°C per year and rainfall is decreased by 16.8 mm/year. The Khosla’s empirical formula shows decrease of 1.7 cm/year in runoff. At present sustainability of water, sanitation and hygiene is more challenge due to sources decreasing in the district. Sanitation and hygiene total behavior change and watershed conservation as well as design and implementation of recharge pound construction are the way forward of sustainability of water, sanitation and hygiene.Keywords: water sanitation, hygiene, sustainability, climate change
Procedia PDF Downloads 337524 Knowledge, Attitude and Practice on Swimming Pool Hygiene and Assessment of Microbial Contamination in Educational Institution in Selangor
Authors: Zarini Ismail, Mas Ayu Arina Mohd Anuwar, Ling Chai Ying, Tengku Zetty Maztura Tengku Jamaluddin, Nurul Azmawati Mohamed, Nadeeya Ayn Umaisara Mohamad Nor
Abstract:
The transmission of infectious diseases can occur anywhere, including in the swimming pools. A large number of swimmers turnover and poor hygienic behaviours will increase the occurrence of direct and indirect water contamination. A wide variety of infections such as the gastrointestinal illnesses, skin rash, eye infections, ear infections and respiratory illnesses had been reported following the exposure to the contaminated water. Understanding the importance of pool hygiene with a healthy practice will reduce the risk of infection. The aims of the study are to investigate the knowledge, attitude and practices on pool hygiene among swimming pool users and to determine the microbial contaminants in swimming pools. A cross-sectional study was conducted using self-administered questionnaires to 600 swimming pool users from four swimming pools belong to the three educational institutions in Selangor. Data was analyzed using SPSS Statistics version 22.0 for Windows. The knowledge, attitude and practice of the study participants were analyzed using the sum score based on Bloom’s cut-off point (80%). Having a score above the cut-off point was classified as having high levels of knowledge, positive attitude and good practice. The association between socio-demographic characteristics, knowledge and attitude with practice on pool hygiene was determined by Chi-Square test. The physicochemical parameters and the microbial contamination were determined using a standard method for examination of waste and wastewater. Of the 600 respondents, 465 (77.5%) were females with the mean age of 21 years old. Most of the respondents are the students (98.8%) which belong to the three educational institutions in Selangor. Overall, the majority of the respondents (89.2%) had low knowledge on pool hygiene, but had positive attitudes (91.3%). Whereas only half of the respondents (50%) practice good hygiene while using the swimming pools. There was a significant association between practice level on pool hygiene with knowledge (p < 0.001) and also the attitude (p < 0.001). The measurements of the physicochemical parameters showed that all 4 swimming pools had low levels of pH and two had low levels of free chlorine. However, all the water samples tested were negative for Escherichia coli. The findings of this study suggested that high knowledge and positive attitude towards pool hygiene ensure a good practice among swimming pool users. Thus, it is recommended that educational interventions should be given to the swimming pool users to increase their knowledge regarding the pool hygiene and this will prevent the unnecessary outbreak of infectious diseases related to swimming pool.Keywords: attitude, knowledge, pool hygiene, practice
Procedia PDF Downloads 298523 Technical and Legal Definitions in Cyber Terrorism
Authors: Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, Hamed Ladoni Damghani, Rohimi Bin Shapiee
Abstract:
In recent years the speed of new technology has brought forth so many new issues. Cyberspace is among the new technologies that need novel ways to address the various issues that have arisen. While cyberspace is a technical notion that defies a single definition, this new technology requires the adoption and application of new laws. In order to manage issues arising from the existence of cyberspace, proper policies and definitions must be formulated which satisfy both technical and legal aspects. One difficulty in this regard is due to the unique features of cyberspace architecture. This article proposes to define cyberspace and cyber terrorism. This will allow for a more effective and comprehensive addressing of legal issues as they can then be handled better by introducing a new factor to the otherwise ordinary analysis in whichever field is implicated such as the nature and place of use.Keywords: cyberspace, cyber terrorism, technical definition, legal definition
Procedia PDF Downloads 590522 Cyber-Victimization among Higher Education Students as Related to Academic and Personal Factors
Authors: T. Heiman, D. Olenik-Shemesh
Abstract:
Over the past decade, with the rapid growth of electronic communication, the internet and, in particular, social networking has become an inseparable part of people's daily lives. Along with its benefits, a new type of online aggression has emerged, defined as cyber bullying, a form of interpersonal aggressive behavior that takes place through electronic means. Cyber-bullying is characterized by repetitive behavior over time of maladaptive authority and power usage using computers and cell phones via sending insulting messages and hurtful pictures. Preliminary findings suggest that the prevalence of involvement in cyber-bullying among higher education students varies between 10 and 35%. As to date, universities are facing an uphill effort in trying to restrain online misbehavior. As no studies examined the relationships between cyber-bullying involvement with personal aspects, and its impacts on academic achievement and work functioning, this present study examined the nature of cyber-bullying involvement among 1,052 undergraduate students (mean age = 27.25, S.D = 4.81; 66.2% female), coping with, as well as the effects of social support, perceived self-efficacy, well-being, and body-perception, in relation to cyber-victimization. We assume that students in higher education are a vulnerable population and at high risk of being cyber-victims. We hypothesize that social support might serve as a protective factor and will moderate the relationships between the socio-emotional variables and the occurrence of cyber- victimization. The findings of this study will present the relationships between cyber-victimization and the social-emotional aspects, which constitute risk and protective factors. After receiving approval from the Ethics Committee of the University, a Google Drive questionnaire was sent to a random sample of students, studying in the various University study centers. Students' participation was voluntary, and they completed the five questionnaires anonymously: Cyber-bullying, perceived self-efficacy, subjective well-being, social support and body perception. Results revealed that 11.6% of the students reported being cyber-victims during last year. Examining the emotional and behavioral reactions to cyber-victimization revealed that female emotional and behavioral reactions were significantly greater than the male reactions (p < .001). Moreover, females reported on a significant higher social support compared to men; male reported significantly on a lower social capability than female; and men's body perception was significantly more positive than women's scores. No gender differences were observed for subjective well-being scale. Significant positive correlations were found between cyber-victimization and fewer friends, lower grades, and work ineffectiveness (r = 0.37- .40, p < 0 .001). The results of the Hierarchical regression indicated significantly that cyber-victimization can be predicted by lower social support, lower body perception, and gender (female), that explained 5.6% of the variance (R2 = 0.056, F(5,1047) = 12.47, p < 0.001). The findings deepen our understanding of the students' involvement in cyber-bullying, and present the relationships of the social-emotional and academic aspects on cyber-victim students. In view of our findings, higher education policy could help facilitate coping with cyber-bullying incidents, and student support units could develop intervention programs aimed at reducing cyber-bullying and its impacts.Keywords: academic and personal factors, cyber-victimization, social support, higher education
Procedia PDF Downloads 289521 Engaging Women Entrepreneurs in School Adolescent Health Program to Ensure Menstrual Hygiene Management in Rural Bangladesh
Authors: Toslim Uddin Khan, Jesmin Akter, Mohiuddin Ahmed
Abstract:
Menstrual hygiene management (MHM) and personal health-care practice is a critical issue to prevent morbidity and other reproductive health complications among adolescent girls in Bangladesh. Inadequate access to water, sanitation and hygiene (WASH) facilities lead to unhealthy MHM practices that resulted in poor reproductive health outcomes. It is evident from different studies that superstitions and misconception are more common in rural communities that limit young girls’ access to and understanding of the menstrual hygiene and self care practices. The state-of-the-art approach of Social Marketing Company (SMC) is proved to be instrumental in delivering reinforcing health messages, making public health and hygiene products available at the door steps of the community through community mobilization programs in rural Bangladesh. School health program is one of the flagship interventions of SMC to equip adolescent girls and boys with correct knowledge of health and hygiene practices among themselves, their families and peers. In Bangladeshi culture, adolescent girls often feel shy to ask fathers or male family members about buying sanitary napkin from local pharmacy and they seem to be reluctant to seek help regarding their menstrual problems. A recent study reveals that 48% adolescent girls are using sanitary napkins while majority of them are unaware of menstrual hygiene practices in Bangladesh. Under school adolescent program, SMC organizes health education sessions for adolescent girls from grade seven to ten using enter-educate approach with special focus on sexual and reproductive health and menstrual hygiene issues including delaying marriage and first pregnancy. In addition, 2500 rural women entrepreneurs branded as community sales agents are also involved in disseminating health messages and selling priority health products including sanitary napkin at the household level. These women entrepreneurs are serving as a source of sustainable supply of the sanitary napkins for the rural adolescent girls and thereby they are earning profit margins on the sales they make. A recent study on the impact of adolescent program activities reveals that majority (71%) of the school adolescent girls are currently using sanitary napkins. Health education equips and empowers adolescent girls with accurate knowledge about menstrual hygiene practices and self-care as well. Therefore, engagement of female entrepreneurs in school adolescent health program at the community level is one of the promising ways to improve menstrual hygiene practices leading to increased use of sanitary napkin in rural and semi-rural communities in Bangladesh.Keywords: school adolescent program, social marketing, women entrepreneurs, menstrual hygiene management
Procedia PDF Downloads 198520 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies
Authors: Lindelwa Mngomezulu, Tonderai Muchenje
Abstract:
Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.Keywords: e-mail security, cyber-attacks, data integrity, authentication
Procedia PDF Downloads 136519 The Need for a Tool to Support Users of E-Science Infrastructures in a Virtual Laboratory Environment
Authors: Hashim Chunpir
Abstract:
Support processes play an important role to facilitate researchers (users) to accomplish their research activities with the help of cyber-infrastructure(s). However, the current user-support process in cyber-infrastructure needs a feasible tool to support users. This tool must enable the users of a cyber-infrastructure to communicate efficiently with the staffs of a cyber-infrastructure in order to get technical and scientific assistance, whilst saving resources at the same time. This research paper narrates the real story of employing various forms of tools to support the user and staff communication. In addition, this paper projects the lessons learned from an exploration of the help-desk tools in the current state of user support process in Earth System Grid Federation (ESGF) from support staffs’ perspective. ESGF is a climate cyber-infrastructure that facilitates Earth System Modeling (ESM) and is taken as a case study in this paper. Finally, this study proposes a need for a tool, a framework or a platform that not only improves the user support process to address support servicing needs of end-users of e-Science infrastructures but also eases the life of staffs in providing assistance to the users. With the help of such a tool; the collaboration between users and the staffs of cyber-infrastructures is made easier. Consequently, the research activities of the users of e-Science infrastructure will thrive as the scientific and technical support will be available to users. Finally, this results into painless and productive e-Research.Keywords: e-Science User Services, e-Research in Earth Sciences, Information Technology Services Management (ITSM), user support process, service desk, management of support activities, help desk tools, application of social media
Procedia PDF Downloads 473518 Cyber Violence Behaviors Among Social Media Users in Ghana: An Application of Self-Control Theory and Social Learning Theory
Authors: Aisha Iddrisu
Abstract:
The proliferation of cyberviolence in the wave of increased social media consumption calls for immediate attention both at the local and global levels. With over 4.70 billion social media users worldwide and 8.8 social media users in Ghana, various forms of violence have become the order of the day in most countries and communities. Cyber violence is defined as producing, retrieving, and sharing of hurtful or dangerous online content to cause emotional, psychological, or physical harm. The urgency and severity of cyber violence have led to the enactment of laws in various countries though lots still need to be done, especially in Ghana. In Ghana, studies on cyber violence have not been extensively dealt with. Existing studies concentrate only on one form or the other form of cyber violence, thus cybercrime and cyber bullying. Also, most studies in Africa have not explored cyber violence forms using empirical theories and the few that existed were qualitatively researched, whereas others examine the effect of cyber violence rather than examining why those who involve in it behave the way they behave. It is against this backdrop that this study aims to examine various cyber violence behaviour among social media users in Ghana by applying the theory of Self-control and Social control theory. This study is important for the following reasons. The outcome of this research will help at both national and international level of policymaking by adding to the knowledge of understanding cyberviolence and why people engage in various forms of cyberviolence. It will also help expose other ways by which such behaviours are enforced thereby serving as a guide in the enactment of the rightful rules and laws to curb such behaviours. It will add to literature on consequences of new media. This study seeks to confirm or reject to the following research hypotheses. H1 Social media usage has direct significant effect of cyberviolence behaviours. H2 Ineffective parental management has direct significant positive relation to Low self-control. H3 Low self-control has direct significant positive effect on cyber violence behaviours among social, H4 Differential association has significant positive effect on cyberviolence behaviour among social media users in Ghana. H5 Definitions have a significant positive effect on cyberviolence behaviour among social media users in Ghana. H6 Imitation has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H7 Differential reinforcement has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H8 Differential association has a significant positive effect on definitions. H9 Differential association has a significant positive effect on imitation. H10 Differential association has a significant positive effect on differential reinforcement. H11 Differential association has significant indirect positive effects on cyberviolence through the learning process.Keywords: cyberviolence, social media users, self-control theory, social learning theory
Procedia PDF Downloads 86517 Identity and Access Management for Medical Cyber-Physical Systems: New Technology and Security Solutions
Authors: Abdulrahman Yarali, Machica McClain
Abstract:
In the context of the increasing use of Cyber-Physical Systems (CPS) across critical infrastructure sectors, this paper addresses a crucial and emerging topic: the integration of Identity and Access Management (IAM) with Internet of Things (IoT) devices in Medical Cyber-Physical Systems (MCPS). It underscores the significance of robust IAM solutions in the expanding interconnection of IoT devices in healthcare settings, leveraging AI, ML, DL, Zero Trust Architecture (ZTA), biometric authentication advancements, and blockchain technologies. The paper advocates for the potential benefits of transitioning from traditional, static IAM frameworks to dynamic, adaptive solutions that can effectively counter sophisticated cyber threats, ensure the integrity and reliability of CPS, and significantly bolster the overall security posture. The paper calls for strategic planning, collaboration, and continuous innovation to harness these benefits. By emphasizing the importance of securing CPS against evolving threats, this research contributes to the ongoing discourse on cybersecurity and advocates for a collaborative approach to foster innovation and enhance the resilience of critical infrastructure in the digital era.Keywords: CPS, IAM, IoT, AI, ML, authentication, models, policies, healthcare
Procedia PDF Downloads 22516 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability
Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola
Abstract:
Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.Keywords: data, employee, malware, work place
Procedia PDF Downloads 383515 Experiences and Challenges of Menstruation Among Rural Schoolgirls in Ghana: A Case of Nadowli-Kaleo District in the Upper West Region of Ghana
Authors: Rosemond Mbii
Abstract:
Menstruation is a critical topic. However normal menstruation is, it has become a determinant in the education of young women today. The research focuses on Breaking the silence and accessing menstrual hygiene management's challenges and experiences among rural schoolgirls in Ghana. The study's goal was to examine the menstrual hygiene practices of female students. Participants described their menstrual hygiene practices, their problems, and how they coped with their menstrual symptoms. The research used a qualitative technique through group interviews, personal interviews, and open-ended questionnaires since it is easier to understand a phenomenon from the subject's viewpoint. Sen's capacities approach and Feminist Political Ecology (FPE) were used to analyze the data. Menstruation was known to girls even before their menarche. A mother or grandmother, friends, and teachers were the primary sources of menstrual knowledge. The study also found that most girls use sanitary products made of fabrics, pads, and cotton during menstruation. Among the difficulties the girls faced, the study found were emotional upset, physical discomfort (cramps in the stomach, fatigue), embarrassment, and inadequate sanitation hygiene facilities. The girls wore many garments to avoid leaks; checked their skirts continuously, went to the bathroom with their friends to act as spics while they changed; sat differently on the chairs, and took medicine to reduce period discomfort. Introduction of a health care teacher who supplies sanitary products and medications to girls during school time. Euphemisms as a form of communication amongst girls were all coping mechanisms girls and the school developed. Another finding was that some girls continued to go to school even while having their periods, while others did not. Discomfort and menstruation cramps hampered class participation. In addition, the study revealed insufficient sanitation and hygiene for females to change sanitary products in private and manage menstrual hygiene comfortably.Keywords: MHM (menstrual hygiene management), rural area, sanitation, menstruation, water, schoolgirl, rural area, sanitation, menstruation, water
Procedia PDF Downloads 114514 Supervised Learning for Cyber Threat Intelligence
Authors: Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk
Abstract:
The major aim of cyber threat intelligence (CTI) is to provide sophisticated knowledge about cybersecurity threats to ensure internal and external safeguards against modern cyberattacks. Inaccurate, incomplete, outdated, and invaluable threat intelligence is the main problem. Therefore, data analysis based on AI algorithms is one of the emergent solutions to overcome the threat of information-sharing issues. In this paper, we propose a supervised machine learning-based algorithm to improve threat information sharing by providing a sophisticated classification of cyber threats and data. Extensive simulations investigate the accuracy, precision, recall, f1-score, and support overall to validate the designed algorithm and to compare it with several supervised machine learning algorithms.Keywords: threat information sharing, supervised learning, data classification, performance evaluation
Procedia PDF Downloads 149513 The Legal Position of Criminal Prevention in the Metaverse World
Authors: Andi Intan Purnamasari, Supriyadi, Sulbadana, Aminuddin Kasim
Abstract:
Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research.Keywords: crime, cyber, metaverse, law
Procedia PDF Downloads 149512 Cybersecurity Awareness through Laboratories and Cyber Competitions in the Education System: Practices to Promote Student Success
Authors: Haydar Teymourlouei
Abstract:
Cybersecurity is one of the greatest challenges society faces in an age revolving around technological development. With cyber-attacks on the continuous rise, the nation needs to understand and learn ways that can prevent such attacks. A major contribution that can change the education system is to implement laboratories and competitions into academia. This method can improve and educate students with more hands-on exercises in a highly motivating setting. Considering the fact that students are the next generation of the nation’s workforce, it is important for students to understand concepts not only through books, but also through actual hands-on experiences in order for them to be prepared for the workforce. An effective cybersecurity education system is critical for creating a strong cyber secure workforce today and for the future. This paper emphasizes the need for awareness and the need for competitions and cybersecurity laboratories to be implemented into the education system.Keywords: awareness, competition, cybersecurity, laboratories, workforce
Procedia PDF Downloads 334511 Food Safety Management in Riyadh’s Ministry of Health Hospitals
Authors: A. Alrasheed, I. Connerton
Abstract:
Providing patients with safe meals on a daily basis is one of the challenges in the healthcare sector. In Saudi Arabia matters related to food safety and hygiene have been the heart of the Ministry of Health (MOH) and Saudi Food and Drugs Authority (SFDA). The aim of this study is to examine the causes of inadequate implementation of food safety management systems such as HACCP in Riyadh’s MOH hospitals. By the law, food safety must be managed using a documented, HACCP based approach, and food handlers must be appropriately trained in food safety. Food handlers in Saudi Arabia are not required to provide a certificate or attend a food handling training course even in healthcare sectors. Since food safety and hygiene issues are of increasing importance for Saudi Arabian health decision makers, the SFDA has been established to apply food hygiene requirements in all food operations. It should be pointed out that the implications of food outbreaks on the whole society may potentially go beyond individual health impacts but also impact on the Nation’s health and bring about economic repercussions.Keywords: food safety, patient, hospital, HACCP
Procedia PDF Downloads 872