Search results for: security risk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8323

Search results for: security risk

7423 “It Just Feels Risky”: Intuition vs Evidence in Child Sexual Abuse Cases. Proposing an Empirically Derived Risk and Protection Protocol

Authors: Christian Perrin, Nicholas Blagden, Louise Allen, Sarah Impey

Abstract:

Social workers in the UK and professionals globally are faced with a particular challenge when dealing with allegations of child sexual abuse (CSA) in the community. In the absence of a conviction or incontestable evidence, staff can often find themselves unable to take decisive action to remove a child from harm, even though there may be a credible threat to their welfare. Conversely, practitioners may over-calculate risk through fear of being accountable for harm. This is, in part, due to the absence of a structured and evidence-based risk assessment tool which can predict the likelihood of a person committing child sexual abuse. Such assessments are often conducted by forensic professionals who utilise offence-specific data and personal history information to calculate risk. In situations where only allegations underpin a case, this mode of assessment is not viable. There are further ethical issues surrounding the assessment of risk in this area which require expert consideration and sensitive planning. This paper explores this entangled problem extant in the wider call to prevent sexual and child sexual abuse in the community. To this end, 32 qualitative interviews were undertaken with social workers dealing with CSA cases. Results were analysed using thematic analysis and operationalised to formulate a risk and protection protocol for use in case management. This paper reports on the early findings associated with the initial indications of protocol reliability. Implications for further research and practice are discussed.

Keywords: sexual offending, child sexual offence, offender rehabilitation, risk assessment, offence prevention

Procedia PDF Downloads 101
7422 Copula Markov Switching Multifractal Models for Forecasting Value-at-Risk

Authors: Giriraj Achari, Malay Bhattacharyya

Abstract:

In this paper, the effectiveness of Copula Markov Switching Multifractal (MSM) models at forecasting Value-at-Risk of a two-stock portfolio is studied. The innovations are allowed to be drawn from distributions that can capture skewness and leptokurtosis, which are well documented empirical characteristics observed in financial returns. The candidate distributions considered for this purpose are Johnson-SU, Pearson Type-IV and α-Stable distributions. The two univariate marginal distributions are combined using the Student-t copula. The estimation of all parameters is performed by Maximum Likelihood Estimation. Finally, the models are compared in terms of accurate Value-at-Risk (VaR) forecasts using tests of unconditional coverage and independence. It is found that Copula-MSM-models with leptokurtic innovation distributions perform slightly better than Copula-MSM model with Normal innovations. Copula-MSM models, in general, produce better VaR forecasts as compared to traditional methods like Historical Simulation method, Variance-Covariance approach and Copula-Generalized Autoregressive Conditional Heteroscedasticity (Copula-GARCH) models.

Keywords: Copula, Markov Switching, multifractal, value-at-risk

Procedia PDF Downloads 161
7421 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 449
7420 A Study on Leaching of Toxic Elements of High Strength Concrete Containing Waste Cathode Ray Tube Glass as Coarse Aggregate

Authors: Nurul Noraziemah Mohd Pauzi, Muhammad Fauzi Mohd Zain

Abstract:

The rapid advance in the electronic industry has led to the increase amount of the waste cathode ray tube (CRT) devices. The management of CRT waste upon disposal haves become a major issue of environmental concern as it contains toxic elements (i.e. lead, barium, zinc, etc.) which has a risk of leaching if it is not managed appropriately. Past studies have reported regarding the possible use of CRT glass as a part of aggregate in concrete production. However, incorporating waste CRT glass may present an environmental risk via leachability of toxic elements. Accordingly, the preventive measures for reducing the risk was proposed. The current work presented the experimental results regarding potential leaching of toxic elements from four types of concrete mixed, each compromising waste CRT glass as coarse aggregate with different shape and properties. Concentrations of detected elements are measure in the leachates by using atomic absorption spectrometry (AAS). Results indicate that the concentration of detected elements were found to be below applicable risk, despite the higher content of toxic elements in CRT glass. Therefore, the used of waste CRT glass as coarse aggregate in hardened concrete does not pose any risk of leachate of heavy metals to the environment.

Keywords: recycled CRT glass, coarse aggregate, physical properties, leaching, toxic elements

Procedia PDF Downloads 349
7419 Volatility Transmission among European Bank CDS

Authors: Aida Alemany, Laura Ballester, Ana González-Urteaga

Abstract:

From 2007 subprime crisis to the recent Eurozone debt crisis the European banking industry has experienced a terrible financial instability situation with increasing levels of CDS spreads (used as a proxy of credit risk). This paper investigates whether volatility transmission channels in European banking markets have changed after three significant crises’ events during the period January 2006 to March 2013. The global financial crisis is characterized by a unidirectional volatility shocks spillovers effect in credit risk from inside to outside the Eurozone. By contrast, the Eurozone debt crisis is revealed to be local in nature with the euro as the key element suggesting a market fragmentation between distressed peripheral and non-distressed core Eurozone countries, whereas retaining the local currency have acted as a firewall. With these findings we are able to shed light on the impact of the different crises on the European banking credit risk dynamics.

Keywords: CDS spreads, credit risk, volatility spillovers, financial crisis

Procedia PDF Downloads 464
7418 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: embedded computing, internet of things, mobile computing, wireless technologies

Procedia PDF Downloads 308
7417 Contagious Corporate Reputation Risk: Uncovering the Pandemic’s Impact

Authors: Yawen Xia, Rubi Yang, Jing Zhao

Abstract:

By using the Reputation Risk Index (RRI) to measure company environmental, social, and governance (ESG) activities, this research studies firms’ ESG comovement with their industry and local peers. This comovement is attenuated during the Covid-19 pandemic. Further analysis shows that corporate governance plays an important role in comovement decrease. We classify companies by region (city, state, region) and industry and calculate the average RRI of companies of the same type. We run separate regressions to test 1) industry comovement; 2) local comovement; 3) Covid-19 pandemic and reputation risk comovement; 4) corporate governance and reputation risk comovement. Our findings are consistent with previous literature that companies follow their industry and local counterparts in engaging in irresponsible activities and reducing ESG engagement. We speculate Covid shock led to a reduction in social activities and information sharing among enterprise managers, and comovement between enterprises, as a result, decreased during the pandemic.

Keywords: ESG, Covid, peer pressure, local comovement, corporate governance

Procedia PDF Downloads 123
7416 The Effects of Weather Events and Land Use Change on Urban Ecosystems: From Risk to Resilience

Authors: Szu-Hua Wang

Abstract:

Urban ecosystems, as complex coupled human-environment systems, contain abundant natural resources for breeding natural assets and, at the same time, attract urban assets and consume natural resources, triggered by urban development. Land use change illustrates the interaction between human activities and environments factually. However, IPCC (2014) announces that land use change and urbanization due to human activities are the major cause of climate change, leading to serious impacts on urban ecosystem resilience and risk. For this reason, risk assessment and resilience analysis are the keys for responding to climate change on urban ecosystems. Urban spatial planning can guide urban development by land use planning, transportation planning, and environmental planning and affect land use allocation and human activities by building major constructions and protecting important national land resources simultaneously. Urban spatial planning can aggravate climate change and, on the other hand, mitigate and adapt climate change. Research on effects of spatial planning on land use change and climate change is one of intense issues currently. Therefore, this research focuses on developing frameworks for risk assessment and resilience analysis from the aspect of ecosystem based on typhoon precipitation in Taipei area. The integrated method of risk assessment and resilience analysis will be also addressed for applying spatial planning practice and sustainable development.

Keywords: ecosystem, land use change, risk analysis, resilience

Procedia PDF Downloads 409
7415 Challenges of Domestic Water Security for Sustainable Development in North Central Belt of Nigeria

Authors: Samuel Ibbi Ibrahim, Isaiah Ndalassan Ibrahim

Abstract:

Accessibility and availability of good quality water have become a major concern among different users. This paper examines the caustic importance of water security in relation to people’s desire for survival. It observed the democratic ideology of national policy on domestic water supply and demand and its implementation for national and societal development. It used analogy on equilibrium approach to ascertain the household water security. In most communities, it is glaring that several public water management in operation for several years are hardly performing efficiently to reach equilibrium demand. Moreover most settlements being rural or urban lack effective public water system that could ensure regular supplies to the population. The terrain and gradual declining of efficient rainfall northward poses great challenge to the region in managing water supply and demand adequately. This study itemized the need for the government to get clear strategy for a sustainable development on better water efficiency. Partnership in providing workable policy on water security is considered apparently important. It is also suggested that water plant treatment should be established in every medium-sized towns in the country.

Keywords: good quality of water, water accessibility, water availability, water sustainable

Procedia PDF Downloads 519
7414 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 321
7413 Knowledge of Sexually Transmitted Infections and Socio-Demographic Factors Affecting High Risk Sex among Unmarried Youths in Nigeria

Authors: Obasanjo Afolabi Bolarinwa

Abstract:

This study assesses the levels of knowledge of sexually transmitted infections among unmarried youths in Nigeria; examines the pattern of high risk sex among unmarried youths in Nigeria; investigate the socio-demographic factors (age, place of residence, religion, level of education, wealth index and employment status) affecting the practice of high-risk sexual behaviour and ascertain the relationships between knowledge of sexually transmitted infections and practice of high risk sex. The goal of the study is to identify the factors associated with the practice of high risk sex among youth. These were with a view to identifying critical actions needed to reduce high risk sexual behaviour among youths. The study employed secondary data. The data for the study were extracted from the 2013 Nigeria Demographic and Health Survey (NDHS). The 2013 NDHS collected information from 38,948 Women ages 15-49 years and 17,359 men ages 15-49. A total of 7,744 female and 6,027 male respondents were utilized in the study. In order to adjust for the effect of oversampling of the population, the weighting factor provided by Measure DHS was applied. The data were analysed using frequency distribution and logistic regression. The results show that both male (92.2%) and female (93.6%) have accurate knowledge of sexually transmitted infections. The study also revealed that prevalence of high risk sexual behavior is high among Nigerian youths; this is evident as 77.7% (female) and 78.4% (male) are engaging in high risk sexual behavior. The bivariate analysis shows that age of respondent (χ2=294.2; p < 0.05), religion (χ2=136.64; p < 0.05), wealth index (χ2=17.38; p < 0.05), level of education (χ2=34.73; p < 0.05) and employment status (χ2=94.54; p < 0.05) were individual factors significantly associated with high risk sexual behaviour among male while age of respondent (χ2=327.07; p < 0.05), place of residence (χ2=6.71; p < 0.05), religion (χ2=81.04; p < 0.05), wealth index (χ2=7.41; p < 0.05), level of education (χ2=18.12; p < 0.05) and employment status (χ2=51.02; p < 0.05) were individual factors significantly associated with high risk sexual behaviour among female. Furthermore, the study shows that there is a relationship between knowledge of sexually transmitted infections and high risk sex among male (χ2=38.32; p < 0.05) and female (χ2=18.37; p < 0.05). At multivariate level, the study revealed that individual characteristics such as age, religion, place of residence, wealth index, levels of education and employment status were statistically significantly related with high risk sexual behaviour among male and female (p < 0.05). Lastly, the study shows that knowledge of sexually transmitted infection was significantly related to high risk sexual behaviour among youths (p < 0.05). The study concludes that there is a high level of knowledge of sexually transmitted infections among unmarried youths in Nigeria. The practice of high risk sex is high among unmarried youths but higher among male youths. The prevalence of high risk sexual activity is higher for males when they are at disadvantage and higher for females when they are at advantage. Socio-demographic factors like age of respondents, religion, wealth index, place of residence, employment status and highest level of education are factors influencing high risk sexual behaviour among youths.

Keywords: high risk sex, wealth index, sexual behaviour, knowledge

Procedia PDF Downloads 250
7412 Terrorism: A Threat in Constant Evolution Still Misunderstood

Authors: M. J. Gazapo Lapayese

Abstract:

It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.

Keywords: responses, resilience, security, terrorism

Procedia PDF Downloads 450
7411 The Implementation of Strengthening Institutional Model of Women Farmers Group in Developing Household Food Security

Authors: Rahmadanih, Sitti Bulkis, A. Amrullah, R. M. Rukka, N. M. Viantika

Abstract:

Food security is still a global issue, including in Indonesia. In South Sulawesi, this issue also occurs in members of farmer groups/women farmer groups. This study aims to (1) describe the implementation of strengthening institutional model of Women Farmer Groups (WFG) and (2) analyzing the capacity building of WFG members in order to develop food security after the implementations on institutional model. The research was conducted in Bulukumba and Luwu Utara District, South Sulawesi, Indonesia. The research was designed with qualitative and quantitative (mixed) method. Qualitative data were collected through in-depth interview and Focus Group Discussion (FGD); while quantitative data collected through a household survey of WGF members. Two WGF were selected they are WFG in Bulukumba and WGF in Luwu Utara District. Both WGF has been selected as the case unit, which consisting of 60 households. Institutional strengthening model that been implemented is a combination model of (1) institutional support and (2) capacity development of WGF members. The model of institutional support aim is to develop food security could be achieved through facilitation on produce banana chips (initiate a business group formation) and preparation of institution rule (AD/ART). (2) The developing Model of WFG members capacity building are (a) technical training of banana chips producing process, also food and nutrition counseling as well as the utilization of the yard, (b) processing of food products from their yards. Food and nutrition knowledge of WFG members was increased about 30% - 60% and accompanied by the development of households’ food security by 6.7% - 10.0%.; when compared to last year percentage.

Keywords: food security, institutional strengthening, model implementation, women farmer group

Procedia PDF Downloads 174
7410 Health Risk Assessment According to Exposure with Heavy Metals and Physicochemical Parameters; Water Quality Index and Contamination Degree Evaluation in Bottled Water

Authors: Samaneh Abolli, Mahmood Alimohammadi

Abstract:

The survey analyzed 71 bottled water brands in Tehran, Iran, examining 10 physicochemical parameters and 16 heavy metals. The water quality index (WQI) approach was used to assess water quality, and methods such as carcinogen risk (CR) and hazard index (HI) were employed to evaluate health risks. The results indicated that the bottled water had good quality overall, but some brands were of poor or very poor quality. The study also revealed significant human health risks, especially for children, due to the presence of minerals and heavy metals in bottled water. Correlation analyses and risk assessments for various substances were conducted, providing valuable insights into the potential health impacts of the analyzed bottled water.

Keywords: bottled wate, rwater quality index, health risk assessment, contamination degree, heavy metal evaluation index

Procedia PDF Downloads 45
7409 Risk-Based Regulation as a Model of Control in the South African Meat Industry

Authors: R. Govender, T. C. Katsande, E. Madoroba, N. M. Thiebaut, D. Naidoo

Abstract:

South African control over meat safety is managed by the Department of Agriculture, Forestry and Fisheries (DAFF). Veterinary services department in each of the nine provinces in the country is tasked with overseeing the farm and abattoir segments of the meat supply chain. Abattoirs are privately owned. The number of abattoirs over the years has increased. This increase has placed constraints on government resources required to monitor these abattoirs. This paper presents empirical research results on the hygienic processing of meat in high and low throughout abattoirs. This paper presents a case for the adoption of risk-based regulation as a method of government control over hygiene and safe meat processing at abattoirs in South Africa. Recommendations are made to the DAFF regarding policy considerations on risk-based regulation as a model of control in South Africa.

Keywords: risk-based regulation, abattoir, food control, meat safety

Procedia PDF Downloads 304
7408 Cash Management in a Cashless Economy of a Developing Nation, Problems and Prospects: Nigeria a Case Study

Authors: Ossai Paulinus Edwin

Abstract:

Cash Management is a broad area having to do with the collection, concentration and disbursement of cash including measuring the level of liquidity and managing the cash balance and Short-Term Investments. Cash Management involves the efficient collection and disbursement of cash and cash equivalents. It also includes management of marketable securities because, in modern Terminology, money comprises marketable securities and actual cash in hand or in a bank. This cash management is concerned with management of cash inflow and cash outflow of a business especially as it concerns a developing nation like Nigeria. The paper throws light on the impact of cashless policy in Nigeria as it was introduced by the Central Bank of Nigeria (CBN) in December 2011 and was kick started in Lagos in January 2012. Survey research was adopted with the questionnaires as data collection instrument. Responses show that cashless policy if adopted generally shall increase employment opportunities, reduce cash related robbery thereby reducing risk of carrying cash; it shall also reduce cash related corruption and attract more foreign investors to the country. It is expected that the introduction of cashless policy in Nigeria is a step in the right direction as it shall bring about modernization of Nigeria payment system, reduction in the cost of banking services, reduction in high security and safety risk and also curb banking related corruptions.

Keywords: cashless economy, cash management, cashless policy, e-banking, Nigeria

Procedia PDF Downloads 382
7407 The Analysis of the Challenge China’s Energy Transition Faces and Proposed Solutions

Authors: Yuhang Wang

Abstract:

As energy is vital to industrial productivity and human existence, ensuring energy security becomes a critical government responsibility. The Chinese government has implemented the energy transition to safeguard China’s energy security. Throughout this progression, the Chinese government has faced numerous obstacles. This article seeks to describe the causes of China’s energy transition barriers and the steps taken by the Chinese government to overcome them.

Keywords: energy transition, energy market, fragmentation, path dependency

Procedia PDF Downloads 91
7406 An Application of Extreme Value Theory as a Risk Measurement Approach in Frontier Markets

Authors: Dany Ng Cheong Vee, Preethee Nunkoo Gonpot, Noor Sookia

Abstract:

In this paper, we consider the application of Extreme Value Theory as a risk measurement tool. The Value at Risk, for a set of indices, from six Stock Exchanges of Frontier markets is calculated using the Peaks over Threshold method and the performance of the model index-wise is evaluated using coverage tests and loss functions. Our results show that 'fat-tailedness' alone of the data is not enough to justify the use of EVT as a VaR approach. The structure of the returns dynamics is also a determining factor. This approach works fine in markets which have had extremes occurring in the past thus making the model capable of coping with extremes coming up (Colombo, Tunisia and Zagreb Stock Exchanges). On the other hand, we find that indices with lower past than present volatility fail to adequately deal with future extremes (Mauritius and Kazakhstan). We also conclude that using EVT alone produces quite static VaR figures not reflecting the actual dynamics of the data.

Keywords: extreme value theory, financial crisis 2008, value at risk, frontier markets

Procedia PDF Downloads 271
7405 Impact of Perceived Racial Discrimination on Health Risk Behaviors and Experiences of BIPOC Adolescents

Authors: Tya M. Arthur

Abstract:

Purpose: BIPOC (Black, Indigenous, and People of Color) adolescents face racism and discrimination at a young age. These early experiences have short- and long-term impacts on their health and overall well-being. The purpose of this study was to determine the relationships between perceived racial discrimination at school and health risk behaviors and experiences of BIPOC adolescents. Methods: Data from the 2021 Adolescent Behaviors and Experiences Survey (ABES) were analyzed. All demographic data were summarized using frequencies and chi-squared tests. A univariate and multivariate logistic regression model was used to test the relationship between perceived racial discrimination and selected health risk factors. All analyses were conducted using STATA SE 18. Results: A total of 42.2% of the BIPOC adolescents in the study indicated being treated unfairly at school due to their race. The majority of those who reported being discriminated against were Black/African American or Multiple Race-Hispanic. Asian adolescents were almost 5 times more likely to face racial discrimination at school compared to their American Indian/Alaska Native counterparts (OR = 4.86, 95% CI [2.69-8.77], p < 0.001). Other risk predictors of racial discrimination included being female (OR = 1.38, 95% CI [1.13-1.68], p = 0.002) and feeling disconnected at school (OR = 1.76, 95% CI [1.30-2.38], p < 0.001). After adjustment for health risk behaviors and experiences, BIPOC adolescents were still more likely to face racial discrimination with even higher odds. Conclusions: The results of this study highlight the depth of racial discrimination faced by BIPOC adolescents at school. Greater attention should be placed on racial discrimination as a social determinant of health and a public health crisis.

Keywords: racial discrimination, adolescents, heath risk factors, BIPOC

Procedia PDF Downloads 72
7404 Household Perspectives and Resistance to Preventive Relocation in Flood Prone Areas: A Case Study in the Polwatta River Basin, Southern Sri Lanka

Authors: Ishara Madusanka, So Morikawa

Abstract:

Natural disasters, particularly floods, pose severe challenges globally, affecting both developed and developing countries. In many regions, especially Asia, riverine floods are prevalent and devastating. Integrated flood management incorporates structural and non-structural measures, with preventive relocation emerging as a cost-effective and proactive strategy for areas repeatedly impacted by severe flooding. However, preventive relocation is often hindered by economic, psychological, social, and institutional barriers. This study investigates the factors influencing resistance to preventive relocation and evaluates the role of flood risk information in shaping relocation decisions through risk perception. A conceptual model was developed, incorporating variables such as Flood Risk Information (FRI), Place Attachment (PA), Good Living Conditions (GLC), and Adaptation to Flooding (ATF), with Flood Risk Perception (FRP) serving as a mediating variable. The research was conducted in Welipitiya in the Polwatta river basin, Matara district, Sri Lanka, a region experiencing recurrent flood damage. For this study, an experimental design involving a structured questionnaire survey was utilized, with 185 households participating. The treatment group received flood risk information, including flood risk maps and historical data, while the control group did not. Data were collected in 2023 and analyzed using independent sample t-tests and Partial Least Squares Structural Equation Modeling (PLS-SEM). PLS-SEM was chosen for its ability to model latent variables, handle complex relationships, and suitability for exploratory research. Multi-group Analysis (MGA) assessed variations across different flood risk areas. Findings indicate that flood risk information had a limited impact on flood risk perception and relocation decisions, though its effect was significant in specific high-risk areas. Place attachment was a significant factor influencing relocation decisions across the sample. One potential reason for the limited impact of flood risk information on relocation decisions could be the lack of specificity in the information provided. The results suggest that while flood risk information alone may not significantly influence relocation decisions, it is crucial in specific contexts. Future studies and practitioners should focus on providing more detailed risk information and addressing psychological factors like place attachments to enhance preventive relocation efforts.

Keywords: flood risk communication, flood risk perception, place attachment, preventive relocation, structural equation modeling

Procedia PDF Downloads 17
7403 Prevalence of High Risk Human Papillomavirus in Cervical Dysplasia and Cancer Samples from Twin Cities in Pakistan

Authors: Sana Gul, Sheeba Murad, Aneela Javed

Abstract:

Introduction: Human Papilloma Virus (HPV) is small DNA virus mostly infecting mucosa and cutaneous keratinocytes. So far, more than 200 Human papillomaviruses are known. HPV have been divided into high- and low-risk on the basis of their oncogenic potential. High risk HPV is considered to be the main etiological cause for cervical cancer. Objective: Current study was designed to screen the local cervical cancer patients from the twin cities of Pakistan for the occurance of high risk HPV. Methodology: A total of 67 formalin fixed paraffin-embedded samples of cervical cancer biopsies were obtained from the government hospitals in Islamabad and Rawalpindi. Cervical cancer biopsies were examined for the presence of HPV DNA. Polymerase chain reaction (PCR) was used for the amplification of a region in the HPV-L1 gene for the general detection of the Papilloma virus and for the genotype specific detection of high risk HPV 16 and 18 using the GP5/GP6 primers and genotype specific primers respectively. Results: HPV DNA was detected in 59 out of 67 samples analyzed. 30 samples showed the presence of HPV16 while 22 samples were positive for HPV 18 . HPV subtype could not be determined in 7 samples. Conclusion: Our results show a strong association between HPV infection and cervical cancer among women in twin cities of Pakistan. One way to minimize the disease burden in relation to HPV infection in Pakistani population is the use of prophylactic vaccines and routine screening. An early diagnosis of HPV infection will allow better health management to reduce the risk of developing cervical cancer.

Keywords: cervical cancer, Pakistan, human papillomavirus, HPV 16

Procedia PDF Downloads 331
7402 Structural Vulnerability of Banking Network – Systemic Risk Approach

Authors: Farhad Reyazat, Richard Werner

Abstract:

This paper contributes to the existent literature by developing a framework that explains how to monitor potential threats to banking sector stability. The study explores structural vulnerabilities at the country level, but also look at bilateral exposures within a network context. The study contributes in analysing of the European banking systemic risk at aggregated level, which integrates the characteristics of bank size, and interconnectedness relative to the size of the economy which ultimate risk belong to, taking to account the concentration ratio of the banking industry within the whole economy. The nature of the systemic risk depends on the interplay of the network topology with the nature of financial transactions over the network, assets and buffer stemming from bank size, correlations, and the nature of the shocks to the financial system. The study’s results illustrate the contribution of banks’ size, size of economy and concentration of counterparty exposures to a given country’s banks in explaining its systemic importance, how much the banking network depends on a few traditional hubs activities and the changes of this dependencies over the last 9 years. The role of few of traditional hubs such as Swiss banks and British Banks and also Irish banks- where the financial sector is fairly new and grew strongly between 1990s till 2008- take the fourth position on 2014 reducing the relative size since 2006 where they had the first position. In-degree concentration index analysis in the study shows concentration index of banking network was not changed since financial crisis 2007-8. In-degree concentration index on first quarter of 2014 indicates that US, UK and Germany together, getting over 70% of the network exposures. The result of comparing the in-degree concentration index with 2007-4Q, shows the same group having over 70% of the network exposure, however the UK getting more important role in the hub and the market share of US and Germany are slightly diminished.

Keywords: systemic risk, counterparty risk, financial stability, interconnectedness, banking concentration, european banks risk, network effect on systemic risk, concentration risk

Procedia PDF Downloads 486
7401 Value at Risk and Expected Shortfall of Firms in the Main European Union Stock Market Indexes: A Detailed Analysis by Economic Sectors and Geographical Situation

Authors: Emma M. Iglesias

Abstract:

We have analyzed extreme movements of the main stocks traded in the Eurozone in the 2000-2012 period. Our results can help future very-risk-averse investors to choose their portfolios in the Eurozone for risk management purposes. We find two main results. First, we can clearly classify firms by economic sector according to their different estimated VaR values in five of the seven countries we analyze. In special, we find sectors in general where companies have very high (telecommunications and banking) and very low (petroleum, utilities, energy and consumption) estimated VaR values. Second, we only find differences according to the geographical situation of where the stocks are traded in two countries: (1) all firms in the Irish stock market (the only financially rescued country we analyze) have very high estimated VaR values in all sectors; while (2) in Spain all firms have very low estimated VaR values including in the banking and the telecommunications sectors. All our results are supported when we study also the expected shortfall of the firms.

Keywords: risk management, firms, pareto tail thickness parameter, GARCH-type models, value-at-risk, extreme value theory, heavy tails, stock indexes, eurozone

Procedia PDF Downloads 365
7400 Risk Management Approach for Lean, Agile, Resilient and Green Supply Chain

Authors: Benmoussa Rachid, Deguio Roland, Dubois Sebastien, Rasovska Ivana

Abstract:

Implementation of LARG (Lean, Agile, Resilient, Green) practices in the supply chain management is a complex task mainly because ecological, economical and operational goals are usually in conflict. To implement these LARG practices successfully, companies’ need relevant decision making tools allowing processes performance control and improvement strategies visibility. To contribute to this issue, this work tries to answer the following research question: How to master performance and anticipate problems in supply chain LARG practices implementation? To answer this question, a risk management approach (RMA) is adopted. Indeed, the proposed RMA aims basically to assess the ability of a supply chain, guided by “Lean, Green and Achievement” performance goals, to face “agility and resilience risk” factors. To proof its relevance, a logistics academic case study based on simulation is used to illustrate all its stages. It shows particularly how to build the “LARG risk map” which is the main output of this approach.

Keywords: agile supply chain, lean supply chain, green supply chain, resilient supply chain, risk approach

Procedia PDF Downloads 304
7399 Salter Pelvic Osteotomy for the Treatment of Developmental Dysplasia of the Hip: Assessment of Postoperative Results and Risk Factors

Authors: Suvorov Vasyl, Filipchuk Viktor

Abstract:

Background: If non-surgical treatment of developmental dysplasia of the hip (DDH) fails or if DDH is late-detected, surgery is necessary. Salter pelvic osteotomy (SPO) is an effective surgical option for such cases. The objectives of this study were to assess the results after SPO, evaluate risk factors, and reveal those radiological parameters that may correlate with the results. Mid- and long-term postoperative results after SPO in 17 patients (22 hip joints) were analyzed. Risk factors included those that do not depend on the surgeon (patient's age, value of the acetabular index (AI) preoperatively, DDH Tonnis grade) and those that depend on the surgeon (amount of AI correction). To radiological parameters which may correlate with the amount of AI correction, we referred distance "d" and the lateral rotation angle. Results: SPO allows performing AI correction in ranges 24.1 ± 6.5°. Excellent and good clinical results were obtained in 95.5% of patients; excellent and good radiological results in 86.4% of patients. Risk factors that do not depend on the surgeon were older patient’s age and higher preoperative AI values (p < 0.05). The risk factor that depends on the surgeon was the amount of AI correction (p < 0.05). The distance "d" was recognized as a radiological parameter that may indicate sufficient AI correction (p < 0.05). Conclusion: In older patients with a higher preoperative AI value, the results will be predictably worse. The surgeon may influence the result with a greater amount of AI correction (which may also be indicated radiologically by the distance "d" values).

Keywords: developmental dysplasia of the hip, results, risk factor, pelvic osteotomy, salter osteotomy

Procedia PDF Downloads 120
7398 Risk Assessment of Oil Spill Pollution by Integration of Gnome, Aloha and Gis in Bandar Abbas Coast, Iran

Authors: Mehrnaz Farzingohar, Mehran Yasemi, Ahmad Savari

Abstract:

The oil products are imported and exported via Rajaee’s tanker terminal. Within loading and discharging in several cases the oil is released into the berths and made oil spills. The spills are distributed within short time and seriously affected Rajaee port’s environment and even extended areas. The trajectory and fate of oil spills investigated by modeling and parted by three risk levels base on the modeling results. First GNOME (General NOAA Operational Modeling Environment) applied to trajectory the liquid oil. Second, ALOHA (Areal Location Of Hazardous Atmosphere) air quality model, is integrated to predict the oil evaporation path within the air. Base on the identified zones the high risk areas are signed by colored dots which their densities calculated and clarified on a map which displayed the harm places. Wind and water circulation moved the pollution to the East of Rajaee Port that accumulated about 12 km of coastline. Approximately 20 km of north east of Qeshm Island shore is covered by the three levels of risky areas. Since the main wind direction is SSW the pollution pushed to the east and the highest risk zones formed on the crests edges hence the low risk appeared on the concavities. This assessment help the management and emergency systems to monitor the exposure places base on the priority factors and find the best approaches to protect the environment.

Keywords: oil spill, modeling, pollution, risk assessment

Procedia PDF Downloads 383
7397 Culture Dimensions of Information Systems Security in Saudi Arabia National Health Services

Authors: Saleh Alumaran, Giampaolo Bella, Feng Chen

Abstract:

The study of organisations’ information security cultures has attracted scholars as well as healthcare services industry to research the topic and find appropriate tools and approaches to develop a positive culture. The vast majority of studies in Saudi national health services are on the use of technology to protect and secure health services information. On the other hand, there is a lack of research on the role and impact of an organisation’s cultural dimensions on information security. This research investigated and analysed the role and impact of cultural dimensions on information security in Saudi Arabia health service. Hypotheses were tested and two surveys were carried out in order to collect data and information from three major hospitals in Saudi Arabia (SA). The first survey identified the main cultural-dimension problems in SA health services and developed an initial information security culture framework model. The second survey evaluated and tested the developed framework model to test its usefulness, reliability and applicability. The model is based on human behaviour theory, where the individual’s attitude is the key element of the individual’s intention to behave as well as of his or her actual behaviour. The research identified six cultural dimensions: Saudi national culture, Saudi health service leadership, employees’ trust, technology, multicultural interactions and employees’ job roles. The research also identified a set of cultural sub-dimensions. These include working values and norms, tribe values and norms, attitudes towards women, power sharing, vision, social interaction, respect and understanding, hospital intra-net, hospital employees’ language(s) used, multi-national culture, communication system, employees’ job satisfaction and job security. The research identified that (a) the human behaviour towards medical information in SA is one of the main threats to information security and one of the main challenges to SA health authority, (b) The current situation of SA hospitals’ IS cultures is falling short in protecting medical information due to the current value and norms towards information security, (c) Saudi national culture and employees’ job role are the main dimensions playing major roles in the employees’ attitude, and technology is the least important dimension playing a role in the employees’ attitudes.

Keywords: cultural dimension, electronic health record, information security, privacy

Procedia PDF Downloads 347
7396 The Integrated Methodological Development of Reliability, Risk and Condition-Based Maintenance in the Improvement of the Thermal Power Plant Availability

Authors: Henry Pariaman, Iwa Garniwa, Isti Surjandari, Bambang Sugiarto

Abstract:

Availability of a complex system of thermal power plant is strongly influenced by the reliability of spare parts and maintenance management policies. A reliability-centered maintenance (RCM) technique is an established method of analysis and is the main reference for maintenance planning. This method considers the consequences of failure in its implementation, but does not deal with further risk of down time that associated with failures, loss of production or high maintenance costs. Risk-based maintenance (RBM) technique provides support strategies to minimize the risks posed by the failure to obtain maintenance task considering cost effectiveness. Meanwhile, condition-based maintenance (CBM) focuses on monitoring the application of the conditions that allow the planning and scheduling of maintenance or other action should be taken to avoid the risk of failure prior to the time-based maintenance. Implementation of RCM, RBM, CBM alone or combined RCM and RBM or RCM and CBM is a maintenance technique used in thermal power plants. Implementation of these three techniques in an integrated maintenance will increase the availability of thermal power plants compared to the use of maintenance techniques individually or in combination of two techniques. This study uses the reliability, risks and conditions-based maintenance in an integrated manner to increase the availability of thermal power plants. The method generates MPI (Priority Maintenance Index) is RPN (Risk Priority Number) are multiplied by RI (Risk Index) and FDT (Failure Defense Task) which can generate the task of monitoring and assessment of conditions other than maintenance tasks. Both MPI and FDT obtained from development of functional tree, failure mode effects analysis, fault-tree analysis, and risk analysis (risk assessment and risk evaluation) were then used to develop and implement a plan and schedule maintenance, monitoring and assessment of the condition and ultimately perform availability analysis. The results of this study indicate that the reliability, risks and conditions-based maintenance methods, in an integrated manner can increase the availability of thermal power plants.

Keywords: integrated maintenance techniques, availability, thermal power plant, MPI, FDT

Procedia PDF Downloads 787
7395 Conceptualizing Conflict in the Gray Zone: A Comparative Analysis of Diplomatic, Military and Political Lenses

Authors: John Hardy, Paul Lushenko

Abstract:

he twenty-first century international security order has been fraught with challenges to the credibility and stability of the post-Cold War status quo. Although the American-led international system has rarely been threatened directly by dissatisfied states, an underlying challenge to the international security order has emerged in the form of a slow-burning abnegation of small but significant aspects of the status quo. Meanwhile, those security challenges which have threatened to destabilize order in the international system have not clearly belonged to the traditional notions of diplomacy and armed conflict. Instead, the main antagonists have been both states and non-state actors, the issues have crossed national and international boundaries, and contestation has occurred in a ‘gray zone’ between peace and war. Gray zone conflicts are not easily categorized as military operations, national security policies or political strategies, because they often include elements of diplomacy, military operations, and statecraft in complex combinations. This study applies three approaches to conceptualizing the gray zone in which many contemporary conflicts take place. The first approach frames gray zone conflicts as a form of coercive diplomacy, in which armed force is used to add credibility and commitment to political threats. The second approach frames gray zone conflicts as a form of discrete military operation, in which armed force is used sparingly and is limited to a specific issue. The third approach frames gray zones conflicts as a form of proxy war, in which armed force is used by or through third parties, rather than directly between belligerents. The study finds that each approach to conceptualizing the gray zone accounts for only a narrow range of issues which fall within the gap between traditional notions of peace and war. However, in combination, all three approaches are useful in explicating the gray zone and understanding the character of contemporary security challenges which defy simple categorization. These findings suggest that coercive diplomacy, discrete military operations, and proxy warfare provide three overlapping lenses for conceptualizing the gray zone and for understanding the gray zone conflicts which threaten international security in the early twenty-first century.

Keywords: gray zone, international security, military operations, national security, strategy

Procedia PDF Downloads 154
7394 CPPI Method with Conditional Floor: The Discrete Time Case

Authors: Hachmi Ben Ameur, Jean Luc Prigent

Abstract:

We propose an extension of the CPPI method, which is based on conditional floors. In this framework, we examine in particular the TIPP and margin based strategies. These methods allow keeping part of the past gains and protecting the portfolio value against future high drawdowns of the financial market. However, as for the standard CPPI method, the investor can benefit from potential market rises. To control the risk of such strategies, we introduce both Value-at-Risk (VaR) and Expected Shortfall (ES) risk measures. For each of these criteria, we show that the conditional floor must be higher than a lower bound. We illustrate these results, for a quite general ARCH type model, including the EGARCH (1,1) as a special case.

Keywords: CPPI, conditional floor, ARCH, VaR, expected ehortfall

Procedia PDF Downloads 297