Search results for: food security status
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8724

Search results for: food security status

7794 Commercialization of Smallholder Rice Producers and Its Determinants in Ethiopia

Authors: Abebaw Assaye, Seiichi Sakurai, Marutama Atsush, Dawit Alemu

Abstract:

Rice is considered as a strategic agricultural commodity targeting national food security and import substitution in Ethiopia and diverse measures are put in place a number of initiatives to ensure the growth and development of rice sector in the country. This study assessed factors that influence smallholder farmers' level of rice commercialization in Ethiopia. The required data were generated from 594 randomly sampled rice producers using multi-stage sampling techniques from four major rice-producing regional states. Both descriptive and econometric methods were used to analyze the data. We adopted the ordered probit model to analyze factors determining output commercialization in the rice market. The ordered probit model result showed that the sex of the household head, educational status of the household head, credit use, proportion of irrigated land cultivated, membership in social groups, and land dedicated to rice production were found to influence significantly and positively the probability of being commercial-oriented. Conversely, the age of the household, total cultivated land, and distance to the main market were found to influence negatively. These findings suggest that promoting productivity-increasing technologies, development of irrigation facilities, strengthening of social institutions, and facilitating access to credit are crucial for enhancing the commercialization of rice in the study area. Since agricultural lands are limited, intensified farming through promoting improved rice technologies and mechanized farming could be an option to enhance marketable surplus and increase level of rice market particicpation.

Keywords: rice, commercialization, Tobit, ordered probit, Ethiopia

Procedia PDF Downloads 78
7793 Impact of Instagram Food Bloggers on Consumer (Generation Z) Decision Making Process in Islamabad. Pakistan

Authors: Tabinda Sadiq, Tehmina Ashfaq Qazi, Hoor Shumail

Abstract:

Recently, the advent of emerging technology has created an emerging generation of restaurant marketing. It explores the aspects that influence customers’ decision-making process in selecting a restaurant after reading food bloggers' reviews online. The motivation behind this research is to investigate the correlation between the credibility of the source and their attitude toward restaurant visits. The researcher collected the data by distributing a survey questionnaire through google forms by employing the Source credibility theory. Non- probability purposive sampling technique was used to collect data. The questionnaire used a predeveloped and validated scale by Ohanian to measure the relationship. Also, the researcher collected data from 250 respondents in order to investigate the influence of food bloggers on Gen Z's decision-making process. SPSS statistical version 26 was used for statistical testing and analyzing the data. The findings of the survey revealed that there is a moderate positive correlation between the variables. So, it can be analyzed that food bloggers do have an impact on Generation Z's decision making process.

Keywords: credibility, decision making, food bloggers, generation z, e-wom

Procedia PDF Downloads 69
7792 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 86
7791 The Sustainability of Farm Forestry Management in Bulukumba Regency, South Sulawesi, Indonesia

Authors: Nuraeni, Suryanti, Saida, Annas Boceng

Abstract:

Farm forestry is a forest where farmers or landowners do cultivation and farming activities on their land. This study aims to determine the dimensions of sustainable development of farm forestry and to analyze the leverage factors to improve the sustainability status of farm forestry management in Bulukumba Regency. This research was conducted in Kajang District, Bulukumba Regency. The analysis of the sustainability of farm forestry management applied Multi-Dimensional Scaling (MDS), a modification of the Rapid Appraisal of The Status of Farming (RAPFARM). The index value of farm forestry sustainability was by 62.01% for ecological dimension, 51.54% for economic dimension, 61.00% for the social and cultural dimension, and 63.24% for legal and institutional dimension with sustainable enough category status. Meanwhile, the index value for the technology and infrastructure was by 47.16% of less sustainable category status. The result of leverage analysis of attributes for the dimensions of ecological, economic, social and cultural, legal and institutional as well as infrastructure and technology afforded twenty-two (22) leverage sensitive factors that influence the sustainability of farm forestry.

Keywords: farm forestry, South Sulawesi, management, sustainability

Procedia PDF Downloads 365
7790 A Review of the Nutritional, Health and Medicinal Benefits of Selected Endangered Food Spice Crops in South Eastern Nigeria

Authors: Poly-Mbah C. P., Offor J. I., Onyeneke E. N., Poly-Mbah J. C.

Abstract:

Many food spice crops are being endangered into extinction in Nigeria because of climate change as well as deforestation occasioned by population pressure and urbanization and also due to neglect of research and agronomic attention. This review was aimed at identifying the nutritional and health benefits of these endangered aromatic food spice crops. The findings of this review will help to popularize their cultivation and increase research efforts made in the agronomy of these food spice species. Nine aromatic food spice crop species identified to be facing the danger of extinction include: Guinea pepper ( Piper guineensis), Utazi ( Gongronema latifolium), Hoary or Thai lemon basil ( Ocimum africanum), Mint basil ( Ocimum gratissimum), Whole country onions( Afrostyrax lepidophyllus), Jansa ( Cussonia bateri), Negro pepper ( Xylopia aethiopica), Ataiko or Orima (Afromomium Danielle), Aidan (Tetrapleura tetraptera). Findings from this review revealed that these species are capable of improving the nutrition and health of the rural dwellers but yet, are minimally cultivated. This paper also reviewed research made in the agronomy of these identified threatened food spice crops in the semi-urban Southeastern Nigeria environment and discovered that there is little research attention on them. The availability of these food spice crop species was discovered to come from collections made from nearby bushes and forests. This paper therefore recommends that agronomic packages such as pre-planting, planting and post-planting requirements be investigated and recommended in order to initiate and increase the cultivation of the selected endangered food spice crops as well as their productivity.

Keywords: review, endangered, food spice crops, South Eastern Nigeria

Procedia PDF Downloads 79
7789 Multidimensional Poverty: A Comparative Study for Vulnerability of Women in Lebanon

Authors: Elif N. Coban

Abstract:

With the political instability that has prevailed in Lebanon since October 2019, followed by a global pandemic and a deepening concurrent economic crisis after the Beirut Port explosion on August 4, 2020, Syrian refugees in Lebanon have struggled to survive what the World Bank has described as one of the worst economic crises in decades. This study aims to assess the vulnerability of Syrian refugee women. It will present a comparative analysis of refugee and Lebanese households using data from Lebanon’s Labour Force and Household Conditions Survey (LFHLCS) and from VASyr surveys, which are comprehensive annual surveys conducted jointly by the United Nations High Commissioner for Refugees (UNHCR), the United Nations Children’s Fund (UNICEF), and the United Nations World Food Programme (WFP). The study adopts an intersectionality-based method, which deals with gender and marginalized communities from many different perspectives, to put forward a gender-oriented approach. Examining the distribution of socioeconomic status among Syrian and Lebanese households might help to understand the disproportionate burdens borne by women. In this context, multidimensional poverty (MP) helps depict fragile communities’ socioeconomic status and allows a fuller grasp the multiple aspects of deprivation. Finally, this understanding may pave the way to more inclusive policy for decision-makers and practitioners working on refugee issues.

Keywords: multidimensional poverty, gender studies, intersectionality, Syrian refugees, Lebanon

Procedia PDF Downloads 115
7788 Study on Health Status and Health Promotion Models for Prevention of Cardiovascular Disease in Asylum Seekers at Asylum Seekers Center, Kupang-Indonesia

Authors: Era Dorihi Kale, Sabina Gero, Uly Agustine

Abstract:

Asylum seekers are people who come to other countries to get asylum. In line with that, they also carry the culture and health behavior of their country, which is very different from the new country they currently live in. This situation raises problems, also in the health sector. The approach taken must also be a culturally sensitive approach, where the culture and habits of the refugee's home area are also valued so that the health services provided can be right on target. Some risk factors that already exist in this group are lack of activity, consumption of fast food, smoking, and stress levels that are quite high. Overall this condition will increase the risk of an increased incidence of cardiovascular disease. This research is a descriptive and experimental study. The purpose of this study is to identify health status and develop a culturally sensitive health promotion model, especially related to the risk of cardiovascular disease for asylum seekers in detention homes in the city of Kupang. This research was carried out in 3 stages, stage 1 was conducting a survey of health problems and the risk of asylum seeker cardiovascular disease, Stage 2 developed a health promotion model, and stage 3 conducted a testing model of health promotion carried out. There were 81 respondents involved in this study. The variables measured were: health status, risk of cardiovascular disease and, health promotion models. Method of data collection: Instruments (questionnaires) were distributed to respondents answered for anamnese health status; then, cardiovascular risk measurements were taken. After that, the preparation of information needs and the compilation of booklets on the prevention of cardiovascular disease is carried out. The compiled booklet was then translated into Farsi. After that, the booklet was tested. Respondent characteristics: average lived in Indonesia for 4.38 years, the majority were male (90.1%), and most were aged 15-34 years (90.1%). There are several diseases that are often suffered by asylum seekers, namely: gastritis, headaches, diarrhea, acute respiratory infections, skin allergies, sore throat, cough, and depression. The level of risk for asylum seekers experiencing cardiovascular problems is 4 high risk people, 6 moderate risk people, and 71 low risk people. This condition needs special attention because the number of people at risk is quite high when compared to the age group of refugees. This is very related to the level of stress experienced by the refugees. The health promotion model that can be used is the transactional stress and coping model, using Persian (oral) and English for written information. It is recommended for health practitioners who care for refugees to always pay attention to aspects of culture (especially language) as well as the psychological condition of asylum seekers to make it easier to conduct health care and promotion. As well for further research, it is recommended to conduct research, especially relating to the effect of psychological stress on the risk of cardiovascular disease in asylum seekers.

Keywords: asylum seekers, health status, cardiovascular disease, health promotion

Procedia PDF Downloads 101
7787 Gender Supportive Systems-Key to Good Governance in Agriculture: Challenges and Strategies

Authors: Padmaja Kaja, Kiran Kumar Gellaboina

Abstract:

A lion’s share of agricultural work is contributed by women in India as it is the case in many developing countries, yet women are not securing the pride as a farmer. Many policies are supporting women empowerment in India, especially in agriculture sector considering the importance of sustainable food security. However these policies many times failed to achieve the targeted results of mainstreaming gender. Implementing the principles of governance would lead to gender equality in agriculture. This paper deals with the social norms and obligations prevailed with reference to Indian context which abstain women from having resources. This paper is formulated by using primary research done in eight districts of Telangana and Andhra Pradesh states of India supported by secondary research. Making amendments to Hindu Succession Act in united Andhra Pradesh much prior to the positioning of the amended act in the whole country lead to a better land holding a share of women in Andhra Pradesh. The policies like registering government distributed lands in the name of women in the state also have an added value. However, the women participation in decision-making process in agriculture is limited in elite families when compared to socially under privileged families, further too it was higher in drought affected districts like Mahbubnagar in Telangana when compared to resource-rich East Godavari district in Andhra Pradesh. Though National Gender Resource Centre for Agriculture (NGRCA) at centre and Gender Cells in the states were established a decade ago, extension reach to the women farmers is still lagging behind. Capturing the strength of women self groups in India especially in Andhra Pradesh to link up with agriculture extension might improve the extension reach of women farmers. Maintenance of micro level women data sets, creating women farmers networks with government departments like agriculture, irrigation, revenue and formal credit institutes would result in good governance to mainstream gender in agriculture. Further to add that continuous monitoring and impact assessments of the programmes and projects for gender inclusiveness would reiterate the government efforts.

Keywords: food security, gender, governance, mainstreaming

Procedia PDF Downloads 243
7786 The Labor Participation–Fertility Trade-off: The Case of the Philippines

Authors: Daphne Ashley Sze, Kenneth Santos, Ariane Gabrielle Lim

Abstract:

As women are now given more freedom and choice to pursue employment, the world’s over-all fertility has been decreasing mainly due to the shift in time allocation between working and child rearing. As such, we study the case of the Philippines, where there exists a decreasing fertility rate and increasing openness for women labor participation. We focused on the distinction between fertility and fecundity, the former being the manifestation of the latter and aim to trace and compare the effects of both fecundity and fertility to women’s employment status through the estimation of the reproduction function and multinomial logistic function. Findings suggest that the perception of women regarding employment opportunities in the Philippines links the negative relationship observed between fertility, fecundity and women’s employment status. Today, there has been a convergence in the traditional family roles of men and women, as both genders now have identical employment opportunities that continue to shape their preferences.

Keywords: multinomial logistic function, tobit, fertility, women employment status, fecundity

Procedia PDF Downloads 599
7785 Multi-Indicator Evaluation of Agricultural Drought Trends in Ethiopia: Implications for Dry Land Agriculture and Food Security

Authors: Dawd Ahmed, Venkatesh Uddameri

Abstract:

Agriculture in Ethiopia is the main economic sector influenced by agricultural drought. A simultaneous assessment of drought trends using multiple drought indicators is useful for drought planning and management. Intra-season and seasonal drought trends in Ethiopia were studied using a suite of drought indicators. Standardized Precipitation Index (SPI), Standardized Precipitation Evapotranspiration Index (SPEI), Palmer Drought Severity Index (PDSI), and Z-index for long-rainy, dry, and short-rainy seasons are used to identify drought-causing mechanisms. The Statistical software package R version 3.5.2 was used for data extraction and data analyses. Trend analysis indicated shifts in late-season long-rainy season precipitation into dry in the southwest and south-central portions of Ethiopia. Droughts during the dry season (October–January) were largely temperature controlled. Short-term temperature-controlled hydrologic processes exacerbated rainfall deficits during the short rainy season (February–May) and highlight the importance of temperature- and hydrology-induced soil dryness on the production of short-season crops such as tef. Droughts during the long-rainy season (June–September) were largely driven by precipitation declines arising from the narrowing of the intertropical convergence zone (ITCZ). Increased dryness during long-rainy season had severe consequences on the production of corn and sorghum. PDSI was an aggressive indicator of seasonal droughts suggesting the low natural resilience to combat the effects of slow-acting, moisture-depleting hydrologic processes. The lack of irrigation systems in the nation limits the ability to combat droughts and improve agricultural resilience. There is an urgent need to monitor soil moisture (a key agro-hydrologic variable) to better quantify the impacts of meteorological droughts on agricultural systems in Ethiopia.

Keywords: autocorrelation, climate change, droughts, Ethiopia, food security, palmer z-index, PDSI, SPEI, SPI, trend analysis

Procedia PDF Downloads 138
7784 Predicting Long-Term Meat Productivity for the Kingdom of Saudi Arabia

Authors: Ahsan Abdullah, Ahmed A. S. Bakshwain

Abstract:

Livestock is one of the fastest-growing sectors in agriculture. If carefully managed, have potential opportunities for economic growth, food sovereignty and food security. In this study we mainly analyse and compare long-term i.e. for year 2030 climate variability impact on predicted productivity of meat i.e. beef, mutton and poultry for the Kingdom of Saudi Arabia w.r.t three factors i.e. i) climatic-change vulnerability ii) CO2 fertilization and iii) water scarcity and compare the results with two countries of the region i.e. Iraq and Yemen. We do the analysis using data from diverse sources, which was extracted, transformed and integrated before usage. The collective impact of the three factors had an overall negative effect on the production of meat for all the three countries, with adverse impact on Iraq. High similarity was found between CO2 fertilization (effecting animal fodder) and water scarcity i.e. higher than that between production of beef and mutton for the three countries considered. Overall, the three factors do not seem to be favorable for the three Middle-East countries considered. This points to possibility of a vegetarian year 2030 based on dependency on indigenous live-stock population.

Keywords: prediction, animal-source foods, pastures, CO2 fertilization, climatic-change vulnerability, water scarcity

Procedia PDF Downloads 317
7783 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications

Authors: Chieh-Fu Chang, Wan-Hsin Hsieh

Abstract:

We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.

Keywords: security, IWE, cliff effect, space communications

Procedia PDF Downloads 421
7782 The Labor Participation-Fertility Trade-Off: Exploring Fecundity and Its Consequences to Women's Employment in the Philippines

Authors: Ariane C. Lim, Daphne Ashley L. Sze, Kenneth S. Santos

Abstract:

As women are now given more freedom and choice to pursue employment, the world’s over-all fertility has been decreasing mainly due to the shift in time allocation between working and child-rearing. As such, we study the case of the Philippines, where there exists a decreasing fertility rate and increasing openness for women labor participation. We focused on the distinction between fertility and fecundity, the former being the manifestation of the latter and aim to trace and compare the effects of both fecundity and fertility to women’s employment status through the estimation of the reproduction function and multinomial logistic function. Findings suggest that the perception of women regarding employment opportunities in the Philippines links the negative relationship observed between fertility, fecundity and women’s employment status. Today, there has been a convergence in the traditional family roles of men and women, as both genders now have identical employment opportunities that continue to shape their preferences.

Keywords: multinomial logistic function, tobit, fertility, women employment status, fecundity

Procedia PDF Downloads 626
7781 Racial and Ethnic Health Disparities: An Investigation of the Relationship between Race, Ethnicity, Health Care Access, and Health Status

Authors: Dorcas Matowe

Abstract:

Inequality in health care for racial and ethnic minorities continues to be a growing concern for many Americans. Some of the barriers hindering the elimination of health disparities include lack of insurance, socioeconomic status (SES), and racism. This study will specifically focus on the association between some of these factors- health care access, which includes insurance coverage and frequency of doctor visits, race, ethnicity, and health status. The purpose of this study will be to address the following questions: is having health insurance associated with increased doctor visits? Are racial and ethnic minorities with health insurance more or less likely to see a doctor? Is the association between having health insurance moderated by being an ethnic minority? Given the current implications of the 2010 Affordable Care Act, this study will highlight the need to prioritize health care access for minorities and confront institutional racism. Critical Race Theory (CRT) will demonstrate how racism has reinforced these health disparities. This quantitative study design will analyze secondary data from the 2015 Behavioral Risk Factor Surveillance System (BRFSS) questionnaire, a telephone survey conducted annually in all 50 states and three US territories by state health departments in conjunction with the Center for Disease Control (CDC). Non-identifying health-related data is gathered annually from over 400,000 adults 18 years and above about their health status and use of preventative services. Through Structural Equation Modeling (SEM), the relationship between the predictor variables of health care access, race, and ethnicity, the criterion variable of health status, and the latent variables of emotional support and life satisfaction will be examined. It is hypothesized that there will be an interaction between certain racial and ethnic minorities who went to see a doctor, had insurance coverage, experienced racism, and the quality of their health status, emotional support, and life satisfaction.

Keywords: ethnic minorities, health disparities, health access, racism

Procedia PDF Downloads 264
7780 Diversification of Indonesian Terasi Shrimp (Acetes indicus) Powder as Alternative and Sustainable Food for the Double Burden of Malnutrition

Authors: Galuh Asri Bestari, Hajar Shofiyya

Abstract:

Double burden of malnutrition (DBM) has been a global problem in these last decades occurs in both developed and developing countries. Overweight in adults and stunting among preschool children have dramatically increased and become the main problems of malnutrition that should be solved immediately since they are directly related with the health status and productivity. Reformulation of food product by using the local sea resources called terasi shrimp (Acetes indicus) has a potential possibility in facing the DBM. A study was carried out in Indonesia to determine the acceptability of terasi shrimp powder through sensory evaluation. Terasi shrimps were processed into powder form through sun drying and pounding methods. The powder form was directly added in food as alternative seasonings and tested among stunted and normal preschool children. Meanwhile, a further processing method is given to the shrimp powder tested in overweight and normal-weighed adults. The shrimp powder was mixed with sago flour and formed into balls, then steamed for 15-20 minutes, and finally served as alternative snacks. Based on the sensory evaluation, the shrimp powder has a good acceptance in taste (54%), shape (60%), and color properties (63%), while the shrimp balls has a good acceptance in size (65%), shape (50%), color (48%), taste (40%), and texture (36%). Terasi shrimp powder can be stored for a month in room temperature. In addition, carried out chemical analysis revealed that terasi shrimp (Acetes indicus) has higher percentage of protein, calcium, and iron than other animal sources, but conversely contains zero sodium and very low percentage of fat. Terasi shrimp’s shell also contains a substance called chitosan which acts by forming gels in the intestinal tract to entrap lipids, thus interfering with their absorption. After going through some processing methods, the shrimp powder and balls did not show any significant changes in their nutrient contents. So that, terasi shrimp powder is good to be consumed not only by overweight adults, but also by children to support their optimum growth. Intervention of terasi shrimp powder should be implemented step by step from national up to global governance program to face the DBM.

Keywords: Acetes indicus, alternative food, double burden of malnutrition, sensory evaluation

Procedia PDF Downloads 300
7779 Microbial Quality of Traditional Qatari Foods Sold by Women Street Vendors in Doha, Qatar

Authors: Tahra El-Obeid, Reham Mousa, Amal Alzahiri

Abstract:

During the past few years the traditional market of Qatar has become an attraction to many customers who eat from the numerous women street vendors selling Qatari traditional dishes. To gain an understanding on the safety of these street vended foods, we designed the study to test microbiological quality of 14 different Qatari foods sold in Souk Wagif, the main traditional market in Qatar. This study was conducted to mainly identify presence or absence of microbial pathogens. A total of 56 samples were purchased from 10 different street vendors and the samples were collected randomly on different days. The samples were tested for microbial contaminants at Central Food Laboratories, Doha, Qatar. The qualitative study was conducted using Real Time-PCR to screen for; Salmonella spp., Listeria monocytogenes, Escherichia coli and E. coli 0157:H7. Out of the 56 samples, only two samples “Biryani” and “Khabess” contained E. coli. However, both samples tested negative for E. coli O157:H7. The microbial contamination of the Qatari traditional street vended foods was 3%. This result may be attributed to the food safety training requirement set by the regulatory authorities before issuing any license to food handlers in Qatar as well as the food inspection conducted by the food health inspectors on a regular basis.

Keywords: microbiological quality, street vended food, traditional dishes, Qatar

Procedia PDF Downloads 307
7778 Correlation Between HIV/AIDS Stage With Oral Health, Dentition, and Periodontal Status

Authors: Eriselda Simoni, Leonard Simoni, Endri Paparisto, Laureta Flaga, Silvana Bara, Edit Xhajanka, Arjan Harxhi

Abstract:

Background: Some pathologies are encountered more often in HIV/ AIDS, such as those with bacterial, fungal, viral, and neoplastic causes, but what has been more noticeable in recent years is the increased and more aggressive manifestation of periodontal disease and oral caries. Our purpose is to investigate the correlation between the HIV/AIDS stage and CD4 level with oral health, dentition, and periodontal status. Materials and Methods: We conducted a prospective observational study that included 35 patients newly diagnosed with HIV/AIDS and underwent an oral examination at the University Dental Clinic in Tirana, Albania, in the period April - July 2024. This study evaluated the basic demographic, laboratory characteristics, oral hygiene, and the presence of oral lesions. The dentition status was assessed with the values DT (decay teeth), FT (filled teeth), and MT (missing teeth) presented as DMFT. The periodontal status was evaluated through a periodontal probe measuring CPI (community periodontal index) and LOA (loss of attachment) as recommended by the WHO Oral Health Assessment Form 2013. The Pearson Correlation Coefficient (r) was used to evaluate the relationship between levels of CD4+ and DMF, CD4+ and CPI, and CD4+ and LOA. The P value ≤ 0.05 was considered statistically significant. Results: 80% of patients included were males with a mean age of 35.8 years. 8.6% of patients were categorized as HIV stage I, 28.6% as stage II, and 62.8% as HIV stage III/AIDS. The mean level value of CD4+ was 266.2 cells/mm3 and the rapport CD4+/ WBC (White Blood Cells) was 15.7%. Most patients (57.2%) used toothbrushes less than 1 time a day. An important negative correlation was found between CD4+ and dentition and periodontal status. A lower level of CD4+ was correlated with a higher DMFT, CPI, and LOA, respectively coefficient (r) for CD4/DMFT = -0.52, p =0.01, (r) for CD4/CPI= - 0.38, p=0.024 and (r) for CD4/LOA= - 0.37, p=0.029. Conclusions: In our study, it was documented that patients with HIV/AIDS had worse oral health, an important negative correlation between CD4+ and dentition and periodontal status. A lower level of CD4+ was correlated with a worse dentition status (higher DMFT), and poor periodontal health (higher CPI and LOA). The monitoring and treatment of oral pathologies can be important in early HIV/AIDS diagnoses and treatment.

Keywords: HIV/AIDS, oral health, dentition, periodontal

Procedia PDF Downloads 24
7777 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income

Authors: M. Koray Cetin, Mehmet Mert

Abstract:

The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.

Keywords: exchange rate, panel data analysis, security, tourism revenues

Procedia PDF Downloads 346
7776 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 424
7775 Eating Constitutes Human Dignity: A Metaphysical Anthropology Perspective

Authors: Sri Poedjiastoeti

Abstract:

One of the traits of living beings is eating. As the living beings, people must provide their life by taking material. They must assimilate for themselves with substances. They grow and develop themselves by changing what they eat and digest into their own substance. This happened in the so-called eating. This article aims to analyze distinction between human beings and other infrahumans when facing and eating food. It uses the analytical description with metaphysical anthropology approach. As a result, to give the expression that eating is not simply to put food in mouth, chew and swallow it. Eating constitutes a sacred ceremonial if it is done in accordance with human dignity. They face food with distance and moderation as well as civilize or make their behaviour better for it. Accordingly, they are being to be human.

Keywords: human beings, behaviour, eating, dignity

Procedia PDF Downloads 269
7774 Investigate the Current Performance of Burger King Ho Chi Minh City in Terms of the Controllable Variables of the Overall Retail Strategy

Authors: Nhi Ngoc Thien

Abstract:

Franchising is a popular trend in Vietnam retail industry, especially in fast food industry. Several famous foreign fast food brands such as KFC, Lotteria, Jollibee or Pizza Hut invested on this potential market since the 1990s. Following this trend, in 2011, Burger King - the second largest fast food hamburger chain all over the world - entered Vietnam with its first store located in Tan Son Nhat International Airport, with the expectation to become the leading brand in the country. However, the business performance of Burger King was not going well in the first few years making it questioned about its strategy. The given assumption was that its business performance was affected negatively by its store location selection strategy. This research aims to investigate the current performance of Burger King Vietnam in terms of the controllable variables like store location as well as to explore the key factors influencing customer decision to choose Burger King. Therefore, a case study research method was conducted to approach deeply on the opinions and evaluations of 10 Burger King’s customers, Burger King's staffs and other fast food experts on Burger King’s performance through in-depth interview, direct observation and documentary analysis. Findings show that there are 8 determinants affecting the decision-making of Burger King’s customers, which are store location, quality of food, service quality, store atmosphere, price, promotion, menu and brand reputation. Moreover, findings present that Burger King’s staffs and fast food experts also mentioned the main problems of Burger King, which are about store location and food quality. As a result, there are some recommendations for Burger King Vietnam to improve its performance in the market and attract more Vietnamese target customers by giving suitable promotional activities among its customers and being differentiated itself from other fast food brands.

Keywords: overall retail strategy, controllable variables, store location, quality of food

Procedia PDF Downloads 342
7773 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 107
7772 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 374
7771 Corporate In-Kind Donations and Economic Efficiency: The Case of Surplus Food Recovery and Donation

Authors: Sedef Sert, Paola Garrone, Marco Melacini, Alessandro Perego

Abstract:

This paper is aimed at enhancing our current understanding of motivations behind corporate in-kind donations and to find out whether economic efficiency may be a major driver. Our empirical setting is consisted of surplus food recovery and donation by companies from food supply chain. This choice of empirical setting is motivated by growing attention on the paradox of food insecurity and food waste i.e. a total of 842 million people worldwide were estimated to be suffering from regularly not getting enough food, while approximately 1.3 billion tons per year food is wasted globally. Recently, many authors have started considering surplus food donation to nonprofit organizations as a way to cope with social issue of food insecurity and environmental issue of food waste. In corporate philanthropy literature the motivations behind the corporate donations for social purposes, such as altruistic motivations, enhancements to employee morale, the organization’s image, supplier/customer relationships, local community support, have been examined. However, the relationship with economic efficiency is not studied and in many cases the pure economic efficiency as a decision making factor is neglected. Although in literature there are some studies give us the clue on economic value creation of surplus food donation such as saving landfill fees or getting tax deductions, so far there is no study focusing deeply on this phenomenon. In this paper, we develop a conceptual framework which explores the economic barriers and drivers towards alternative surplus food management options i.e. discounts, secondary markets, feeding animals, composting, energy recovery, disposal. The case study methodology is used to conduct the research. Protocols for semi structured interviews are prepared based on an extensive literature review and adapted after expert opinions. The interviews are conducted mostly with the supply chain and logistics managers of 20 companies in food sector operating in Italy, in particular in Lombardy region. The results shows that in current situation, the food manufacturing companies can experience cost saving by recovering and donating the surplus food with respect to other methods especially considering the disposal option. On the other hand, retail and food service sectors are not economically incentivized to recover and donate surplus food to disfavored population. The paper shows that not only strategic and moral motivations, but also economic motivations play an important role in managerial decision making process in surplus food management. We also believe that our research while rooted in the surplus food management topic delivers some interesting implications to more general research on corporate in-kind donations. It also shows that there is a huge room for policy making favoring the recovery and donation of surplus products.

Keywords: corporate philanthropy, donation, recovery, surplus food

Procedia PDF Downloads 310
7770 The Correlation between Education, Food Intake, Exercise, and Medication Obedience with the Average of Blood Sugar in Indonesia

Authors: Aisyah Rahmatul Laily

Abstract:

Indonesia Ministry of Health is increasing their awareness on non communicable diseases. From the top ten causes of death, two of them are non communicable diseases. Diabetes Mellitus is one of the two non communicable diseases above that have the increasing number of patient from year to year. From that problem, this research is made to determine the correlation between education, food intake, exercise, and the medication obedience with the average of blood sugar. In this research, the researchers used observational and cross-sectional studies. The sample that used in this research were 50 patients in Puskesmas Gamping I Yogyakarta who have suffered from Diabetes Mellitus in long period. The researcher doing anamnesis by using questionnaire to collect the data, then analyzed it with Chi Square to determine the correlation between each variable. The dependent variable in this research is the average of blood sugar, whereas the independent variables are education, food intake, do exercise, and the obedience of medication. The result shows a relation between education and average blood sugar level (p=0.029), a relation between food intake and average blood sugar level (p=0.009), and a relation between exercise and average blood sugar level (p=0.023). There is also a relation between the medication obedience with the average of blood sugar (p=0,002). The conclusion is that the positive correlations exist between education and average blood sugar level, between food intake and average blood sugar level, and between medication obedience and average blood sugar level.

Keywords: average of blood sugar, education, exercise, food intake, medication obedience

Procedia PDF Downloads 269
7769 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 85
7768 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment

Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 460
7767 Labor Welfare and Social Security

Authors: Shoaib Alvi

Abstract:

Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.

Keywords: labor welfare, internal social responsibility, social security, international conventions

Procedia PDF Downloads 571
7766 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 243
7765 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures

Authors: Zeinab Ranjbar

Abstract:

Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.

Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security

Procedia PDF Downloads 378