Search results for: income security
3395 Effects of Parental Socio-Economic Status and Individuals' Educational Achievement on Their Socio-Economic Status: A Study of South Korea
Authors: Eun-Jeong Jang
Abstract:
Inequality has been considered as a core issue in public policy. Korea is categorized into one of the countries in the high level of inequality, which matters to not only current but also future generations. The relationship between individuals' origin and destination has an implication of intergenerational inequality. The previous work on this was mostly conducted at macro level using panel data to our knowledge. However, in this level, there is no room to track down what happened during the time between origin and destination. Individuals' origin is represented by their parents' socio-economic status, and in the same way, destination is translated into their own socio-economic status. The first research question is that how origin is related to the destination. Certainly, destination is highly affected by origin. In this view, people's destination is already set to be more or less than a reproduction of previous generations. However, educational achievement is widely believed as an independent factor from the origin. From this point of view, there is a possibility to change the path given by parents by educational attainment. Hence, the second research question would be that how education is related to destination and also, which factor is more influential to destination between origin and education. Also, the focus lies in the mediation of education between origin and destination, which would be the third research question. Socio-economic status in this study is referring to class as a sociological term, as well as wealth including labor and capital income, as an economic term. The combination of class and wealth would be expected to give more accurate picture about the hierarchy in a society. In some cases of non-manual and professional occupations, even though they are categorized into relatively high class, their income is much lower than those who in the same class. Moreover, it is one way to overcome the limitation of the retrospective view during survey. Education is measured as an absolute term, the years of schooling, and also as a relative term, the rank of school. Moreover, all respondents were asked the effort scaled by time intensity, self-motivation, before and during the course of their college based on a standard questionnaire academic achieved model provides. This research is based on a survey at an individual level. The target for sampling is an individual who has a job, regardless of gender, including income-earners and self-employed people and aged between thirties and forties because this age group is considered to reach the stage of job stability. In most cases, the researcher met respondents person to person visiting their work place or home and had a chance to interview some of them. One hundred forty individual data collected from May to August in 2017. It will be analyzed by multiple regression (Q1, Q2) and structural equation modeling (Q3).Keywords: class, destination, educational achievement, effort, income, origin, socio-economic status, South Korea
Procedia PDF Downloads 2733394 Prevalence of Burnout among Health Care Workers During Covid-19 Pandemic at a Tertiary Hospital in Mauritius
Authors: Mubarak Jan Beebee Zeba Mahetaab, Sumera Bibi Keenoo
Abstract:
Background: Covid-19 was first reported in Wuhan. On 13th March 2020, WHO declared Covid-19 as a pandemic disease with 140,936 cases globally. The outbreak of covid-19 occurred in over 184 countries, and it created a lot of medical and mental burdens. Aside from the physical problems, the mental health of the medical staff has been of critical concern. Aims and Objectives: To determine the prevalence of burnout among HCW dealing with COVID-19, identify the risk factors and find measures to support their mental health while dealing with the current and future pandemic. Methodology: A cross-sectional study was conducted among the HCW who fought against COVID-19 in SSRN Hospital in Mauritius. The HCWs were recruited using the snowballing sampling technique. Age, gender, job category, income, duration of vacation, working environment and importance of mental health were measured. Results: The prevalence of burnout was highest among HCA. Age had no significant association with pandemic-related burnout. In Mauritius, burnout during the pandemic is linked with lower income and having less vacation days. Conclusion: Burnout is prevalent among healthcare workers working during the Covid-19 Pandemic. Interventions such as psychological counselling, yoga and financial increments need to be implemented to help the healthcare workers.Keywords: burnout, Covid-19, health care professionals, pandemic
Procedia PDF Downloads 803393 Empirical Investigation into Climate Change and Climate-Smart Agriculture for Food Security in Nigeria
Authors: J. Julius Adebayo
Abstract:
The objective of this paper is to assess the agro-climatic condition of Ibadan in the rain forest ecological zone of Nigeria, using rainfall pattern and temperature between 1978-2018. Data on rainfall and temperature in Ibadan, Oyo State for a period of 40 years were obtained from Meteorological Section of Forestry Research Institute of Nigeria, Ibadan and Oyo State Meteorology Centre. Time series analysis was employed to analyze the data. The trend revealed that rainfall is decreasing slowly and temperature is averagely increasing year after year. The model for rainfall and temperature are Yₜ = 1454.11-8*t and Yₜ = 31.5995 + 2.54 E-02*t respectively, where t is the time. On this basis, a forecast of 20 years (2019-2038) was generated, and the results showed a further downward trend on rainfall and upward trend in temperature, this indicates persistence rainfall shortage and very hot weather for agricultural practices in the southwest rain forest ecological zone. Suggestions on possible solutions to avert climate change crisis and also promote climate-smart agriculture for sustainable food and nutrition security were also discussed.Keywords: climate change, rainfall pattern, temperature, time series analysis, food and nutrition security
Procedia PDF Downloads 1443392 Impact of Organic Farming on Soil Fertility and Microbial Activity
Authors: Menuka Maharjan
Abstract:
In the name of food security, agriculture intensification through conventional farming is being implemented in Nepal. Government focus on increasing agriculture production completely ignores soil as well human health. This leads to create serious soil degradation, i.e., reduction of soil fertility and microbial activity and health hazard in the country. On this note, organic farming is sustainable agriculture approach which can address challenge of sustaining food security while protecting the environment. This creates a win-win situation both for people and the environment. However, people have limited knowledge on significance of organic farming for environment conservation and food security especially developing countries like Nepal. Thus, the objective of the study was to assess the impacts of organic farming on soil fertility and microbial activity compared to conventional farming and forest in Chitwan, Nepal. Total soil organic carbon (C) was highest in organic farming (24 mg C g⁻¹ soil) followed by conventional farming (15 mg C g⁻¹ soil) and forest (9 mg C g⁻¹ soil) in the topsoil layer (0-10 cm depth). A similar trend was found for total nitrogen (N) content in all three land uses with organic farming soil possessing the highest total N content in both 0-10 cm and 10-20 cm depth. Microbial biomass C and N were also highest under organic farming, especially in the topsoil layer (350 and 46 mg g⁻¹ soil, respectively). Similarly, microbial biomass phosphorus (P) was higher (3.6 and 1.0 mg P kg⁻¹ at 0-10 and 10-20 cm depth, respectively) in organic farming compared to conventional farming and forest at both depths. However, conventional farming and forest soils had similar microbial biomass (C, N, and P) content. After conversion of forest, the P stock significantly increased by 373% and 170% in soil under organic farming at 0-10 and 10-20 cm depth, respectively. In conventional farming, the P stock increased by 64% and 36% at 0-10 cm and 10-20 cm depth, respectively, compared to forest. Overall, organic farming practices, i.e., crop rotation, residue input and farmyard manure application, significantly alters soil fertility and microbial activity. Organic farming system is emerging as a sustainable land use system which can address the issues of food security and environment conservation by increasing sustainable agriculture production and carbon sequestration, respectively, supporting to achieve goals of sustainable development.Keywords: organic farming, soil fertility, micobial biomas, food security
Procedia PDF Downloads 1763391 The Fusion of Blockchain and AI in Supply Chain Finance: Scalability in Distributed Systems
Authors: Wu You, Burra Venkata Durga Kumar
Abstract:
This study examines the promising potential of integrating Blockchain and Artificial Intelligence (AI) technologies to scalability in Distributed Systems within the field of supply chain finance. The finance industry is continually confronted with scalability challenges in its Distributed Systems, particularly within the supply chain finance sector, impacting efficiency and security. Blockchain, with its inherent attributes of high scalability and secure distributed ledger system, coupled with AI's strengths in optimizing data processing and decision-making, holds the key to innovating the industry's approach to these issues. This study elucidates the synergistic interplay between Blockchain and AI, detailing how their fusion can drive a significant transformation in the supply chain finance sector's Distributed Systems. It offers specific use-cases within this field to illustrate the practical implications and potential benefits of this technological convergence. The study also discusses future possibilities and current challenges in implementing this groundbreaking approach within the context of supply chain finance. It concludes that the intersection of Blockchain and AI could ignite a new epoch of enhanced efficiency, security, and transparency in the Distributed Systems of supply chain finance within the financial industry.Keywords: blockchain, artificial intelligence (AI), scaled distributed systems, supply chain finance, efficiency and security
Procedia PDF Downloads 933390 Solving 94-Bit ECDLP with 70 Computers in Parallel
Authors: Shunsuke Miyoshi, Yasuyuki Nogami, Takuya Kusaka, Nariyoshi Yamai
Abstract:
Elliptic curve discrete logarithm problem (ECDLP) is one of problems on which the security of pairing-based cryptography is based. This paper considers Pollard's rho method to evaluate the security of ECDLP on Barreto-Naehrig (BN) curve that is an efficient pairing-friendly curve. Some techniques are proposed to make the rho method efficient. Especially, the group structure on BN curve, distinguished point method, and Montgomery trick are well-known techniques. This paper applies these techniques and shows its optimization. According to the experimental results for which a large-scale parallel system with MySQL is applied, 94-bit ECDLP was solved about 28 hours by parallelizing 71 computers.Keywords: Pollard's rho method, BN curve, Montgomery multiplication
Procedia PDF Downloads 2723389 Customer Segmentation Revisited: The Case of the E-Tailing Industry in Emerging Market
Authors: Sanjeev Prasher, T. Sai Vijay, Chandan Parsad, Abhishek Banerjee, Sahakari Nikhil Krishna, Subham Chatterjee
Abstract:
With rapid rise in internet retailing, the industry is set for a major implosion. Due to the little difference among competitors, companies find it difficult to segment and target the right shoppers. The objective of the study is to segment Indian online shoppers on the basis of the factors – website characteristics and shopping values. Together, these cover extrinsic and intrinsic factors that affect shoppers as they visit web retailers. Data were collected using questionnaire from 319 Indian online shoppers, and factor analysis was used to confirm the factors influencing the shoppers in their selection of web portals. Thereafter, cluster analysis was applied, and different segments of shoppers were identified. The relationship between income groups and online shoppers’ segments was tracked using correspondence analysis. Significant findings from the study include that web entertainment and informativeness together contribute more than fifty percent of the total influence on the web shoppers. Contrary to general perception that shoppers seek utilitarian leverages, the present study highlights the preference for fun, excitement, and entertainment during browsing of the website. Four segments namely Information Seekers, Utility Seekers, Value Seekers and Core Shoppers were identified and profiled. Value seekers emerged to be the most dominant segment with two-fifth of the respondents falling for hedonic as well as utilitarian shopping values. With overlap among the segments, utilitarian shopping value garnered prominence with more than fifty-eight percent of the total respondents. Moreover, a strong relation has been established between the income levels and the segments of Indian online shoppers. Web shoppers show different motives from being utility seekers to information seekers, core shoppers and finally value seekers as income levels increase. Companies can strategically use this information for target marketing and align their web portals accordingly. This study can further be used to develop models revolving around satisfaction, trust and customer loyalty.Keywords: online shopping, shopping values, effectiveness of information content, web informativeness, web entertainment, information seekers, utility seekers, value seekers, core shoppers
Procedia PDF Downloads 1953388 The Flypaper Effect and the Municipal Participation Fund in the Brazilian Public Sector
Authors: Lucas Oliveira Gomes Ferreira, André Luiz Marques Serrano
Abstract:
The fiscal decentralization driven by the 1988 Constitution was responsible for granting greater autonomy to Brazilian subnational entities, as states and municipalities were entrusted with greater responsibilities to provide local public goods and services. However, the revenues necessary to implement the new attributions are largely received through intergovernmental transfers and not by local tax collection. The literature points out that public spending increases more by receiving unconditional and nonmatching (lump sum) intergovernmental grants than by an increase in taxpayers' income. This effect, called the flypaper effect, happens because the funds received could be used to reduce local taxes, meaning an increase in the citizen's private income. However, they are applied in the public sector in the form of expenses. The present work investigates the existence of the flypaper effect in Brazilian municipalities during the first two decades of the 21st century. The research uses the Municipal Participation Fund (FPM) as a grant proxy from 2000 to 2019 through econometrics of cross-section and panel data for all 5,568 municipalities. The results indicate the flypaper effect in Brazilian municipalities, as well as the proportional relationship between the receipt of constitutional transfers and the increase in public expenditure.Keywords: flypaper effect, intergovernmental transfers, municipal participation fund, fiscal federalism
Procedia PDF Downloads 1453387 Cybersecurity Challenges in the Era of Open Banking
Authors: Krish Batra
Abstract:
The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices
Procedia PDF Downloads 603386 Low-Income African-American Fathers' Gendered Relationships with Their Children: A Study Examining the Impact of Child Gender on Father-Child Interactions
Authors: M. Lim Haslip
Abstract:
This quantitative study explores the correlation between child gender and father-child interactions. The author analyzes data from videotaped interactions between African-American fathers and their boy or girl toddler to explain how African-American fathers and toddlers interact with each other and whether these interactions differ by child gender. The purpose of this study is to investigate the research question: 'How, if at all, do fathers’ speech and gestures differ when interacting with their two-year-old sons versus daughters during free play?' The objectives of this study are to describe how child gender impacts African-American fathers’ verbal communication, examine how fathers gesture and speak to their toddler by gender, and to guide interventions for low-income African-American families and their children in early language development. This study involves a sample of 41 low-income African-American fathers and their 24-month-old toddlers. The videotape data will be used to observe 10-minute father-child interactions during free play. This study uses the already transcribed and coded data provided by Dr. Meredith Rowe, who did her study on the impact of African-American fathers’ verbal input on their children’s language development. The Child Language Data Exchange System (CHILDES program), created to study conversational interactions, was used for transcription and coding of the videotape data. The findings focus on the quantity of speech, diversity of speech, complexity of speech, and the quantity of gesture to inform the vocabulary usage, number of spoken words, length of speech, and the number of object pointings observed during father-toddler interactions in a free play setting. This study will help intervention and prevention scientists understand early language development in the African-American population. It will contribute to knowledge of the role of African-American fathers’ interactions on their children’s language development. It will guide interventions for the early language development of African-American children.Keywords: parental engagement, early language development, African-American families, quantity of speech, diversity of speech, complexity of speech and the quantity of gesture
Procedia PDF Downloads 1053385 Security in Resource Constraints: Network Energy Efficient Encryption
Authors: Mona Almansoori, Ahmed Mustafa, Ahmad Elshamy
Abstract:
Wireless nodes in a sensor network gather and process critical information designed to process and communicate, information flooding through such network is critical for decision making and data processing, the integrity of such data is one of the most critical factors in wireless security without compromising the processing and transmission capability of the network. This paper presents mechanism to securely transmit data over a chain of sensor nodes without compromising the throughput of the network utilizing available battery resources available at the sensor node.Keywords: hybrid protocol, data integrity, lightweight encryption, neighbor based key sharing, sensor node data processing, Z-MAC
Procedia PDF Downloads 1453384 Creation of Greater Mekong Subregion Regional Competitiveness through Cluster Mapping
Authors: Danuvasin Charoen
Abstract:
This research investigates cluster development in the area called the Greater Mekong Subregion (GMS), which consists of Thailand, the People’s Republic of China (PRC), the Yunnan Province and Guangxi Zhuang Autonomous Region, Myanmar, the Lao People’s Democratic Republic (Lao PDR), Cambodia, and Vietnam. The study utilized Porter’s competitiveness theory and the cluster mapping approach to analyze the competitiveness of the region. The data collection consists of interviews, focus groups, and the analysis of secondary data. The findings identify some evidence of cluster development in the GMS; however, there is no clear indication of collaboration among the components in the clusters. GMS clusters tend to be stand-alone. The clusters in Vietnam, Lao PDR, Myanmar, and Cambodia tend to be labor intensive, whereas the clusters in Thailand and the PRC (Yunnan) have the potential to successfully develop into innovative clusters. The collaboration and integration among the clusters in the GMS area are promising, though it could take a long time. The most likely relationship between the GMS countries could be, for example, suppliers of the low-end, labor-intensive products will be located in the low income countries such as Myanmar, Lao PDR, and Cambodia, and these countries will be providing input materials for innovative clusters in the middle income countries such as Thailand and the PRC.Keywords: cluster, GMS, competitiveness, development
Procedia PDF Downloads 2623383 Enhancing the Use of Traditional, Complementary and Alternative Medicines into Global Cancer Treatment and Research
Authors: Alejandro Salicrup, Riacrdo Gelhman, Geetha Gopalakrishna
Abstract:
The main aim of this session is to have a panel to discuss specific steps for the integration of traditional, complementary and alternative medicine (TCAM) with conventional oncology for enhancing treatment practices at the global level, specifically in low-and-middle-income-countries (LMICs). Concrete current and required programs for strengthening Integrative Oncology research in LMICs will also be discussed. Case Studies from Latin America, Asia, Europe and Africa will discuss and highlight 1) What is working regarding treatment practices in integrative oncology in their countries/regions providing concrete examples 2) What is not working on this integration for cancer treatment in their countries/regions with concrete examples and 3) What are the challenges and opportunities for research related to integrative oncology treatment. Discussion will include potential next steps and potential mechanisms to enhance global integrative oncology research aimed to enhance the use of TCAM therapies and strengthening cancer treatment in LMICs.Keywords: global cancer treatment, integrative oncology research, low and middle income countries, traditional, complementary and alternative medicines
Procedia PDF Downloads 1223382 On the Resilience of Operational Technology Devices in Penetration Tests
Authors: Marko Schuba, Florian Kessels, Niklas Reitz
Abstract:
Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.Keywords: penetration testing, OT, ICS, OT security
Procedia PDF Downloads 163381 Diverse Survey Sampling of US Population Reveals Race/Ethnicity Differences in Perceptions of Dog Breed Personalities
Authors: J. A. Villarreal, D. S. Ha., A. Smith, J. C. Ha
Abstract:
Numerous dogs are living in shelters seeking homes. Perceptions of dog personality based on breed type have been shown to influence adoptability. Past research has focused primarily on Caucasian female samples. This study provides a more diverse sample within the US. Of the respondents, 558 identified as White/Caucasian, 395 identified as Black/African American, 123 identified as Hispanic/Latinx, and 46 identified as Asian/Asian American. 29.6% of respondents identified as male and 70.4% identified as female. Initial analyses indicate significant differences in race/ethnicity in the association of the personality terms of “Dangerous”, “Calm”, and “Energetic” with dog breeds. Black/African-American respondents were more likely to associate the term “Dangerous” with almost all breeds assessed in this survey, followed by Hispanic/Latinx, and lastly by White/Caucasian and Asian/Asian American. Higher annual income respondents were less likely to associate the term “Calm” with most breeds and lower-income respondents were less likely to ascribe the term “Dangerous” to Pit Bull Terriers. Further analyses are underway. These findings can help dog adoption programs promote more diversity in potential adopters.Keywords: breed, diversity, dog, ethnicity, personality
Procedia PDF Downloads 1643380 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels
Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur
Abstract:
With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography
Procedia PDF Downloads 1243379 Cyber Security and Risk Assessment of the e-Banking Services
Authors: Aisha F. Bushager
Abstract:
Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.Keywords: cyber security, e-banking, risk assessment, threats identification
Procedia PDF Downloads 3503378 Suicidal Ideation and Associated Factors among Students Aged 13-15 Years in Association of Southeast Asian Nations (ASEAN) Member States, 2007-2014
Authors: Karl Peltzer, Supa Pengpid
Abstract:
Introduction: The aim of this study was to assess suicidal ideation and associated factors in school-going adolescents in the Association of Southeast Asian Nations (ASEAN) Member States. Methods: The analysis included 30284 school children aged 13-15 years from seven ASEAN that participated in the cross-sectional Global School-based Student Health Survey (GSHS) between 2007 and 2013. Results: The overall prevalence of suicidal ideation across seven ASEAN countries (excluding Brunei) was 12.3%, significantly higher in girls (15.1%) than boys (9.3%). Among eight ASEAN countries with the highest prevalence of suicidal ideation was in the Philippines (17.0%) and Vietnam (16.9%) and the lowest in Myanmar (1.1%) and Indonesia (4.2%). In multivariate logistic regression analysis, female gender, older age (14 or 15 years), living in a low income or lower middle income country, having no friends, loneliness, bullying victimization, having been in a physical fight in the past 12 months, lack of parental or guardian support, tobacco use and having a history of ever got drunk were associated with suicidal ideatiion. Conclusion: Different rates of suicidal ideation were observed in ASEAN member states. Several risk factors for suicidal ideation were identified which can help guide preventive efforts.Keywords: adolesents, ASEAN, correlates, suicidal behaviour
Procedia PDF Downloads 2693377 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 4053376 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems
Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy
Abstract:
The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.Keywords: smart grids, blockchain, fiber optic sensor, security
Procedia PDF Downloads 1203375 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies
Authors: Arun Prabhakar
Abstract:
Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling
Procedia PDF Downloads 1393374 From Poverty to Progress: A Comparative Analysis of Mongolia with PEER Countries
Authors: Yude Wu
Abstract:
Mongolia, grappling with significant socio-economic challenges, faces pressing issues of inequality and poverty, as evidenced by a high Gini coefficient and the highest poverty rate among the top 20 largest Asian countries. Despite government efforts, Mongolia's poverty rate experienced only a slight reduction from 29.6 percent in 2016 to 27.8 percent in 2020. PEER countries, such as South Africa, Botswana, Kazakhstan, and Peru, share characteristics with Mongolia, including reliance on the mining industry and classification as lower middle-income countries. Successful transitions of these countries to upper middle-income status between 1994 and the 2010s provide valuable insights. Drawing on secondary analyses of existing research and PEER country profiles, the study evaluates past policies, identifies gaps in current approaches, and proposes recommendations to combat poverty sustainably. The hypothesis includes a reliance on the mining industry and a transition from lower to upper middle-income status. Policies from these countries, such as the GEAR policy in South Africa and economic diversification in Botswana, offer insights into Mongolia's development. This essay aims to illuminate the multidimensional nature of underdevelopment in Mongolia through a secondary analysis of existing research and PEER country profiles, evaluating past policies, identifying gaps in current approaches, and providing recommendations for sustainable progress. Drawing inspiration from PEER countries, Mongolia can implement policies such as economic diversification to reduce vulnerability and create stable job opportunities. Emphasis on infrastructure, human capital, and strategic partnerships for Foreign Direct Investment (FDI) aligns with successful strategies implemented by PEER countries, providing a roadmap for Mongolia's development objectives.Keywords: inequality, PEER countries, comparative analysis, nomadic animal husbandry, sustainable growth
Procedia PDF Downloads 633373 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices
Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman
Abstract:
The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.Keywords: hospital, light fidelity, Li-Fi, medical devices, security
Procedia PDF Downloads 1023372 Barriers for Appropriate Palliative Symptom Management: A Qualitative Research in Kazakhstan, a Medium-Income Transitional-Economy Country
Authors: Ibragim Issabekov, Byron Crape, Lyazzat Toleubekova
Abstract:
Background: Palliative care substantially improves the quality of life of terminally-ill patients. Symptom control is one of the keystones in the management of patients in palliative care settings, lowering distress as well as improving the quality of life of patients with end-stage diseases. The most common symptoms causing significant distress for patients are pain, nausea and vomiting, increased respiratory secretions and mental health issues like depression. Aims are: 1. to identify best practices in symptom management in palliative patients in accordance with internationally approved guidelines and compare aforementioned with actual practices in Kazakhstan; to evaluate the criteria for assessing symptoms in terminally-ill patients, 2. to review the availability and utilization of pharmaceutical agents for pain control, management of excessive respiratory secretions, nausea, and vomiting, and delirium and 3. to develop recommendations for the systematic approach to end-of-life symptom management in Kazakhstan. Methods: The use of qualitative research methods together with systematic literature review have been employed to provide a rigorous research process to evaluate current approaches for symptom management of palliative patients in Kazakhstan. Qualitative methods include in-depth semi-structured interviews of the healthcare professionals involved in palliative care provision. Results: Obstacles were found in appropriate provision of palliative care. Inadequate education and training to manage severe symptoms, poorly defined laws and regulations for palliative care provision, and a lack of algorithms and guidelines for care were major barriers in the effective provision of palliative care. Conclusion: Assessment of palliative care in this medium-income transitional-economy country is one of the first steps in the initiation of integration of palliative care into the existing health system. Achieving this requires identifying obstacles and resolving these issues.Keywords: end-of-life care, middle income country, palliative care, symptom control
Procedia PDF Downloads 2003371 Quantifying the Second-Level Digital Divide on Sub-National Level with a Composite Index
Authors: Vladimir Korovkin, Albert Park, Evgeny Kaganer
Abstract:
The paper studies the second-level digital divide (the one defined by the way how digital technology is used in everyday life) between regions of the Russian Federation. The paper offers a systemic review of literature on the measurement of the digital divide; based upon this it suggests a composite Digital Life Index, that captures the complex multi-dimensional character of the phenomenon. The model of the index studies separately the digital supply and demand across seven independent dimensions providing for 14 subindices. The Index is based on Internet-borne data, a distinction from traditional research approaches that rely on official statistics or surveys. Regression analysis is used to determine the relative importance of factors like income, human capital, and policy in determining the digital divide. The result of the analysis suggests that the digital divide is driven more by the differences in demand (defined by consumer competencies) than in supply; the role of income is insignificant, and the quality of human capital is the key determinant of the divide. The paper advances the existing methodological literature on the issue and can also inform practical decision-making regarding the strategies of national and regional digital development.Keywords: digital transformation, second-level digital divide, composite index, digital policy, regional development, Russia
Procedia PDF Downloads 1863370 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.Keywords: actuator, user authentication, security evaluation, haptic actuator
Procedia PDF Downloads 3463369 World on the Edge: Migration and Cross Border Crimes in West Africa
Authors: Adeyemi Kamil Hamzah
Abstract:
The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation
Procedia PDF Downloads 2263368 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment
Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref
Abstract:
In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment
Procedia PDF Downloads 1823367 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security
Authors: Carmen J. Savelli, Romy Conzade
Abstract:
Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.Keywords: food safety, food security, nutrition, policy
Procedia PDF Downloads 4213366 Examining Fertility Desires and Reproductive Planning among Low-Income Black Fathers: A Mixed-Methods Approach
Authors: Adaobi Anakwe, Wilson Majee, Kari White, Rhonda BeLue
Abstract:
Background: Black men in the U.S. have overall poorer health, are more likely to experience unintended pregnancies, and have pregnancies (with their partner) at younger ages than other racial/ethnic groups. These factors increase the likelihood that pregnancies among Black fathers will occur at suboptimal paternal health. Although several community-based programs exist to support low-income Black fathers’ involvement with their families, little is known about the sexual and reproductive health, and family planning needs of fathers enrolled in these programs. The objective of this study was to quantitatively examine the relationship between Black fathers’ fertility desires and pregnancy prevention strategies and qualitatively explore the nuances of this relationship. Methods: A concurrent mixed-methods approach was used to survey 36 and interview 13 Black fathers from low-income backgrounds, who were participating in a community-based fatherhood program in a Midwestern urban area. Fathers in this study were ≥18 years old with at least one child. Differences between groups were compared using Fisher’s Exact tests and thematic analyses to examine the relationship between participants' fertility desires and reproductive planning practices. Results: Participants had a median age of 33 years, and 72% were non-residential biological parents. About 40% of men desired pregnancy, and 69% reported they or their partner always used contraception. In bivariate analysis, participants’ fertility desires were not associated with pregnancy prevention (p=0.251). Although most interview participants desired pregnancies, several factors contributed to their ability to plan for a pregnancy. Men felt that using contraception to prevent pregnancies was dependent on navigating trust with a partner. Health before pregnancy and financial stability were also important. Overall, participants thought that using an adult mindset, in which they considered the consequences of unprotected sex, was key to family planning. Conclusion: Black fathers may not desire pregnancy and consider a variety of factors, but this does not always result in active pregnancy prevention/contraceptive use. Community-based organizations already working with Black fathers can be leveraged to increase reproductive health awareness and facilitate reproductive planning for fathers.Keywords: reproductive planning, reproductive health, preconception health, Black fathers, fertility desires, pregnancy
Procedia PDF Downloads 125