Search results for: United States v. Vayner
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3505

Search results for: United States v. Vayner

2455 Trends in Incisional and Ventral Hernia Repair: A Population Analysis from 2001 to 2021

Authors: Lakmali Anthony, Madeline Gillies

Abstract:

Background: Incisional and ventral hernias are highly prevalent, with primary ventral hernias occurring in approximately 20% of adults and incisional hernias developing in up to 30% of midline abdominal incisions. Recent data from the United States have shown an increasing incidence of elective incisional and ventral hernia repair (IVHR) and emergency repair of complicated hernias. This study examines Australian population trends in IVHR over a two-decade study period. Methods: This retrospective study was performed using procedure data from the Australian Institute of Health and Welfare, and population data from the Australian Bureau of Statistics captured between 2000 and 2021 to calculate incidence rates per 100,000 population by age and sex for selected subcategories of IVHR operations. Trends over time were evaluated using simple linear regression. Results: There were 809,308 IVHR operations performed in Australia during the study period. The cumulative incidence adjusted for the population was 182 per 100,000; this increased by 9.578 per year during the study period (95% CI = 8.431- 10.726, p<.001). IVHR for primary umbilical hernias experienced the most significant increase in population-adjusted incidence, 1.177 per year. (95% CI = 0.654- 1.701, p<.001). Emergency IVHR for incarcerated, obstructed, and strangulated hernias increased by 0.576 per year (95% CI = 0.510 -0.642, p<.001). Only 20.2% of IVHR procedures were performed as day surgery. Conclusions: Australia has seen a significant increase in IVHR operations performed in the last 20 years, particularly those for primary ventral hernias. IVHR for hernias complicated by incarceration, obstruction, and strangulation also increased significantly. The proportion of IVHR operations performed as day surgery is well below the target set by the Royal Australasian College of Surgeons. With the increasing incidence of IVHR operations and an increasing proportion of these being emergent, elective IVHR should be performed as day surgery when it is safe.

Keywords: ventral, incisional, hernia, trends

Procedia PDF Downloads 53
2454 Cultural Cognition and Voting: Understanding Values and Perceived Risks in the Colombian Population

Authors: Andrea N. Alarcon, Julian D. Castro, Gloria C. Rojas, Paola A. Vaca, Santiago Ortiz, Gustavo Martinez, Pablo D. Lemoine

Abstract:

Recently, electoral results across many countries have shown to be inconsistent with rational decision theory, which states that individuals make decisions based on maximizing benefits and reducing risks. An alternative explanation has emerged: Fear and rage-driven vote have been proved to be highly effective for political persuasion and mobilization. This phenomenon has been evident in the 2016 elections in the United States, 2006 elections in Mexico, 1998 elections in Venezuela, and 2004 elections in Bolivia. In Colombia, it has occurred recently in the 2016 plebiscite for peace and 2018 presidential elections. The aim of this study is to explain this phenomenon using cultural cognition theory, referring to the psychological predisposition individuals have to believe that its own and its peer´s behavior is correct and, therefore, beneficial to the entire society. Cultural cognition refers to the tendency of individuals to fit perceived risks, and factual beliefs into group shared values; the Cultural Cognition Worldview Scales (CCWS) measures cultural perceptions through two different dimensions: Individualism-communitarianism and hierarchy-egalitarianism. The former refers to attitudes towards social dominance based on conspicuous and static characteristics (sex, ethnicity or social class), while the latter refers to attitudes towards a social ordering in which it is expected from individuals to guarantee their own wellbeing without society´s or government´s intervention. A probabilistic national sample was obtained from different polls from the consulting and public opinion company Centro Nacional de Consultoría. Sociodemographic data was obtained along with CCWS scores, a subjective measure of left-right ideological placement and vote intention for 2019 Mayor´s elections were also included in the questionnaires. Finally, the question “In your opinion, what is the greatest risk Colombia is facing right now?” was included to identify perceived risk in the population. Preliminary results show that Colombians are highly distributed among hierarchical communitarians and egalitarian individualists (30.9% and 31.7%, respectively), and to a less extent among hierarchical individualists and egalitarian communitarians (19% and 18.4%, respectively). Males tended to be more hierarchical (p < .000) and communitarian (p=.009) than females. ANOVA´s revealed statistically significant differences between groups (quadrants) for the level of schooling, left-right ideological orientation, and stratum (p < .000 for all), and proportion differences revealed statistically significant differences for groups of age (p < .001). Differences and distributions for vote intention and perceived risks are still being processed and results are yet to be analyzed. Results show that Colombians are differentially distributed among quadrants in regard to sociodemographic data and left-right ideological orientation. These preliminary results indicate that this study may shed some light on why Colombians vote the way they do, and future qualitative data will show the fears emerging from the identified values in the CCWS and the relation this has with vote intention.

Keywords: communitarianism, cultural cognition, egalitarianism, hierarchy, individualism, perceived risks

Procedia PDF Downloads 129
2453 A Method for solving Legendre's Conjecture

Authors: Hashem Sazegar

Abstract:

Legendre’s conjecture states that there is a prime number between n^2 and (n + 1)^2 for every positive integer n. In this paper we prove that every composite number between n2 and (n + 1)2 can be written u^2 − v^2 or u^2 − v^2 + u − v that u > 0 and v ≥ 0. Using these result as well as induction and residues (modq) we prove Legendre’s conjecture.

Keywords: bertrand-chebyshev theorem, landau’s problems, goldbach’s conjecture, twin prime, ramanujan proof

Procedia PDF Downloads 346
2452 Long Time Oxidation Behavior of Machined 316 Austenitic Stainless Steel in Primary Water Reactor

Authors: Siyang Wang, Yujin Hu, Xuelin Wang, Wenqian Zhang

Abstract:

Austenitic stainless steels are widely used in nuclear industry to manufacture critical components owing to their excellent corrosion resistance at high temperatures. Almost all the components used in nuclear power plants are produced by surface finishing (surface cold work) such as milling, grinding and so on. The change of surface states induced by machining has great influence on the corrosion behavior. In the present study, long time oxidation behavior of machined 316 austenitic stainless steel exposed to simulated pressure water reactor environment was investigated considering different surface states. Four surface finishes were produced by electro-polishing (P), grinding (G), and two milling (M and M1) processes respectively. Before oxidation, the surface Vickers micro-hardness, surface roughness of each type of sample was measured. Corrosion behavior of four types of sample was studied by using oxidation weight gain method for six oxidation periods. The oxidation time of each period was 120h, 216h, 336h, 504h, 672h and 1344h, respectively. SEM was used to observe the surface morphology of oxide film in several period. The results showed that oxide film on austenitic stainless steel has a duplex-layer structure. The inner oxide film is continuous and compact, while the outer layer is composed of oxide particles. The oxide particle consisted of large particles (nearly micron size) and small particles (dozens of nanometers to a few hundred nanometers). The formation of oxide particle could be significantly affected by the machined surface states. The large particle on cold worked samples (grinding and milling) appeared earlier than electro-polished one, and the milled sample has the largest particle size followed by ground one and electro-polished one. For machined samples, the large particles were almost distributed along the direction of machining marks. Severe exfoliation was observed on one milled surface (M) which had the most heavily cold worked layer, while rare local exfoliation occurred on the ground sample (G) and the other milled sample (M1). The electro-polished sample (P) entirely did not exfoliate.

Keywords: austenitic stainless steel, oxidation, machining, SEM

Procedia PDF Downloads 271
2451 Analysing “The Direction of Artificial Intelligence Legislation from a Global Perspective” from the Perspective of “AIGC Copyright Protection” Content

Authors: Xiaochen Mu

Abstract:

Due to the diversity of stakeholders and the ambiguity of ownership boundaries, the current protection models for Artificial Intelligence Generated Content (AIGC) have many disadvantages. In response to this situation, there are three different protection models worldwide. The United States Copyright Office stipulates that works autonomously generated by artificial intelligence ‘lack’ the element of human creation, and non-human AI cannot create works. To protect and promote investment in the field of artificial intelligence, UK legislation, through Section 9(3) of the CDPA, designates the author of AI-generated works as ‘the person by whom the arrangements necessary for the creation of the work are undertaken.’ China neither simply excludes the work attributes of AI-generated content based on the lack of a natural person subject as the sole reason, nor does it generalize that AIGC should or should not be protected. Instead, it combines specific case circumstances and comprehensively evaluates the degree of originality of AIGC and the contributions of natural persons to AIGC. In China's first AI drawing case, the court determined that the image in question was the result of the plaintiff's design and selection through inputting prompt words and setting parameters, reflecting the plaintiff's intellectual investment and personalized expression, and should be recognized as a work in the sense of copyright law. Despite opposition, the ruling also established the feasibility of the AIGC copyright protection path. The recognition of the work attributes of AIGC will not lead to overprotection that hinders the overall development of the AI industry. Just as with the legislation and regulation of AI by various countries, there is a need for a balance between protection and development. For example, the provisional agreement reached on the EU AI Act, based on a risk classification approach, seeks a dynamic balance between copyright protection and the development of the AI industry.

Keywords: generative artificial intelligence, originality, works, copyright

Procedia PDF Downloads 4
2450 The Correlation Between Self-Talk and COVID-19

Authors: Abigail Vallance

Abstract:

Current research shows a correlation between declining mental health in the United States and the effect of COVID-19 on young adults and adolescents. Anxiety and depression are the two most common psychiatric illnesses, which are also the leading impediments to academic success. Spending six hours a day or more using computers is associated with higher risks of depression, with this time constraint pervasive even in present-day academia. Along with many hours on the computer, common issues COVID-19 had on students’ academic performance during online school included technical difficulties, poor support services, and difficulty adapting to online learning. Given the volume of requirements with unrealistic deadlines, and despite experiencing COVID-19, students showed an increase in their levels of anxiety. Besides the prevalent effect of COVID-19 on mental health, many studies show a correlation between mental health, COVID-19, academia, and sports performance. Academic research showed that negative self-talk, in relation to one’s self-efficacy, correlated with negative academic performance. Research showed that students who reported negative self-efficacy when test-taking led to negative test results. Furthermore, in sports performance, negative effects were found when athletes engage in negative self-talk. Overall, motivational self-talk, by oneself and through teammates and coaches, correlated with better performance than regular self-talk in sports. In relation to sports performance, the COVID-19 pandemic canceled complete sports seasons for millions of adolescents across the country. Many student-athletes use their sport to release emotions and escape from their mental health, but this was taken away. The purpose of this study is to address the current increase in mental health diagnoses in adolescents, including suicide rates after the COVID-19 pandemic began in 2020.This literature analysis is actively being studied.

Keywords: self-talk, COVID-19, mental health, adolescents

Procedia PDF Downloads 37
2449 India’s Neighborhood Policy and the Northeast: Exploratory Study of the Nagas in the Indo-Myanmar Border

Authors: Sachoiba Inkah

Abstract:

The Northeast region has not been a major factor in India’s foreign policy calculation since independence. Instead, the region was ignored and marginalized even to the extent of using force and repressive Acts such as AFSPA(Armed Forces Special Powers Act) to suppress the voices of both states and non-state actors. The liberalization of the economy in the 90s in the wake of globalization gave India a new outlook and the Look East Policy (LEP) was a paradigm shift in India’s engagement with the Southeast Asian nations as it seeks to explore the benefits of the ASEAN. The reorienting of India’s foreign policy to ‘Neighborhood First” is attributed to the present political dispensation, which is further widened to include ‘Extended Neighborhood.’ As a result, the Northeastern states have become key players in India’s participation in regional groupings such as SAARC, BIMSTEC, and BCIM. The need for external balancing, diplomacy and development has reset India’s foreign policy priorities as the Northeast states lie in the confluence of South Asia, Southeast and East Asia, and a stakeholder in Act East Policy. The paper will explore the role of Northeastern states in the framework of Indian foreign policy as it shares international boundaries with China, Bhutan, Bangladesh, and Myanmar and most importantly, study the case of Nagas who are spread across Manipur, Nagaland, and Arunachal Pradesh bordering Myanmar. The Indo-Myanmar border is an area of conflict and various illegal activities such as arms trafficking, illegal migrants, drug, and human trafficking are still being carried out and in order to address this issue, both India and Myanmar need to take into consideration the various communities living across the border. And conflict and insurgency should not be a yardstick to curtailed development of infrastructures such as roads, health facilities, transport, and communication in the contested region. The realities, perceptions, and contentions of the Northeastern states and the different communities living in the border areas need a wider discourse as the region the potential to drive India’s diplomatic relations with its neighbors and extended neighborhood. The methods employed are analytical and more of a descriptive analysis on India’s foreign policy framework with a focus on Nagas in Myanmar, drawing from both primary and secondary sources. Primary sources include official documents, data, and statistics released by various governmental agencies, parliamentary debates, political speeches, press releases, treaties and agreements, historical biographies and organizational policy papers, protocols and procedures of government conferences, regional organization study reports etc. The paper concludes that the recent proactive engagement between India and Myanmar on trade, defense, economic, and infrastructure development are positive signs cementing bilateral ties, but there is not much room for the people-to-people connect, especially for people living in the borderland. The Freedom of Movement Regime that is in place is limited and there is more scope for improvement as people in the borderland looks towards trade and commerce to not only uplift the border economy but also act as a catalyst for robust engagement between the two countries, albeit with more infrastructure such as road, healthcare, education, a tourist hotspot, trade centers, mobile connectivity, etc.

Keywords: foreign policy, infrastructure development, insurgency, people to people connect

Procedia PDF Downloads 183
2448 Optimizing Bridge Deck Construction: A deep Neural Network Approach for Limiting Exterior Grider Rotation

Authors: Li Hui, Riyadh Hindi

Abstract:

In the United States, bridge construction often employs overhang brackets to support the deck overhang, the weight of fresh concrete, and loads from construction equipment. This approach, however, can lead to significant torsional moments on the exterior girders, potentially causing excessive girder rotation. Such rotations can result in various safety and maintenance issues, including thinning of the deck, reduced concrete cover, and cracking during service. Traditionally, these issues are addressed by installing temporary lateral bracing systems and conducting comprehensive torsional analysis through detailed finite element analysis for the construction of bridge deck overhang. However, this process is often intricate and time-intensive, with the spacing between temporary lateral bracing systems usually relying on the field engineers’ expertise. In this study, a deep neural network model is introduced to limit exterior girder rotation during bridge deck construction. The model predicts the optimal spacing between temporary bracing systems. To train this model, over 10,000 finite element models were generated in SAP2000, incorporating varying parameters such as girder dimensions, span length, and types and spacing of lateral bracing systems. The findings demonstrate that the deep neural network provides an effective and efficient alternative for limiting the exterior girder rotation for bridge deck construction. By reducing dependence on extensive finite element analyses, this approach stands out as a significant advancement in improving safety and maintenance effectiveness in the construction of bridge decks.

Keywords: bridge deck construction, exterior girder rotation, deep learning, finite element analysis

Procedia PDF Downloads 42
2447 Rear Seat Belt Use in Developing Countries: A Case Study from the United Arab Emirates

Authors: Salaheddine Bendak, Sara S. Alnaqbi

Abstract:

The seat belt is a vital tool in improving traffic safety conditions and minimising injuries due to traffic accidents. Most developing countries are facing a big problems associated with the human and financial losses due to traffic accidents. One way to minimise these losses is the use of seat belts by passengers both in the front and rear seats of a vehicle; however, at the same time, close to nothing is known about the rates of seat belt utilisation among rear seat passengers in many developing countries. Therefore, there is a need to estimate these rates in order to know the extent of this problem and how people interact with traffic safety measures like seat belts and find demographic characteristics that contribute to wearing or non-wearing of seat belts with the aim of finding solutions to improve wearing rates. In this paper, an observational study was done to gather data on restraints use in motor vehicle rear seats in eight observational stations in a rapidly developing country, the United Arab Emirates (UAE), and estimate a use rate for the whole country. Also, a questionnaire was used in order to study demographic characteristics affecting the wearing of seatbelts in rear seats. Results of the observational study showed that the overall wearing/usage rate was 12.3%, which is considered very low when compared to other countries. Survey results show that single, male, less educated passengers from Arab and South Asian backgrounds use seat belts reportedly less than others. Finally, solutions are put forward to improve this wearing rate based on the results of this study.

Keywords: Seat belts, traffic crashes, United Arab Emirates, rear seats

Procedia PDF Downloads 228
2446 A Modest Proposal for Deep-Sixing Propositions in the Philosophy of Language

Authors: Patrick Duffley

Abstract:

Hanks (2021) identifies three Frege-inspired commitments concerning propositions that are widely shared across the philosophy of language: (1) propositions are the primary, inherent bearers of representational properties and truth-conditions; (2) propositions are neutral representations possessing a ‘content’ that is devoid of ‘force; (3) propositions can be entertained or expressed without being asserted. Hanks then argues that the postulate of neutral content must be abandoned, and the primary bearers of truth-evaluable representation must be identified as the token acts of assertoric predication that people perform when they are thinking or speaking about the world. Propositions are ‘types of acts of predication, which derive their representational features from their tokens.’ Their role is that of ‘classificatory devices that we use for the purposes of identifying and individuating mental states and speech acts,’ so that ‘to say that Russell believes that Mont Blanc is over 4000 meters high is to classify Russell’s mental state under a certain type, and thereby distinguish that mental state from others that Russell might possess.’ It is argued in this paper that there is no need to classify an utterance of 'Russell believes that Mont Blanc is over 4000 meters high' as a token of some higher-order utterance-type in order to identify what Russell believes; the meanings of the words themselves and the syntactico-semantic relations between them are sufficient. In our view what Hanks has accomplished in effect is to build a convincing argument for dispensing with propositions completely in the philosophy of language. By divesting propositions of the role of being the primary bearers of representational properties and truth-conditions and fittingly transferring this role to the token acts of predication that people perform when they are thinking or speaking about the world, he has situated truth in its proper place and obviated any need for abstractions like propositions to explain how language can express things that are true. This leaves propositions with the extremely modest role of classifying mental states and speech acts for the purposes of identifying and individuating them. It is demonstrated here however that there is no need whatsoever to posit such abstract entities to explain how people identify and individuate such states/acts. We therefore make the modest proposal that the term ‘proposition’ be stricken from the vocabulary of philosophers of language.

Keywords: propositions, truth-conditions, predication, Frege, truth-bearers

Procedia PDF Downloads 43
2445 A Multivariate Analysis of Patent Price Variations in the Emerging United States Patent Auction Market: Role of Patent, Seller, and Bundling Related Characteristics

Authors: Pratheeba Subramanian, Anjula Gurtoo, Mary Mathew

Abstract:

Transaction of patents in emerging patent markets is gaining momentum. Pricing patents for a transaction say patent sale remains a challenge. Patents vary in their pricing with some patents fetching higher prices than others. Sale of patents in portfolios further complicates pricing with multiple patents playing a role in pricing a bundle. In this paper, a set of 138 US patents sold individually as single invention lots and 462 US patents sold in bundles of 120 portfolios are investigated to understand the dynamics of selling prices of singletons and portfolios and their determinants. Firstly, price variations when patents are sold individually as singletons and portfolios are studied. Multivariate statistical techniques are used for analysis both at the lot level as well as at the individual patent level. The results show portfolios fetching higher prices than singletons at the lot level. However, at the individual patent level singletons show higher prices than per patent price of individual patent members within the portfolio. Secondly, to understand the price determinants, the effect of patent, seller, and bundling related characteristics on selling prices is studied separately for singletons and portfolios. The results show differences in the set of characteristics determining prices of singletons and portfolios. Selling prices of singletons are found to be dependent on the patent related characteristics, unlike portfolios whose prices are found to be dependent on all three aspects – patent, seller, and bundling. The specific patent, seller and bundling characteristics influencing selling price are discussed along with the implications.

Keywords: auction, patents, portfolio bundling, seller type, selling price, singleton

Procedia PDF Downloads 314
2444 Ongoing Gender-Based Challenges in Post-2015 Development Agenda: A Comparative Study between Qatar and Arab States

Authors: Abdel-Samad M. Ali, Ali A. Hadi Al-Shawi

Abstract:

Discrimination against women and girls impairs progress in all domains of development articulated either in the framework of Millennium Development Goals (MDGs) or in the Post-2015 Development Agenda. Paper aspires to create greater awareness among researchers and policy makers of the challenges posed by gender gaps and the opportunities created by reducing them within the Arab region. The study reveals how Arab countries are closing in on gender-oriented targets of the third and fifth MDGs. While some countries can claim remarkable achievements particularly in girls’ equality in education, there is still a long way to go to keep Arab’s commitments to current and future generations in other countries and subregions especially in the economic participation or in the political empowerment of women. No country has closed or even expected to close the economic participation gap or the political empowerment gap. This should provide the incentive to keep moving forward in the Post-2015 Agenda. Findings of the study prove that while Arab states have uneven achievements in reducing maternal mortality, Arab women remain at a disadvantage in the labour market. For Arab region especially LDCs, improving maternal health is part of the unmet agenda for the post-2015 period and still calls for intensified efforts and procedures. While antenatal care coverage is improving across the Arab region, progress is marginal in LDCs. To achieve proper realization of gender equality and empowerment of women in the Arab region in the post-2015 agenda, the study presents critical key challenges to be addressed. These challenges include: Negative cultural norms and stereotypes; violence against women and girls; early marriage and child labour; women’s limited control over their own bodies; limited ability of women to generate their own income and control assets and property; gender-based discrimination in law and in practice; women’s unequal participation in private and public decision making autonomy; and limitations in data. However, in all Arab states, gender equality must be integrated as a goal across all issues, particularly those that affect the future of a country.

Keywords: gender, equity, millennium development goals, post-2015 development agenda

Procedia PDF Downloads 243
2443 Red Dawn in the Desert: A World-Systems Analysis of the Maritime Silk Road Initiative

Authors: Toufic Sarieddine

Abstract:

The current debate on the hegemonic impact of China’s Belt and Road Initiative (BRI) is of two opposing strands: Resilient and absolute US hegemony on the one hand and various models of multipolar hegemony such as bifurcation on the other. Bifurcation theories illustrate an unprecedented division of hegemonic functions between China and the US, whereby Beijing becomes the world’s economic hegemon, leaving Washington the world’s military hegemon and security guarantor. While consensus points to China being the main driver of unipolarity’s rupturing, the debate among bifurcationists is on the location of the first rupture. In this regard, the Middle East and North Africa (MENA) region has seen increasing Chinese foreign direct investment in recent years while that to other regions has declined, ranking it second in 2018 as part of the financing for the Maritime Silk Road Initiative (MSRI). China has also become the top trade partner of 11 states in the MENA region, as well as its top source of machine imports, surpassing the US and achieving an overall trade surplus almost double that of Washington’s. These are among other features outlined in world-systems analysis (WSA) literature which correspond with the emergence of a new hegemon. WSA is further utilized to gauge other facets of China’s increasing involvement in MENA and assess whether bifurcation is unfolding therein. These features of hegemony include the adoption of China’s modi operandi, economic dominance in production, trade, and finance, military capacity, cultural hegemony in ideology, education, and language, and the promotion of a general interest around which to rally potential peripheries (MENA states in this case). China’s modi operandi has seen some adoption with regards to support against the United Nations Convention on the Law of the Sea, oil bonds denominated in the yuan, and financial institutions such as the Shanghai Gold Exchange enjoying increasing Arab patronage. However, recent elections in Qatar, as well as liberal reforms in Saudi Arabia, demonstrate Washington’s stronger normative influence. Meanwhile, Washington’s economic dominance is challenged by China’s sizable machine exports, increasing overall imports, and widening trade surplus, but retains some clout via dominant arms and transport exports, as well as free-trade deals across the region. Militarily, Washington bests Beijing’s arms exports, has a dominant and well-established presence in the region, and successfully blocked Beijing’s attempt to penetrate through the UAE. Culturally, Beijing enjoys higher favorability in Arab public opinion, and its broadcast networks have found some resonance with Arab audiences. In education, the West remains MENA students’ preferred destination. Further, while Mandarin has become increasingly available in schools across MENA, its usage and availability still lag far behind English. Finally, Beijing’s general interest in infrastructure provision and prioritizing economic development over social justice and democracy provides an avenue for increased incorporation between Beijing and the MENA region. The overall analysis shows solid progress towards bifurcation in MENA.

Keywords: belt and road initiative, hegemony, Middle East and North Africa, world-systems analysis

Procedia PDF Downloads 87
2442 Need for Privacy in the Technological Era: An Analysis in the Indian Perspective

Authors: Amrashaa Singh

Abstract:

In the digital age and the large cyberspace, Data Protection and Privacy have become major issues in this technological era. There was a time when social media and online shopping websites were treated as a blessing for the people. But now the tables have turned, and the people have started to look at them with suspicion. They are getting aware of the privacy implications, and they do not feel as safe as they used to initially. When Edward Snowden informed the world about the snooping United States Security Agencies had been doing, that is when the picture became clear for the people. After the Cambridge Analytica case where the data of Facebook users were stored without their consent, the doubts arose in the minds of people about how safe they actually are. In India, the case of spyware Pegasus also raised a lot of concerns. It was used to snoop on a lot of human right activists and lawyers and the company which invented the spyware claims that it only sells it to the government. The paper will be dealing with the privacy concerns in the Indian perspective with an analytical methodology. The Supreme Court here had recently declared a right to privacy a Fundamental Right under Article 21 of the Constitution of India. Further, the Government is also working on the Data Protection Bill. The point to note is that India is still a developing country, and with the bill, the government aims at data localization. But there are doubts in the minds of many people that the Government would actually be snooping on the data of the individuals. It looks more like an attempt to curb dissenters ‘lawfully’. The focus of the paper would be on these issues in India in light of the European Union (EU) General Data Protection Regulation (GDPR). The Indian Data Protection Bill is also said to be loosely based on EU GDPR. But how helpful would these laws actually be is another concern since the economic and social conditions in both countries are very different? The paper aims at discussing these concerns, how good or bad is the intention of the government behind the bill, and how the nations can act together and draft common regulations so that there is some uniformity in the laws and their application.

Keywords: Article 21, data protection, dissent, fundamental right, India, privacy

Procedia PDF Downloads 104
2441 Using Large Databases and Interviews to Explore the Temporal Phases of Technology-Based Entrepreneurial Ecosystems

Authors: Elsie L. Echeverri-Carroll

Abstract:

Entrepreneurial ecosystems have become an important concept to explain the birth and sustainability of technology-based entrepreneurship within regions. However, as a theoretical concept, the temporal evolution of entrepreneurship systems remain underdeveloped, making it difficult to understand their dynamic contributions to entrepreneurs. This paper argues that successful technology-based ecosystems go over three cumulative spawning stages: corporate spawning, entrepreneurial spawning, and community spawning. The importance of corporate incubation in vibrant entrepreneurial ecosystems is well documented in the entrepreneurial literature. Similarly, entrepreneurial spawning processes for venture capital-backed startups are well documented in the financial literature. In contrast, there is little understanding of both the third stage of entrepreneurial spawning (when a community of entrepreneurs become a source of firm spawning) and the temporal sequence in which spawning effects occur in a region. We test this three-stage model of entrepreneurial spawning using data from two large databases on firm births—the Secretary of State (160,000 observations) and the National Establishment Time Series (NEST with 150,000 observations)—and information collected from 60 1½-hour interviews with startup founders and representatives of key entrepreneurial organizations. This temporal model is illustrated with case study of Austin, Texas ranked by the Kauffman Foundation as the number one entrepreneurial city in the United States in 2015 and 2016. The 1½-year study founded by the Kauffman Foundation demonstrates the importance of taken into consideration the temporal contributions of both large and entrepreneurial firms in understanding the factors that contribute to the birth and growth of technology-based entrepreneurial regions. More important, these learnings could offer an important road map for regions that pursue to advance their entrepreneurial ecosystems.

Keywords: entrepreneurial ecosystems, entrepreneurial industrial clusters, high-technology, temporal changes

Procedia PDF Downloads 254
2440 Using Fly Ash Based Synthetic Zeolite Permeable Reactive Barrier to Remove Arsenic, Cadmium, and their Mixture from Aqueous Solution

Authors: Mozhgan Bahadory, Gholam-Hossein Rostami

Abstract:

Over the next quarter of a century, the US government and the private sector will spend billions of dollars annually to clean the contaminated sites from pollution such as petroleum products, heavy metals, and solvents organic compounds. During the past three decades, almost 750,000 sites that require remediation have been reported to the United States federal and state agencies. Out of these contamination sites, approximately 300,000 are still in need of remediation. In these sites, the most widespread forms of contamination are petroleum products and heavy metals. At least half of US Department of Defense, US Department of Energy, Superfund sites, and Resource Conservation and Recovery Act (RCRA) sites have been reported to contain heavy metals. Heavy metals most often found in the contaminated water are lead, mercury, chromium, cadmium, arsenic, and zinc. This investigation emphasizes the elimination of arsenic and cadmium from aqueous solution. During the past several years, we developed a novel material called Alkali-Activated fly ash Material Permeable Reactive Barrier (AAM-PRB), which includes fly ash, fine aggregates, coarse aggregates, activating chemicals, and water. AAM can be produced with high permeability, 10-1 cm/s, then crushed into pelletized form. Laboratory experiments showed that water containing 10 ppm, 100 ppm, and 1000 ppm of arsenic and cadmium ion passing through AAM-PRB reduced to less than 0.1 ppm. However, water containing 10,000 ppm arsenic ion passing through AAM- PRB shows that the breakthrough was achieved. The removal of the mixture of arsenic and cadmium from aqueous solutions was also tested by using AAM-PRB. The results indicate that the efficiency of AAM-PRB for simultaneous removal of arsenic and cadmium from 10 ppm, 100 ppm, and 1,000 ppm were marginally below that of arsenic alone. Still, it was significantly lower for cadmium from the aqueous solution. The basic science behind removing heavy metal and microstructural investigation AAM-PRB will be the focus of our future work.

Keywords: arsenic, cadmium, contaminated water, fly ash, permeability, reactive barrier

Procedia PDF Downloads 51
2439 21st Century Gunboat Diplomacy and Strategic Sea Areas

Authors: Mustafa Avsever

Abstract:

Throughout history, states have attached great importance to seas in terms of economic and security. Advanced civilizations have always founded in coastal regions. Over time, human being has tended to trade and naturally always aimed get more and more. Seas by covering 71% of the earth, provide the greatest economic opportunities for access to raw material resources and the world market. As a result, seas have become the most important areas of conflict over the course of time. Coastal states, use seas as a tool for defense zone, trade, marine transportation and power transfer, they have acquired colonies overseas and increased their capital, raw materials and labor. Societies, have increased their economic prosperity, though their navies in order to retain their welfare and achieve their foreign policy objectives. Sometimes they have imposed their demands through the use or threat of limited naval force in accordance with their interests that is gunboat diplomacy. Today we can see samples of gunboat diplomacy used in the Eastern Mediterranean, during Ukraine crisis, in dispute between North Korea and South Korea and the ongoing power struggle in Asia-Pacific. Gunboat diplomacy has been and continues to be applied consistently in solving problems by the stronger side of the problem. The purpose of this article is to examine using navy under the gunboat diplomacy as an active instrument of foreign policy and security policy and reveal the strategic sea areas in which gunboat diplomacy is used effectively in the matrix of international politics in the 21st century.

Keywords: gunboat diplomacy, maritime strategy, sea power, strategic sea lands

Procedia PDF Downloads 420
2438 Authentication and Legal Admissibility of 'Computer Evidence from Electronic Voting Machines' in Electoral Litigation: A Qualitative Legal Analysis of Judicial Opinions of Appellate Courts in the USA

Authors: Felix O. Omosele

Abstract:

Several studies have established that electronic voting machines are prone to multi-faceted challenges. One of which is their capacity to lose votes after the ballots might have been cast. Therefore, the international consensus appears to favour the use of electronic voting machines that are accompanied with verifiable audit paper audit trail (VVPAT). At present, there is no known study that has evaluated the impacts (or otherwise) of this verification and auditing on the authentication, admissibility and evidential weight of electronically-obtained electoral data. This legal inquiry is important as elections are sometimes won or lost in courts and on the basis of such data. This gap will be filled by the present research work. Using the United States of America as a case study, this paper employed a qualitative legal analysis of several of its appellate courts’ judicial opinions. This analysis equally unearths the necessary statutory rules and regulations that are important to the research problem. The objective of the research is to highlight the roles played by VVPAT on electoral evidence- as seen from the eyes of the court. The preliminary outcome of this qualitative analysis shows that the admissibility and weight attached to ‘Computer Evidence from e-voting machines (CEEM)’ are often treated with general standards applied to other computer-stored evidence. These standards sometimes fail to embrace the peculiar challenges faced by CEEM, particularly with respect to their tabulation and transmission. This paper, therefore, argues that CEEM should be accorded unique consideration by courts. It proposes the development of a legal standard which recognises verification and auditing as ‘weight enhancers’ for electronically-obtained electoral data.

Keywords: admissibility of computer evidence, electronic voting, qualitative legal analysis, voting machines in the USA

Procedia PDF Downloads 179
2437 Social Impact Bonds in the US Context

Authors: Paula M. Lantz

Abstract:

In the United States, significant socioeconomic and racial inequalities exist in many population-based indicators of health and social welfare. Although a number of effective prevention programs and interventions are available, local and state governments often do not pursue prevention in the face of budgetary constraints and more acute problems. There is growing interest in and excitement about Pay for Success” (PFS) strategies, also referred to as social impact bonds, as an approach to financing and implementing promising prevention programs and services that help the public sector either save money or achieve greater value for an investment. The PFS finance model implements evidence-based interventions using capital from investors who only receive a return on their investment from the government if agreed-upon, measurable outcomes are achieved. This paper discusses the current landscape regarding social impact bonds in the U.S., and their potential and challenges in addressing serious health and social problems. The paper presents an analysis of a number of social science issues that are fundamental to the potential for social impact bonds to successfully address social inequalities in health and social welfare. This includes: a) the economics of the intervention and a potential public payout; b) organizational and management issues in intervention implementation; c) evaluation research design and methods; d) legal/regulatory issues in public payouts to investors; e) ethical issues in the design of social impact bond deals and their evaluation; and f) political issues. Despite significant challenges in the U.S. context, there is great potential for social impact bonds as a type of social impact investing to encourage private investments in evidence-based interventions that address important public health and social problems in underserved populations and provide a return on investment.

Keywords: pay for success, public/private partnerships, social impact bonds, social impact investing

Procedia PDF Downloads 284
2436 Total Life Cycle Cost and Life Cycle Assessment of Mass Timber Buildings in the US

Authors: Hongmei Gu, Shaobo Liang, Richard Bergman

Abstract:

With current worldwide trend in designs to have net-zero emission buildings to mitigate climate change, widespread use of mass timber products, such as Cross Laminated Timber (CLT), or Nail Laminated Timber (NLT) or Dowel Laminated Timber (DLT) in buildings have been proposed as one approach in reducing Greenhouse Gas (GHG) emissions. Consequentially, mass timber building designs are being adopted more and more by architectures in North America, especially for mid- to high-rise buildings where concrete and steel buildings are currently prevalent, but traditional light-frame wood buildings are not. Wood buildings and their associated wood products have tended to have lower environmental impacts than competing energy-intensive materials. It is common practice to conduct life cycle assessments (LCAs) and life cycle cost analyses on buildings with traditional structural materials like concrete and steel in the building design process. Mass timber buildings with lower environmental impacts, especially GHG emissions, can contribute to the Net Zero-emission goal for the world-building sector. However, the economic impacts from CLT mass timber buildings still vary from the life-cycle cost perspective and environmental trade-offs associated with GHG emissions. This paper quantified the Total Life Cycle Cost and cradle-to-grave GHG emissions of a pre-designed CLT mass timber building and compared it to a functionally-equivalent concrete building. The Total life cycle Eco-cost-efficiency is defined in this study and calculated to discuss the trade-offs for the net-zero emission buildings in a holistic view for both environmental and economic impacts. Mass timber used in buildings for the United States is targeted to the materials from the nation’s sustainable managed forest in order to benefit both national and global environments and economies.

Keywords: GHG, economic impact, eco-cost-efficiency, total life-cycle costs

Procedia PDF Downloads 118
2435 The Crossroads of Corruption and Terrorism in the Global South

Authors: Stephen M. Magu

Abstract:

The 9/11 and Christmas bombing attacks in the United States are mostly associated with the inability of intelligence agencies to connect dots based on intelligence that was already available. The 1998, 2002, 2013 and several 2014 terrorist attacks in Kenya, on the other hand, are probably driven by a completely different dynamic: the invisible hand of corruption. The World Bank and Transparency International annually compute the Worldwide Governance Indicators and the Corruption Perception Index respectively. What perhaps is not adequately captured in the corruption metrics is the impact of corruption on terrorism. The World Bank data includes variables such as the control of corruption, (estimates of) government effectiveness, political stability and absence of violence/terrorism, regulatory quality, rule of law and voice and accountability. TI's CPI does not include measures related to terrorism, but it is plausible that there is an expectation of some terrorism impact arising from corruption. This paper, by examining the incidence, frequency and total number of terrorist attacks that have occurred especially since 1990, and further examining the specific cases of Kenya and Nigeria, argues that in addition to having major effects on governance, corruption has an even more frightening impact: that of facilitating and/or violating security mechanisms to the extent that foreign nationals can easily obtain identification that enables them to perpetuate major events, targeting powerful countries' interests in countries with weak corruption-fighting mechanisms. The paper aims to model interactions that demonstrate the cost/benefit analysis and agents' rational calculations as being non-rational calculations, given the ultimate impact. It argues that eradication of corruption is not just a matter of a better business environment, but that it is implicit in national security, and that for anti-corruption crusaders, this is an argument more potent than the economic cost / cost of doing business argument.

Keywords: corruption, global south, identification, passports, terrorism

Procedia PDF Downloads 411
2434 An Investigation into the Ideological Facets Involved in Western Interpretations of the History of Communism

Authors: Anna Stoutenburg

Abstract:

With the rise of the so-called 'new left' within the United States, marked by social democratic figures such as Bernie Sanders and Alexandria Ocasio-Cortez, significant questions have been raised in response to those who would identify with the term 'socialist'. These queries typically revolve around the negatively perceived legacy of past and present countries that share the term in question, with the stark conclusion that not only is socialism a structure that does not work economically, but that it also tends to inflict more harm on those living under it that would be endured in a country functioning under capitalism. In order to examine these claims, the goal of this paper is to examine the legacy of anti-communist historiography in a western context, with the Union of Soviet Socialist Republics, China, and modern Venezuela used as case studies for how this phenomenon operates. Not only will key portions of each nation’s history be re-examined, but there will also be a critical analysis of source cultivation and usage among western historians. The intent of this paper is not merely to deride previous attempts at historicizing and reporting on the events of the nations, but rather to attempt to glean a clearer picture that is free from anti-communist sentiments. Theoretical works that will be consulted in order to define this project are 'The Historiography of Communism' by Michael Brown, as well as 'Beyond Philosophy: Ethics, History, Marxism, and Liberation Theology' by Enrique Dussel. The latter will provide insights concerning why these questions are relevant in a larger context, namely by articulating how the means of liberation understood through an analectic method can be achieved structurally. For a majority of leftists, this question is integral, and by using history as a tool, the ways that political organizing can be used can be better understood, bridging the gap between the common assumption that the communist legacy is a dire one and the idea that it is something which needs to be completely lauded.

Keywords: anti-communism, history, ideology, Marxism

Procedia PDF Downloads 105
2433 Jail Reentry in Rural America: A Quasi-Experimental Examination of a Rural Behavioral Health Reentry Program

Authors: Debra L. Stanley, Gabriela Wasileski

Abstract:

Offenders face many challenges as they transition from being incarcerated to the community, ranging from housing and employment needs to long standing problems with addictions and mental health issues. A lack of appropriate behavioral health services in the more remote parts of the United States has led to a significant illegal substance abuse problem, housing instability, and unaddressed mental health and trauma issues. High rates of poverty and unemployment exacerbate the growing behavioral health issues, drug overdoses, co-occurring disorders, and crime that are so prevalent across rural communities. This study examines the challenges of rural jail reentry faced by offenders in a treatment capacity. The client-centered evidence-based program is uniquely designed to provide continuity of care that focuses on issues which affect rural communities. Prior to release from jail, individuals go through comprehensive assessment screenings to measure mental health and substance use disorder as well as trauma and prior crime victimization histories; the assessments help to target client-specific services. The quasi-experimental research design tracks clients throughout their recovery and reintegration into the community. Individuals in a rural program often do not have the benefit of easy access or peer mentoring that is so often found in urban recovery programs. Therefore, much of the support is provided through telehealth and e-services. The goal of this study is to explore the nature of rural reentry programs and measures of recidivism, drug overdoses, and other behavioral health needs and successful reentry to include stable housing and employment.

Keywords: jail reentry, rehabilitation, behavioral health, drug abuse, recidivism

Procedia PDF Downloads 75
2432 Women Academics' Insecure Identity at Work: A Millennials Phenomenon

Authors: Emmanouil Papavasileiou, Nikos Bozionelos, Liza Howe-Walsh, Sarah Turnbull

Abstract:

Purpose: The research focuses on women academics’ insecure identity at work and examines its link with generational identity. The aim is to enrich understanding of identities at work as a crucial attribute of managing academics in the context of the proliferation of managerialist controls of audit, accountability, monitoring, and performativity. Methodology: Positivist quantitative methodology was utilized. Data were collected from the Scientific Women's Academic Network (SWAN) Charter. Responses from 155 women academics based in the British Higher Education system were analysed. Findings: Analysis showed high prevalence of strong imposter feelings among participants, suggesting high insecurity at work among women academics in the United Kingdom. Generational identity was related to imposter feelings. In particular, Millennials scored significantly higher than the other generational groups. Research implications: The study shows that imposter feelings are variously manifested among the prevalent generations of women academics, while generational identity is a significant antecedent of such feelings. Research limitations: Caution should be exercised in generalizing the findings to national cultural contexts beyond the United Kingdom. Practical and social implications: Contrary to popular depictions of Millennials as self-centered, narcissistic, materialistic and demanding, women academics who are members of this generational group appear significantly more insecure than the preceding generations. Value: The study provides insightful understandings into women academics’ identity at work as a function of generational identity, and provides a fruitful avenue for further research within and beyond this gender group and profession.

Keywords: academics, generational diversity, imposter feelings, United Kingdom, women, work identity

Procedia PDF Downloads 128
2431 Impact of America's Anti-Ballistic Missile System (ABMS) on Power Dynamics of the World

Authors: Fehmeen Anwar, Ujala Liaqat

Abstract:

For over half a century, U.S. and the Soviet Union have been at daggers drawn with each other. Both leading powers of the world have been struggling hard to surpass each other in military and other technological fields. This neck-to-neck competition turned in favour of U.S. in the early 1990s when USSR had to face economic stagnation and later dismemberment of several of its states. The predominance of U.S. is still evident to date, rather it continues to grow. With this proposed defence program i.e. Anti-Ballistic Missile System, the U.S. will have a considerable chance of intercepting any nuclear strike by Russia, which re-asserts U.S. dominance in the region and creating a security dilemma for Russia and other states. The question is whether America’s recent nuclear deterrence project is merely to counter nuclear threats from Iran and North Korea or is it purely directed towards Russia, thus ensuring complete military supremacy in the world. Although U.S professes to direct its Anti-Ballistic Missile System (ABMS) against the axis of evil (Iran and North Korea), yet the deployment of this system in the East European territory undermines the Russian nuclear strategic capability, as this enables U.S. to initiate an attack and guard itself from retaliatory strike, thus disturbing the security equilibrium in Europe. The implications of this program can lead to power imbalance which can lead to the emergence of fundamentally different paradigm of international politics.

Keywords: Anti-Ballistic Missile System (ABMS), cold-war, axis of evil, power dynamics

Procedia PDF Downloads 279
2430 The Cost-Effectiveness of High-Volume Hospital’s Surgical Care for Pancreatic Cancer: Economic Evidence Reviewed

Authors: Shannon Hearney, Jeffrey Hoch

Abstract:

Pancreatic cancer is a notoriously costly and deadly form of cancer. Many types of treatment centers exist for patients to seek care from, including high-volume centers which have shown promise to provide the highest quality of care. While it may be true that this type of center provides the best care it is unclear if that care is cost-effective. Studies in the US have confirmed that high-volume hospitals do provide higher quality of care but have shown inconsistencies in the cost-effectiveness of that care. Other studies, like those from Finland have shown that high-volume centers had lower mortality and lower costs than low-volume centers. This paper thus seeks to review the current scientific literature to better understand if high-volume centers are cost-effective in delivering care in both a European setting and in the US. A review of major reference databases such as Medline, Embase and PubMed will be conducted for cost-effectiveness studies on the surgical treatment of pancreatic cancer at high-volume centers. Possible MeSH terms to be included, but not limited to, are: “pancreatic cancer”, “cost analysis”, “cost-effectiveness”, “economic evaluation”, “pancreatic neoplasms”, “surgical”, and “high-volume”. Studies must also have been available in the English language. This review will encompass European scientific literature, as well as those in the US. Based on our preliminary findings, we anticipate high-volume hospitals to provide better care at greater costs. We anticipate that high-volume hospitals may be cost-effective in different contexts depending on the national structure of a healthcare system. Countries with more centralized and socialized healthcare may yield results that are more cost-effective. High-volume centers may differ in their cost-effectiveness of the surgical care of pancreatic cancer internationally especially when comparing those in the United States to others throughout Europe.

Keywords: cost-effectiveness analysis, economic evaluation, pancreatic cancer, scientific literature review

Procedia PDF Downloads 77
2429 The Dark Side of the Fight against Organised Crime

Authors: Ana M. Prieto del Pino

Abstract:

As is well known, UN Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances (1988) was a landmark regarding the seizure of proceeds of crime. Depriving criminals of the profits from their activity became a priority at an international level in the fight against organised crime. Enabling confiscation of proceeds of illicit traffic in narcotic drugs and psychotropic substances, criminalising money laundering and confiscating the proceeds thereof are the three measures taken in order to achieve that purpose. The beginning of 21st century brought the declaration of war on corruption and on the illicit enjoyment of the profits thereof onto the international scene. According to the UN Convention against Transnational Organised Crime (2000), States Parties should adopt the necessary measures to enable the confiscation of proceeds of crime derived from offences (or property of equivalent value) and property, equipment and other instrumentalities used in offences covered by that Convention. The UN Convention against Corruption (2003) states asset recovery explicitly as a fundamental principle and sets forth measures aiming at the direct recovery of property through international cooperation in confiscation. Furthermore, European legislation has made many significant strides forward in less than twenty years concerning money laundering, confiscation, and asset recovery. Crime does not pay, let there be no doubt about it. Nevertheless, we must be very careful not to sing out of tune with individual rights and legal guarantees. On the one hand, innocent individuals and businesses must be protected, since they should not pay for the guilty ones’ faults. On the other hand, the rule of law must be preserved and not be tossed aside regarding those who have carried out criminal activities. An in-depth analysis of judicial decisions on money laundering and confiscation of proceeds of crime issued by European national courts and by the European Court of Human Rights in the last decade has been carried out from a human rights, legal guarantees and criminal law basic principles’ perspective. The undertaken study has revealed the violation of the right to property, of the proportionality principle legal and the infringement of basic principles of states’ domestic substantive and procedural criminal law systems. The most relevant ones have to do with the punishment of money laundering committed through negligence, non-conviction based confiscation and a too-far reaching interpretation of the notion of ‘proceeds of crime’. Almost everything in life has a bright and a dark side. Confiscation of criminal proceeds and asset recovery are not an exception to this rule.

Keywords: confiscation, human rights, money laundering, organized crime

Procedia PDF Downloads 128
2428 A Critical-Quantitative Approach to Examine the Effects of Systemic Factors on Education Outcomes

Authors: Sireen Irsheid

Abstract:

Despite concerted efforts to improve education attainment with progress in recent years, student achievement and attainment remain among the most significant challenges for school districts across the United States. Many scholars have argued that students who do not complete high school do not drop out of school voluntarily but are ‘pushed out’ of schools through multiple mechanisms related to structural and socioeconomic barriers, behavioral health challenges, pedagogical practices, and administrative procedures. Extant literature has shown that living in historically disadvantaged neighborhoods or attending under-resourced schools exacerbates student-level risk factors for grade retention and school pushout. Most efforts to respond to the school pushout phenomenon have focused on individual characteristics of students, with relatively little attention to addressing these multiple system-level characteristics related to perpetuating inequities. This study is built on a growing body of social justice-oriented research concerned with the systemic influences that shape the experiences and mental health challenges of young people. Specifically, this study examined how young people who have been experiencing education inequities make meaning and navigate the structural factors related to neighborhood and school disinvestment and access to resources and supports, and their risk for school pushout. Furthermore, schools as political, cultural, and ideologically reproductive spaces often serve as sites of resistance and can support students who are impacted by educational inequity. Study findings provide education, neighborhood, school psychology, social work practice, and policy considerations.

Keywords: education policy, mental health, school prison nexus, school pushout, structural trauma

Procedia PDF Downloads 48
2427 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment

Authors: Atma Sahu

Abstract:

After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.

Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems

Procedia PDF Downloads 66
2426 The Status of Precision Agricultural Technology Adoption on Row Crop Farms vs. Specialty Crop Farms

Authors: Shirin Ghatrehsamani

Abstract:

Higher efficiency and lower environmental impact are the consequence of using advanced technology in farming. They also help to decrease yield variability by diminishing weather variability impact, optimizing nutrient and pest management as well as reducing competition from weeds. A better understanding of the pros and cons of applying technology and finding the main reason for preventing the utilization of the technology has a significant impact on developing technology adoption among farmers and producers in the digital agriculture era. The results from two surveys carried out in 2019 and 2021 were used to investigate whether the crop types had an impact on the willingness to utilize technology on the farms. The main focus of the questionnaire was on utilizing precision agriculture (PA) technologies among farmers in some parts of the united states. Collected data was analyzed to determine the practical application of various technologies. The survey results showed more similarities in the main reason not to use PA between the two crop types, but the present application of using technology in specialty crops is generally five times larger than in row crops. GPS receiver applications were reported similar for both types of crops. Lack of knowledge and high cost of data handling were cited as the main problems. The most significant difference was among using variable rate technology, which was 43% for specialty crops while was reported 0% for row crops. Pest scouting and mapping were commonly used for specialty crops, while they were rarely applied for row crops. Survey respondents found yield mapping, soil sampling map, and irrigation scheduling were more valuable for specialty crops than row crops in management decisions. About 50% of the respondents would like to share the PA data in both types of crops. Almost 50 % of respondents got their PA information from retailers in both categories, and as the second source, using extension agents were more common in specialty crops than row crops.

Keywords: precision agriculture, smart farming, digital agriculture, technology adoption

Procedia PDF Downloads 93