Search results for: personal cyber insurance
2790 Solution of Insurance Pricing Model Giving Optimum Premium Level for Both Insured and Insurer by Game Theory
Authors: Betul Zehra Karagul
Abstract:
A game consists of strategies that each actor has in his/her own choice strategies, and a game regulates the certain rules in the strategies that the actors choose, express how they evaluate their knowledge and the utility of output results. Game theory examines the human behaviors (preferences) of strategic situations in which each actor of a game regards the action that others will make in spite of his own moves. There is a balance between each player playing a game with the final number of players and the player with a certain probability of choosing the players, and this is called Nash equilibrium. The insurance is a two-person game where the insurer and insured are the actors. Both sides have the right to act in favor of utility functions. The insured has to pay a premium to buy the insurance cover. The insured will want to pay a low premium while the insurer is willing to get a high premium. In this study, the state of equilibrium for insurance pricing was examined in terms of the insurer and insured with game theory.Keywords: game theory, insurance pricing, Nash equilibrium, utility function
Procedia PDF Downloads 3622789 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours
Authors: Elham Rajabian
Abstract:
The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture
Procedia PDF Downloads 972788 The Impact of Personal Identity on Self-Esteem among Muslim Adolescents
Authors: Nadia Ayub
Abstract:
The purpose of the study was to explore the impact of personal identity on self-esteem among adolescents. Two hypotheses were tested in the study, i.e., personal identity effects on self-esteem; and gender difference in the variables of personal identity and self-esteem. The total of 300 (150 female; 150 male) adolescents participated in the study. Personal identity scale (Ayub, N., In Press), and self-esteem scale (Rosenberg, 1985) were administered. The findings of the study suggest that positive personal identity impact on self-esteem and gender difference was found on the variables of personal identity and self-esteem. In conclusion, the results of the study are beneficial for researchers, policymakers, psychologists. The strong positive personal identity and self-esteem help in healthy mental development not only in adolescence but throughout the life of individuals.Keywords: personal identity, self-esteem, adolescents, positive psychology
Procedia PDF Downloads 4012787 National Health Insurance: An Exploratory Study of Patient Satisfaction
Authors: Nihayatul Munaa, Nyoman A. Damayanti
Abstract:
This study seeks to understand what factors might influence a patient’s perception of health care under national health insurance in early implementation. In Indonesia, National Health Insurance was first implemented in 2014 and planned to achieve universal health coverage by 2019. However, the little understanding of this new policy lead to increase of complaint in hospital as a health care provider. This is a observational descriptive study with cross sectional design method. Data was collected through in-depth interview with 96 patient from Jemursari Islamic Hospital of Surabaya (Rumah Sakit Islam Jemursari Surabaya) who participate in National Health Insurance. Subject was selected by simple random sampling. The findings demonstrated that from five categories, 82,3% patient was satisfied in reliability aspect and 85,4% in assurance aspect, while in tangible, responsiveness and empathy aspect > 90% patient was satisfied. Meanwhile, in Indonesia, the minimum service standard of healthcare of patient satisfaction is 90%.Keywords: patient’s satisfaction, national health insurance, hospital, complaint
Procedia PDF Downloads 1912786 Power System Cyber Security Risk in the Era of Digital Transformation
Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim
Abstract:
Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.Keywords: supply chain, cybersecurity, maturity model, risk, smart grid
Procedia PDF Downloads 1142785 The Framework of System Safety for Multi Human-in-The-Loop System
Authors: Hideyuki Shintani, Ichiro Koshijima
Abstract:
In Cyber Physical System (CPS), if there are a large number of persons in the process, a role of person in CPS might be different comparing with the one-man system. It is also necessary to consider how Human-in-The-Loop Cyber Physical Systems (HiTLCPS) ensure safety of each person in the loop process. In this paper, the authors discuss a system safety framework with an illustrative example with STAMP model to clarify what point for safety should be considered and what role of person in the should have.Keywords: cyber-physical-system, human-in-the-loop, safety, STAMP model
Procedia PDF Downloads 3252784 A Comparative Analysis of Clustering Approaches for Understanding Patterns in Health Insurance Uptake: Evidence from Sociodemographic Kenyan Data
Authors: Nelson Kimeli Kemboi Yego, Juma Kasozi, Joseph Nkruzinza, Francis Kipkogei
Abstract:
The study investigated the low uptake of health insurance in Kenya despite efforts to achieve universal health coverage through various health insurance schemes. Unsupervised machine learning techniques were employed to identify patterns in health insurance uptake based on sociodemographic factors among Kenyan households. The aim was to identify key demographic groups that are underinsured and to provide insights for the development of effective policies and outreach programs. Using the 2021 FinAccess Survey, the study clustered Kenyan households based on their health insurance uptake and sociodemographic features to reveal patterns in health insurance uptake across the country. The effectiveness of k-prototypes clustering, hierarchical clustering, and agglomerative hierarchical clustering in clustering based on sociodemographic factors was compared. The k-prototypes approach was found to be the most effective at uncovering distinct and well-separated clusters in the Kenyan sociodemographic data related to health insurance uptake based on silhouette, Calinski-Harabasz, Davies-Bouldin, and Rand indices. Hence, it was utilized in uncovering the patterns in uptake. The results of the analysis indicate that inclusivity in health insurance is greatly related to affordability. The findings suggest that targeted policy interventions and outreach programs are necessary to increase health insurance uptake in Kenya, with the ultimate goal of achieving universal health coverage. The study provides important insights for policymakers and stakeholders in the health insurance sector to address the low uptake of health insurance and to ensure that healthcare services are accessible and affordable to all Kenyans, regardless of their socio-demographic status. The study highlights the potential of unsupervised machine learning techniques to provide insights into complex health policy issues and improve decision-making in the health sector.Keywords: health insurance, unsupervised learning, clustering algorithms, machine learning
Procedia PDF Downloads 1382783 Cyber Bullying Victimization of Elementary School Students and Their Reflections on the Victimization
Authors: Merve Sadetas Sezer, Ismail Sahin, Ahmet Oguz Akturk
Abstract:
With the use of developing technology, mostly in communication and entertainment, students spend considerable time on the internet. In addition to the advantages provided by the internet, social isolation brings problems such as addiction. This is one of the problems of the virtual violence. Cyber-bullying is the common name of the intensities which students are exposed on the internet. The purpose of this study designed as a qualitative research is to find out the cyber bullying varieties and its effects on elementary school students. The participants of this research are 6th, 7th and 8th grade students of a primary school and 24 students agreed to participate in the study. The students were asked to fill an interview with semi-structured open-ended questions. According to the results obtained in the research, the most important statements determined by the participants are breaking passwords on social networking sites, slang insult to blasphemy and taking friendship offers from unfamiliar people. According to participants from the research, the most used techniques to prevent themselves from cyber bullying are to complain to the site administrator, closing accounts on social networking sites and countercharging. Also, suggestions were presented according to the findings.Keywords: bullying, cyber-bullying, elementary, peer-relationship, virtual victimization
Procedia PDF Downloads 3492782 Adoption of Risk and Insurance among Aquaculture Producers in Khuzestan Province, Iran
Authors: Kiyanoush Ghalavand
Abstract:
Aquaculture production is inherently a risky business, and farmers face a variety of weather, pest, disease, inptut supply, and market related risks. There are many factors out farmers control and unpredictable. Insurance has an important role in aquaculture production and is a tool to support farmers against threats. Investigation of factors affecting aquaculture farmers' adoption of aquaculture insurance strategy was the objective of this study. The purpose of this study was determining the related factors to adoption of insurance by aquaculture farmers in Khuzestan province, Iran. The research design was a descriptive and correlation surveying method. Aquaculture farmers in Khuzestan province were the target population for this study. A random sample of aquaculture selected (N=1830, n =139). The main result of the study reveled that exist correlation between the level of education, knowledge about purpose of insurance, participation in extension course, visit with insurance organization, and contact with extension agents to the adoption of insurance by aquaculture farmers were significantly positive. By using Bartlett's test and KMO test, determine whether research variables are appropriate for factor analysis (Sig = 0.000, Bartlett test = 0.9724, KMO = 0.74). The number of factors was determined using a split plot, eigenvalue, and percent of variance. An examination of the items and their factors loadings was used to understand the nature of the nine factors. To reduce subjectivity, items with factor loading equal to or greater than 0.5 were considered most important when factors were labeled. The nine factors were labeled (1) Extension and education activities, (2) Economical characteristics, (3) Governmental support, (4) communicational channel, (5) local leaders, (6) Facilitate in given damage (7) Motivation establishing, (8) Given damage in appropriate methods and (9) Appropriate activities by insurance organization. The results obtained from the factors analysis reveal that the nine factors explain percentage75 of the variation of the adoption of insurance of the adoption of insurance by aquaculture farmers in Khuzestan province.Keywords: aquaculture farmers, insurance, factorial analysis, Khuzestan province, risks
Procedia PDF Downloads 1512781 Machine Learning-Based Techniques for Detecting and Mitigating Cyber-attacks on Automatic Generation Control in Smart Grids
Authors: Sami M. Alshareef
Abstract:
The rapid growth of smart grid technology has brought significant advancements to the power industry. However, with the increasing interconnectivity and reliance on information and communication technologies, smart grids have become vulnerable to cyber-attacks, posing significant threats to the reliable operation of power systems. Among the critical components of smart grids, the Automatic Generation Control (AGC) system plays a vital role in maintaining the balance between generation and load demand. Therefore, protecting the AGC system from cyber threats is of paramount importance to maintain grid stability and prevent disruptions. Traditional security measures often fall short in addressing sophisticated and evolving cyber threats, necessitating the exploration of innovative approaches. Machine learning, with its ability to analyze vast amounts of data and learn patterns, has emerged as a promising solution to enhance AGC system security. Therefore, this research proposal aims to address the challenges associated with detecting and mitigating cyber-attacks on AGC in smart grids by leveraging machine learning techniques on automatic generation control of two-area power systems. By utilizing historical data, the proposed system will learn the normal behavior patterns of AGC and identify deviations caused by cyber-attacks. Once an attack is detected, appropriate mitigation strategies will be employed to safeguard the AGC system. The outcomes of this research will provide power system operators and administrators with valuable insights into the vulnerabilities of AGC systems in smart grids and offer practical solutions to enhance their cyber resilience.Keywords: machine learning, cyber-attacks, automatic generation control, smart grid
Procedia PDF Downloads 852780 The Nexus between Counter Terrorism and Human Rights with a Perspective on Cyber Terrorism
Authors: Allan Munyao Mukuki
Abstract:
The nexus between terrorism and human rights has become a big challenge in the fight against terrorism globally. This is hinged on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognised in the Vienna Declaration and Programme of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, terrorism constitutes an assault on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitisation’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then concludes with recommendations on how to balance counter-terrorism and human rights in the modern age.Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation
Procedia PDF Downloads 4032779 Strategies in Customer Relationship Management and Customers’ Behavior in Making Decision on Buying Car Insurance of Southeast Insurance Co. Ltd. in Bangkok
Authors: Nattapong Techarattanased, Paweena Sribunrueng
Abstract:
The objective of this study is to investigate strategies in customer relationship management and customers’ behavior in making decision on buying car insurance of Southeast Insurance Co. Ltd. in Bangkok. Subjects in this study included 400 customers with the age over 20 years old to complete questionnaires. The data were analyzed by arithmetic mean and multiple regressions. The results revealed that the customers’ opinions on the strategies in customer relationship management, i.e. customer relationship, customer feedback, customer follow-up, useful service suggestions, customer communication, and service channels were in moderate level but on the customer retention was in high level. Moreover, the strategy in customer relationship management, i.e. customer relationship, and customer feedback had an influence on customers’ buying decision on buying car insurance. The two factors above can be used for the prediction at the rate of 34%. In addition, the strategy in customer relationship management, i.e. customer retention, customer feedback, and useful service suggestions had an influence on the customers’ buying decision on period of being customers. The three factors could be used for the prediction at the rate of 45%.Keywords: strategies, customer relationship management, behavior in buying decision, car insurance
Procedia PDF Downloads 4052778 The Effects of Ethnicity, Personality and Religiosity on Desire for Personal Space
Authors: Ioanna Skoura
Abstract:
Past research shows that personal space has been investigated since the 1950s. Also, personality traits have been found to have a significant relationship with personal space. However, some of these studies have been criticized for being ethically inappropriate. In an attempt to avoid ethical issues, a new scale measuring desire for personal space has been created. The purpose of the present study is to investigate the impact of ethnicity on desire for personal space. Additionally, extraversion and neuroticism are expected to predict significantly desire for personal space. Furthermore, the study is looking for any impact of religiosity on desire for personal space. In order to test the previous hypotheses, 115 participants from three cultural groups (English, Greeks in Greece and Greeks in the UK) are recruited online. Results indicate that only extraversion and religiosity are significant predictors of desire for personal space. Implications of the findings are discussed and suggestions for future research are made.Keywords: ethnicity, religiosity, personality, personal space
Procedia PDF Downloads 2012777 The Future of Insurance: P2P Innovation versus Traditional Business Model
Authors: Ivan Sosa Gomez
Abstract:
Digitalization has impacted the entire insurance value chain, and the growing movement towards P2P platforms and the collaborative economy is also beginning to have a significant impact. P2P insurance is defined as innovation, enabling policyholders to pool their capital, self-organize, and self-manage their own insurance. In this context, new InsurTech start-ups are emerging as peer-to-peer (P2P) providers, based on a model that differs from traditional insurance. As a result, although P2P platforms do not change the fundamental basis of insurance, they do enable potentially more efficient business models to be established in terms of ensuring the coverage of risk. It is therefore relevant to determine whether p2p innovation can have substantial effects on the future of the insurance sector. For this purpose, it is considered necessary to develop P2P innovation from a business perspective, as well as to build a comparison between a traditional model and a P2P model from an actuarial perspective. Objectives: The objectives are (1) to represent P2P innovation in the business model compared to the traditional insurance model and (2) to establish a comparison between a traditional model and a P2P model from an actuarial perspective. Methodology: The research design is defined as action research in terms of understanding and solving the problems of a collectivity linked to an environment, applying theory and best practices according to the approach. For this purpose, the study is carried out through the participatory variant, which involves the collaboration of the participants, given that in this design, participants are considered experts. For this purpose, prolonged immersion in the field is carried out as the main instrument for data collection. Finally, an actuarial model is developed relating to the calculation of premiums that allows for the establishment of projections of future scenarios and the generation of conclusions between the two models. Main Contributions: From an actuarial and business perspective, we aim to contribute by developing a comparison of the two models in the coverage of risk in order to determine whether P2P innovation can have substantial effects on the future of the insurance sector.Keywords: Insurtech, innovation, business model, P2P, insurance
Procedia PDF Downloads 922776 India and Space Insurance Policy: An Analytical Insight
Authors: Shreyas Jayasimha, Suneel Anand Sundharesan, Rohan Tigadi
Abstract:
In the recent past, the United States of America and Russia were the only two dominant players in the field of space exploration and had a virtual monopoly in the field of space and technology. However, this has changed over the past few years. Many other nation states such as India, China, and the UK have made significant progress in this field. Amongst these nations, the growth and development of the Indian space program have been nothing short of a miracle. Starting recently, India has successfully launched a series of satellites including its much acclaimed Mangalyaan mission, which placed a satellite in Mars’ orbit. The fact that India was able to attain this feat in its attempt demonstrates the enormous growth potential and promise that the Indian space program holds for the coming years. However, unlike other space-faring nations, India does not have a comprehensive and consolidated space insurance policy. In this regard, it is pertinent to note that, the costs and risks involved in a administering a space program are enormous. Therefore, in the absence of a comprehensive space insurance policy, any losses from an unsuccessful will have to be borne by the state exchequer. Thus, in order to ensure that Indian space program continues on its upward trajectory, the Indian establishment should seriously consider formulating a comprehensive insurance policy. This paper intends to analyze the international best practices followed by other space-faring nations in relation to space insurance policy. Thereafter, the authors seek to examine the current regime in India relating to space insurance policy. Finally, the authors will conclude by providing a series of recommendations regarding the essential elements that should be part of any Indian space insurance policy regime.Keywords: India, space insurance policy, space law, Indian space research organization
Procedia PDF Downloads 2272775 Commercial Automobile Insurance: A Practical Approach of the Generalized Additive Model
Authors: Nicolas Plamondon, Stuart Atkinson, Shuzi Zhou
Abstract:
The insurance industry is usually not the first topic one has in mind when thinking about applications of data science. However, the use of data science in the finance and insurance industry is growing quickly for several reasons, including an abundance of reliable customer data, ferocious competition requiring more accurate pricing, etc. Among the top use cases of data science, we find pricing optimization, customer segmentation, customer risk assessment, fraud detection, marketing, and triage analytics. The objective of this paper is to present an application of the generalized additive model (GAM) on a commercial automobile insurance product: an individually rated commercial automobile. These are vehicles used for commercial purposes, but for which there is not enough volume to apply pricing to several vehicles at the same time. The GAM model was selected as an improvement over GLM for its ease of use and its wide range of applications. The model was trained using the largest split of the data to determine model parameters. The remaining part of the data was used as testing data to verify the quality of the modeling activity. We used the Gini coefficient to evaluate the performance of the model. For long-term monitoring, commonly used metrics such as RMSE and MAE will be used. Another topic of interest in the insurance industry is to process of producing the model. We will discuss at a high level the interactions between the different teams with an insurance company that needs to work together to produce a model and then monitor the performance of the model over time. Moreover, we will discuss the regulations in place in the insurance industry. Finally, we will discuss the maintenance of the model and the fact that new data does not come constantly and that some metrics can take a long time to become meaningful.Keywords: insurance, data science, modeling, monitoring, regulation, processes
Procedia PDF Downloads 752774 Applications of AI, Machine Learning, and Deep Learning in Cyber Security
Authors: Hailyie Tekleselase
Abstract:
Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data
Procedia PDF Downloads 1262773 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations
Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa
Abstract:
This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy
Procedia PDF Downloads 2042772 The Relationship among Perceived Risk, Product Knowledge, Brand Image and the Insurance Purchase Intention of Taiwanese Working Holiday Youths
Authors: Wan-Ling Chang, Hsiu-Ju Huang, Jui-Hsiu Chang
Abstract:
In 2004, the Ministry of Foreign Affairs Taiwan launched ‘An Arrangement on Working Holiday Scheme’ with 15 countries including New Zealand, Japan, Canada, Germany, South Korea, Britain, Australia and others. The aim of the scheme is to allow young people to work and study English or other foreign languages. Each year, there are 30,000 Taiwanese youths applied for participating in the working holiday schemes. However, frequent accidents could cause huge medical expenses and post-delivery fee, which are usually unaffordable for most families. Therefore, this study explored the relationship among perceived risk toward working holiday, insurance product knowledge, brand image and insurance purchase intention for Taiwanese youths who plan to apply for working holiday. A survey questionnaire was distributed for data collection. A total of 316 questionnaires were collected for data analyzed. Data were analyzed using descriptive statistics, independent samples T-test, one-way ANOVA, correlation analysis, regression analysis and hierarchical regression methods of analysis and hypothesis testing. The results of this research indicate that perceived risk has a negative influence on insurance purchase intention. On the opposite, product knowledge has brand image has a positive influence on the insurance purchase intention. According to the mentioned results, practical implications were further addressed for insurance companies when developing a future marketing plan.Keywords: insurance product knowledges, insurance purchase intention, perceived risk, working holiday
Procedia PDF Downloads 2502771 Pricing and Economic Benefits of Commercial Insurance Incorporated into Home-based Hospice Care
Authors: Lie-Fen Lin, Tzu-Hsuan Lin, Ching-Heng Lin
Abstract:
Hospice care for terminally ill patients provides not only a better quality of life but also cost-saving benefits. However, the utilization of home-based hospice care (HBH care) remains low even for countries covered by National Health Insurance (NHI) programs in Taiwan. In the current commercial insurance policy, only hospital-based hospice benefits were covered. It may have an influence on the insureds chosen to receive end-of-life care in a hospitalized manner. Thus, how to propose a feasible method to advocate HBH care utilization rate of public health policies is an important issue. A total of 130,219 cancer decedents in the year 2011-2013 from the National Health Insurance Research Database (NHIRD) in Taiwan were included in this study. By adding a day volume pays benefits of HBH care as a commercial insurance rider, will provide alternative benefits for the insureds. A multiple-state Markov chain model was incorporated to estimate the transition intensities of patients in different states at the end of their lives (Non-hospice, HBH, hospital-based hospice), and the premiums were estimated. HBH care insurance benefits provide financial support and reduce the burden of care for patients. The rate-making of this product is very sensitive while the utilization rate is rising, especially for high ages. The proposed HBH care insurance is a feasible way to reduce the financial burden, enhance the care quality and family satisfaction of insureds. Meanwhile, insurance companies can participate in advocating a good medical policy to enhance the social image. In addition, the medical costs of NHI can reduce effectively.Keywords: home-based hospice care, commercial insurance, Markov chain model, the day volume pays
Procedia PDF Downloads 2132770 Cyberbullying among College Students: Prevalence and Effects on Psychological Well-Being
Authors: Jeyaseelan Maria Michael
Abstract:
This study investigated the prevalence of cyberbullying among college female students and its effects on their psychological well-being. The respondents were from the age group of 17 and 18, doing the first-year college in Tamilnadu, India. In this study, 110 participants were selected through simple random sampling. The standardized questionnaire of David Alvare-Garcia’s Cybervictimization Questionnaire for Adolescents (CYVIC) and Ryff’s Psychological Well-Being (PWB) were administered for data collection. CYVIC has four subdomains namely, impersonation, visual-sexual cybervictimization, written-verbal cybervictimization, online exclusion. Ryff’s PWB has six domains namely, autonomy, environmental mastery, personal growth, positive relations with others, purpose in life, and self- acceptance. The collected data were analyzed by SPSS v.23. The results indicate that cyberbullying prevails among college female students (M=1.24, SD= .21). Among the participants, 17 are scored one standard deviation above the mean (1.45). Among the subdomains of the CYVIC, the respondents have the highest score (M=1.40, SD= .38) in written-verbal cybervictimization. Cyber victimization has a significant correlation at the 0.01 level with psychological well-being.Keywords: college students, cyberbullying, cyber victimization, psychological well-being
Procedia PDF Downloads 1272769 Ensuring Cyber Security Using Kippo Honeypots
Authors: S. Vivekananda Pandian
Abstract:
A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.Keywords: attackers, security, Kippo Honeypots, virtual machine
Procedia PDF Downloads 4272768 Increasing National Health Insurance Scheme Enrolment in Ghana: Pro-Rata Insurance Premium Payment with Mobile Phone as the Answer
Authors: Joseph Marfo Boaheng, Daniel Ansong, Eugenia Amporfo
Abstract:
Health Insurance is proposed to provide financial protection against catastrophic health care cost arising from disease. Ghana has had a National Health Insurance Scheme (NHIS) since 2003 with the current enrolment/retention rate of 36%. The main goal of the scheme is to provide equity in the health sector as well as ensuring affordable health care for the poor. However, the current payment system is not flexible to attract significant proportion of the poor informal sector onto the scheme. Looking at the extensive use of mobiles in the Ghana where about 29,220,602.00 registered mobile phone lines are actively in used as of June 2014, paying health insurance premium through mobile phone could be feasible to attract larger proportion of the informal sector onto the scheme. Methodology: The quantitative cross-sectional survey was used to solicit the required information from 877 respondents living in Kumasi, the second capital city of Ghana. The magnitude of the effect of Pro-rata system (flexible payment terms) on NHIS enrollment rate was estimated with binary logistic regression model. Results: The odds for an individual to enroll onto NHIS with mobile phone increases about 2 times more when payment of insurance premium is on pro-rata basis ie. flexible payment terms (p=0.008, CI=1.212-3.565). Conclusion: The study advocates the National Health Insurance Authority consider this alternative payment system that has the potential of attracting a greater proportion of the informal sector to be enrolled or retained onto the scheme.Keywords: enrollment, health insurance, mobile phone, pro-rata
Procedia PDF Downloads 3942767 Exploring Cybercrimes and Major Security Breaches: Assessing the Broader Fiscal Impact on Nigeria
Authors: Washima Tuleun
Abstract:
Cybercrime is a global concern, and Nigeria is not immune to its effects. This paper investigates the cybercrimes and significant cyber-attacks that have targeted businesses and institutions in Nigeria, examining their various forms and the financial and economic impacts they have on individuals, businesses, and the nation as a whole. As technological advancements rapidly evolve and online services gain widespread adoption, there has been a corresponding rise in cyber-related attacks. These attacks often target personal data, exploit system vulnerabilities, and result in the theft of sensitive information, leading to financial losses, reputational damage, and broader impacts on organizations. The study conducts a thorough review of existing literature, case studies, and statistical data to provide a comprehensive understanding of Nigeria’s cybercrime landscape. Additionally, it assesses the efforts by both the government and the private sector to address these challenges and offers recommendations for more effective strategies to mitigate and reduce their impact.Keywords: cybersecurity, telecommunications engineering, information technology, threat intelligence, vulnerability management, computing
Procedia PDF Downloads 292766 Nexus Between Agricultural Insurance Scheme and Performance of Agribusiness in Nigeria
Authors: Festus Epetimehin
Abstract:
Agriculture remains the dominant sector in the rural areas where over 70% of Nigerian reside and it’s still the backbone of our economy. The observed poor performance of farmers in agricultural productivity is due to the nature of risks and uncertainties in agriculture.Agricultural insurance is one of the mechanisms by which farmers can stabilize farm income and investment. The study examined the relationship between agricultural insurance scheme (AIS) and performance of agribusiness in Nigeria. The study adopted exploratory research design which is an ex-ante research approach. One hundred copies of structured questionnaire were administered for the purpose of the study. Correlation analysis and regression analysis were employed for the study. The correlation analysis of the finding revealed that the independent variable; agricultural insurance scheme (AIS) is positively and significantly correlated with the set of dependent variables; where turnover (ABT)=0.582**, profitability (ABP)=0.321**, solvency (ABS)=0.418**and cost of production (ABC)=0.23** respectively. The regression analysis result also revealed the degree of relationship between the independent variable (AIS) and set of dependent variables where one(1%) percent increase in independent variable will lead to 33.9% (ABT), 9.7% (ABP), 17.5%(ABS) and 1.5%(ABC).The study recommended that the Federal Government in collaboration with the participating Agricultural insurers embark on awareness campaign through to the length and breadth of Nigeria on government support and insurance scheme for farmers. Government should also ensure that the loan and insurance scheme should extend beyond the mechanized farmers and include the intensive subsistence farmers in view of the fact that they are the dominants in most of the farm produce markets.Keywords: agribusiness, agricultural insurance, performance, turnover, solvency, agricultural risks
Procedia PDF Downloads 922765 The Effect of Corporate Governance on Financial Stability and Solvency Margin for Insurance Companies in Jordan
Authors: Ghadeer A.Al-Jabaree, Husam Aldeen Al-Khadash, M. Nassar
Abstract:
This study aimed at investigating the effect of well-designed corporate governance system on the financial stability of insurance companies listed in ASE. Further, this study provides a comprehensive model for evaluating and analyzing insurance companies' financial position and prospective for comparing the degree of corporate governance application provisions among Jordanian insurance companies. In order to achieve the goals of the study, a whole population that consist of (27) listed insurance companies was introduced through the variables of (board of director, audit committee, internal and external auditor, board and management ownership and block holder's identities). Statistical methods were used with alternative techniques by (SPSS); where descriptive statistical techniques such as means, standard deviations were used to describe the variables, while (F) test and ANOVA analysis of variance were used to test the hypotheses of the study. The study revealed the existence of significant effect of corporate governance variables except local companies that are not listed in ASE on financial stability within control variables especially debt ratio (leverage),where it's also showed that concentration in motor third party doesn't have significant effect on insurance companies' financial stability during study period. Moreover, the study concludes that Global financial crisis affect the investment side of insurance companies with insignificant effect on the technical side. Finally, some recommendations were presented such as enhancing the laws and regulation that help the appropriate application of corporate governance, and work on activating the transparency in the disclosures of the financial statements and focusing on supporting the technical provisions for the companies, rather than focusing only on profit side.Keywords: corporate governance, financial stability and solvency margin, insurance companies, Jordan
Procedia PDF Downloads 4892764 Assessing the Effectiveness of Machine Learning Algorithms for Cyber Threat Intelligence Discovery from the Darknet
Authors: Azene Zenebe
Abstract:
Deep learning is a subset of machine learning which incorporates techniques for the construction of artificial neural networks and found to be useful for modeling complex problems with large dataset. Deep learning requires a very high power computational and longer time for training. By aggregating computing power, high performance computer (HPC) has emerged as an approach to resolving advanced problems and performing data-driven research activities. Cyber threat intelligence (CIT) is actionable information or insight an organization or individual uses to understand the threats that have, will, or are currently targeting the organization. Results of review of literature will be presented along with results of experimental study that compares the performance of tree-based and function-base machine learning including deep learning algorithms using secondary dataset collected from darknet.Keywords: deep-learning, cyber security, cyber threat modeling, tree-based machine learning, function-based machine learning, data science
Procedia PDF Downloads 1532763 Consumption Insurance against the Chronic Illness: Evidence from Thailand
Authors: Yuthapoom Thanakijborisut
Abstract:
This paper studies consumption insurance against the chronic illness in Thailand. The study estimates the impact of household consumption in the chronic illness on consumption growth. Chronic illness is the health care costs of a person or a household’s decision in treatment for the long term; the causes and effects of the household’s ability for smooth consumption. The chronic illnesses are measured in health status when at least one member within the household faces the chronic illness. The data used is from the Household Social Economic Panel Survey conducted during 2007 and 2012. The survey collected data from approximately 6,000 households from every province, both inside and outside municipal areas in Thailand. The study estimates the change in household consumption by using an ordinary least squares (OLS) regression model. The result shows that the members within the household facing the chronic illness would reduce the consumption by around 4%. This case indicates that consumption insurance in Thailand is quite sufficient against chronic illness.Keywords: consumption insurance, chronic illness, health care, Thailand
Procedia PDF Downloads 2382762 Challenges in Anti-Counterfeiting of Cyber-Physical Systems
Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier
Abstract:
This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection
Procedia PDF Downloads 4982761 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network
Authors: Phillip Garrad, Saritha Unnikrishnan
Abstract:
The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing
Procedia PDF Downloads 110