Search results for: health data security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 31965

Search results for: health data security

30795 Society-Centric Warfare: Lessons from Afghanistan

Authors: Amin Tarzi

Abstract:

The government of the Islamic Republic of Afghanistan was expected to keep the Taliban insurgents at bay after the departure of North Atlantic Treaty Organization (NATO)-led forces in 2021, especially given the two decades of effort to establish security forces to safeguard Western-backed governing institutions. This articles reviews the reasons for the failure of the much larger and better-equipped Afghan National Security Forces (ANSF) to stop the Taliban from taking over the Afghan capital of Kabul in a few days and analyzes the often-forgotten dimension of strategic calculations in this dialogue—namely the societal dimension. In this article, the author argues that this is one of the primary reasons that the ANSF and the Afghan government collapsed.

Keywords: societal warfare, Afghanistan, NATO, Taliban, military strategy

Procedia PDF Downloads 100
30794 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives

Authors: Nawt Almutairi, Ramzi El-Haddadeh

Abstract:

With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.

Keywords: e-service, satisfaction, trust, loyalty

Procedia PDF Downloads 259
30793 Analysis of Big Data

Authors: Sandeep Sharma, Sarabjit Singh

Abstract:

As per the user demand and growth trends of large free data the storage solutions are now becoming more challenge-able to protect, store and to retrieve data. The days are not so far when the storage companies and organizations are start saying 'no' to store our valuable data or they will start charging a huge amount for its storage and protection. On the other hand as per the environmental conditions it becomes challenge-able to maintain and establish new data warehouses and data centers to protect global warming threats. A challenge of small data is over now, the challenges are big that how to manage the exponential growth of data. In this paper we have analyzed the growth trend of big data and its future implications. We have also focused on the impact of the unstructured data on various concerns and we have also suggested some possible remedies to streamline big data.

Keywords: big data, unstructured data, volume, variety, velocity

Procedia PDF Downloads 548
30792 Jordan Water District Interactive Billing and Accounting Information System

Authors: Adrian J. Forca, Simeon J. Cainday III

Abstract:

The Jordan Water District Interactive Billing and Accounting Information Systems is designed for Jordan Water District to uplift the efficiency and effectiveness of its services to its customers. It is designed to process computations of water bills in accurate and fast way through automating the manual process and ensures that correct rates and fees are applied. In addition to billing process, a mobile app will be integrated into it to support rapid and accurate water bill generation. An interactive feature will be incorporated to support electronic billing to customers who wish to receive water bills through the use of electronic mail. The system will also improve, organize and avoid data inaccuracy in accounting processes because data will be stored in a database which is designed logically correct through normalization. Furthermore, strict programming constraints will be plunged to validate account access privilege based on job function and data being stored and retrieved to ensure data security, reliability, and accuracy. The system will be able to cater the billing and accounting services of Jordan Water District resulting in setting forth the manual process and adapt to the modern technological innovations.

Keywords: accounting, bill, information system, interactive

Procedia PDF Downloads 251
30791 Detect Cable Force of Cable Stayed Bridge from Accelerometer Data of SHM as Real Time

Authors: Nguyen Lan, Le Tan Kien, Nguyen Pham Gia Bao

Abstract:

The cable-stayed bridge belongs to the combined system, in which the cables is a major strutual element. Cable-stayed bridges with large spans are often arranged with structural health monitoring systems to collect data for bridge health diagnosis. Cables tension monitoring is a structural monitoring content. It is common to measure cable tension by a direct force sensor or cable vibration accelerometer sensor, thereby inferring the indirect cable tension through the cable vibration frequency. To translate cable-stayed vibration acceleration data to real-time tension requires some necessary calculations and programming. This paper introduces the algorithm, labview program that converts cable-stayed vibration acceleration data to real-time tension. The research results are applied to the monitoring system of Tran Thi Ly cable-stayed bridge and Song Hieu cable-stayed bridge in Vietnam.

Keywords: cable-stayed bridge, cable fore, structural heath monitoring (SHM), fast fourie transformed (FFT), real time, vibrations

Procedia PDF Downloads 71
30790 Jordan, Towards Eliminating Preventable Maternal Deaths

Authors: Abdelmanie Suleimat, Nagham Abu Shaqra, Sawsan Majali, Issam Adawi, Heba Abo Shindi, Anas Al Mohtaseb

Abstract:

The Government of Jordan recognizes that maternal mortality constitutes a grave public health problem. Over the past two decades, there has been significant progress in improving the quality of maternal health services, resulting in improved maternal and child health outcomes. Despite these efforts, measurement and analysis of maternal mortality remained a challenge, with significant discrepancies from previous national surveys that inhibited accuracy. In response with support from USAID, the Jordan Maternal Mortality Surveillance Response (JMMSR) System was established to collect, analyze, and equip policymakers with data for decision-making guided by interdisciplinary multi-levelled advisory groups aiming to eliminate preventable maternal deaths, A 2016 Public Health Bylaw required the notification of deaths among women of reproductive age. The JMMSR system was launched in 2018 and continues annually, analyzing data received from health facilities, to guide policy to prevent avoidable deaths. To date, there have been four annual national maternal mortality reports (2018-2021). Data is collected, reviewed by advisory groups, and then consolidated in an annual report to inform and guide the Ministry of Health (MOH); JMMSR collects the necessary information to calculate an accurate maternal mortality ratio and assists in identifying leading causes and contributing factors for each maternal death. Based on this data, national response plans are created. A monitoring and evaluation plan was designed to define, track, and improve implementation through indicators. Over the past four years, one of these indicators, ‘percent of facilities notifying respective health directorates of all deaths of women of reproductive age,’ increased annually from 82.16%, 92.95%, and 92.50% to 97.02%, respectively. The Government of Jordan demonstrated commitment to the JMMSR system by designating the MOH to primarily host the system and lead the development and dissemination of policies and procedures to standardize implementation. The data was translated into practical and evidence-based recommendations. The successful impact of results deepened the understanding of maternal mortality in Jordan, which convinced the MOH to amend the Bylaw now mandating electronic reporting of all births and neonatal deaths from health facilities to empower the JMMSR system, by developing a stillbirths and neonatal mortality surveillance and response system.

Keywords: maternal health, maternal mortality, preventable maternal deaths, maternal morbidity

Procedia PDF Downloads 38
30789 Integrating Sexual Reproductive Health and Rights in Promoting Gender Equality, Equity, and Empowerment of Women

Authors: Danielle G. Saique

Abstract:

Introduction: Promoting Gender Equality, Equity and Empowerment of Women (GEE&EW) can be attained by practicing thereby exercising Sexual and Reproductive Health and Rights (SRHR). Gender Inequality is manifested thru Violence Against Women (VAW). Objectives: This study presents causes, prevalence, effects of Gender Inequality for not practicing and violating SRHR. This proposes Action Plan by promoting, integrating SRHR in the “holistic approach” of Social Work education, practice and service-delivery in any work-set-ups. Limitations: VAW cases showed victim and violator are known, related and living together. Cases transpired at home, reported, investigated in the police and filed in the legal court of law for the year 2013. Methods: Data from blotters, reports, filed cases, case studies gathered by the Social Worker (SWr). Qualitative analysis identified cause, prevalence of VAW related in violating SRHR. SWr serves innovative interventions in any work settings by applying SRHR background, skills in educating, counseling client-victims. Results: 65 VAW cases on non-negotiation or refusal of practicing SRHR. Non-acceptance of Family Planning yielded unwanted, unplanned pregnancies, abandoned children, battered women. Neglected pre-post natal maternal care caused complications or death. Rape, incest led trauma or death. Unsafe, unprotected sex transmitted STDs. Conclusions: Non-availing SRHR from health facilities, from Medical Health SWr concluded to non-practicing or violating rights to life, health care, protection, rights to information, education, rights to plan family, rights from torture, ill-treatment. VAW brings undesirable effects to the well-being, wellness and humaneness of the victim. Recommendations: The innovative intervention services on SRHR of a SWr and the findings, results in violating SRHR are recommendations in Action Planning by adding “The SRHR Concepts” in Social Work thereby preventing VAW; empowering women’s rights to development, gender equality, equity liberty, security, freedom; resilience and involvement in promoting, practicing, exercising SRHR at home. Recommended therefore to duplicate this innovative practice and experience on SRHR as implemented by the SWr in any work setting.

Keywords: women development, promoting gender equality, equity, empowerment of women

Procedia PDF Downloads 476
30788 Challenges to Ensure Food Safety through Sanitation and Hygiene Coverage in Bangladesh

Authors: Moshiur Rahman, Tahmida Jakia

Abstract:

Bangladesh, a densely populated South Asian country is home to more than 160 million people. In two decades ago, the people of this developing nation drank heavily contaminated surface water. Over the past thirty years, the country, and its development partners, has undertaken extensive efforts to provide microbiologically safe groundwater based drinking water through the use of tube-wells. About 85% of the people now drink tube-well water from about 11 million tube-wells/hand pumps. However, diarrhoeal and other water-related diseases are still reported among the major causes of morbidity and mortality among Bangladeshi children. This implies that the mode of transmission of pathogens through water and/or other modes continue. In addition, massive scale arsenic contamination has been recently reported in the ground water. Thirty five million people may be at risk of consuming arsenic contaminated water exceeding 0.05 mg/l in Bangladesh. Drinking of arsenic contaminated water has been linked with skin problems, cancer, cardiovascular diseases, neurological diseases, eye problems, cancer of the internal organs, and other diseases. In the study area, Narail district, recent investigations about existing water quality situations indicated presence of low to high levels of arsenic, salinity, iron, manganese and bacteriological contamination risks. As challenges for safe water exist; it is likely that sanitation and food hygiene practices are poor which lead threat to ensure food security.The main attempt of this study is to find out the challenges to ensure food security andprovide probable solutions to ensure food safety towards 0.7 million of people in study area. A survey has been conducted at Lohagara and Kalia sub district of Narail district with a pretested questionnaire. Primary data are collected through a questionnaire, while secondary data are collected from pertinent offices as well as academic journals. FGD has also been done to know the knowledge regarding water, sanitation as well as food preparation and consumption practice of community people in study area. The major focus of this study is to assess the state of sanitation and food hygiene condition of rural people. It is found that most of the villagers have lack of knowledge about food safety. Open defecation rate is high which lead threat to ensure food security.

Keywords: food safety, challenges, hygiene, Bangladesh

Procedia PDF Downloads 334
30787 The Effect of Job Insecurity on Attitude towards Change and Organizational Citizenship Behavior: Moderating Role of Islamic Work Ethics

Authors: Khurram Shahzad, Muhammad Usman

Abstract:

The main aim of this study is to examine the direct and interactive effects of job insecurity and Islamic work ethics on employee’s attitude towards change and organizational citizenship behavior. Design/methodology/approach: The data was collected from 171 male and female university teachers of Pakistan. Self administered, close ended questionnaires were used to collect the data. Data was analyzed through correlation and regression analysis. Findings: Through the analysis of data, it was found that job insecurity has a strong negative effect on the attitude towards change of university teachers. On the contrary, job insecurity has no significant effect on organizational citizenship behavior of university teachers. Our results also show that Islamic work ethics does not moderate the relationship of job insecurity and attitude towards change, while a strong moderation effect of Islamic wok ethics is found on the relationship of job insecurity and organizational citizenship behavior. Originality/value: This study for the first time examines the relationship of job insecurity with employee’s attitude towards change and organizational citizenship behavior with the moderating effect of Islamic work ethics.

Keywords: job security, islamic work ethics, attitude towards change, organizational citizenship behavior

Procedia PDF Downloads 475
30786 [Keynote Talk]: Mental Health Challenges among Women in Dubai, Mental Health Needs Assessment for Dubai (2015), Public Health and Safety Department - Dubai Health Authority (DHA)

Authors: Kadhim Alabady

Abstract:

Purpose: Mental health problems affect women and men equally, but some are more common among women. To Provide a baseline of the current picture of major mental health challenges among women in Dubai. which can then be used to measure the impact of interventions or service development. Method: We have used mixed methods evaluation approaches. This was used to increase the validity of findings by using a variety of data collection techniques. We have integrated qualitative and quantitative methods in this piece of work. Conducting the two approaches is to explore issues that might not be highlighted enough through one method. Results: The key findings are: The prevalence of people who suffer from different types of mental disorders remains largely unknown, many women are unwilling to seek professional help because of lack of awareness or the stigma attached to it. -It is estimated there were around 2,928–4,392 mothers in Dubai (2014) suffering from postnatal depression of which 858–1,287, early intervention can be effective. -The system for managing health care for women with mental illness is fragmented and contains gaps and duplications. -It is estimated 1,029 girl aged 13–19 years affected with anorexia nervosa and there would be an estimated 1,029 girl aged 13–19 years affected with anorexia nervosa. Recommendations: -Work is required with primary health care in order to identify women with undiagnosed mental illnesses. Further work is undertaken within primary health care to assess disease registries with the aim of helping GP practices to improve their disease registers. -It is important to conduct local psychiatric morbidity surveys in Dubai to obtain data and assess the prevalence of essential mental health symptoms and conditions that are not routinely collected to get a clear sense of what is needed and to assist decision and policy making in getting a complete picture on what services are required. -Emergency Mental Health Care – there is a need for a crisis response team to respond to emergencies in the community. -Continuum of care – a significant gap in the services for women once they diagnosed with mental disorder.

Keywords: mental health, depression, schizophrenia, women

Procedia PDF Downloads 208
30785 Context Aware Anomaly Behavior Analysis for Smart Home Systems

Authors: Zhiwen Pan, Jesus Pacheco, Salim Hariri, Yiqiang Chen, Bozhi Liu

Abstract:

The Internet of Things (IoT) will lead to the development of advanced Smart Home services that are pervasive, cost-effective, and can be accessed by home occupants from anywhere and at any time. However, advanced smart home applications will introduce grand security challenges due to the increase in the attack surface. Current approaches do not handle cybersecurity from a holistic point of view; hence, a systematic cybersecurity mechanism needs to be adopted when designing smart home applications. In this paper, we present a generic intrusion detection methodology to detect and mitigate the anomaly behaviors happened in Smart Home Systems (SHS). By utilizing our Smart Home Context Data Structure, the heterogeneous information and services acquired from SHS are mapped in context attributes which can describe the context of smart home operation precisely and accurately. Runtime models for describing usage patterns of home assets are developed based on characterization functions. A threat-aware action management methodology, used to efficiently mitigate anomaly behaviors, is proposed at the end. Our preliminary experimental results show that our methodology can be used to detect and mitigate known and unknown threats, as well as to protect SHS premises and services.

Keywords: Internet of Things, network security, context awareness, intrusion detection

Procedia PDF Downloads 191
30784 Grapevine Farmers’ Adaptation to Climate Change and its Implication to Human Health: A Case of Dodoma, Tanzania

Authors: Felix Y. Mahenge, Abiud L. Kaswamila, Davis G. Mwamfupe

Abstract:

Grapevine is a drought resistant crop, although in recent years it has been observed to be affect by climate change. This compelled investigation of grapevine farmers’ adaptation strategies to climate change in Dodoma, Tanzania. A mixed research approach was adopted. Likewise, purposive and random sampling techniques were used to select individuals for the study. About 248 grapevine farmers and 64 key informants and members of focus group discussions were involved. Primary data were collected through surveys, discussions, interviews, and observations, while secondary data were collected through documentary reviews. Quantitative data were analysed through descriptive statistics by means of IBM (SPSS) software while the qualitative data were analysed through content analysis. The findings indicate that climate change has adversely affected grapevine production leading to the occurrence of grapevine pests and diseases, drought which increases costs for irrigation and uncertainties which affect grapevine markets. For the purpose of lessening grapevine production constraints due to climate change, farmers have been using several adaptation strategies. Some of the strategies include application of pesticides, use of scarers to threaten birds, irrigation, timed pruning, manure fertilisers and diversification to other farm or non-farm activities. The use of pesticides and industrial fertilizers were regarded as increasing human health risks in the study area. The researchers recommend that the Tanzania government should strengthen the agricultural extension services in the study area so that the farmers undertake adaptation strategies with the consideration of human health safety.

Keywords: grapevine farmers, adaptation, climate change, human health

Procedia PDF Downloads 91
30783 Securing Online Voting With Blockchain and Smart Contracts

Authors: Anant Mehrotra, Krish Phagwani

Abstract:

Democratic voting is vital for any country, but current methods like ballot papers or EVMs have drawbacks, including transparency issues, low voter turnout, and security concerns. Blockchain technology offers a potential solution by providing a secure, decentralized, and transparent platform for e-voting. With features like immutability, security, and anonymity, blockchain combined with smart contracts can enhance trust and prevent vote tampering. This paper explores an Ethereum-based e-voting application using Solidity, showcasing a web app that prevents duplicate voting through a token-based system, while also discussing the advantages and limitations of blockchain in digital voting. Voting is a crucial component of democratic decision-making, yet current methods, like paper ballots, remain outdated and inefficient. This paper reviews blockchain-based voting systems, highlighting strategies and guidelines to create a comprehensive electronic voting system that leverages cryptographic techniques, such as zero-knowledge proofs, to enhance privacy. It addresses limitations of existing e-voting solutions, including cost, identity management, and scalability, and provides key insights for organizations looking to design their own blockchain-based voting systems.

Keywords: electronic voting, smart contracts, blockchain nased voting, security

Procedia PDF Downloads 10
30782 A Cross-Sectional Study of Parents’ Knowledge, Attitude, and Health-Seeking Behaviour Towards Childhood Tuberculosis during COVID-19 Pandemic: Lessons Learned from Indonesia

Authors: Windy Rakhmawati, Suryani Suryani, Sri Hendrawati, Nenden Nur Asriyani Maryam

Abstract:

Tuberculosis (TB) is one of the leading causes of death in the world. Fear of COVID-19 has made people reluctant to visit health facilities, leading to disruptions to childhood TB control programs, which may increase household transmission and delay diagnosis and treatment. This study aimed to describe parents' knowledge, attitudes, and health-seeking behaviour towards childhood TB during the COVID-19 pandemic. This cross-sectional study was performed on 392 parents with TB children in three provinces with the highest proportion of TB cases in Indonesia. This study was conducted from February to December 2022. The inclusion criteria of respondents were parents with a child aged 0-14 years old with TB diagnosis who live with their parents. Data were collected using the Knowledge, Attitude, and Practice (KAP) survey guidelines from the World Health Organization and analyzed descriptively, as well as Spearman’s correlation. Overall, 392 parents of children with TB had poor knowledge (51.8%) including about causes, risk factors, transmission, symptoms, treatment, and prevention, which about 52.3%, 55.1%, 61.2%, 69.6%, 100%, 59.2%, respectively. Parents' health service-seeking behaviour towards Child TB was not normally distributed (P < 0.05) with knowledge test results (.000) and Seeking Health Services (.000). Health-seeking behaviour of parents in pediatric TB care was self-medication or self-treatment (86.2%), Traditional health seeking behaviour (4.8%), and modern health seeking behaviour (8.9%). The correlation between knowledge and seeking health services (Sig= .609) means there is no correlation between knowledge about TB and parents' health-seeking behaviour. Furthermore, 60.2% of the respondents would be shocked if their child had TB. More than half of the families in this study have poor knowledge and did self-medication or self-treatment regarding health-seeking behaviour for TB disease. Therefore, health workers, especially nurses, must provide TB-related education and health promotion and emphasize the importance of early detection. Health workers can also optimize their role in caring for and providing care to patients by increasing their trust in health workers, which will impact health-seeking behaviour in the future.

Keywords: attitude, child, health seeking behaviour, knowledge, tuberculosis

Procedia PDF Downloads 68
30781 Combination between Intrusion Systems and Honeypots

Authors: Majed Sanan, Mohammad Rammal, Wassim Rammal

Abstract:

Today, security is a major concern. Intrusion Detection, Prevention Systems and Honeypot can be used to moderate attacks. Many researchers have proposed to use many IDSs ((Intrusion Detection System) time to time. Some of these IDS’s combine their features of two or more IDSs which are called Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS, if an attacker attacks slowly and in organized way, the attack may go undetected through the IDS, as signatures include factors based on duration of the events but the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. So there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we propose a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time. We have discussed experimental results performed: both the Honeypot and Anomaly based IDS have some shortcomings but if we hybridized these two technologies, the newly proposed Hybrid Intrusion Detection System (HIDS) is capable enough to overcome these shortcomings with much enhanced performance. In this paper, we present a modified Hybrid Intrusion Detection System (HIDS) that combines the positive features of two different detection methodologies - Honeypot methodology and anomaly based intrusion detection methodology. In the experiment, we ran both the Intrusion Detection System individually first and then together and recorded the data from time to time. From the data we can conclude that the resulting IDS are much better in detecting intrusions from the existing IDSs.

Keywords: security, intrusion detection, intrusion prevention, honeypot, anomaly-based detection, signature-based detection, cloud computing, kfsensor

Procedia PDF Downloads 383
30780 Evaluating Effects of Health and Physical Maintenance on Academic Competencies of University Teachers in Pakistan

Authors: Muhammad Badar Habib, Muhammad Shakir, Asif Ali, Muhammad Zia ul Haq

Abstract:

Purpose of the research is to examine the university teachers’ health and physical activities regarding their academic competencies. Major objectives of this piece research were (a) to identify health problems of teachers at university level that affects academic competencies of university teachers and (b) to evaluate educational betterment through physical balance. This research is descriptive in nature and questionnaire was used as source of collecting data. Population of the present research comprises teachers, professors and professionals teaching in the universities of Pakistan. 580 university teachers were selected as a population of the study. Random sampling technique was used to identify recipients. Data was feed and filter in Ms-Excel. In the light of the analysis of the study following findings were drawn out. This study found that the university teachers in Pakistan do not adopt proper physical exercise program. They were less interested to burn their extra calories and face diseases such as cramping, contraction of the muscles, diabetics and stomach diseases. This study recommends that seminars/workshops may be held by University establishment; to develop overall awareness among the teachers.

Keywords: evaluating effects of health and physical maintenance, academic competencies, university teachers, Pakistan

Procedia PDF Downloads 457
30779 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 398
30778 Leveraging Artificial Intelligence to Analyze the Interplay between Social Vulnerability Index and Mobility Dynamics in Pandemics

Authors: Joshua Harrell, Gideon Osei Bonsu, Susan Garza, Clarence Conner, Da’Neisha Harris, Emma Bukoswki, Zohreh Safari

Abstract:

The Social Vulnerability Index (SVI) stands as a pivotal tool for gauging community resilience amidst diverse stressors, including pandemics like COVID-19. This paper synthesizes recent research and underscores the significance of SVI in elucidating the differential impacts of crises on communities. Drawing on studies by Fox et al. (2023) and Mah et al. (2023), we delve into the application of SVI alongside emerging data sources to uncover nuanced insights into community vulnerability. Specifically, we explore the utilization of SVI in conjunction with mobility data from platforms like SafeGraph to probe the intricate relationship between social vulnerability and mobility dynamics during the COVID-19 pandemic. By leveraging 16 community variables derived from the American Community Survey, including socioeconomic status and demographic characteristics, SVI offers actionable intelligence for guiding targeted interventions and resource allocation. Building upon recent advancements, this paper contributes to the discourse on harnessing AI techniques to mitigate health disparities and fortify public health resilience in the face of pandemics and other crises.

Keywords: social vulnerability index, mobility dynamics, data analytics, health equity, pandemic preparedness, targeted interventions, data integration

Procedia PDF Downloads 64
30777 PLC Based Automatic Railway Crossing System for India

Authors: Tapan Upadhyay, Aqib Siddiqui, Sameer Khan

Abstract:

Railway crossing system in India is a manually operated level crossing system, either manned or unmanned. The main aim is to protect pedestrians and vehicles from colliding with trains, which pass at regular intervals, as India has the largest and busiest railway network. But because of human error and negligence, every year thousands of lives are lost due to accidents at railway crossings. To avoid this, we suggest a solution, by using Programmable Logical Controller (PLC) based automatic system, which will automatically control the barrier as well as roadblocks to stop people from crossing while security warning is given. Often people avoid security warning, and pass two-wheelers from beneath the barrier, while the train is at a distance away. This paper aims at reducing the fatality and accident rate by controlling barrier and roadblocks using sensors which sense the incoming train and vehicles and sends a signal to PLC. The PLC in return sends a signal to barrier and roadblocks. Once the train passes, the barrier and roadblocks retrieve back, and the passage is clear for vehicles and pedestrians to cross. PLC’s are used because they are very flexible, cost effective, space efficient, reduces complexity and minimises errors. Supervisory Control And Data Acquisition (SCADA) is used to monitor the functioning.

Keywords: level crossing, PLC, sensors, SCADA

Procedia PDF Downloads 427
30776 The Contribution of the Lomé Charter to Combating Drugs Trafficking at Sea: Nigerian and South African Legal Perspectives

Authors: Obinna Emmanuel Nkomadu

Abstract:

The sea attracts many criminal activities including drug trafficking. The illicit traffic in narcotic drugs and psychotropic substances by sea poses a serious threat to maritime security globally. The seizure of drugs, particularly, on the African continent is on the raise. In terms of Southern Africa, South Africa is a major transit point for Latin American drugs and South Africa is the largest market for illicit drugs entering the Southern African region. Nigeria and South Africa have taken a number of steps to address this scourge, but, despite those steps, drugs trafficking at sea continues. For that reason and to combat a number of other threats to maritime security around the continent, a substantial number of AU members in 2016 adopted the African Charter on Maritime Security and Safety and Development in Africa (“the Charter”). However, the Charter is yet to come into force due to the number of States required to accede or ratify the Charter. This paper set out the pre-existing international instruments on drugs, to ascertain the domestic laws of Nigeria and South Africa relating to drugs with the relevant provisions of the Lomé Charter in order to establish whether any legal steps are required to ensure that Nigeria and South Africa comply with its obligations under the Charter. Indeed, should Nigeria and South Africa decide to ratify it and should it come into force, both States must cooperate with other relevant States in establishing policies, as well as a regional and continental institutions, and ensure the implementation of such policies. The paper urged the States to urgently ratify the Charter as it is a step in the right direction in the prevention and repression of drugs trafficking on the African maritime domain.

Keywords: cooperation against drugs trafficking at sea, Lomé Charter, maritime security, Nigerian and South Africa legislation on drugs

Procedia PDF Downloads 97
30775 Consumer Attitude and Purchase Intention towards Organic Food: Insights from Pakistan

Authors: Muneshia Maheshwar, Kanwal Gul, Shakira Fareed, Ume-Amama Areeb Gul

Abstract:

Organic food is commonly known for its healthier content without the use of pesticides, herbicides, inorganic fertilizers, antibiotics and growth hormones. The aim of this research is to examine the effect of health consciousness, environmental concern and organic food knowledge on both the intention to buy organic foods and the attitude towards organic foods and the effect of attitude towards organic foods on the intention to buy organic foods in Pakistan. Primary data was used which was collected through adopted questionnaire from previous research. Non- probability convenience sampling was used to select sample size of 200 consumers based on Karachi. The data was analyzed through Descriptive statistics and Multi regression method. The findings of the study showed that the attitude and the intention to buy organic food were affected by health consciousness, environmental concern, and organic food knowledge. The results also revealed that attitude also affects the intention to buy organic food.

Keywords: health consciousness, attitude, intention to purchase, environmental concern, organic food knowledge

Procedia PDF Downloads 248
30774 A Model of Human Security: A Comparison of Vulnerabilities and Timespace

Authors: Anders Troedsson

Abstract:

For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.

Keywords: human security, timespace, vulnerabilities, risk perception

Procedia PDF Downloads 336
30773 Energy in the Nexus of Defense and Border Security: Securing Energy Deposits in the Natuna Islands of Indonesia

Authors: Debby Rizqie Amelia Gustin, Purnomo Yusgiantoro

Abstract:

Hydrocarbon energy is still pivotal to today’s economy, but its existence is continually declining. Thus, preserving future energy supply has become the national interest of many countries, which they cater in various way, from importing to expansion and occupation. Underwater of Natuna islands in Indonesia deposits great amount of natural gas reserved, numbered to 46 TCF (trillion cubic feet), which is highly potential to meet Indonesia future energy demand. On the other hand, there could be a possibility that others also seek this natural resources. Natuna is located in the borderline of Indonesia, directly adjacent to the South China Sea, an area which is prolonged to conflict. It is a challenge for Indonesia government to preserve their energy deposit in Natuna islands and to response accordingly if the tension in South China Sea rises. This paper examines that nowadays defense and border security is not only a matter of guarding a country from foreign invasion, but also securing its resources accumulated on the borderline. Countries with great amount of energy deposits on their borderline need to build up their defense capacity continually, to ensure their territory along with their energy deposits is free from any interferences.

Keywords: border security, defense, energy, national interest, threat

Procedia PDF Downloads 482
30772 Effort-Reward-Imbalance and Self-Rated Health Among Healthcare Professionals in the Gambia

Authors: Amadou Darboe, Kuo Hsien-Wen

Abstract:

Background/Objective: The Effort-Reward Imbalance (ERI) model by Siegrist et al (1986) have been widely used to examine the relationship between psychosocial factors at work and health. It claimed that failed reciprocity in terms of high efforts and low rewards elicits strong negative emotions in combination with sustained autonomic activation and is hazardous to health. The aim of this study is to identify the association between Self-rated Health and Effort-reward Imbalance (ERI) among Nurses and Environmental Health officers in the Gambia. Method: a cross-sectional study was conducted using a multi-stage random sampling of 296 healthcare professionals (206 nurses and 90 environmental health officers) working in public health facilities. The 22 items Effort-reward imbalance questionnaire (ERI-L version 22.11.2012) will be used to collect data on the psychosocial factors defined by the model. In addition, self-rated health will be assessed by using structured questionnaires containing Likert scale items. Results: We found that self-rated health among environmental health officers has a significant negative correlation with extrinsic effort and a positive significant correlations with occupational reward and job satisfaction. However, among the nurses only job satisfaction was significantly correlated with self-rated health and was positive. Overall, Extrinsic effort has a significant negative correlation with reward and job satisfaction but a positive correlation with over-commitment. Conclusion: Because low reward and high over-commitment among the nursing group, It is necessary to modify working conditions through improving psychosocial factors, such as reasonable allocation of resources to increase pay or rewards from government.

Keywords: effort-reward imbalance model, healthcare professionals, self-rated health

Procedia PDF Downloads 407
30771 Community Health Workers’ Performance and Their Influence in the Adoption of Strategies to Address Malaria Burden at a Subnational Level Health System in Cameroon

Authors: Tacho Rubby Kong

Abstract:

Community health workers’ performances are known to influence members’ behaviours and practices while translating policies into service delivery. However, little remains known about the extent to which this remains true within interventions aimed at addressing malaria burden in low-resource settings like Cameroon. The objective of this study was to examine the health workers’ performance and their influence on the adoption of strategies to address the malaria burden at a subnational level health system in Cameroon. A qualitative exploratory design was adopted on a purposively selected sample of 18 key informants. The study was conducted in Konye health district among sub-national health systems, managers, health facility in-charges, and frontline community health workers. Data was collected using semi-structured interview guides in a face-to-face interview with respondents. The analysis adopted a thematic approach utilising journals, credible authors, and peer review articles for data management. Participants acknowledged that workplace networks were influential during the implementation of policies to address malaria. The influence exerted was in form of linkage with other services, caution, and advice regarding strict adherence to policy recommendations, perhaps reflective of the level of trust in providers’ ability to adhere to policy provisions. At the district health management level and among non-state actors, support in perceived areas of weak performance in policy implementation was observed. In addition, timely initiation of contact and subsequent referral was another aspect where community health workers exerted influence while translating policies to address the malaria burden. While the level of support from among network peers was observed to influence community health workers’ adoption and implementation of strategies to address the malaria burden, different mechanisms triggered subsequent response and level of adherence to recommended policy aspects. Drawing from the elicited responses, it was infer that community health workers’ performance influence the direction and extent of success in policy implementation to address the malaria burden at the subnational level.

Keywords: subnational, community, malaria, strategy

Procedia PDF Downloads 92
30770 Factors Affecting M-Government Deployment and Adoption

Authors: Saif Obaid Alkaabi, Nabil Ayad

Abstract:

Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.

Keywords: e-government, m-government, system dependability, system security, trust

Procedia PDF Downloads 381
30769 Non-Governmental Organisations and Human Development in Bauchi State, Nigeria

Authors: Sadeeq Launi

Abstract:

NGOs, the world over, have been recognized as part of the institutions that complement government activities in providing services to the people, particularly in respect of human development. This study examined the role played by the NGOs in human development in Bauchi State, Nigeria, between 2004 and 2013. The emphasis was on reproductive health and access to education role of the selected NGOs. All the research questions, objectives and hypotheses were stated in line with these variables. The theoretical framework that guided the study was the participatory development approach. Being a survey research, data were generated from both primary and secondary sources with questionnaires and interviews as the instruments for generating the primary data. The population of the study was made up of the staff of the selected NGOs, beneficiaries, health staff and school teachers in Bauchi State. The sample drawn from these categories were 90, 107 and 148 units respectively. Stratified random and simple random sampling techniques were adopted for NGOs staff, and Health staff and school teachers data were analyzed quantitatively and qualitatively and hypotheses were tested using Pearson Chi-square test through SPSS computer statistical package. The study revealed that despite the challenges facing NGOs operations in the study area, NGOs rendered services in the areas of health and education This research recommends among others that, both government and people should be more cooperative to NGOs to enable them provide more efficient and effective services. Governments at all levels should be more dedicated to increasing accessibility and affordability of basic education and reproductive health care facilities and services in Bauchi state through committing more resources to the Health and Education sectors, this would support and facilitate the complementary role of NGOs in providing teaching facilities, drugs, and other reproductive health services in the States. More enlightenment campaigns should be carried out by governments to sensitize the public, particularly women on the need to embrace immunization programmes for their children and antenatal care services being provided by both the government and NGOs.

Keywords: access to education, human development, NGOs, reproductive health

Procedia PDF Downloads 176
30768 Is More Inclusive More Effective? The 'New Style' Public Distribution System in India

Authors: Avinash Kishore, Suman Chakrabarti

Abstract:

In September 2013, the parliament of India enacted the National Food Security Act (NFSA) which entitles two-thirds of India’s population to five kilograms of rice, wheat or coarse cereals per person per month at one to three rupees per kilogram. Five states in India—Andhra Pradesh, Chhattisgarh, Tamil Nadu, Odisha and West Bengal—had already implemented somewhat similar changes in the TPDS a few years earlier using their own budgetary resources. They made rice—coincidentally, all five states are predominantly rice-eating—available in fair price shops to a majority of their population at very low prices (less than Rs.3/kg). This paper tries to account for the changes in household consumption patterns associated with the change in TPDS policy in these states using data from household consumption surveys by the National Sample Survey Organization (NSSO). NSS data show improvement in the coverage of TPDS and average off-take of grains from fair price shops between 2004-05 and 2009-10 across all states of India. However, the increase in coverage and off-take was significantly higher in four out of these five states than in the rest of India. An average household in these states purchased three kilos more rice per month from fair price shops than its counterpart in non-treated states as a result of more generous TPDS policies backed by administrative reforms. The increase in consumption of PDS rice was the highest in Chhattisgarh, the poster state of PDS reforms. Households in Chhattisgarh used money saved on rice to spend more on pulses, edible oil, vegetables and sugar and other non-food items. We also find evidence that making TPDS more inclusive and more generous is not enough unless it is supported by administrative reforms to improve grain delivery and control diversion to open markets.

Keywords: public distribution system, social safety-net, national food security act, diet quality, Chhattisgarh

Procedia PDF Downloads 374
30767 The Importance of Electronic Medical Record Systems in Health Care Economics

Authors: Mutaz Shurahabeel Ahmed Ombada

Abstract:

This paper investigates potential health and financial settlement of health information technology, this paper evaluates health care with the use of IT and other associated industries. It assesses prospective savings and costs of extensive acceptance of Electronic Medical Record Systems (EMRS), models significant to health as well as safety remuneration, and conclude that efficient EMRS execution and networking could ultimately save more than US $55 billion annually through recuperating health care effectiveness and that Health Information Technology -enabled prevention and administration of chronic disease could eventually double those savings while rising health and other social remuneration. On the contrary, this is improbable to be realized without related to significant modifications to the health care system.

Keywords: electronic medical record systems, health care economics, EMRS

Procedia PDF Downloads 561
30766 Strategies by National Health Systems in the Northern Hemisphere Against COVID-19

Authors: Aysha Zahidie, Meesha Iqbal

Abstract:

This paper aims to assess the effectiveness of strategies adopted by national health systems across the globe in different ‘geographical regions’ in the Northern Hemisphere to combat COVID-19 pandemic. Data is included from the first case reported in November 2019 till mid-April 2020. Sources of information are COVID-19 case repositories, official country websites, university research teams’ perspectives, official briefings, and available published research articles to date. We triangulated all data to formulate a comprehensive illustration of COVID-19 situation in each country included. It has been found that the 2002-2004 SARS outbreak experienced in China, Taiwan, and South Korea saw better strategies adopted by leadership to combat COVID-19 pandemic containment as compared to Iran, Italy, and the United States of America. Saudi Arabia has so far been successful in the implementation of containment strategies as there have been no large outbreaks in major cities or confined areas such as prisons. The situation has yet to unfold in India and Pakistan, which exhibit their own weaknesses in policy formulation or implementation in response to health crises.

Keywords: national health systems, COVID-19, prevention, response

Procedia PDF Downloads 113