Search results for: cyber security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5404

Search results for: cyber security awareness

4174 Environmental Education for Sustainable Development in Bangladesh and Its Challenges

Authors: Md. Kamal Uddin

Abstract:

Bangladesh is trying to achieve Sustainable Development Goals (SDGs) by 2030. Environmental Education (EE) is very vital to reaching the agenda of SDGs. However, a lack of environmental awareness and gaps in theoretical knowledge and its practices still exists in Bangladesh. Therefore, this research aims to understand the students’ perceptions of whether and how their behaviour is environment-friendly to achieve SDGs. It also addresses teachers’ perceptions of what are the shortcomings of environmental education in Bangladesh. It uses the qualitative and quantitative techniques of data collection and analysis based on in-depth interviews, surveys among different categories of participants and classroom observation. The paper finds that the level of EE and students’ awareness of the environment is inadequate. Some teachers believe that the EE is not better in Bangladesh due to the absence of practical learning of EE, lack of the motivations and actions, institutional weakness, inadequate policies, poor implementation, and cultural and traditional beliefs. Thus, this paper argues that Bangladeshi EE is not adequate to change the behaviour of the students towards the environment, which makes it difficult for the country to ensure SD. Thus, this research suggests that there is a need to revise the environmental education policy to change the behaviour and structure of the country for sustainable development.

Keywords: environmental education, sustainable development, environmental practice, environmental behaviour, Bangladesh

Procedia PDF Downloads 187
4173 A Review on Future Safety Conditions and Requirements for E-Bikes

Authors: Jonas Palmer, Leon Brüning, Lukas Himmelsbach

Abstract:

The worldwide ambitions to transform the transportation sector are increasingly affecting the safety conditions for all traffic participants and the required infrastructure. To contribute to the transformation and for health aspects, individuals search for carbon-free alternatives that include physical excitation. Especially e-bikes experience a growing demand within the last few years and consequently change the safety requirements. E-cyclists are exposed to amplified risks due to higher velocity in comparison to classic cyclists. Furthermore, cyclists suffer from a lack of infrastructure, rider assistance systems as well as awareness of other road users. For minimizing the risk of accidents, it is crucial to identify, develop and implement safety measures for cyclists. The paper aims to contribute to future research with delivering an overview of the latest publications and to subsequently identify essential research gaps. Therefore, it is essential to analyze the areas of technical adjustments as well as legal aspects and the correlation of both. The review`s insights can intensify the awareness of safety issues related to e-bikes and promote the development and implementation of appropriate measures.

Keywords: e-bike safety measures, future mobility, risk management, road safety

Procedia PDF Downloads 112
4172 Identification of Information War in Lithuania

Authors: Vitalijus Leibenka

Abstract:

After 2014 the world of Russia’s actions in annexing Crimea has seen a hybrid war that has helped Russia achieve its goals. The world and NATO nations have pointed out that hybrid action can help achieve not only military but also economic and political goals. One of the weapons of action in hybrid warfare is information warfare tools, the use of which helps to carry out actions in the context of hybrid warfare as a whole. In addition, information war tools can be used alone, over time and for long-term purposes. Although forms of information war, such as propaganda and disinformation, have been used in the past, in old conflicts and wars, new forms of information war have emerged as a result of technological development, making the dissemination of information faster and more efficient. The world understands that information is becoming a weapon, but not everyone understands that both information war and information warfare differ in their essence and full content. In addition, the damage and impact of the use of information war, which may have worse consequences than a brief military conflict, is underestimated. Lithuania is also facing various interpretations of the information war. Some believe that the information attack is an information war and the understanding of the information war is limited to a false message in the press. Others, however, deepen and explain the essence of the information war. Society has formed in such a way that not all people are able to assess the threats of information war, to separate information war from information attack. Recently, the Lithuanian government has been taking measures in the context of the information war, making decisions that allow the development of the activities of the state and state institutions in order to create defense mechanisms in the information war. However, this is happening rather slowly and incompletely. Every military conflict, related to Lithuania in one way or another, forces Lithuanian politicians to take up the theme of information warfare again. As a result, a national cyber security center is being set up, and Russian channels spreading lies are banned. However, there is no consistent development and continuous improvement of action against information threats. Although a sufficiently influential part of society (not a political part) helps to stop the spread of obscure information by creating social projects such as “Demaskuok” and “Laikykis ten su Andriumi tapinu”, it goes without saying that it will not become a key tool in the fight against information threats. Therefore, in order to achieve clean dissemination of information in Lithuania, full-fledged and substantial political decisions are necessary, the adoption of which would change the public perception of the information war, its damage, impact and actions that would allow to combat the spread. Political decisions should cover the educational, military, economic and political areas, which are one of the main and most important in the state, which would allow to fundamentally change the situation against the background of information war.

Keywords: information war, information warfare, hybrid war, hybrid warfare, NATO, Lithuania, Russia

Procedia PDF Downloads 58
4171 Nutritional Potential and Traditional Uses of High Altitude Wild Edible Plants in Eastern Himalayas, India

Authors: Hui Tag, Jambey Tsering, Pallabi Kalita Hui, Baikuntha Jyoti Gogoi, Vijay Veer

Abstract:

The food security issues and its relevance in High Mountain regions of the world have been often neglected. Wild edible plants have been playing a major role in livelihood security among the tribal Communities of East Himalayan Region of the world since time immemorial. The Eastern Himalayan Region of India is one of the mega diverse regions of world and rated as top 12th Global Biodiversity Hotspots by IUCN and recognized as one of the 200 significant eco-regions of the Globe. The region supports one of the world’s richest alpine floras and about one-third of them are endemic to the region. There are at least 7,500 flowering plants, 700 orchids, 58 bamboo species, 64 citrus species, 28 conifers, 500 mosses, 700 ferns and 728 lichens. The region is the home of more than three hundred different ethnic communities having diverse knowledge on traditional uses of flora and fauna as food, medicine and beverages. Monpa, Memba and Khamba are among the local communities residing in high altitude region of Eastern Himalaya with rich traditional knowledge related to utilization of wild edible plants. The Monpas, Memba and Khamba are the followers Mahayana sect of Himalayan Buddhism and they are mostly agrarian by primary occupation and also heavily relaying on wild edible plants for their livelihood security during famine since millennia. In the present study, we have reported traditional uses of 40 wild edible plant species and out of which 6 species were analysed at biochemical level for nutrients contents and free radical scavenging activities. The results have shown significant free radical scavenging (antioxidant) activity and nutritional potential of the selected 6 wild edible plants used by the local communities of Eastern Himalayan Region of India.

Keywords: East Himalaya, local community, wild edible plants, nutrition, food security

Procedia PDF Downloads 257
4170 The Psychological Effect of Emotional Demands and Discrimination, and the Role of Job Resources among Asian Immigrant Microbusiness Owners

Authors: Il-Ho Kim, Samuel Noh, Kwame McKenzie, Cyu-Chul Choi

Abstract:

Many members of immigrant minorities choose to operate microbusinesses that involve emotionally taxing interactions with customers and discriminatory exposures in the workplace. This study investigated the psychological risks of emotional demands and discrimination as well as the buffering roles of two types of job resources (job autonomy and job security) among immigrant microbusiness owners (MBOs). Data were derived from a cross-sectional survey of 550 Korean immigrant MBOs, aged 30 to 70, living in Toronto and its surrounding areas. Face-to-face interviews were conducted between March and November 2013. Results showed that emotional suppression and discrimination were positively associated with depressive symptoms. However, the direct effect of positive emotional demands was insignificant. For job resources, the beneficial effect of job security on depressive symptom was apparent, but the effect of job autonomy was trivial. Regarding the moderating effect, job security buffered the psychological harm of both emotional suppression and workplace discrimination. Although job autonomy buffered the link between discrimination and depressive symptoms, the buffering effect of job autonomy on the emotional suppression-depression link was insignificant. This study’s finding implies that emotional demands and workplace discrimination seem to be important factors in contributing to occupational psychological problems, but the psychological impact can differ according to the types of emotional demands and job resources among immigrant MBOs.

Keywords: immigrant microbusiness owners, emotional demands, discrimination, job resources, depression

Procedia PDF Downloads 212
4169 Supermarket Shoppers Perceptions to Genetically Modified Foods in Trinidad and Tobago: Focus on Health Risks and Benefits

Authors: Safia Hasan Varachhia, Neela Badrie, Marsha Singh

Abstract:

Genetic modification of food is an innovative technology that offers a host of benefits and advantages to consumers. Consumer attitudes towards GM food and GM technologies can be identified a major determinant in conditioning market force and encouraging policy makers and regulators to recognize the significance of consumer influence on the market. This study aimed to investigate and evaluate the extent of consumer awareness, knowledge, perception and acceptance of GM foods and its associated health risks and benefit in Trinidad and Tobago, West Indies. The specific objectives of this study were to (determine consumer awareness to GM foods, ascertain their perspectives on health and safety risks and ethical issues associated with GM foods and determine whether labeling of GM foods and ingredients will influence consumers’ willingness to purchase GM foods. A survey comprising of a questionnaire consisting of 40 questions, both open-ended and close-ended was administered to 240 shoppers in small, medium and large-scale supermarkets throughout Trinidad between April-May, 2015 using convenience sampling. This survey investigated consumer awareness, knowledge, perception and acceptance of GM foods and its associated health risks/benefits. The data was analyzed using SPSS 19.0 and Minitab 16.0. One-way ANOVA investigated the effects categories of supermarkets and knowledge scores on shoppers’ awareness, knowledge, perception and acceptance of GM foods. Linear Regression tested whether demographic variables (category of supermarket, age of consumer, level of were useful predictors of consumer’s knowledge of GM foods). More than half of respondents (64.3%) were aware of GM foods and GM technologies, 28.3% of consumers indicated the presence of GM foods in local supermarkets and 47.1% claimed to be knowledgeable of GM foods. Furthermore, significant associations (P < 0.05) were observed between demographic variables (age, income, and education), and consumer knowledge of GM foods. Also, significant differences (P < 0.05) were observed between demographic variables (education, gender, and income) and consumer knowledge of GM foods. In addition, age, education, gender and income (P < 0.05) were useful predictors of consumer knowledge of GM foods. There was a contradiction as whilst 35% of consumers considered GM foods safe for consumption, 70% of consumers were wary of the unknown health risks of GM foods. About two-thirds of respondents (67.5%) considered the creation of GM foods morally wrong and unethical. Regarding GM food labeling preferences, 88% of consumers preferred mandatory labeling of GM foods and 67% of consumers specified that any food product containing a trace of GM food ingredients required mandatory GM labeling. Also, despite the declaration of GM food ingredients on food labels and the reassurance of its safety for consumption by food safety and regulatory institutions, the majority of consumers (76.1%) still preferred conventionally produced foods over GM foods. The study revealed the need to inform shoppers of the presence of GM foods and technologies, present the scientific evidence as to the benefits and risks and the need for a policy on labeling so that informed choices could be taken.

Keywords: genetically modified foods, income, labeling consumer awareness, ingredients, morality and ethics, policy

Procedia PDF Downloads 325
4168 The Impact of Malicious Attacks on the Performance of Routing Protocols in Mobile Ad-Hoc Networks

Authors: Habib Gorine, Rabia Saleh

Abstract:

Mobile Ad-Hoc Networks are the special type of wireless networks which share common security requirements with other networks such as confidentiality, integrity, authentication, and availability, which need to be addressed in order to secure data transfer through the network. Their routing protocols are vulnerable to various malicious attacks which could have a devastating consequence on data security. In this paper, three types of attacks such as selfish, gray hole, and black hole attacks have been applied to the two most important routing protocols in MANET named dynamic source routing and ad-hoc on demand distance vector in order to analyse and compare the impact of these attacks on the Network performance in terms of throughput, average delay, packet loss, and consumption of energy using NS2 simulator.

Keywords: MANET, wireless networks, routing protocols, malicious attacks, wireless networks simulation

Procedia PDF Downloads 316
4167 Landmines and the Postcolonial Security Discourse in Zimbabwe

Authors: Fradreck Jockonia Mujuru

Abstract:

The effects of landmine residues from the Zimbabwean liberation war are persisting. Landmines are violently maiming and killing people and animals, causing certain areas inaccessible for agriculture and habitation, instilling fear, and even inducing forced migration. A significant gap in landmines literature is that they are mainly treated as a humanitarian issue and less scholarly. This paper engaged in theorising landmines using postcolonial literature as an epistemology. The results exhibit three issues. One, postcolonial literature provides a timeframe, a process, a space, and an attitude towards modernity on the inquiry of landmines. Two, landmines are understood in the context of war and were further decolonised to pick unique principles studied. Lastly, some of the unique principles found in landmines after decolonising are their ability to provide surveillance, repression and violent fate to all who cross the set boundaries. Therefore, theorising landmines can also be pushed further to be understood through repression. This article concluded that landmines can be theorised outside mainstream International Relations theories using postcolonial literature.

Keywords: landmines, postcolonial, repression, security, violence

Procedia PDF Downloads 68
4166 Taxonomy of Threats and Vulnerabilities in Smart Grid Networks

Authors: Faisal Al Yahmadi, Muhammad R. Ahmed

Abstract:

Electric power is a fundamental necessity in the 21st century. Consequently, any break in electric power is probably going to affect the general activity. To make the power supply smooth and efficient, a smart grid network is introduced which uses communication technology. In any communication network, security is essential. It has been observed from several recent incidents that adversary causes an interruption to the operation of networks. In order to resolve the issues, it is vital to understand the threats and vulnerabilities associated with the smart grid networks. In this paper, we have investigated the threats and vulnerabilities in Smart Grid Networks (SGN) and the few solutions in the literature. Proposed solutions showed developments in electricity theft countermeasures, Denial of services attacks (DoS) and malicious injection attacks detection model, as well as malicious nodes detection using watchdog like techniques and other solutions.

Keywords: smart grid network, security, threats, vulnerabilities

Procedia PDF Downloads 131
4165 Determining the Awareness Level of Chefs and Students on Food Safety and Allergens in Kano State, Nigeria and Ankara City in Turkey

Authors: Balarabe Bilyaminu Ismail, Osman Cavus, Fügen Durlu Özkaya

Abstract:

This study is aimed at determining the level of awareness of chefs and students of food science and technology on food safety in general and allergens in particular. To get appropriate data, a questionnaire comprising of 19 questions covering many food safety issues and allergens in foods were used to collect information for the study through face to face interviews. Interviews were conducted for 284 people in Nigeria and Turkey. Sixty-eight percent of respondents from Turkey; 31.3% were students and 68.7% were chefs. Thirty-one percent of respondents from Nigeria include 33.7% students and 66.3% chefs. The result of the study indicated that most of the findings of scientific studies on food safety issues have not been directly applied by the people working in the food sector. Additionally, the knowledge level of the gastronomy and culinary arts students on food safety and allergens are significantly higher than the restaurant chefs that prepare the food and serve it to the public. The study, therefore, concluded that proper training of food business operators is critical to ensuring the safety of foods and control of allergens.

Keywords: allergens, food safety, questionnaire survey, training

Procedia PDF Downloads 353
4164 Adult Attachment Security as a Predictor of Career Decision-Making Self-Efficacy among College Students in the United States

Authors: Mai Kaneda, Sarah Feeney

Abstract:

This study examined the association between adult attachment security and career decision-making self-efficacy (CDMSE) among college students in the United States. Previous studies show that attachment security is associated with levels of CDMSE among college students. Given that a majority of studies examining career development variables have used parental attachment measures, this study adds to understanding of this phenomenon by utilizing a broader measure of attachment. The participants included 269 college students (76% female) between the ages of 19-29. An anonymous survey was distributed online via social media as well as in hard copy format in classrooms. Multiple regression analyses were conducted to determine the relationship between anxious and avoidant attachment and CDMSE. Results revealed anxious attachment was a significant predictor of CDMSE (B = -.13, p = .01), such that greater anxiety in attachment was associated with lower levels of CDMSE. When accounting for anxious attachment, avoidant attachment was no longer significant as a predictor of CDMSE (B = -.12, p = .10). The variance in college CDMSE explained by the model was 7%, F(2,267) = 9.51, p < .001. Results for anxious attachment are consistent with existing literature that finds insecure attachment to be related to lower levels of CDMSE, however the non-significant results for avoidant attachment as a predictor of CDMSE suggest not all types of attachment insecurity are equally related to CDMSE. Future research is needed to explore the nature of the relationship between different dimensions of attachment insecurity and CDMSE.

Keywords: attachment, career decision-making, college students, self-efficacy

Procedia PDF Downloads 215
4163 Engaging the Terrorism Problematique in Africa: Discursive and Non-Discursive Approaches to Counter Terrorism

Authors: Cecil Blake, Tolu Kayode-Adedeji, Innocent Chiluwa, Charles Iruonagbe

Abstract:

National, regional and international security threats have dominated the twenty-first century thus far. Insurgencies that utilize “terrorism” as their primary strategy pose the most serious threat to global security. States in turn adopt terrorist strategies to resist and even defeat insurgents who invoke the legitimacy of statehood to justify their action. In short, the era is dominated by the use of terror tactics by state and non-state actors. Globally, there is a powerful network of groups involved in insurgencies using Islam as the bastion for their cause. In Africa, there are Boko Haram, Al Shabaab and Al Qaeda in the Maghreb representing Islamic groups utilizing terror strategies and tactics to prosecute their wars. The task at hand is to discover and to use multiple ways of handling the present security threats, including novel approaches to policy formulation, implementation, monitoring and evaluation that would pay significant attention to the important role of culture and communication strategies germane for discursive means of conflict resolution. In other to achieve this, the proposed research would address inter alia, root causes of insurgences that predicate their mission on Islamic tenets particularly in Africa; discursive and non-discursive counter-terrorism approaches fashioned by African governments, continental supra-national and regional organizations, recruitment strategies by major non-sate actors in Africa that rely solely on terrorist strategies and tactics and sources of finances for the groups under study. A major anticipated outcome of this research is a contribution to answers that would lead to the much needed stability required for development in African countries experiencing insurgencies carried out by the use of patterned terror strategies and tactics. The nature of the research requires the use of triangulation as the methodological tool.

Keywords: counter-terrorism, discourse, Nigeria, security, terrorism

Procedia PDF Downloads 480
4162 Understanding Everyday Insecurities Emerging from Fragmented Territorial Control in Post-Accord Colombia

Authors: Clara Voyvodic

Abstract:

Transitions from conflict to peace are by no means smooth nor linear, particularly from the perspective of those living through them. Over the last few decades, the changing focus in peacebuilding studies has come to appreciate the everyday experience of communities and how that provides a lens through which the relative success or efficacy of these transitions can be understood. In particular, the demobilization of a significant conflict actor is not without consequences, not just for the macro-view of state stabilization and peace, but for the communities who find themselves without a clear authority of territorial control. In Colombia, the demobilization and disarmament of the FARC guerilla group provided a brief respite to the conflict and a major political win for President Manuel Santos. However, this victory has proven short-lived. Drawing from extensive field research in Colombia within the last year, including interviews with local communities and actors operating in these regions, field observations, and other primary resources, this paper examines the post-accord transitions in Colombia and the everyday security experiences of local communities in regions formerly controlled by the FARC. In order to do so, the research focused on a semi-ethnographic approach in the northern region of the department of Antioquia and the coastal area of the border department of Nariño that documented how individuals within these marginalized communities have come to understand and negotiate their security in the years following the accord and the demobilization of the FARC. This presentation will argue that the removal of the FARC as an informal governance actor opened a space for multiple actors to attempt to control the same territory, including the state. This shift has had a clear impact on the everyday security experiences of the local communities. With an exploration of the dynamics of local governance and its impact on lived security experiences, this research seeks to demonstrate how distinct patterns of armed group behavior are emerging not only from a vacuum of control left by the FARC but from an increase in state presence that nonetheless remains inconsistent and unpersuasive as a monopoly of force in the region. The increased multiplicity of actors, particularly the state, has meant that the normal (informal) rules for communities to navigate these territories are no longer in play as the identities, actions, and intentions of different competing groups have become frustratingly opaque. This research provides a prescient analysis on how the shifting dynamics of territorial control in a post-peace accord landscape produce uncertain realities that affect the daily lives of the local communities and endanger the long-term prospect of human-centered security.

Keywords: armed actors, conflict transitions, informal governance, post-accord, security experiences

Procedia PDF Downloads 129
4161 Environmental Science: A Proposal for Constructing New Knowledge for Ecotourism Itineraries

Authors: Veruska C. Dutra, Mary L. G. S. Senna

Abstract:

The principle of sustainability has been studied by different sciences with the purpose of formulating clear and concrete models. Much has been discussed about sustainability, and several points of view have been used to try to explain it; environmental science emerges from various environmental discourses that are willing to establish a new concept for understanding this complexity. This way, we focus on the activity of ecotourism as a way to integrate sustainable practices proposed by environmental science, and thus, make it possible to create a new perspective for eco-tourists and the managers of tourist destinations towards nature. The aim of this study was to suggest a direction for environmental awareness, based on environmental science, to change the eco-tourist's view of nature in ecotourism tours. The methodology used was based on a case study concerning the Jalapão State Park - JSP, located in the State of Tocantins, Northern Brazil. The study was based on discussions, theoretical studies, bibliographical research and on-site research. We have identified that to incite the tourists’ awareness, they need to visit nature to understand the environmental problems and promote actions for its preservation. We highlight in this study actions to drive their human perception through environmental science, so that the ecotourism itinerary tours to the JSP, promote a balance between the natural environment and the tourist, making them, in this way, environmental tourists.

Keywords: science, environmental, ecoturism, Jalapão

Procedia PDF Downloads 331
4160 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 178
4159 Preoperative Smoking Cessation Audit: A Single Centre Experience from Metropolitan Melbourne

Authors: Ya-Chu May Tsai, Ibrahim Yacoub, Eoin Casey

Abstract:

The Australian and New Zealand College of Anaesthetists (ANZCA) advises that smoking should not be permitted within 12 hours of surgery. There is little information in the medical literature regarding patients awareness of perioperative smoking cessation recommendations nor their appreciation of how smoking might negatively impact their perioperative course. The aim of the study is to assess the prevalence of current smokers presenting to Werribee Mercy Hospital (WMH) and to evaluate if pre-operative provision of both written and verbal pre-operative advice was, 1: Effective in improving patient awareness of the benefits of pre-operative smoking cessation, 2: Associated with an increase in the number of elective surgical patients who stop smoking at least 12 hours pre-operatively. Methods: The initial survey included all patients who presented to WMH for elective surgical procedures from 19 – 30 September 2016 using a standardized questionnaire focused on patients’ smoking history and their awareness of smoking cessation preoperatively. The intervention consisted of a standard pre-operative phone call to all patients advising them of the increased perioperative risks associated with smoking, and advised patients to cease 12 hours prior. In addition, written information on smoking cessation strategies were sent out in mail at least 1 week prior to planned procedure date to all patients. Questionnaire-based study after the intervention was conducted on day of elective procedure from 10 – 21 October 2016 inclusive. Primary outcomes measured were patient’s awareness of smoking cessation and proportion of smokers who quit >12 hours, considered a clinically meaning duration to reduce anaesthetics complications. Comparison of pre and post intervention results were made using SPSS 21.0. Results: In the pre-intervention group (n=156), 36 (22.4%) patients were current smokers, 46 were ex-smokers (29.5%) and 74 were non-smokers (48.1%). Of the smokers, 12 (33%) reported having been informed of smoking cessation prior to operation and 8 (22%) were aware of increased intra- and perioperative adverse events associated with smoking. In the post-intervention group n= 177, 38 (21.5%) patients were current smokers, 39 were ex-smokers (22.0%) and 100 were non-smokers (56.5%). Of the smokers, 32 (88.9%) reported having been informed of smoking cessation prior to operation and 35 (97.2%) reported being aware of increased intra- and perioperative adverse events associated with smoking. The median time since last smoke in the pre-intervention group was 5.5 hours (Q1-Q3 = 2-14) compared with 13 hours (Q1-Q3 = 5-24) in post intervention group. Amongst the smokers, smoking cessation at least 12 hours prior to surgery significantly increased from 27.8% pre-intervention to 52.6% post intervention (P=0.03). Conclusion: A standard preoperative phone call and written instruction on smoking cessation guidelines at time of waitlist placement increase preoperative smoking cessation rates by almost 2-fold.

Keywords: anaesthesia, audit, perioperative medicine, smoking cessation

Procedia PDF Downloads 301
4158 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 289
4157 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 30
4156 Ethereum Based Smart Contracts for Trade and Finance

Authors: Rishabh Garg

Abstract:

Traditionally, business parties build trust with a centralized operating mechanism, such as payment by letter of credit. However, the increase in cyber-attacks and malicious hacking has jeopardized business operations and finance practices. Emerging markets, owing to their higher banking risks and bigger presence of digital financing, are looking forward to technology-driven solutions, financial inclusion and innovative working paradigms. Blockchain has the potential to enhance transaction transparency and supply chain traceability. It has captured a vast landscape with 200 million crypto users worldwide. Fintech and blockchain products are popping up across brokerage, digital wallets, exchanges, post-trade clearance, settlement, middleware, infrastructure, and base protocols.

Keywords: blockchain, distributed ledger technology, decentralized applications, ethereum, smart contracts, trade finance

Procedia PDF Downloads 145
4155 Waste Generation in Iranian Building Industry: Addressing a Theory

Authors: Golnaz Moghimi, Alireza Afsharghotli, Alireza Rezaei

Abstract:

Construction waste has been gradually increased as a result of upsizing construction projects which are occurred within the lifecycle of buildings. Since waste management is a major priority and has profound impacts on the volume of waste generated in construction stage, the majority of efforts have been attempted to reuse, recycle and reduce waste. However, there is still room to study on lack of sufficient knowledge about waste management in construction industry. This paper intends to provide an insight into the effect of project management knowledge areas on waste management solely on construction stage. To this end, a survey among Iranian building construction industry contractors was conducted to identify the effectiveness of project management knowledge areas on three jobsite key factors including ‘Site activity’, ‘Training’, and ‘Awareness’. As a result, four management disciplines were identified as most influential ones on amount of construction waste. These disciplines were Project Cost Management, Quality Management, Human Resource Management, and Integration Management. Based on the research findings, a new model was presented to develop effective construction waste strategies.

Keywords: awareness, PMBOK, site activity, training, waste management

Procedia PDF Downloads 346
4154 The Effectiveness of Using Nihongo Mantappu Channel on Youtube as an Effort to Succeed Sustainable Development Goals 2030 for Tenth Graders of Smam 10 GKB Gresik

Authors: Salsabila Meutia Meutia

Abstract:

Indonesia as one of the countries that agreed to SDG's must commit to achieve this SDG's goal until the deadline of 2030. The government has tried hard to realize all the goals in the SDG’s, but there is still something that has not been achieved, especially the goal in number 4 which is to ensure that every human being has a decent and inclusive education and encourages lifelong learning opportunities for everyone. Teenagers who are the golden generation for Indonesia are starting to feel dependent on Youtube. The addictive virus of teenagers about using YouTube is both good news and bad news for the sustainability of government programs in achieving goals in SDG’s, especially in term of education. One popular YouTube channel among high school teenagers is Nihongo Mantappu which has 1.8 million followers. This channel contains interesting but quality content that can have a positive influence for the audience. This research was conducted to determine the effectiveness of the Nihongo Mantappu channel on Youtube as a means of fostering enthusiasm and awareness of learning in tenth graders of SMA Muhammadiyah 10 GKB, as well as how it affected in achieving quality educational goals as an effort to succeed in the Sustainable Development Goals of 2030. The objectives of this study were carried out with distributing questionnaires to tenth graders of SMA Muhammadiyah 10 GKB and observing objects in the real life. Then the data obtained are analyzed and described properly so that this research is a descriptive study. The results of the study mentioned that YouTube as one of the websites for viewing and sharing videos is a very effective media for disseminating information, especially among teenagers. The Nihongo Mantappu channel is also considered to be a very effective channel in building enthusiasm and awareness of learning in tenth graders of SMA Muhammadiyah 10 GKB. Students as the main subject of education have a great influence on the achievement of one of SDG’s fourth goals, named quality education. Students who are always on fire in the spirit and awareness of learning will greatly help the achievement of quality education goals in the Sustainable Development Goals by 2030.

Keywords: Youtube, Nihongo, Mantappu, SDG's

Procedia PDF Downloads 128
4153 Multi-Generational Analysis of Perception and Acceptance of Mental Illnesses: Current Indian Context

Authors: Anvi Kumar

Abstract:

This paper explores the attitudes and awareness of multiple generations ranging from Boomers I to GenZ (i.e. from 1954 to 2012) towards mental health issues. A convenient sample of 191 people was gathered in India aged 11-77. 20 people each were considered from 5 generational cohorts, namely- Boomers I, Boomers II, Gen X, Millennials, and Gen Z. The study tool comprised a survey that included demographic questions and the Community Attitude towards Mental Illness (CAMI) scale by Taylor & Dear (1981). Descriptive statistics, ANOVA, and Bonferonni’s post-hoc analysis have been used to perform the analysis. The findings reveal that the level of kindness towards those who struggle with mental health varies through certain age groups. An overall sense of exclusion of those struggling with mental health is prevalent among all age groups. GenZ’s awareness of mental health issues is primarily via social media, as against the rest of the generations seeking it from close relatives and friends. The study’s findings suggest a need to investigate further the quality of mental health knowledge content and its consumption pattern. Understanding the dynamics of information sharing and the potential for biases requires further discovery.

Keywords: attitude, behaviour, mental illness, Gen Z, millennials, Gen Y, multi-generations, generational differences

Procedia PDF Downloads 71
4152 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 139
4151 Consumer Preferences for Low-Carbon Futures: A Structural Equation Model Based on the Domestic Hydrogen Acceptance Framework

Authors: Joel A. Gordon, Nazmiye Balta-Ozkan, Seyed Ali Nabavi

Abstract:

Hydrogen-fueled technologies are rapidly advancing as a critical component of the low-carbon energy transition. In countries historically reliant on natural gas for home heating, such as the UK, hydrogen may prove fundamental for decarbonizing the residential sector, alongside other technologies such as heat pumps and district heat networks. While the UK government is set to take a long-term policy decision on the role of domestic hydrogen by 2026, there are considerable uncertainties regarding consumer preferences for ‘hydrogen homes’ (i.e., hydrogen-fueled appliances for space heating, hot water, and cooking. In comparison to other hydrogen energy technologies, such as road transport applications, to date, few studies have engaged with the social acceptance aspects of the domestic hydrogen transition, resulting in a stark knowledge deficit and pronounced risk to policymaking efforts. In response, this study aims to safeguard against undesirable policy measures by revealing the underlying relationships between the factors of domestic hydrogen acceptance and their respective dimensions: attitudinal, socio-political, community, market, and behavioral acceptance. The study employs an online survey (n=~2100) to gauge how different UK householders perceive the proposition of switching from natural gas to hydrogen-fueled appliances. In addition to accounting for housing characteristics (i.e., housing tenure, property type and number of occupants per dwelling) and several other socio-structural variables (e.g. age, gender, and location), the study explores the impacts of consumer heterogeneity on hydrogen acceptance by recruiting respondents from across five distinct groups: (1) fuel poor householders, (2) technology engaged householders, (3) environmentally engaged householders, (4) technology and environmentally engaged householders, and (5) a baseline group (n=~700) which filters out each of the smaller targeted groups (n=~350). This research design reflects the notion that supporting a socially fair and efficient transition to hydrogen will require parallel engagement with potential early adopters and demographic groups impacted by fuel poverty while also accounting strongly for public attitudes towards net zero. Employing a second-order multigroup confirmatory factor analysis (CFA) in Mplus, the proposed hydrogen acceptance model is tested to fit the data through a partial least squares (PLS) approach. In addition to testing differences between and within groups, the findings provide policymakers with critical insights regarding the significance of knowledge and awareness, safety perceptions, perceived community impacts, cost factors, and trust in key actors and stakeholders as potential explanatory factors of hydrogen acceptance. Preliminary results suggest that knowledge and awareness of hydrogen are positively associated with support for domestic hydrogen at the household, community, and national levels. However, with the exception of technology and/or environmentally engaged citizens, much of the population remains unfamiliar with hydrogen and somewhat skeptical of its application in homes. Knowledge and awareness present as critical to facilitating positive safety perceptions, alongside higher levels of trust and more favorable expectations for community benefits, appliance performance, and potential cost savings. Based on these preliminary findings, policymakers should be put on red alert about diffusing hydrogen into the public consciousness in alignment with energy security, fuel poverty, and net-zero agendas.

Keywords: hydrogen homes, social acceptance, consumer heterogeneity, heat decarbonization

Procedia PDF Downloads 107
4150 A Comparative Genre-Based Study of Research Articles' Method and Results Sections Authored by Iranian and English Native Speakers

Authors: Mohammad Amin Mozaheb, Mahnaz Saeidi, Saeideh Ahangari, Saeideh Ahangari

Abstract:

The present genre-driven study aims at comparing moves and sub-moves deployed by Iranian and English medical writers while writing their research articles in English. To obtain the goals of the study, the researchers randomly selected a number of medical articles and compared them using Nwogu (1997)’s model. The results of relevant statistical tests, Chi-square tests for goodness of fit, used for comparing the two groups of the articles dubbed IrISI (Iranian ISI articles) and EISI (English ISI articles) have shown that no significant difference exists between the two groups of the articles in terms of the moves and sub-moves used in the method and results sections of them. The findings can be beneficial for people interested in English for Specific Purposes (ESP) and medical experts. The findings can also increase language awareness and genre awareness among researchers who are interested in publishing their research outcomes in ISI-indexed journals in the Islamic Republic of Iran and some other world countries.

Keywords: writing, ESP, research articles, medical sciences, language, scientific writing

Procedia PDF Downloads 364
4149 Subjective Well-Being, Emotional Regulation and Motivational Orientation of Competition Athletes

Authors: Cristina Costa-Lobo, Priscila Martins, Silvia Amado Cordeiro, Ana Campina

Abstract:

Behavior directed toward high levels of sports performance and excellence implies task-focused processes, processes of cognitive and emotional regulation. This research aims to understand if subjective well-being, emotional regulation, and motivational orientation influence the performance of competitive athletes. The sample of this study is a non-probabilistic convenience sample, consisting of 50 male athletes, aged 14 to 15 years, who belong to training teams integrated in the pedagogical department of a sports club in the North of Portugal. In terms of performance, the distinction between team A and team B is due to the championships in which the respective athletes participate. Team A participates in national championships where the levels of demand and challenge are more pronounced and the team B only participates in championships at the district level. Was verified the internal consistency of the subjective happiness scale, the emotional regulation scale, and the motivational orientation questionnaire. SPSS, version 22.0, was used in the data treatment. When comparing the dimensions of emotional regulation with performance, it can be seen that athletes with lower sports scores have higher levels of emotional control and emotional self-awareness. As far as situational responsiveness is concerned, only the emotional self-control dimension and the emotional self-awareness dimension show an influence on the income, although, contrary to what would be expected, they appear to be associated with lower incomes. When comparing the motivational orientation with the athletic performance, it is verified that the athletes with the highest performance present an ego-oriented motivation, evidencing the athletes with a lower performance athletic tendency towards the task orientation. Only the ego-oriented dimension seems to be associated with high sport performance. The motivational orientation for the ego and the dimensions emotional control and emotional self-awareness are presented in this study as having influence on sports performance. Following these studies that have shown concern with the characterization of the best athletes and the promotion of higher sports performances, this work contributes to the signaling of psychological variables associated with high sports income.

Keywords: subjective well-being, emotional regulation, motivational orientation, sports performance

Procedia PDF Downloads 271
4148 Cultural Heritage Education in Preschools: Preschool Teachers' Perspectives

Authors: Yasemin Yücesan, Gabriela Portugal, Maria Figueiredo

Abstract:

This paper presents a part of an ongoing study on preschool teachers' perspectives and pedagogical practices regarding cultural heritage education. Accordingly, this study is based on a quantitative survey. The study area is Türkiye, and the research participants are preschool teachers actively teaching in preschool education institutions. It is necessary to encourage children to understand the past and cultural heritage values at an early age. Moreover, raising awareness of cultural heritage in preschool children is crucial for recognising and preserving this heritage. Therefore, it is very important to provide people with cultural heritage knowledge at an early age, as the preschool period is a key factor in raising awareness of this issue. In the preschool education programme implemented in Türkiye, it is stated that cultural heritage education is important in early childhood and should be included in the programme. However, although it is stated that cultural heritage education should be included in the preschool education programme, it is not clearly stated which subjects will be included in the programme and what kind of practices will be carried out. Therefore, this study examines the perspectives and pedagogical practices of preschool teachers working in preschool education institutions toward cultural heritage education.

Keywords: cultural heritage, early childhood education, pedagogical practices, preschool teacher

Procedia PDF Downloads 18
4147 Evaluation of the Implementation of Public Examination Chief Examiners’ Reports in Mathematics Curriculum Contents

Authors: Oginni Omoniyi Israel

Abstract:

This study evaluated the implementation of public examination Chief Examiners’ Reports (CER) in mathematics curriculum contents in Ekiti State Senior Secondary schools, Nigeria. The study adopted a descriptive research design of survey type. The sample consisted of 60 mathematics teachers and 120 students using a multi-stage sampling procedure. The instruments used were “Questionnaire on Teachers Implementation of Chief Examiners’ Report and Mathematics Curriculum Contents (QTICERMCC) and Questionnaire on Students Knowledge of Chief Examiners’ Report and Mathematics Curriculum Contents Implementation (SIERMCC)”. The validity of the instruments was carried out by experts, while the reliability coefficients of 0.85 and 0.87 were obtained through Cronbach’s Alpha formula. The data collected were analysed using descriptive and inferential statistics. The findings revealed that there was a significant relationship between awareness, availability, and accessibility of CER as well as mathematics curriculum contents. There was also a significant relationship in the implementation of CER in mathematics between teachers and students. Based on the findings, it was recommended that the examination bodies should organize an enlightment programme annually to create awareness of the utilization of CER among the stakeholders.

Keywords: evaluation, implementation, chief examiners’ reports, curriculum contents

Procedia PDF Downloads 15
4146 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 141
4145 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 252