Search results for: security risk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8386

Search results for: security risk

7156 Risk Factors Associated with Obesity Among Adults in Tshikota, Makhado Municipality, Limpopo Province, South Africa

Authors: Ndou Rembuluwani Moddy, Daniel Ter Goon, Takalani Grace Tshitangano, Lindelani Fhumudzani Mushaphi

Abstract:

Obesity is a global public health problem. The study aimed to determine the risk factors associated with and the consequences of obesity among residents of Tshikota, Makhado Municipality, Limpopo Province, South Africa. A cross-sectional study involving 318 randomly selected adults aged 18-45 years residing at Tshikota, Makhado Local Municipality, South Africa. Sociodemographic information includes age, gender, educational level, occupation, behavioral lifestyle, environmental, psychological, and family history. Anthropometric, blood pressure, and blood glucose measurements followed standard procedure. The prevalence of obesity and overweight was 35.5% and 28.6%, respectively. About 75.2% of obese do not engage in physical activity. Most participants (63.5%) take meals three times a day, and 19.2% do not skip breakfast. Most participants do not have access to fruits and vegetables. Participants who were pre-hypertensive were 92(28.9%) and 32(10.1%) were in Stage 1 hypertension. Of the participants with Class 1 obesity, 40.9% were pre-hypertensive, and 15.2% were in Stage 1 hypertension. In Class 2 obesity, 37.8% were pre-hypertensive, and 26.7% were in Stage 1 hypertension. There was a significant difference between BMI and blood pressure among participants (p=0.00). About 6.1% of the participants in Class 1 obesity were at high risk, and 3.0% were at very high risk of glucose levels. Regarding cholesterol levels, 65 (20.4%) were at borderline, and 17(5.3%) were at high risk. There was no significant difference in BMI and cholesterol levels among participants (p= 0.20). The prevalence of obesity and overweight was high among residents of this setting. Age, marital and educational status, and employment were significantly associated with obesity. An obesity awareness campaign is crucial, and the availability of supermarkets and full-service grocery stores would provide accessibility to healthy food such as fruits and vegetables.

Keywords: obesity, overweight, risk factors, adults.

Procedia PDF Downloads 84
7155 Near-Miss Deep Learning Approach for Neuro-Fuzzy Risk Assessment in Pipelines

Authors: Alexander Guzman Urbina, Atsushi Aoyama

Abstract:

The sustainability of traditional technologies employed in energy and chemical infrastructure brings a big challenge for our society. Making decisions related with safety of industrial infrastructure, the values of accidental risk are becoming relevant points for discussion. However, the challenge is the reliability of the models employed to get the risk data. Such models usually involve large number of variables and with large amounts of uncertainty. The most efficient techniques to overcome those problems are built using Artificial Intelligence (AI), and more specifically using hybrid systems such as Neuro-Fuzzy algorithms. Therefore, this paper aims to introduce a hybrid algorithm for risk assessment trained using near-miss accident data. As mentioned above the sustainability of traditional technologies related with energy and chemical infrastructure constitutes one of the major challenges that today’s societies and firms are facing. Besides that, the adaptation of those technologies to the effects of the climate change in sensible environments represents a critical concern for safety and risk management. Regarding this issue argue that social consequences of catastrophic risks are increasing rapidly, due mainly to the concentration of people and energy infrastructure in hazard-prone areas, aggravated by the lack of knowledge about the risks. Additional to the social consequences described above, and considering the industrial sector as critical infrastructure due to its large impact to the economy in case of a failure the relevance of industrial safety has become a critical issue for the current society. Then, regarding the safety concern, pipeline operators and regulators have been performing risk assessments in attempts to evaluate accurately probabilities of failure of the infrastructure, and consequences associated with those failures. However, estimating accidental risks in critical infrastructure involves a substantial effort and costs due to number of variables involved, complexity and lack of information. Therefore, this paper aims to introduce a well trained algorithm for risk assessment using deep learning, which could be capable to deal efficiently with the complexity and uncertainty. The advantage point of the deep learning using near-miss accidents data is that it could be employed in risk assessment as an efficient engineering tool to treat the uncertainty of the risk values in complex environments. The basic idea of using a Near-Miss Deep Learning Approach for Neuro-Fuzzy Risk Assessment in Pipelines is focused in the objective of improve the validity of the risk values learning from near-miss accidents and imitating the human expertise scoring risks and setting tolerance levels. In summary, the method of Deep Learning for Neuro-Fuzzy Risk Assessment involves a regression analysis called group method of data handling (GMDH), which consists in the determination of the optimal configuration of the risk assessment model and its parameters employing polynomial theory.

Keywords: deep learning, risk assessment, neuro fuzzy, pipelines

Procedia PDF Downloads 288
7154 Integrated Safety Net Program for High-Risk Families in New Taipei City

Authors: Peifang Hsieh

Abstract:

New Taipei city faces increasing number of migrant families, in which the needs of children are sometimes neglected due to insufficient support from communities. Moreover, the traditional mindset of disengagement discourages citizens from preemptively identifying families in need in their communities, resulting in delay of prompt intervention from authorities concerned. To safeguard these vulnerable families, New Taipei city develops the 'Integrated Safety-Net Program for High-Risk Families' from 2011 by implementing the following measures: (A) New attitude and action: Instead of passively receiving reported case of high-risk families, the program takes proactive and preemptive approach to detect and respond at early stage, so the cases are prevented from worsening. In addition, cross-departmental integration mechanism is established to meet multiple needs of high-risk families. The children number added to the government care network is greatly increased to over 10,000, which is around 4.4 times the original number before the program. (B) New service points: 2000 city-wide convenience stores are added as service stations so that children in less privileged families can go to any of 24-hour convenience stores across the city to pick up free meals. This greatly increases the approachability to high-risk families. Moreover, the social welfare institutes will be notified with information left in convenience stores by children and follow up with further assistance, greatly enhancing chances of less privileged families being identified. (C) New Key Figures: Mobilize community officers and volunteers to detect and offer on-site assistance. Volunteer organizations within communities are connected to report and offer follow-up services in a more active manner. In total, from 2011 to 2015, 54,789 cases are identified through active care, benefiting 82,124 children. In addition, 87.49% family-cases in the program receiving comprehensive social assistance are no longer at high risk.

Keywords: cross department, high-risk families, public-private partnership, integrated safety net

Procedia PDF Downloads 295
7153 Erectile Function and Heart Rate Variability in Men under 40 Years Old

Authors: Rui Miguel Costa, Jose Pestana, David Costa, Paula Mangia, Catarina Correia, Mafalda Pinto Coelho

Abstract:

There is lack of studies examining the relation of different heart rate variability (HRV) parameters with the risk of erectile dysfunction (ED) in younger men. Thus, the present study aimed at examining, in a nonclinical sample of men aged 19-39 years old (mean age = 23.98 years, SD = 4.90), the relations of risk of ED with the standard deviation of the heart rate (SD of HR), high and low frequency power of HRV, and low-to-high frequency HRV ratio. Eighty-three heterosexual Portuguese men completed the 5-item version of the International Index of Erectile Function (IIEF-5) and HRV parameters were calculated from a 5-minute resting period. Risk of ED was determined by IIEF-5 scores of 21 or less. Fifteen men (18.1%) reported symptoms of ED (14 with mild and one with mild to moderate symptoms). Univariate analyses of variance revealed that risk of ED was related to lesser SD of HR and lesser low-frequency power, the two HRV parameters that express a coupling of higher vagal and sympathetic tone. Risk of ED was unrelated to high-frequency power and low-to-high frequency HRV ratio. Further, in a logistic regression, the risk of ED was independently predicted by older age and lower SD of HR, but not by low-frequency power, having a regular sexual partner, and cohabiting. The results provide preliminary evidence that, in younger men, a coupling of higher vagal and sympathetic tone, as indexed by the SD of HR, is important for erections. Greater resting SD of HR might reflect better vascular and interpersonal function via vagal tone coupled with greater motor mobilization to pursue sexual intercourse via sympathetic tone. Many interventions can elevate HRV; future research is warranted on how they can be tailored to treat ED in younger men.

Keywords: erectile dysfunction, heart rate variability, standard deviation of the heart rate, younger men

Procedia PDF Downloads 273
7152 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 480
7151 Land-Use Transitions and Its Implications on Food Production Systems in Rural Landscape of Southwestern Ghana

Authors: Evelyn Asante Yeboah, Kwabena O. Asubonteng, Justice Camillus Mensah, Christine Furst

Abstract:

Smallholder-dominated mosaic landscapes in rural Africa are relevant for food production, biodiversity conservation, and climate regulation. Land-use transitions threaten the multifunctionality of such landscapes, especially the production capacity of arable lands resulting in food security challenges. Using land-cover maps derived from maximum likelihood classification of Landsat satellite images for the years 2002, 2015, and 2020, post-classification change detection, landscape metrics, and key informant interviews, the study assessed the implications of rubber plantation expansion and oil business development on the food production capacity of Ahanta West District, Ghana. The analysis reveals that settlement and rubber areas expanded by 5.82% and 10.33% of the landscape area, respectively, between 2002 and 2020. This increase translates into over twice their initial sizes (144% in settlement change and 101% in rubber change). Rubber plantation spread dominates the north and southwestern areas, whereas settlement is widespread in the eastern parts of the landscape. Rubber and settlement expanded at the expense of cropland, palm, and shrublands. Land-use transitions between cropland, palm, and shrubland were targeting each other, but the net loss in shrubland was higher (-17.27%). Isolation, subdivision, connectedness, and patch adjacency indices showed patch consolidation in the landscape configuration from 2002 to 2015 and patch fragmentation from 2015 to 2020. The study also found patches with consistent increasing connectivity in settlement areas indicating the influence of oil discovery developments and fragmentation tendencies in rubber, shrubland, cropland, and palm, indicating springing up of smaller rubber farms, the disappearance of shrubland, and splitting up of cropland and palm areas respectively. The results revealed a trend in land-use transitions in favor of smallholder rubber plantation expansion and oil discovery developments, which suggest serious implications on food production systems and poses a risk for food security and landscape multifunctional characteristics. To ensure sustainability in land uses, this paper recommends the enforcement of legislative instruments governing spatial planning and land use in Ghana as embedded in the 2016 land-use and spatial planning act.

Keywords: food production systems, food security, Ghana’s west coast, land-use transitions, multifunctional rural landscapes

Procedia PDF Downloads 138
7150 A Risk-Based Modeling Approach for Successful Adoption of CAATTs in Audits: An Exploratory Study Applied to Israeli Accountancy Firms

Authors: Alon Cohen, Jeffrey Kantor, Shalom Levy

Abstract:

Technology adoption models are extensively used in the literature to explore drivers and inhibitors affecting the adoption of Computer Assisted Audit Techniques and Tools (CAATTs). Further studies from recent years suggested additional factors that may affect technology adoption by CPA firms. However, the adoption of CAATTs by financial auditors differs from the adoption of technologies in other industries. This is a result of the unique characteristics of the auditing process, which are expressed in the audit risk elements and the risk-based auditing approach, as encoded in the auditing standards. Since these audit risk factors are not part of the existing models that are used to explain technology adoption, these models do not fully correspond to the specific needs and requirements of the auditing domain. The overarching objective of this qualitative research is to fill the gap in the literature, which exists as a result of using generic technology adoption models. Followed by a pretest and based on semi-structured in-depth interviews with 16 Israeli CPA firms of different sizes, this study aims to reveal determinants related to audit risk factors that influence the adoption of CAATTs in audits and proposes a new modeling approach for the successful adoption of CAATTs. The findings emphasize several important aspects: (1) while large CPA firms developed their own inner guidelines to assess the audit risk components, other CPA firms do not follow a formal and validated methodology to evaluate these risks; (2) large firms incorporate a variety of CAATTs, including self-developed advanced tools. On the other hand, small and mid-sized CPA firms incorporate standard CAATTs and still need to catch up to better understand what CAATTs can offer and how they can contribute to the quality of the audit; (3) the top management of mid-sized and small CPA firms should be more proactive and updated about CAATTs capabilities and contributions to audits; and (4) All CPA firms consider professionalism as a major challenge that must be constantly managed to ensure an optimal CAATTs operation. The study extends the existing knowledge of CAATTs adoption by looking at it from a risk-based auditing approach. It suggests a new model for CAATTs adoption by incorporating influencing audit risk factors that auditors should examine when considering CAATTs adoption. Since the model can be used in various audited scenarios and supports strategic, risk-based decisions, it maximizes the great potential of CAATTs on the quality of the audits. The results and insights can be useful to CPA firms, internal auditors, CAATTs developers and regulators. Moreover, it may motivate audit standard-setters to issue updated guidelines regarding CAATTs adoption in audits.

Keywords: audit risk, CAATTs, financial auditing, information technology, technology adoption models

Procedia PDF Downloads 62
7149 Contact Address Levels and Human Health Risk of Metals In Milk and Milk Products Bought from Abeokuta, Southwestern Nigeria

Authors: Olukayode Bamgbose, Feyisola Agboola, Adewale M. Taiwo, Olanrewaju Olujimi Oluwole Terebo, Azeez Soyingbe, Akeem Bamgbade

Abstract:

The present study evaluated the contents and health risk assessment of metals determined in milk and milk product samples collected from the Abeokuta market. Forty-five milk and milk product (yoghurt) samples were digested and analysed for selected metals using Atomic Absorption Spectrophotometric method. Health risk assessment was evaluated for hazard quotient (HQ), hazard index (HI), and cancer risk (CR). Data were subjected to descriptive and inferential statistics. The concentrations of Zn, which ranged from 3.24±0.59 to 4.35±0.59 mg/kg, were the highest in the samples. Cr and Cd were measured below the detection limit of the analytical instrument, while the Pb level was higher than the Codex Alimentarius Commission value of 0.02 mg/kg, indicating unsafe for consumption. However, the HQ of Pb and other metals in milk and milk product samples was less than 1.0, thereby establishing no adverse health effects for Pb and other metals. The distribution pattern of metals in milk and milk product samples followed the decreasing order of Zn > Fe > Ni > Co > Cu > Mn > Pb > Cd/Cr. The CR levels of meals were also less than the permissible limit of 1.0 x 10-4, establishing no possible development of cancer. Keywords: adverse effects, cancer, metals, milk, milk product, the permissible limit.

Keywords: adverse effects, cancer, metals, milk, milk product, permissible limit

Procedia PDF Downloads 75
7148 Covid Impact and Corporate Environmental, Social, and Governance Behavior

Authors: Yawen Xia, Rubi Yang, Jing Zhao

Abstract:

We examine the environmental, social, and governance (ESG) decision-making of companies during turbulent times like COVID-19. We find that firms’ ESG reputation risk comove with their industry and local peers, suggesting that managers may follow their industry and local counterparts in engaging in irresponsible activities. Moreover, the comovement in reputation risk is attenuated during the COVID-19 pandemic. Further analyses suggest that the reduction in comovement varies by state-level partisanship and death rate during the pandemic. Comovement in reputation risk declines more significantly in the Democratic states with stringent social distancing policies and in states with higher infection severity. Our findings suggest that social distancing provisions during COVID-19 may lead to a reduction in social activities and information sharing among enterprise managers.

Keywords: ESG, Covid, peer pressure, local comovement, orporate governance

Procedia PDF Downloads 24
7147 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 137
7146 Influence of Pretreatment Magnetic Resonance Imaging on Local Therapy Decisions in Intermediate-Risk Prostate Cancer Patients

Authors: Christian Skowronski, Andrew Shanholtzer, Brent Yelton, Muayad Almahariq, Daniel J. Krauss

Abstract:

Prostate cancer has the third highest incidence rate and is the second leading cause of cancer death for men in the United States. Of the diagnostic tools available for intermediate-risk prostate cancer, magnetic resonance imaging (MRI) provides superior soft tissue delineation serving as a valuable tool for both diagnosis and treatment planning. Currently, there is minimal data regarding the practical utility of MRI for evaluation of intermediate-risk prostate cancer. As such, the National Comprehensive Cancer Network’s guidelines indicate MRI as optional in intermediate-risk prostate cancer evaluation. This project aims to elucidate whether MRI affects radiation treatment decisions for intermediate-risk prostate cancer. This was a retrospective study evaluating 210 patients with intermediate-risk prostate cancer, treated with definitive radiotherapy at our institution between 2019-2020. NCCN risk stratification criteria were used to define intermediate-risk prostate cancer. Patients were divided into two groups: those with pretreatment prostate MRI, and those without pretreatment prostate MRI. We compared the use of external beam radiotherapy, brachytherapy alone, brachytherapy boost, and androgen depravation therapy between the two groups. Inverse probability of treatment weighting was used to match the two groups for age, comorbidity index, American Urologic Association symptoms index, pretreatment PSA, grade group, and percent core involvement on prostate biopsy. Wilcoxon Rank Sum and Chi-squared tests were used to compare continuous and categorical variables. Of the patients who met the study’s eligibility criteria, 133 had a prostate MRI and 77 did not. Following propensity matching, there were no differences between baseline characteristics between the two groups. There were no statistically significant differences in treatments pursued between the two groups: 42% vs 47% were treated with brachytherapy alone, 40% vs 42% were treated with external beam radiotherapy alone, 18% vs 12% were treated with external beam radiotherapy with a brachytherapy boost, and 24% vs 17% received androgen deprivation therapy in the non-MRI and MRI groups, respectively. This analysis suggests that pretreatment MRI does not significantly impact radiation therapy or androgen deprivation therapy decisions in patients with intermediate-risk prostate cancer. Obtaining a pretreatment prostate MRI should be used judiciously and pursued only to answer a specific question, for which the answer is likely to impact treatment decision. Further follow up is needed to correlate MRI findings with their impacts on specific oncologic outcomes.

Keywords: magnetic resonance imaging, prostate cancer, definitive radiotherapy, gleason score 7

Procedia PDF Downloads 85
7145 Risky Driving Behavior among Bus Driver in Jakarta

Authors: Ratri A. Benedictus, Felicia M. Yolanda

Abstract:

Public transport is a crucial issue for capital city in developing country, such as Jakarta. Inadequate number and low quality of public transport services resulting personal vehicles as the main option. As a result, traffic jams are getting worse in Jakarta. The low quality of public transport, particularly buses, compounded by the risk behavior of the driver. Traffic accidents involving public bus in Jakarta were often the case, even result in fatality. The purpose of this study is to get a description of risk behavior among the public bus drivers in Jakarta. 132 bus drivers become respondent of this study. Risky Driving Behavior scale of Dorn were used. Data were analyzed using descriptive statistics. 51.5% of respondents felt often showing risky behavior while on driving. The highest type of risky driving behavior is still using the unsafe bus (62%). Followed by trespass the bus line (30%), over speed (21%), violate the road signs (15%) and driving with unhealthy physical condition (4%). Results of this study suggested that high understanding of the bus drivers on their risk behaviors have not lead to the emergence of safe driving behavior. Therefore, together with technical engineering and instrumentation work intervention over this issue, psychological aspects also need to be considered, such as: risk perception, safety attitude,safety culture, locus of control and Fatalism.

Keywords: bus driver, psychological factors, public transportation, risky driving behavior

Procedia PDF Downloads 353
7144 Indoor Air Assessment and Health Risk of Volatile Organic Compounds in Secondary School Classrooms in Benin City, Edo State, Nigeria

Authors: Osayomwanbor E. Oghama, John O. Olomukoro

Abstract:

The school environment, apart from home, is probably the most important indoor environment for children. Children spend as much as 80-90% of their indoor time either at school or at home; an average of 35 - 40 hours per week in schools, hence are at the risk of indoor air pollutants such as volatile organic compounds (VOCs). Concentrations of VOCs vary widely but are generally higher indoors than outdoors. This research was, therefore, carried out to evaluate the levels of VOCs in secondary school classrooms in Benin City, Edo State. Samples were obtained from a total of 18 classrooms in 6 secondary schools. Samples were collected 3 times from each school and from 3 different classrooms in each school using Draeger ORSA 5 tubes. Samplers were left to stay for a school-week (5 days). The VOCs detected and analyzed were benzene, ethlybenzene, isopropylbenzene, naphthalene, n-butylbenzene, n-propylbenzene, toluene, m-xylene, p-xylene, o-xylene, styrene, chlorobenzene, chloroform, 1,2-dichloropropane, 2,2-dichloropropane, tetrachloroethane, tetrahydrofuran, isopropyl acetate, α-pinene, and camphene. The results showed that chloroform, o-xylene, and styrene were the most abundant while α-pinene and camphene were the least abundant. The health risk assessment was done in terms of carcinogenic (CRI) and non-carcinogenic risks (THR). The CRI values of the schools ranged from 1.03 × 10-5 to 1.36 × 10-5 μg/m³ (a mean of 1.16 × 10-5 μg/m³) with School 6 and School 3 having the highest and lowest values respectively. The THR values of the study schools ranged from 0.071-0.086 μg/m³ (a mean of 0.078 μg/m³) with School 3 and School 2 having the highest and lowest values respectively. The results show that all the schools pose a potential carcinogenic risks having CRI values greater than the recommended limit of 1 × 10-6 µg/m³ and no non-carcinogenic risk having THR values less than the USEPA hazard quotient of 1 µg/m³. It is recommended that school authorities should ensure adequate ventilation in their schools, supplementing natural ventilation with mechanical sources, where necessary. In addition, indoor air quality should be taken into consideration in the design and construction of classrooms.

Keywords: carcinogenic risk indicator, health risk, indoor air, non-carcinogenic risk indicator, secondary schools, volatile organic compounds

Procedia PDF Downloads 189
7143 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 236
7142 Principles of Risk Management in Surgery Department

Authors: Mohammad H. Yarmohammadian, Masoud Ferdosi, Abbas Haghshenas, Fatemeh Rezaei

Abstract:

Surgical procedures aim at preserving human life and improving quality of their life. However, there are many potential risk sources that can cause serious harm to patients. For centuries, managers believed that technical competence of a surgeon is the only key to a successful surgery. But over the past decade, risks are considered in terms of process-based safety procedures, teamwork and inter departmental communication. Aims: This study aims to determine how the process- biased surgical risk management should be done in terms of project management tool named ABS (Activity Breakdown Structure). Settings and Design: This study was conducted in two stages. First, literature review and meeting with professors was done to determine principles and framework of surgical risk management. Next, responsible teams for surgical patient journey were involved in following meeting to develop the process- biased surgical risk management. Methods and Material: This study is a qualitative research in which focus groups with the inductive approach is used. Sampling was performed to achieve representativeness through intensity sampling biased on experience and seniority. Analysis Method used: context analysis of interviews and consensus themes extracted from FDG meetings discussion was the analysis tool. Results: we developed the patient journey process in 5 main phases, 24 activities and 108 tasks. Then, responsible teams, transposition and allocated places for performing determined. Some activities and tasks themes were repeated in each phases like patient identification and records review because of their importance. Conclusions: Risk management of surgical departments is significant as this facility is the hospital’s largest cost and revenue center. Good communication between surgical team and other clinical teams outside surgery department through process- biased perspective could improve safety of patient under this procedure.

Keywords: risk management, activity breakdown structure (ABS), surgical department, medical sciences

Procedia PDF Downloads 299
7141 Stochastic Prioritization of Dependent Actuarial Risks: Preferences among Prospects

Authors: Ezgi Nevruz, Kasirga Yildirak, Ashis SenGupta

Abstract:

Comparing or ranking risks is the main motivating factor behind the human trait of making choices. Cumulative prospect theory (CPT) is a preference theory approach that evaluates perception and bias in decision making under risk and uncertainty. We aim to investigate the aggregate claims of different risk classes in terms of their comparability and amenability to ordering when the impact of risk perception is considered. For this aim, we prioritize the aggregate claims taken as actuarial risks by using various stochastic ordering relations. In order to prioritize actuarial risks, we use stochastic relations such as stochastic dominance and stop-loss dominance that are proposed in the frame of partial order theory. We take into account the dependency of the individual claims exposed to similar environmental risks. At first, we modify the zero-utility premium principle in order to obtain a solution for the stop-loss premium under CPT. Then, we propose a stochastic stop-loss dominance of the aggregate claims and find a relation between the stop-loss dominance and the first-order stochastic dominance under the dependence assumption by using properties of the familiar as well as some emerging multivariate claim distributions.

Keywords: cumulative prospect theory, partial order theory, risk perception, stochastic dominance, stop-loss dominance

Procedia PDF Downloads 318
7140 The Role of Group Interaction and Managers’ Risk-willingness for Business Model Innovation Decisions: A Thematic Analysis

Authors: Sarah Müller-Sägebrecht

Abstract:

Today’s volatile environment challenges executives to make the right strategic decisions to gain sustainable success. Entrepreneurship scholars postulate mainly positive effects of environmental changes on entrepreneurship behavior, such as developing new business opportunities, promoting ingenuity, and the satisfaction of resource voids. A strategic solution approach to overcome threatening environmental changes and catch new business opportunities is business model innovation (BMI). Although this research stream has gained further importance in the last decade, BMI research is still insufficient. Especially BMI barriers, such as inefficient strategic decision-making processes, need to be identified. Strategic decisions strongly impact organizational future and are, therefore, usually made in groups. Although groups draw on a more extensive information base than single individuals, group-interaction effects can influence the decision-making process - in a favorable but also unfavorable way. Decisions are characterized by uncertainty and risk, whereby their intensity is perceived individually differently. The individual risk-willingness influences which option humans choose. The special nature of strategic decisions, such as in BMI processes, is that these decisions are not made individually but in groups due to their high organizational scope. These groups consist of different personalities whose individual risk-willingness can vary considerably. It is known from group decision theory that these individuals influence each other, observable in different group-interaction effects. The following research questions arise: i) How does group interaction shape BMI decision-making from managers’ perspective? ii) What are the potential interrelations among managers’ risk-willingness, group biases, and BMI decision-making? After conducting 26 in-depth interviews with executives from the manufacturing industry, applied Gioia methodology reveals the following results: i) Risk-averse decision-makers have an increased need to be guided by facts. The more information available to them, the lower they perceive uncertainty and the more willing they are to pursue a specific decision option. However, the results also show that social interaction does not change the individual risk-willingness in the decision-making process. ii) Generally, it could be observed that during BMI decisions, group interaction is primarily beneficial to increase the group’s information base for making good decisions, less than for social interaction. Further, decision-makers mainly focus on information available to all decision-makers in the team but less on personal knowledge. This work contributes to strategic decision-making literature twofold. First, it gives insights into how group-interaction effects influence an organization’s strategic BMI decision-making. Second, it enriches risk-management research by highlighting how individual risk-willingness impacts organizational strategic decision-making. To date, it was known in BMI research that risk aversion would be an internal BMI barrier. However, with this study, it becomes clear that it is not risk aversion that inhibits BMI. Instead, the lack of information prevents risk-averse decision-makers from choosing a riskier option. Simultaneously, results show that risk-averse decision-makers are not easily carried away by the higher risk-willingness of their team members. Instead, they use social interaction to gather missing information. Therefore, executives need to provide sufficient information to all decision-makers to catch promising business opportunities.

Keywords: business model innovation, cognitive biases, group-interaction effects, strategic decision-making, risk-willingness

Procedia PDF Downloads 75
7139 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 203
7138 Binary Decision Diagram Based Methods to Evaluate the Reliability of Systems Considering Failure Dependencies

Authors: Siqi Qiu, Yijian Zheng, Xin Guo Ming

Abstract:

In many reliability and risk analysis, failures of components are supposed to be independent. However, in reality, the ignorance of failure dependencies among components may render the results of reliability and risk analysis incorrect. There are two principal ways to incorporate failure dependencies in system reliability and risk analysis: implicit and explicit methods. In the implicit method, failure dependencies can be modeled by joint probabilities, correlation values or conditional probabilities. In the explicit method, certain types of dependencies can be modeled in a fault tree as mutually independent basic events for specific component failures. In this paper, explicit and implicit methods based on BDD will be proposed to evaluate the reliability of systems considering failure dependencies. The obtained results prove the equivalence of the proposed implicit and explicit methods. It is found that the consideration of failure dependencies decreases the reliability of systems. This observation is intuitive, because more components fail due to failure dependencies. The consideration of failure dependencies helps designers to reduce the dependencies between components during the design phase to make the system more reliable.

Keywords: reliability assessment, risk assessment, failure dependencies, binary decision diagram

Procedia PDF Downloads 469
7137 Evaluation of the Sterilization Practice in Liberal Dental Surgeons at Sidi Bel Abbes- Algeria

Authors: A. Chenafa, S. Boulenouar, M. Zitouni, M. Boukouria

Abstract:

The sterilization of medical devices constitutes for all the medical professions, an inescapable obligation. It has for objective to prevent the infectious risk, both for the patient and for the medical team. The Dental surgeon as every healthcare professional has to master perfectly this subject and to train his staff to the various techniques of sterilization. It is the only way to assure the patients all the security for which they are entitled to wait when they undergo a dental care. It’s for it, that we undertook to lead an investigation aiming at estimating the sterilization practice at the dental surgeon of Sidi bel Abbes. The survey result showed a youth marked with the profession with a majority use of autoclave with cycle B and an almost total absence of the sterilization controls (test of Bowie and Dick). However, the majority of the dentists control and validate their sterilizers. Finally, our survey allowed us to describe some practices which must be improved regarding control, regarding qualification and regarding staff training. And suggestions were made in this sense.

Keywords: dental surgeon, medical devices, sterilization, survey

Procedia PDF Downloads 398
7136 Public-Private Partnership Projects in Canada: A Case Study Approach

Authors: Samuel Carpintero

Abstract:

Public-private partnerships (PPP) arrangements have emerged all around the world as a response to infrastructure deficits and the need to refurbish existing infrastructure. The motivations of governments for embarking on PPPs for the delivery of public infrastructure are manifold, and include on-time and on-budget delivery as well as access to private project management expertise. The PPP formula has been used by some State governments in United States and Canada, where the participation of private companies in financing and managing infrastructure projects has increased significantly in the last decade, particularly in the transport sector. On the one hand, this paper examines the various ways used in these two countries in the implementation of PPP arrangements, with a particular focus on risk transfer. The examination of risk transfer in this paper is carried out with reference to the following key PPP risk categories: construction risk, revenue risk, operating risk and availability risk. The main difference between both countries is that in Canada the demand risk remains usually within the public sector whereas in the United States this risk is usually transferred to the private concessionaire. The aim is to explore which lessons can be learnt from both models than might be useful for other countries. On the other hand, the paper also analyzes why the Spanish companies have been so successful in winning PPP contracts in North America during the past decade. Contrary to the Latin American PPP market, the Spanish companies do not have any cultural advantage in the case of the United States and Canada. Arguably, some relevant reasons for the success of the Spanish groups are their extensive experience in PPP projects (that dates back to the late 1960s in some cases), their high technical level (that allows them to be aggressive in their bids), and their good position and track-record in the financial markets. The article’s empirical base consists of data provided by official sources of both countries as well as information collected through face-to-face interviews with public and private representatives of the stakeholders participating in some of the PPP schemes. Interviewees include private project managers of the concessionaires, representatives of banks involved as financiers in the projects, and experts in the PPP industry with close knowledge of the North American market. Unstructured in-depth interviews have been adopted as a means of investigation for this study because of its powers to achieve honest and robust responses and to ensure realism in the collection of an overall impression of stakeholders’ perspectives.

Keywords: PPP, concession, infrastructure, construction

Procedia PDF Downloads 295
7135 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 515
7134 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 167
7133 Measuring Flood Risk concerning with the Flood Protection Embankment in Big Flooding Events of Dhaka Metropolitan Zone

Authors: Marju Ben Sayed, Shigeko Haruyama

Abstract:

Among all kinds of natural disaster, the flood is a common feature in rapidly urbanizing Dhaka city. In this research, assessment of flood risk of Dhaka metropolitan area has been investigated by using an integrated approach of GIS, remote sensing and socio-economic data. The purpose of the study is to measure the flooding risk concerning with the flood protection embankment in big flooding events (1988, 1998 and 2004) and urbanization of Dhaka metropolitan zone. In this research, we considered the Dhaka city into two parts; East Dhaka (outside the flood protection embankment) and West Dhaka (inside the flood protection embankment). Using statistical data, we explored the socio-economic status of the study area population by comparing the density of population, land price and income level. We have drawn the cross section profile of the flood protection embankment into three different points for realizing the flooding risk in the study area, especially in the big flooding year (1988, 1998 and 2004). According to the physical condition of the study area, the land use/land cover map has been classified into five classes. Comparing with each land cover unit, historical weather station data and the socio-economic data, the flooding risk has been evaluated. Moreover, we compared between DEM data and each land cover units to find out the relationship with flood. It is expected that, this study could contribute to effective flood forecasting, relief and emergency management for a future flood event in Dhaka city.

Keywords: land use, land cover change, socio-economic, Dhaka city, GIS, flood

Procedia PDF Downloads 293
7132 Risk Management in Islamic Micro Finance Credit System for Poverty Alleviation from Qualitative Perspective

Authors: Liyu Adhi Kasari Sulung

Abstract:

Poverty has been a major problem in Indonesia. Islamic micro finance (IMF) named Baitul Maal Wat Tamwil (Bmt) plays a prominent role to eradicate this. Indonesia as the biggest muslim country has many successful applied products such as worldwide adopt group-based lending approach, flexible financing for farmers, and gold pawning. The Problems related to these models are operation risk management and internal control system (ICS). A proper ICS will help an organization in preventing the occurrence of bad financing through detecting error and irregularities in its operation. This study aims to seek a proper risk management scheme of credit system in Bmt and internal control system’s rank for every stage. Risk management variables are obtained at the first In-Depth Interview (IDI) and Focus Group Discussion (FGD) with Shariah supervisory boards, boards of directors, and operational managers. Survey was conducted covering nationwide data; West Java, South Sulawesi, and West Nusa Tenggara. Moreover, Content analysis is employed to build the relationship among these variables. Research Findings shows that risk management Characteristics in Indonesia involves ex ante, credit process, and ex post strategies to deal with risk in credit system. Ex-ante control consists of Shariah compliance, survey, group leader reference, and islamic forming orientation. Then, credit process involves saving, collateral, joint liability, loan repayment, and credit installment controlling. Finally, ex-post control includes shariah evaluation, credit evaluation, grace period and low installment provisions. In addition, internal control order sort three stages by its priority; Credit process as first rank, then ex-post control as second, and ex ante control as the last rank.

Keywords: internal control system, islamic micro finance, poverty, risk management

Procedia PDF Downloads 401
7131 Awareness about HIV-Infection among HIV-Infected Individuals Attending Medical Moscow Center, Russia

Authors: Marina Nosik, Irina Rymanova, Sergei Sevostyanihin, Natalya Sergeeva, Alexander Sobkin

Abstract:

This paper presents results of the survey regarding the awareness about HIV/AIDS among HIV-infected individuals. A questionnaire covering various aspects of HIV-infection was conducted among 110 HIV-infected individuals who attended the G.A. Zaharyan Moscow Tuberculosis Clinic, Department for the treatment of TB patients with HIV. The questionnaire included questions about modes of HIV transmission and preventive measures against HIV/AIDS, as well as questions about age, gender, education, and employment status. The survey revealed that the respondents in the whole had a good knowledge regarding modes of HIV transmission and preventive measures against HIV/AIDS: about 83,6% male respondents and 85,7% female respondents gave accurate answers regarding the HIV-infection. However, the overwhelming majority of the study participants, that is, 88,5% men and 98% women, was quite ignorant about the risk of acquiring HIV through saliva and toothbrush of HIV-infected individual. Though that risk is rather insignificant, it is still biologically possible. And this gap in knowledge needs to be filled. As the study showed another point of concern was the fact, that despite the knowledge of HIV transmission risk through unprotected sex about 40% percent of HIV-positive men and 25% of HIV-positive women did not insist on using condoms with their sexual partners. These findings indicate that there are still some aspects about HIV-infection which needed to be clarified and explained through more detailed and specific educational programmes.

Keywords: AIDS, HIV transmission risks, HIV misconceptions, risk behavior

Procedia PDF Downloads 330
7130 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks

Authors: Sulemana Ibrahim

Abstract:

Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.

Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks

Procedia PDF Downloads 59
7129 A Model for Diagnosis and Prediction of Coronavirus Using Neural Network

Authors: Sajjad Baghernezhad

Abstract:

Meta-heuristic and hybrid algorithms have high adeer in modeling medical problems. In this study, a neural network was used to predict covid-19 among high-risk and low-risk patients. This study was conducted to collect the applied method and its target population consisting of 550 high-risk and low-risk patients from the Kerman University of medical sciences medical center to predict the coronavirus. In this study, the memetic algorithm, which is a combination of a genetic algorithm and a local search algorithm, has been used to update the weights of the neural network and develop the accuracy of the neural network. The initial study showed that the accuracy of the neural network was 88%. After updating the weights, the memetic algorithm increased by 93%. For the proposed model, sensitivity, specificity, positive predictivity value, value/accuracy to 97.4, 92.3, 95.8, 96.2, and 0.918, respectively; for the genetic algorithm model, 87.05, 9.20 7, 89.45, 97.30 and 0.967 and for logistic regression model were 87.40, 95.20, 93.79, 0.87 and 0.916. Based on the findings of this study, neural network models have a lower error rate in the diagnosis of patients based on individual variables and vital signs compared to the regression model. The findings of this study can help planners and health care providers in signing programs and early diagnosis of COVID-19 or Corona.

Keywords: COVID-19, decision support technique, neural network, genetic algorithm, memetic algorithm

Procedia PDF Downloads 65
7128 Investigation of Occupational Health and Safety of Bakeries in Izmir, Turkey

Authors: Pinar Ercan, Bulut Mert

Abstract:

The baking industry is prone to occupational health challenges like other industries. Workers in bakeries face many hazards in their work environment; hazards have the potential for causing injury, illness or work accidents. Most of these hazards are preventable and arise from the neglect of occupational safety measures. Some bakeries in Izmır Turkey was evaluated according to occupational health and safety. First of all, the production process was evaluated. The survey was administered to a total of 50 employees. The survey consisted of two sections. The first one comprised only demographic questions and items related to job characteristics. The remaining section was assessing the satisfaction and confidence about occupational health and safety in terms of employees consist of a 10-item questionnaire by using HSE (2010) survey with some modifications. Also, hazards, risks and control measures in the bakeries were determined. Risk assessment has been done by the use of '5x5 Risk Assessment Table' for this purpose.

Keywords: bakeries, occupational health and safety, hazards, risks, risk assessment

Procedia PDF Downloads 364
7127 Urban Areas Management in Developing Countries: Analysis of the Urban Areas Crossed with Risk of Storm Water Drains, Aswan-Egypt

Authors: Omar Hamdy, Schichen Zhao, Hussein Abd El-Atty, Ayman Ragab, Muhammad Salem

Abstract:

One of the most risky areas in Aswan is Abouelreesh, which is suffering from flood disasters, as heavy deluge inundates urban areas causing considerable damage to buildings and infrastructure. Moreover, the main problem was the urban sprawl towards this risky area. This paper aims to identify the urban areas located in the risk areas prone to flash floods. Analyzing this phenomenon needs a lot of data to ensure satisfactory results; however, in this case the official data and field data were limited, and therefore, free sources of satellite data were used. This paper used ArcGIS tools to obtain the storm water drains network by analyzing DEM files. Additionally, historical imagery in Google Earth was studied to determine the age of each building. The last step was to overlay the urban area layer and the storm water drains layer to identify the vulnerable areas. The results of this study would be helpful to urban planners and government officials to make the disasters risk estimation and develop primary plans to recover the risky area, especially urban areas located in torrents.

Keywords: risk area, DEM, storm water drains, GIS

Procedia PDF Downloads 453