Search results for: information system risk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 29326

Search results for: information system risk

27946 Community Based Disaster Risk Reduction in Mizoram, India

Authors: Lalrokima Chenkual

Abstract:

Legal provision and various guidelines issued by the National Disaster Management Authority in India strives for setting up of disaster management authority from the central government to the district level. Community-Based Disaster Risk Reduction practice is still relevant as the communities are the victim as well as the first responder in any incidents. The primary goal of Community Based Disaster Risk Reduction is to reduce vulnerability of the concerned community and strengthen its existing capacity to cope with disaster. By involving the community in the preparedness phase, it not only increases the likelihood of coordinated action by the communities to help in mitigating disasters and lessening the impact of disaster but also brings the community together to address the issue collectively. Community participation ensures local ownership, addresses local needs, and promotes volunteerism and mutual help to prevent and minimise damage. Community-Based Disaster Risk Reduction is very much relevant for Mizoram as the society is closed knit, population is very less, religion homogeneity i.e Christianity, very active and widespread community-based organization viz, Young Mizo Association, MHIP (Women Federation), MUP (Elders Clubs which are guided together by Mizo code of morals conduct termed as Tlawmngaihna.

Keywords: community, close-knit, first responder, Tlawmngaihna

Procedia PDF Downloads 139
27945 Productivity of Construction Companies Using the Management of Threats and Opportunities ‎in Construction Projects of Iran

Authors: Nima Amani, Ali Salehi Dastjerdi, Fatemeh Ahmadi, Ardalan Sabamehr

Abstract:

The cost overrun of the construction projects has always been one of the main problems of the construction companies caused by the risky nature of the construction projects. Therefore, today, the application of risk management is inevitable. Although in theory, the issue of risk management is divided into the opportunities and threats management, in practice, most of the projects have been focused on the threats management. However, considering the opportunities management and applying the opportunities-response strategies can lead to the improved profitability of the construction projects of the companies. In this paper, a new technique is developed to identify the opportunities in the construction projects using an improved protocol and propose the appropriate opportunities-response strategies to the construction companies to provide them with higher profitability. To evaluate the effectiveness of the protocol for selecting the most appropriate strategies in ‎response to the opportunities and threats, two projects from a construction company in Iran were ‎studied. Both projects selected were in mid-range in terms of size and similar in terms of time, ‎run time and costs. Finally, the output indicates that using the proposed opportunities-response strategies show that the company's profitability in the future can be increased approximately for similar projects.

Keywords: opportunities management, risk-response strategy, opportunity-response strategy, productivity, risk management

Procedia PDF Downloads 226
27944 The Information-Seeking Behaviour of Kuwaiti Judges (KJs)

Authors: Essam Mansour

Abstract:

The key purpose of this study is to show information-seeking behaviour of Kuwaiti Judges (KJs). Being one of the few studies about the information needs and information-seeking behaviour conducted in Arab and developing countries, this study is a pioneer one among many studies conducted in information seeking, especially with this significant group of information users. The authors tried to investigate this seeking behavior in terms of KJs' thoughts, perceptions, motivations, techniques, preferences, tools and barriers met when seeking information. The authors employed a questionnaire, with a response rate 77.2 percent. This study showed that most of KJs were likely to be older, educated and with a work experience ranged from new to old experience. There is a statistically reliable significant difference between KJs' demographic characteristics and some sources of information, such as books, encyclopedias, references and mass media. KJs were using information moderately to make a decision, to be in line with current events, to collect statistics and to make a specific/general research. The office and home were the most frequent location KJs were accessing information from. KJs' efficiency level of the English language is described to be moderately good, and a little number of them confirmed that their efficiency level of French was not bad. The assistance provided by colleagues, followed by consultants, translators, sectaries and librarians were found to be most strong types of assistance needed when seeking information. Mobile apps, followed by PCs, information networks (the Internet) and information databases were the highest technology tool used by KJs. Printed materials, followed by non-printed and audiovisual materials were the most preferred information formats KJs use. The use of languages, the recency of information and the place of information, the deficit role of the library to deliver information were at least significant barriers to KJs when seeking information.

Keywords: information users, information-seeking behaviour, information needs, judges, Kuwait

Procedia PDF Downloads 305
27943 Identification of Groundwater Potential Zones Using Geographic Information System and Multi-Criteria Decision Analysis: A Case Study in Bagmati River Basin

Authors: Hritik Bhattarai, Vivek Dumre, Ananya Neupane, Poonam Koirala, Anjali Singh

Abstract:

The availability of clean and reliable groundwater is essential for the sustainment of human and environmental health. Groundwater is a crucial resource that contributes significantly to the total annual supply. However, over-exploitation has depleted groundwater availability considerably and led to some land subsidence. Determining the potential zone of groundwater is vital for protecting water quality and managing groundwater systems. Groundwater potential zones are marked with the assistance of Geographic Information System techniques. During the study, a standard methodology was proposed to determine groundwater potential using an integration of GIS and AHP techniques. When choosing the prospective groundwater zone, accurate information was generated to get parameters such as geology, slope, soil, temperature, rainfall, drainage density, and lineament density. However, identifying and mapping potential groundwater zones remains challenging due to aquifer systems' complex and dynamic nature. Then, ArcGIS was incorporated with a weighted overlay, and appropriate ranks were assigned to each parameter group. Through data analysis, MCDA was applied to weigh and prioritize the different parameters based on their relative impact on groundwater potential. There were three probable groundwater zones: low potential, moderate potential, and high potential. Our analysis showed that the central and lower parts of the Bagmati River Basin have the highest potential, i.e., 7.20% of the total area. In contrast, the northern and eastern parts have lower potential. The identified potential zones can be used to guide future groundwater exploration and management strategies in the region.

Keywords: groundwater, geographic information system, analytic hierarchy processes, multi-criteria decision analysis, Bagmati

Procedia PDF Downloads 100
27942 A Qualitative Exploration of the Strategic Management of Employee Resistance to Organisational Change

Authors: Muneeb Banday, Anukriti Dixit

Abstract:

Change in organizations is viewed as a conversion process of the organizational functioning. One of the crucial elements of this conversion process is the employee resistance to organizational change. The existing literature on change resistance has generally treated resistance as a barrier or an opportunity for successful implementation of change. However, there is little empirical research exploring how resistance to change is managed. This may be partially due to difficulty in getting information on resistance to change. The top management does not divulge such information to avoid negative evaluation whereas employees face huge risk in sharing information related to resistance. The focus of the study is to understand how the organization under study dealt with the employee resistance to change. The conversion process is a story of how the organization went from one stage to another. We used narrative approach to change. Data was collected data through company visits and interviews. The interviews were transcribed, coded, and themes were identified. We focused on the strands that left huge scope for alternative interpretations than the dominant narrative of change prevalent in the organization. The study reveals that the top management strategically uses the legitimacy of leadership, roles of key employees, and rationality of change to manage resistance.

Keywords: employee resistance, legitimacy of leadership, narrative analysis, organisational change

Procedia PDF Downloads 268
27941 Computer Network Applications, Practical Implementations and Structural Control System Representations

Authors: El Miloudi Djelloul

Abstract:

The computer network play an important position for practical implementations of the differently system. To implement a system into network above all is needed to know all the configurations, which is responsible to be a part of the system, and to give adequate information and solution in realtime. So if want to implement this system for example in the school or relevant institutions, the first step is to analyze the types of model which is needed to be configured and another important step is to organize the works in the context of devices, as a part of the general system. Often before configuration, as important point is descriptions and documentations from all the works into the respective process, and then to organize in the aspect of problem-solving. The computer network as critic infrastructure is very specific so the paper present the effectiveness solutions in the structured aspect viewed from one side, and another side is, than the paper reflect the positive aspect in the context of modeling and block schema presentations as an better alternative to solve the specific problem because of continually distortions of the system from the line of devices, programs and signals or packed collisions, which are in movement from one computer node to another nodes.

Keywords: local area networks, LANs, block schema presentations, computer network system, computer node, critical infrastructure packed collisions, structural control system representations, computer network, implementations, modeling structural representations, companies, computers, context, control systems, internet, software

Procedia PDF Downloads 359
27940 Risk Factors for High Resistance of Ciprofloxacin Against Escherichia coli in Complicated Urinary Tract Infection

Authors: Liaqat Ali, Khalid Farooq, Shafieullah Khan, Nasir Orakzai, Qudratullah

Abstract:

Objectives: To determine the risk factors for high resistance of ciprofloxacin in complicated urinary tract infections. Materials and Methods: It is an analytical study that was conducted in the department of Urology (Team ‘C’) at Institute of Kidney Diseases Hayatabad Peshawar from 1st June 2012 till 31st December 2012. Total numbers of 100 patients with complicated UTI was selected in the study. Multivariate analysis and linear regression were performed for the detection of risk factors. All the data was recorded on structured Proforma and was analyzed on SPSS version 17. Results: The mean age of the patient was 55.6 years (Range 3-82 years). 62 patients were male while 38 patients were female. 66 isolates of E-Coli were found sensitive to ciprofloxacin while 34 isolates were found Resistant for ciprofloxacin. Using multivariate analysis and linear regression, an increasing age above 50 (p=0.002) History of urinary catheterization especially for bladder outflow obstruction (p=0.001) and previous multiple use of ciprofloxacin (p=0.001) and poor brand of ciprofloxacin were found to be independent risk factors for high resistance of ciprofloxacin. Conclusion: UTI is common illness across the globe with increasing trend of antimicrobial resistance for ciprofloxacin against E Coli in complicated UTI. The risk factors for emerging resistance are increasing age, urinary catheterization and multiple use and poor brand of ciprofloxacin.

Keywords: urinary tract infection, ciprofloxacin, urethral catheterization, antimicrobial resistance

Procedia PDF Downloads 350
27939 Potential Risk Factors Associated with Sole Hemorrhages Causing Lameness in Egyptian Water Buffaloes and Native Breed Cows

Authors: Waleed El-Said Abou El-Amaiem

Abstract:

Sole hemorrhages are considered as a main cause for sub clinical laminitis. In this study we aimed at discussing the most prominent risk factors associated with sole hemorrhages causing lameness in Egyptian water buffaloes and native breed cows. The final multivariate logistic regression model showed, a significant association between sub acute ruminal acidosis (P< 0.05), limb affected (P< 0.05) and weight (P< 0.05) and sole hemorrhages causing lameness in Egyptian water buffaloes and native breed cows. According to our knowledge, this is the first paper to discuss the risk factors associated with sole hemorrhages causing lameness in Egyptian water buffaloes and native breed cows.

Keywords: lameness, buffalo, sole hemorrhages, breed cows

Procedia PDF Downloads 446
27938 Condom Attitudes and Self-Efficacy: Unwrapping Safer Sex Practices among Heterosexual Bahamian Men

Authors: Theresa Adderley

Abstract:

Background: Aside from abstinence, correct and consistent use of latex condoms is the best known effective method to reduce HIV transmission among sexually active heterosexual individuals. When condoms are correctly used, the risk of HIV transmission is reduced by approximately 85%, relative to risk when not protected during sexual intercourse. The literature provides evidence that heterosexual young adults continue to be the group among whom STI rates are highest and the group that engages in more sexual risk-taking behaviors such as inconsistent or no condom usage. This study examines condom attitudes, condom use self-efficacy and their contributions to safer sex behaviors among heterosexual men living in The Bahamas. Methods: Guided by the Theory of Planned Behavior, and a convenience sample of 185 heterosexual males (Mage= 31.95, SD = 11.35), three standardized instruments were used to assess behaviors that may not only place heterosexual males at risk for HIV infection but also their female partners. Results: The results of this study suggest that condom attitudes, and condom use self-efficacy are important in explaining 24% variance in safer sex behaviors among Bahamian men. Income (β= -.15, p < .01; condom attitudes, (β= .36, p < .01), and condom use self-efficacy (β= .1, p < .01) were significantly associated with safer sex behaviors. Conclusion: Rather than focusing only on the use of safer sex behaviors, an effective HIV prevention strategy must consider condom attitudes and condom use self-efficacy as specific variables that may contribute to perpetuating the transmission of HIV.

Keywords: condom attitudes, safer sex behaviors, HIV, condom self-efficacy

Procedia PDF Downloads 291
27937 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 443
27936 Occupant Behaviour Change in Post-Pandemic Australia

Authors: Yan Zhang, Felix Kin Peng Hui, Colin Duffield, Caroline X. Gao

Abstract:

In post-pandemic Australia, it is unclear how building occupant have changed their behaviour in their interaction with buildings and other occupants. This research provides information on occupant behaviour change compared to before the pandemic and examines the predictors for those behaviour changes. This paper analyses survey responses from 2298 building occupants in Melbourne to investigate occupant behaviour change and determinants for those changes one year after the pandemic in Australia. The behaviour changes were grouped into three categories based on respiratory infection routes: (1) fomite: hand-shaking and hand hygiene behaviours; (2) airborne: individual interventions to indoor air quality such as face masking, window openings for occupants working in naturally ventilated space; (3) droplets: social distancing, reducing working hours in the workplace. The survey shows that the pandemic has significantly changed occupants' behaviour in all three categories compared to before the pandemic. The changes are significantly associated with occupants' perceived indoor air quality, indoor environmental cleanliness, and occupant density, demonstrating their growing awareness of respiratory infection risk that influences their health behaviours. The two most significant factors identified from multivariate regressions to drive the behaviour change include occupant risk perception of respiratory infections at the workplace and their observed co-worker's behaviour change. Based on the survey results, the paper provides adjusted estimates for related occupant behaviour parameters. The study also discusses alternatives for managing window operations in naturally ventilated buildings to improve occupant satisfaction. This paper could help Building Managers, and Building Designers understand occupant behaviour change to improve building operations and new building design to enhance occupant experience. Also, building energy modellers and risk assessors may use the findings to adjust occupant behaviour-related parameters to improve the models. The findings contribute to the knowledge of Human-Building Interaction.

Keywords: human-building interaction, risk perception, occupant behaviour, IAQ, COVID-19

Procedia PDF Downloads 67
27935 Prevalence of Bovine Mastitis and Associated Risk Factors in Selected Dairy Farms in Zoba Anseba, Eritrea

Authors: Redie Kidane Ghebrehawariat, Betiel Habte Hadgu, Filmon Berhane Kahsay, Rim Berhane Fisehaye, Samuel Haile Kahsay, Saron Yemane Yosief, Selemawit Mosazghi Gilazghi

Abstract:

A cross-sectional study was conducted from 22 February to 9 April 2022 on small, medium, and large holder dairy farms to determine the bovine mastitis prevalence and associated risk factors in the Anseba region, Eritrea. A total of 34 dairy farms and 193 dairy cows were randomly selected. Dairy cows were physically examined for any change on the udder and milk; a California mastitis test was performed to check sub-clinical mastitis; a closed-ended semi-structured questionnaire composed of 28 variables/risk factors (21 management risk factors and 7 animal-level risk factors) was used to determine the risk factors responsible for clinical and sub-clinical mastitis in the dairy cows. The overall cow-level prevalence of mastitis was 147 (76.2%). The animal level prevalence rate of clinical and sub-clinical mastitis was found to be 22 (11.4%) and 125 (64.8%), respectively, while herd level prevalence both for clinical and subclinical mastitis was found to be 14 (41.2%) and 26 (76.5%) respectively. Based on the already set P-value, which is <0.05, a number of risk factors were found to have a significant relationship with the occurrence of clinical and sub-clinical mastitis. Generally, animal risk factors such as animal age, parity, injury on the udder or teat, and previous history of mastitis presence of injury on the udder and lactation stage were risk factors with a significant relationship with the occurrence of clinical and sub-clinical mastitis. On the other hand, management risk factors with a significant relationship to the occurrence of clinical and sub-clinical mastitis were herd size, failure to milk mastitic cow, at last, educational level, floor type, failure to use a towel, using one towel for more than one cow and failure to practice mastitis test. From a total of 772 quarters, 280 (36.3%) were found positive for sub-clinical mastitis using the California mastitis test; of these, 70 (9%) were weakly positive, 90 (11.7%) were distinct positive, and 120 (15.5%) were strongly positive. Furthermore, 13 (1.7%) quarters were blocked. Quarter level prevalence was right front 80 (41.5%), left front 64 (33.3%), right hind 69 (35.8%) and left hind 67 (34.7%). The study has shown that mastitis is a major problem for dairy farms and the findings suggested that mastitis is one of the limiting factors in increasing milk production. Subclinical mastitis was found to be a devastating problem, and it occurred in all three breeds of lactating dairy cattle. Therefore, farmers should work hard to avoid the above-mentioned risk factors to minimize the infection of their dairy cattle by mastitis and thereby increase their profit. On the other hand, the Ministry of Agriculture, through the extension unit, should work in close contact with the farmers to increase awareness of the economic importance of the disease and associated risk factors.

Keywords: mastitis, prevalence, dairy cattle, Anseba, Eritrea

Procedia PDF Downloads 121
27934 The Impact of Supply Chain Strategy and Integration on Supply Chain Performance: Supply Chain Vulnerability as a Moderator

Authors: Yi-Chun Kuo, Jo-Chieh Lin

Abstract:

The objective of a supply chain strategy is to reduce waste and increase efficiency to attain cost benefits, and to guarantee supply chain flexibility when facing the ever-changing market environment in order to meet customer requirements. Strategy implementation aims to fulfill common goals and attain benefits by integrating upstream and downstream enterprises, sharing information, conducting common planning, and taking part in decision making, so as to enhance the overall performance of the supply chain. With the rise of outsourcing and globalization, the increasing dependence on suppliers and customers and the rapid development of information technology, the complexity and uncertainty of the supply chain have intensified, and supply chain vulnerability has surged, resulting in adverse effects on supply chain performance. Thus, this study aims to use supply chain vulnerability as a moderating variable and apply structural equation modeling (SEM) to determine the relationships among supply chain strategy, supply chain integration, and supply chain performance, as well as the moderating effect of supply chain vulnerability on supply chain performance. The data investigation of this study was questionnaires which were collected from the management level of enterprises in Taiwan and China, 149 questionnaires were received. The result of confirmatory factor analysis shows that the path coefficients of supply chain strategy on supply chain integration and supply chain performance are positive (0.497, t= 4.914; 0.748, t= 5.919), having a significantly positive effect. Supply chain integration is also significantly positively correlated to supply chain performance (0.192, t = 2.273). The moderating effects of supply chain vulnerability on supply chain strategy and supply chain integration to supply chain performance are significant (7.407; 4.687). In Taiwan, 97.73% of enterprises are small- and medium-sized enterprises (SMEs) focusing on receiving original equipment manufacturer (OEM) and original design manufacturer (ODM) orders. In order to meet the needs of customers and to respond to market changes, these enterprises especially focus on supply chain flexibility and their integration with the upstream and downstream enterprises. According to the observation of this research, the effect of supply chain vulnerability on supply chain performance is significant, and so enterprises need to attach great importance to the management of supply chain risk and conduct risk analysis on their suppliers in order to formulate response strategies when facing emergency situations. At the same time, risk management is incorporated into the supply chain so as to reduce the effect of supply chain vulnerability on the overall supply chain performance.

Keywords: supply chain integration, supply chain performance, supply chain vulnerability, structural equation modeling

Procedia PDF Downloads 312
27933 Suicide Wrongful Death: Standard of Care Problems Involving the Inaccurate Discernment of Lethal Risk When Focusing on the Elicitation of Suicide Ideation

Authors: Bill D. Geis

Abstract:

Suicide wrongful death forensic cases are the fastest rising tort in mental health law. It is estimated that suicide-related cases have accounted for 15% of U.S. malpractice claims since 2006. Most suicide-related personal injury claims fall into the legal category of “wrongful death.” Though mental health experts may be called on to address a range of forensic questions in wrongful death cases, the central consultation that most experts provide is about the negligence element—specifically, the issue of whether the clinician met the clinical standard of care in assessing, treating, and managing the deceased person’s mental health care. Standards of care, varying from U.S. state to state, are broad and address what a reasonable clinician might do in a similar circumstance. This fact leaves the issue of the suicide standard of care, in each case, up to forensic experts to put forth a reasoned estimate of what the standard of care should have been in the specific case under litigation. Because the general state guidelines for standard of care are broad, forensic experts are readily retained to provide scientific and clinical opinions about whether or not a clinician met the standard of care in their suicide assessment, treatment, and management of the case. In the past and in much of current practice, the assessment of suicide has centered on the elicitation of verbalized suicide ideation. Research in recent years, however, has indicated that the majority of persons who end their lives do not say they are suicidal at their last medical or psychiatric contact. Near-term risk assessment—that goes beyond verbalized suicide ideation—is needed. Our previous research employed structural equation modeling to predict lethal suicide risk--eight negative thought patterns (feeling like a burden on others, hopelessness, self-hatred, etc.) mediated by nine transdiagnostic clinical factors (mental torment, insomnia, substance abuse, PTSD intrusions, etc.) were combined to predict acute lethal suicide risk. This structural equation model, the Lethal Suicide Risk Pattern (LSRP), Acute model, had excellent goodness-of-fit [χ2(df) = 94.25(47)***, CFI = .98, RMSEA = .05, .90CI = .03-.06, p(RMSEA = .05) = .63. AIC = 340.25, ***p < .001.]. A further SEQ analysis was completed for this paper, adding a measure of Acute Suicide Ideation to the previous SEQ. Acceptable prediction model fit was no longer achieved [χ2(df) = 3.571, CFI > .953, RMSEA = .075, .90% CI = .065-.085, AIC = 529.550].This finding suggests that, in this additional study, immediate verbalized suicide ideation information was unhelpful in the assessment of lethal risk. The LSRP and other dynamic, near-term risk models (such as the Acute Suicide Affective Disorder Model and the Suicide Crisis Syndrome Model)—going beyond elicited suicide ideation—need to be incorporated into current clinical suicide assessment training. Without this training, the standard of care for suicide assessment is out of sync with current research—an emerging dilemma for the forensic evaluation of suicide wrongful death cases.

Keywords: forensic evaluation, standard of care, suicide, suicide assessment, wrongful death

Procedia PDF Downloads 67
27932 The Influence of Environmental Factors on Honey Bee Activities: A Quantitative Analysis

Authors: Hung-Jen Lin, Chien-Hao Wang, Chien-Peng Huang, Yu-Sheng Tseng, En-Cheng Yang, Joe-Air Jiang

Abstract:

Bees’ incoming and outgoing behavior is a decisive index which can indicate the health condition of a colony. Traditional methods for monitoring the behavior of honey bees (Apis mellifera) take too much time and are highly labor-intensive, and the lack of automation and synchronization disables researchers and beekeepers from obtaining real-time information of beehives. To solve these problems, this study proposes to use an Internet of Things (IoT)-based system for counting honey bees’ incoming and outgoing activities using an infrared interruption technique, while environmental factors are recorded simultaneously. The accuracy of the established system is verified by comparing the counting results with the outcomes of manual counting. Moreover, this highly -accurate device is appropriate for providing quantitative information regarding honey bees’ incoming and outgoing behavior. Different statistical analysis methods, including one-way ANOVA and two-way ANOVA, are used to investigate the influence of environmental factors, such as temperature, humidity, illumination and ambient pressure, on bees’ incoming and outgoing behavior. With the real-time data, a standard model is established using the outcomes from analyzing the relationship between environmental factors and bees’ incoming and outgoing behavior. In the future, smart control systems, such as a temperature control system, can also be combined with the proposed system to create an appropriate colony environment. It is expected that the proposed system will make a considerable contribution to the apiculture and researchers.

Keywords: ANOVA, environmental factors, honey bee, incoming and outgoing behavior

Procedia PDF Downloads 362
27931 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance

Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle

Abstract:

Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.

Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model

Procedia PDF Downloads 99
27930 An Indoor Guidance System Combining Near Field Communication and Bluetooth Low Energy Beacon Technologies

Authors: Rung-Shiang Cheng, Wei-Jun Hong, Jheng-Syun Wang, Kawuu W. Lin

Abstract:

Users rely increasingly on Location-Based Services (LBS) and automated navigation/guidance systems nowadays. However, while such services are easily implemented in outdoor environments using Global Positioning System (GPS) technology, a requirement still exists for accurate localization and guidance schemes in indoor settings. Accordingly, the present study presents a methodology based on GPS, Bluetooth Low Energy (BLE) beacons, and Near Field Communication (NFC) technology. Through establishing graphic information and the design of algorithm, this study develops a guidance system for indoor and outdoor on smartphones, with aim to provide users a smart life through this system. The presented system is implemented on a smartphone and evaluated on a student campus environment. The experimental results confirm the ability of the presented app to switch automatically from an outdoor mode to an indoor mode and to guide the user to the requested target destination via the shortest possible route.

Keywords: beacon, indoor, BLE, Dijkstra algorithm

Procedia PDF Downloads 297
27929 Framework for Government ICT Projects

Authors: Manal Rayes

Abstract:

In its efforts to utilize the information and communication technology to enhance the quality of public service delivery, national and local governments around the world are competing to introduce more ICT applications as tools to automate processes related to law enforcement or policy execution, increase citizen orientation, trust, and satisfaction, and create one-stop-shops for public services. In its implementation, e-Government ICTs need to maintain transparency, participation, and collaboration. Due to this diverse of mixed goals and requirements, e-Government systems need to be designed based on special design considerations in order to eliminate the risks of failure to compliance to government regulations, citizen dissatisfaction, or market repulsion. In this article we suggest a framework with guidelines for designing government information systems that takes into consideration the special requirements of the public sector. Then we introduce two case studies and show how applying those guidelines would result in a more solid system design.

Keywords: e-government, framework, guidelines, system design

Procedia PDF Downloads 363
27928 Data Integrity between Ministry of Education and Private Schools in the United Arab Emirates

Authors: Rima Shishakly, Mervyn Misajon

Abstract:

Education is similar to other businesses and industries. Achieving data integrity is essential in order to attain a significant supporting for all the stakeholders in the educational sector. Efficient data collect, flow, processing, storing and retrieving are vital in order to deliver successful solutions to the different stakeholders. Ministry of Education (MOE) in United Arab Emirates (UAE) has adopted ‘Education 2020’ a series of five-year plans designed to introduce advanced education management information systems. As part of this program, in 2010 MOE implemented Student Information Systems (SIS) to manage and monitor the students’ data and information flow between MOE and international private schools in UAE. This paper is going to discuss data integrity concerns between MOE, and private schools. The paper will clarify the data integrity issues and will indicate the challenges that face private schools in UAE.

Keywords: education management information systems (EMIS), student information system (SIS), United Arab Emirates (UAE), ministry of education (MOE), (KHDA) the knowledge and human development authority, Abu Dhabi educational counsel (ADEC)

Procedia PDF Downloads 218
27927 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 342
27926 Way to Successful Enterprise Resource Planning System Implementation in Developing Countries: Case of Public Sector Unit

Authors: Suraj Kumar Mukti

Abstract:

Enterprise Resource Planning (ERP) system is a management tool to integrate all departments in an organization. It integrates business processes, manages resources efficiently and provides an appropriate decision support system to management. ERP system implementation is a typical and time taking process as well as money consuming process. Articles related to key success factors of ERP system implementation are available in the literature, but rare authors have focused on roadmap of successful ERP system implementation. Postponement is better if the organization is not ready to implement ERP system in better way; hence checking of organization’s preparation to adopt new system is an important prerequisite to ensure the success of ERP system implementation in an organization. Then comes what will be called as success of ERP system implementation. Benefits achieved by ERP system may be categorized into two categories; viz. tangible and intangible benefits. This research article presents a roadmap to ensure the success of ERP system implementation and benefits achieved through the new system as in success indicator. A case study is presented to evaluate the success and benefit achieved through the new system. The article gives a comprehensive approach to academicians and a roadmap to the organizations seeking to implement the ERP system.

Keywords: ERP system, decision support system, tangible, intangible

Procedia PDF Downloads 326
27925 Investigation of Information Security Incident Management Based on International Standard ISO/IEC 27002 in Educational Hospitals in 2014

Authors: Nahid Tavakoli, Asghar Ehteshami, Akbar Hassanzadeh, Fatemeh Amini

Abstract:

Introduction: The Information security incident management guidelines was been developed to help hospitals to meet their information security event and incident management requirements. The purpose of this Study was to investigate on Information Security Incident Management in Isfahan’s educational hospitals in accordance to ISO/IEC 27002 standards. Methods: This was a cross-sectional study to investigate on Information Security Incident Management of educational hospitals in 2014. Based on ISO/IEC 27002 standards, two checklists were applied to check the compliance with standards on Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements. One inspector was trained to carry out the assessments in the hospitals. The data was analyzed by SPSS. Findings: In general the score of compliance Information Security Incident Management requirements in two steps; Reporting Information Security Events and Weakness and Management of Information Security Incidents and Improvements was %60. There was the significant difference in various compliance levels among the hospitals (p-valueKeywords: information security incident management, information security management, standards, hospitals

Procedia PDF Downloads 574
27924 Integration of Two Thermodynamic Cycles by Absorption for Simultaneous Production of Fresh Water and Cooling

Authors: Javier Delgado-Gonzaga, Wilfrido Rivera, David Juárez-Romero

Abstract:

Cooling and water purification are processes that have contributed to the economic and social development of the modern world. However, these processes require a significant amount of energy globally. Nowadays, absorption heat pumps have been studied with great interest since they are capable of producing cooling and/or purifying water from low-temperature energy sources such as industrial waste heat or renewable energy. In addition, absorption heat pumps require negligible amounts of electricity for their operation and generally use working fluids that do not represent a risk to the environment. The objective of this work is to evaluate a system that integrates an absorption heat transformer and an absorption cooling system to produce fresh water and cooling from a low-temperature heat source. Both cycles operate with the working pair LiBr-H2O. The integration is possible through the interaction of the LiBr-H2O solution streams between both cycles and also by recycling heat from the absorption heat transformer to the absorption cooling system. Mathematical models were developed to compare the performance of four different configurations. The results showed that the configuration in which the hottest streams of LiBr-H2O solution preheated the coldest streams in the economizers of both cycles was one that achieved the best performance. The interaction of the solution currents and the heat recycling analyzed in this work serves as a record of the possibilities of integration between absorption cycles for cogeneration.

Keywords: absorption heat transformer, absorption cooling system, water desalination, integrated system

Procedia PDF Downloads 74
27923 Performance the SOFA and APACHEII Scoring System to Predicate the Mortality of the ICU Cases

Authors: Yu-Chuan Huang

Abstract:

Introduction: There is a higher mortality rate for unplanned transfer to intensive care units. It also needs a longer length of stay and makes the intensive care unit beds cannot be effectively used. It affects the immediate medical treatment of critically ill patients, resulting in a drop in the quality of medical care. Purpose: The purpose of this study was using SOFA and APACHEII score to analyze the mortality rate of the cases transferred from ED to ICU. According to the score that should be provide an appropriate care as early as possible. Methods: This study was a descriptive experimental design. The sample size was estimated at 220 to reach a power of 0.8 for detecting a medium effect size of 0.30, with a 0.05 significance level, using G-power. Considering an estimated follow-up loss, the required sample size was estimated as 242 participants. Data were calculated by medical system of SOFA and APACHEII score that cases transferred from ED to ICU in 2016. Results: There were 233 participants meet the study. The medical records showed 33 participants’ mortality. Age and sex with QSOFA , SOFA and sex with APACHEII showed p>0.05. Age with APCHHII in ED and ICU showed r=0.150, 0,268 (p < 0.001**). The score with mortality risk showed: ED QSOFA is r=0.235 (p < 0.001**), exp(B)=1.685(p = 0.007); ICU SOFA 0.78 (p < 0.001**), exp(B)=1.205(p < 0.001). APACHII in ED and ICU showed r= 0.253, 0.286 (p < 0.001**), exp(B) = 1.041,1.073(p = 0.017,0.001). For SOFA, a cutoff score of above 15 points was identified as a predictor of the 95% mortality risk. Conclusions: The SOFA and APACHE II were calculated based on initial laboratory data in the Emergency Department, and during the first 24 hours of ICU admission. In conclusion, the SOFA and APACHII score is significantly associated with mortality and strongly predicting mortality. Early predictors of morbidity and mortality, which we can according the predicting score, and provide patients with a detail assessment and proper care, thereby reducing mortality and length of stay.

Keywords: SOFA, APACHEII, mortality, ICU

Procedia PDF Downloads 145
27922 Posterior Circulation Ischemic Strokes in Olympic and Division 1 Wrestlers

Authors: Christen Kutz

Abstract:

Objective: The aim of this study is to review a case series of 4 high-level Olympic and Division 1 wrestlers who experienced debilitating posterior circulation ischemic strokes during or after a competitive wrestling event and to identify risk factors, etiology and outcomes of stroke in young, healthy elite wrestlers. Background: Stroke occurs in one in 10,000 people under age 64. In young adults, the most common causes of stroke are cardiac embolism, hypercoagulable state, and vasculopathy. One-third of these strokes occur in young, fit individuals. There is little published literature about ischemic strokes that occur in wrestlers. Based on the nature of wrestling, the risk of injury or dissection to neurovascular structures may be a possible theory, but very few case reports exist. Methodology: 4 wrestlers under the age of 44 with a known history of ischemic stroke participated in individual interviews either in person or virtually. Each of the wrestlers provided their demographic information, wrestling background, clinical presentation at the time of stroke, imaging results, identification of potential risk factors, acute treatment and recovery. Results: 3 white male Division 1 wrestlers (2 Lehigh University, 1 Lock Haven University) and 1 black male 2008 Olympian experienced posterior circulation strokes. Case #1 felt a “pop” while wrestling (lateral medullary infarct, possible vertebral artery dissection); Case #2 awoke with severe vertigo, sweating, and vomiting after wrestling the previous day (left cerebellar infarct, (+) protein S deficiency); Case #3 severe vertigo, ataxia, and sensation of impending doom after wrestling earlier that week (left cerebellar infarct, hypoplastic left vertebral artery (+) anti-cardiolipin antibodies). Case #4 severe dizziness, confusion (left cerebellar stroke, vertebral artery dissection, small PFO). Conclusion: 3 wrestlers were started on anti-platelet therapy, risk factors were modified, and returned to their sport. 1 wrestler was placed on anti-coagulation and retired from competition.

Keywords: stroke, wrestling, Olympic, posterior circulation

Procedia PDF Downloads 72
27921 Integrated Clean Development Mechanism and Risk Management Approach for Infrastructure Transportation Project

Authors: Debasis Sarkar

Abstract:

Clean development mechanism (CDM) can act as an effective instrument for mitigating climate change. This mechanism can effectively reduce the emission of CO2 and other green house gases (GHG). Construction of a mega infrastructure project like underground corridor construction for metro rail operation involves in consumption of substantial quantity of concrete which consumes huge quantity of energy consuming materials like cement and steel. This paper is an attempt to develop an integrated clean development mechanism and risk management approach for sustainable development for an underground corridor metro rail project in India during its construction phase. It was observed that about 35% reduction in CO2 emission can be obtained by adding fly ash as a part replacement of cement. The reduced emission quantity of CO2 which is of the quantum of about 21,646.36 MT would result in cost savings of approximately INR 8.5 million (USD 1,29,878).But construction and operation of such infrastructure projects of the present era are subject to huge risks and uncertainties throughout all the phases of the project, thus reducing the probability of successful completion of the project within stipulated time and cost frame. Thus, an integrated approach of combining CDM with risk management would enable the metro rail authorities to develop a sustainable risk mitigation measure framework to ensure more cost and energy savings and lesser time and cost over-run.

Keywords: clean development mechanism (CDM), infrastructure transportation, project risk management, underground metro rail

Procedia PDF Downloads 472
27920 Biosignal Recognition for Personal Identification

Authors: Hadri Hussain, M.Nasir Ibrahim, Chee-Ming Ting, Mariani Idroas, Fuad Numan, Alias Mohd Noor

Abstract:

A biometric security system has become an important application in client identification and verification system. A conventional biometric system is normally based on unimodal biometric that depends on either behavioural or physiological information for authentication purposes. The behavioural biometric depends on human body biometric signal (such as speech) and biosignal biometric (such as electrocardiogram (ECG) and phonocardiogram or heart sound (HS)). The speech signal is commonly used in a recognition system in biometric, while the ECG and the HS have been used to identify a person’s diseases uniquely related to its cluster. However, the conventional biometric system is liable to spoof attack that will affect the performance of the system. Therefore, a multimodal biometric security system is developed, which is based on biometric signal of ECG, HS, and speech. The biosignal data involved in the biometric system is initially segmented, with each segment Mel Frequency Cepstral Coefficients (MFCC) method is exploited for extracting the feature. The Hidden Markov Model (HMM) is used to model the client and to classify the unknown input with respect to the modal. The recognition system involved training and testing session that is known as client identification (CID). In this project, twenty clients are tested with the developed system. The best overall performance at 44 kHz was 93.92% for ECG and the worst overall performance was ECG at 88.47%. The results were compared to the best overall performance at 44 kHz for (20clients) to increment of clients, which was 90.00% for HS and the worst overall performance falls at ECG at 79.91%. It can be concluded that the difference multimodal biometric has a substantial effect on performance of the biometric system and with the increment of data, even with higher frequency sampling, the performance still decreased slightly as predicted.

Keywords: electrocardiogram, phonocardiogram, hidden markov model, mel frequency cepstral coeffiecients, client identification

Procedia PDF Downloads 276
27919 The Use of Metformin in Treatment of Polycystic Ovary Syndrome (PCOS) and Glucose Control in Pregnant Women with Gestational Diabetes Mellitus (GDM) at Tripoli Medical Center

Authors: Ebtisam A. Benomran, Abdurrauf M. Gusbi, Malak S. Elazarg, M. Sultan, Layla M. Kafu, Arwa M. Matoug, Esra E. Benamara

Abstract:

Normal pregnancy is associated with metabolic changes leading to decreased insulin sensitivity and reduced glucose tolerance, however, 3-5% of pregnant women proceed to develop gestational diabetes mellitus (GDM). Researcher studied the use of metformin in many fields and the benefit to risk balance of using metformin during pregnancy and the risk of fetotoxic. In this study we examined the use of Metformin to control Glucose in pregnant Women with gestational diabetes mellitus (GDM) and evaluate its safety use during the first trimester of pregnancy.A group of pregnant patients with gestational diabetes mellitus from the first trimester of pregnancy, non smoking with no family history of congenital malformation disease, aged between (20-45 years) and have no liver diseases and who had indicating good compliance at more than one visit over several month until delivery put on Metformin were participated in this trial. Our study shown that all the studied group of pregnant women using metformin 500 mg daily delivered a healthy babies. Meta-analysis by mother risk program showed no increase in incidence of malformations by use Metformin during the first trimester of pregnancy. A hundred outpatients were participated in the survey on the general knowledge and awareness of diabetic patients to their illness and medication used their aged between 20-40 years old. In this survey we realize that 90% of the doctors are not giving the patient full information about their illness and the use of metformin during pregnancy, also about 65% of the patients did not know about the nutritionist in the hospital and the right control diet for diabetes. Courses on first aid, rapid diagnosis of poisoning and follow the written procedures to dealing with such cases.

Keywords: gestational diabetes, malformations, metformin, pregnancy

Procedia PDF Downloads 487
27918 Risk Management in Industrial Supervision Projects

Authors: Érick Aragão Ribeiro, George André Pereira Thé, José Marques Soares

Abstract:

Several problems in industrial supervision software development projects may lead to the delay or cancellation of projects. These problems can be avoided or contained by using identification methods, analysis and control of risks. These procedures can give an overview of the possible problems that can happen in the projects and what are the immediate solutions. Therefore, we propose a risk management method applied to the teaching and development of industrial supervision software. The method is developed through a literature review and previous projects can be divided into phases of management and have basic features that are validated with experimental research carried out by mechatronics engineering students and professionals. The management is conducted through the stages of identification, analysis, planning, monitoring, control and communication of risks. Programmers use a method of prioritizing risks considering the gravity and the possibility of occurrence of the risk. The outputs of the method indicate which risks occurred or are about to happen. The first results indicate which risks occur at different stages of the project and what risks have a high probability of occurring. The results show the efficiency of the proposed method compared to other methods, showing the improvement of software quality and leading developers in their decisions. This new way of developing supervision software helps students identify design problems, evaluate software developed and propose effective solutions. We conclude that the risk management optimizes the development of the industrial process control software and provides higher quality to the product.

Keywords: supervision software, risk management, industrial supervision, project management

Procedia PDF Downloads 345
27917 Nutritional Status of Surgical and Orthopedic Patients: 3B Ward

Authors: Jitaree Tantiyasawatdikul, Bantita Jadnok, Sarunya Tijana

Abstract:

Background: Nutritional status is an important factor before, during, and after an operation. It can help wound healing. If the patients have good nutritional status before and after an operation, wound healing can occur more easily. It can strengthen the immune system leading to decreased infection, reduced length of stay, and reducing the cost to patients and caregivers. Therefore, screening to evaluate the nutritional status of patients in 3B becomes the database for further developing the treatment and also will lead to excellent service from the interdisciplinary team. Objective: To study the nutritional status of patients in surgical ward 3B at Surgical and Orthopedics Nursing Division, Srinagarind Hospital. Method: A descriptive study, to evaluate the nutritional status of 86 patients admitted in 3B between October 2014 and March 2015.The instruments used in this study consisted of two parts: 1) personal data, 2) Screening nutritional status. The data were analyzed by percentage and mean. Results: A sample population of 86 patients aged 22-81 years old, mean age 52.59years, 90.69% are married, female were 55.81%, regular diet 70.93%, patients with no problem oral cavity was 87.21%.The sample population had high incidence of CA 47.67% and secondly cardiovascular disease 36.05 %. Patients with high-risk nutrition was 12.79 % including 45.45% cardiovascular disease and 36.36% CA. Screening of nutritional status of high-risk nutrition was 39.36% severe triceps skinfold (TSF), severe mid-arm muscle circumference(MAMC) 9.09% and severe total lymphocyte 39.36%. Conclusion: The result of nutritional status screening of surgical ward 3B found 12.79% patients with high-risk nutrition including 45.45% with cardiovascular disease .There was no problem with oral cavity and eating.

Keywords: nutritional status, screening, surgical patients, 3B ward, Srinagarind Hospital

Procedia PDF Downloads 325