Search results for: security risk
7109 Risk Assessment on New Bio-Composite Materials Made from Water Resource Recovery
Authors: Arianna Nativio, Zoran Kapelan, Jan Peter van der Hoek
Abstract:
Bio-composite materials are becoming increasingly popular in various applications, such as the automotive industry. Usually, bio-composite materials are made from natural resources recovered from plants, now, a new type of bio-composite material has begun to be produced in the Netherlands. This material is made from resources recovered from drinking water treatments (calcite), wastewater treatment (cellulose), and material from surface water management (aquatic plants). Surface water, raw drinking water, and wastewater can be contaminated with pathogens and chemical compounds. Therefore, it would be valuable to develop a framework to assess, monitor, and control the potential risks. Indeed, the goal is to define the major risks in terms of human health, quality of materials, and environment associated with the production and application of these new materials. This study describes the general risk assessment framework, starting with a qualitative risk assessment. The qualitative risk analysis was carried out by using the HAZOP methodology for the hazard identification phase. The HAZOP methodology is logical and structured and able to identify the hazards in the first stage of the design when hazards and associated risks are not well known. The identified hazards were analyzed to define the potential associated risks, and then these were evaluated by using the qualitative Event Tree Analysis. ETA is a logical methodology used to define the consequences for a specific hazardous incidents, evaluating the failure modes of safety barriers and dangerous intermediate events that lead to the final scenario (risk). This paper shows the effectiveness of combining of HAZOP and qualitative ETA methodologies for hazard identification and risk mapping. Then, key risks were identified, and a quantitative framework was developed based on the type of risks identified, such as QMRA and QCRA. These two models were applied to assess human health risks due to the presence of pathogens and chemical compounds such as heavy metals into the bio-composite materials. Thus, due to these contaminations, the bio-composite product, during its application, might release toxic substances into the environment leading to a negative environmental impact. Therefore, leaching tests are going to be planned to simulate the application of these materials into the environment and evaluate the potential leaching of inorganic substances, assessing environmental risk.Keywords: bio-composite, risk assessment, water reuse, resource recovery
Procedia PDF Downloads 1077108 Cost Based Analysis of Risk Stratification Tool for Prediction and Management of High Risk Choledocholithiasis Patients
Authors: Shreya Saxena
Abstract:
Background: Choledocholithiasis is a common complication of gallstone disease. Risk scoring systems exist to guide the need for further imaging or endoscopy in managing choledocholithiasis. We completed an audit to review the American Society for Gastrointestinal Endoscopy (ASGE) scoring system for prediction and management of choledocholithiasis against the current practice at a tertiary hospital to assess its utility in resource optimisation. We have now conducted a cost focused sub-analysis on patients categorized high-risk for choledocholithiasis according to the guidelines to determine any associated cost benefits. Method: Data collection from our prior audit was used to retrospectively identify thirteen patients considered high-risk for choledocholithiasis. Their ongoing management was mapped against the guidelines. Individual costs for the key investigations were obtained from our hospital financial data. Total cost for the different management pathways identified in clinical practice were calculated and compared against predicted costs associated with recommendations in the guidelines. We excluded the cost of laparoscopic cholecystectomy and considered a set figure for per day hospital admission related expenses. Results: Based on our previous audit data, we identified a77% positive predictive value for the ASGE risk stratification tool to determine patients at high-risk of choledocholithiasis. 47% (6/13) had an magnetic resonance cholangiopancreatography (MRCP) prior to endoscopic retrograde cholangiopancreatography (ERCP), whilst 53% (7/13) went straight for ERCP. The average length of stay in the hospital was 7 days, with an additional day and cost of £328.00 (£117 for ERCP) for patients awaiting an MRCP prior to ERCP. Per day hospital admission was valued at £838.69. When calculating total cost, we assumed all patients had admission bloods and ultrasound done as the gold standard. In doing an MRCP prior to ERCP, there was a 130% increase in cost incurred (£580.04 vs £252.04) per patient. When also considering hospital admission and the average length of stay, it was an additional £1166.69 per patient. We then calculated the exact costs incurred by the department, over a three-month period, for all patients, for key investigations or procedures done in the management of choledocholithiasis. This was compared to an estimate cost derived from the recommended pathways in the ASGE guidelines. Overall, 81% (£2048.45) saving was associated with following the guidelines compared to clinical practice. Conclusion: MRCP is the most expensive test associated with the diagnosis and management of choledocholithiasis. The ASGE guidelines recommend endoscopy without an MRCP in patients stratified as high-risk for choledocholithiasis. Our audit that focused on assessing the utility of the ASGE risk scoring system showed it to be relatively reliable for identifying high-risk patients. Our cost analysis has shown significant cost savings per patient and when considering the average length of stay associated with direct endoscopy rather than an additional MRCP. Part of this is also because of an increased average length of stay associated with waiting for an MRCP. The above data supports the ASGE guidelines for the management of high-risk for choledocholithiasis patients from a cost perspective. The only caveat is our small data set that may impact the validity of our average length of hospital stay figures and hence total cost calculations.Keywords: cost-analysis, choledocholithiasis, risk stratification tool, general surgery
Procedia PDF Downloads 977107 Corporate Governance and Firm Performance in the UAE
Authors: Bakr Ali Al-Gamrh, Ku Nor Izah B. Ku Ismail
Abstract:
We investigate the relationship between corporate governance, leverage, risk, and firm performance. We use a firm level panel that spans the period 2008 to 2012 of all listed firms on Abu Dhabi Stock Exchange and Dubai Financial Market. After constructing an index of corporate governance strength, we find a negative effect of corporate governance on firm performance. We, however, discover that corporate governance strength indirectly improves the negative influence of leverage on firm performance in normal times. On the contrary, the results completely reversed when there is a black swan event. Corporate governance strength plays a significantly negative role in moderating the relationship between leverage and firm performance during the financial crisis. We also reveal that corporate governance strength increases firms’ risk and deteriorates performance during crisis. Results provide evidence that corporate governance indirectly plays a completely different role in different time periods.Keywords: corporate governance, firm performance, risk, leverage, the UAE
Procedia PDF Downloads 5477106 Treatment of Type 2 Diabetes Mellitus: Physicians’ Adherence to the American Diabetes Association Guideline in Central Region, Saudi Arabia
Authors: Ibrahim Mohammed
Abstract:
Background: Diabetes mellitus is a chronic disease that can cause devastating secondary complications, reducing the quality and length of life as well as increasing medical costs for the patient and society. The guidelines recommend both clinical and preventive strategies for diabetes management and are regularly updated. The aim of the study is to assess the level of adherence of physicians to American Diabetes Association Guidelines. Method: Observational multicenter retrospective study will be conducted among different hospitals in the central region. Patient data will be collected from the records of the last three years (2017- 2020). Records will be selected randomly after a complete randomized design. The study focuses on the management of type 2 according to ADA not changed in the last three updating; those standards; all patients should be taking Metformin 1500 to 2000 mg/day as recommended dose and should be received a high dose of statin if the high risk to ASCVD or moderate statin if not at risk, patients with hypertension and diabetes should taking ACE or ARBS. Result: The study aimed to evaluate the commitment of physicians in the central region to the ADA. Out of the 153 selected patients, only 17 % were able to control their diabetes with an average A1c below 7. ADA stated that to reach the minimum benefit of using Metformin, the daily dose should be between 1500 and 2000 mg. Results showed that 110 patients were on Metformin, where 68% of them were on the recommended dose. ADA recommended the intake of high statin for diabetic patients with ASCVD risk, while diabetic patients without ASCVD risk should be on a moderate statin. Results showed that 61.5% of patients with ASCVD risk were at high statin while only 36% of patients without ASCVD risk were at moderate statin. Results showed that 89 patients have hypertension, and 80% of them are getting ACE/ARBs as recommended by the ADA. Recommendation: It is necessary to implement periodic training courses for some physicians to enhance and update their knowledge.Keywords: American Diabetic Association, diabetes mellitus, atherosclerotic cardiovascular disease, ACE inhibitors
Procedia PDF Downloads 847105 Prevalence of Pre Hypertension and Its Association to Risk Factors for Cardiovascular Diseases Among Male Undergraduate Students in Chennai
Authors: R. S. Dinesh Madhavan, M. Logaraj
Abstract:
Background: Recent studies have documented an increase in the risk of cardiovascular diseases (CVD) and a high rate of progression to hypertension in persons with pre hypertension. The risk factors for the growing burden of cardiovascular diseases especially hypertension, diabetes, overweight or obesity and waist hip ratio are increasing. Much study has not been done on cardiovascular risk factors associated with blood pressure (BP) among college students in Indian population. Objectives: The objective of our study was to estimate the prevalence of prehypertension among male students and to assess the association between prehypertension and risk factors for cardiovascular diseases. Material and Methods: A cross-sectional study was conducted among students of a university situated in the suburban area of Chennai. A total of 403 students was studied which included 200 medical and 203 engineering students. The information on selected socio-demographic variables were collected with the help of pre tested structured questionnaire. Measurements of height, weight, blood pressure and postprandial blood glucose were carried out as per standard procedure. Results: The mean age of the participants was 19.56 ± 1.67years. The mean systolic and diastolic blood pressure were 125.80±10.03 mm of Hg and 78.96 ±11.75mm of Hg. The average intake of fruits and vegetable per week were 4.34 ±3.47days and 6.55±4.39 days respectively. Use of smoke and smokeless tobacco were 27.3% and 3% respectively. About 30.3% of the students consume alcohol. Nearly 45.9 % of them did not practice regular exercise. About 29 % were overweight and 5.7% were obese, 24.8% were with waist circumference above 90 centimeters. The prevalence of pre hypertension and hypertension was 49.6% and 19.1% among male students. The prevalence of pre hypertension was higher in medical students (51.5%) compared to engineering students (47.8%). Higher risk of being pre hypertensive were noted above the age of 20 years (OR=4.32), fruit intake less than 3 days a week (OR= 1.03), smokers (OR= 1.13), alcohol intake (OR=1.56), lack of physical exercise (OR=1.90), BMI of more than 25 kg/m2 (OR=1.99). But statistically significant difference was noted between pre hypertensive and normotensive for age (p<0.0001), lack of physical exercise (p=0.004) and BMI (p=0.015). Conclusion: In conclusion nearly half of the students were pre hypertensive. Higher prevalence of smoking, alcohol intake, lack of physical exercise, overweight and increased waist circumference and postprandial blood sugar more than 140 mg/dl was noted among pre-hypertensive compared to normotensive.Keywords: cardiovascular diseases, prehypertension, risk factors, undergraduate Students
Procedia PDF Downloads 4377104 Perception of Risks of the Telecommunication Towers in Malaysia: A Qualitative Inquiry
Authors: Y. Kamarulzaman, A. Madun, F. D. Yusop, N. Abdullah, N. K. Hoong
Abstract:
In 2011, the Malaysian Government has initiated a nationwide project called 1BestariNet which will adopt the using of technology in teaching and learning, resulting in the construction of telecommunication towers inside the public schools’ premise. Using qualitative approach, this study investigated public perception of risks associated with the project, particularly the telecommunication towers. Data collection involved observation and in-depth interviews with 22 individuals consist of a segment of public that was anxious about the risks of radio frequency electromagnetic field (RFEMF) which include two employees of telecommunication companies (telcos) and five employees of Government agencies. Observation of the location of the towers at 10 public schools, a public forum, and media reports provide valuable information in our analysis. The study finds that the main concern is related to the health risks. This study also shows that it is not easy for the Government to manage public perception mainly because it involves public trust. We find that risk perception is related with public trust, as well as the perceived benefits and level of knowledge. Efficient communication and continuous engagement with the local communities help to build and maintain public trust, reduce public fear and anxiety, hence mitigating the risk perception among the public.Keywords: risk perception, risk communication, trust, telecommunication tower, radio frequency electromagnetic field (RFEMF)
Procedia PDF Downloads 3197103 Study of University Course Scheduling for Crowd Gathering Risk Prevention and Control in the Context of Routine Epidemic Prevention
Authors: Yuzhen Hu, Sirui Wang
Abstract:
As a training base for intellectual talents, universities have a large number of students. Teaching is a primary activity in universities, and during the teaching process, a large number of people gather both inside and outside the teaching buildings, posing a strong risk of close contact. The class schedule is the fundamental basis for teaching activities in universities and plays a crucial role in the management of teaching order. Different class schedules can lead to varying degrees of indoor gatherings and trajectories of class attendees. In recent years, highly contagious diseases have frequently occurred worldwide, and how to reduce the risk of infection has always been a hot issue related to public safety. "Reducing gatherings" is one of the core measures in epidemic prevention and control, and it can be controlled through scientific scheduling in specific environments. Therefore, the scientific prevention and control goal can be achieved by considering the reduction of the risk of excessive gathering of people during the course schedule arrangement. Firstly, we address the issue of personnel gathering in various pathways on campus, with the goal of minimizing congestion and maximizing teaching effectiveness, establishing a nonlinear mathematical model. Next, we design an improved genetic algorithm, incorporating real-time evacuation operations based on tracking search and multidimensional positive gradient cross-mutation operations, considering the characteristics of outdoor crowd evacuation. Finally, we apply undergraduate course data from a university in Harbin to conduct a case study. It compares and analyzes the effects of algorithm improvement and optimization of gathering situations and explores the impact of path blocking on the degree of gathering of individuals on other pathways.Keywords: the university timetabling problem, risk prevention, genetic algorithm, risk control
Procedia PDF Downloads 887102 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework
Authors: Abdulrahman S. Alqahtani
Abstract:
The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism
Procedia PDF Downloads 4037101 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems
Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy
Abstract:
The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.Keywords: smart grids, blockchain, fiber optic sensor, security
Procedia PDF Downloads 1187100 Review of Capitalization of Construction Industry on Sustainable Risk Management in Nigeria
Authors: Nnadi Ezekiel Ejiofor
Abstract:
The construction industry plays a decisive role in the healthy development of any nation. Not only large but even small construction projects contribute to a country’s economic growth. There is a need for good management to ensure successful delivery and sustainability because of the plethora of risks that have resulted in low-profit margins for contractors, cost and schedule overruns, poor quality delivery, and abandoned projects. This research reviewed Capitalization on Sustainable Risk Management. Questionnaires and oral interviews conducted were utilized as means of data collection. One hundred and ninety-eight (198) large construction firms in Nigeria form the population of this study. 15 (fifteen) companies that emanated from merger and acquisition were used for the study. The instruments used for data collection were a researcher-developed structured questionnaire based on a five-point rating scale, interviews, focus group discussion, and secondary sources (bill of quantities and stock and exchange commission). The instrument was validated by two experts in the field. The reliability of the instrument was established by applying the split-half method. Kendall’s coefficient of concordance was used to test the data, and a degree of agreement was obtained. Data were subjected to descriptive statistics and analyzed using analysis of variance, t-test, and SPSS. The identified impacts of capitalization were an increase in turnover (24.5%), improvement in the image (24.5%), risk reduction (20%), business expansion (17.3%), and geographical spread (13.6%). The study strongly advocates the inclusion of risk management evaluation as part of the construction procurement process.Keywords: capitalization, project delivery, risks, risk management, sustainability
Procedia PDF Downloads 577099 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies
Authors: Arun Prabhakar
Abstract:
Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling
Procedia PDF Downloads 1377098 Implementation of an Economic – Probabilistic Model to Risk Analysis of ERP Project in Technological Innovation Firms – A Case Study of ICT Industry in Iran
Authors: Reza Heidari, Maryam Amiri
Abstract:
In a technological world, many countries have a tendency to fortifying their companies and technological infrastructures. Also, one of the most important requirements for developing technology is innovation, and then, all companies are struggling to consider innovation as a basic principle. Since, the expansion of a product need to combine different technologies, therefore, different innovative projects would be run in the firms as a base of technology development. In such an environment, enterprise resource planning (ERP) has special significance in order to develop and strengthen of innovations. In this article, an economic-probabilistic analysis was provided to perform an implementation project of ERP in the technological innovation (TI) based firms. The used model in this article assesses simultaneously both risk and economic analysis in view of the probability of each event that is jointly between economical approach and risk investigation approach. To provide an economic-probabilistic analysis of risk of the project, activities and milestones in the cash flow were extracted. Also, probability of occurrence of each of them was assessed. Since, Resources planning in an innovative firm is the object of this project. Therefore, we extracted various risks that are in relation with innovative project and then they were evaluated in the form of cash flow. This model, by considering risks affecting the project and the probability of each of them and assign them to the project's cash flow categories, presents an adjusted cash flow based on Net Present Value (NPV) and with probabilistic simulation approach. Indeed, this model presented economic analysis of the project based on risks-adjusted. Then, it measures NPV of the project, by concerning that these risks which have the most effect on technological innovation projects, and in the following measures probability associated with the NPV for each category. As a result of application of presented model in the information and communication technology (ICT) industry, provided an appropriate analysis of feasibility of the project from the point of view of cash flow based on risk impact on the project. Obtained results can be given to decision makers until they can practically have a systematically analysis of the possibility of the project with an economic approach and as moderated.Keywords: cash flow categorization, economic evaluation, probabilistic, risk assessment, technological innovation
Procedia PDF Downloads 4037097 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices
Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman
Abstract:
The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.Keywords: hospital, light fidelity, Li-Fi, medical devices, security
Procedia PDF Downloads 1027096 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation
Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han
Abstract:
As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.Keywords: actuator, user authentication, security evaluation, haptic actuator
Procedia PDF Downloads 3447095 Spatial Distribution and Cluster Analysis of Sexual Risk Behaviors and STIs Reported by Chinese Adults in Guangzhou, China: A Representative Population-Based Study
Authors: Fangjing Zhou, Wen Chen, Brian J. Hall, Yu Wang, Carl Latkin, Li Ling, Joseph D. Tucker
Abstract:
Background: Economic and social reforms designed to open China to the world has been successful, but also appear to have rapidly laid the foundation for the reemergence of STIs since 1980s. Changes in sexual behaviors, relationships, and norms among Chinese contributed to the STIs epidemic. As the massive population moved during the last 30 years, early coital debut, multiple sexual partnerships, and unprotected sex have increased within the general population. Our objectives were to assess associations between residences location, sexual risk behaviors and sexually transmitted infections (STIs) among adults living in Guangzhou, China. Methods: Stratified cluster sampling followed a two-step process was used to select populations aged 18-59 years in Guangzhou, China. Spatial methods including Geographic Information Systems (GIS) were utilized to identify 1400 coordinates with latitude and longitude. Face-to-face household interviews were conducted to collect self-report data on sexual risk behaviors and diagnosed STIs. Kulldorff’s spatial scan statistic was implemented to identify and detect spatial distribution and clusters of sexual risk behaviors and STIs. The presence and location of statistically significant clusters were mapped in the study areas using ArcGIS software. Results: In this study, 1215 of 1400 households attempted surveys, with 368 refusals, resulting in a sample of 751 completed surveys. The prevalence of self-reported sexual risk behaviors was between 5.1% and 50.0%. The self-reported lifetime prevalence of diagnosed STIs was 7.06%. Anal intercourse clustered in an area located along the border within the rural-urban continuum (p=0.001). High rate clusters for alcohol or other drugs using before sex (p=0.008) and migrants who lived in Guangzhou less than one year (p=0.007) overlapped this cluster. Excess cases for sex without a condom (p=0.031) overlapped the cluster for college students (p<0.001). Conclusions: Short-term migrants and college students reported greater sexual risk behaviors. Programs to increase safer sex within these communities to reduce the risk of STIs are warranted in Guangzhou. Spatial analysis identified geographical clusters of sexual risk behaviors, which is critical for optimizing surveillance and targeting control measures for these locations in the future.Keywords: cluster analysis, migrant, sexual risk behaviors, spatial distribution
Procedia PDF Downloads 3407094 Mitigation of Risk Management Activities towards Accountability into Microfinance Environment: Malaysian Case Study
Authors: Nor Azlina A. Rahman, Jamaliah Said, Salwana Hassan
Abstract:
Prompt changes in global business environment, such as passionate competition, managerial/operational, changing governmental regulation and innovation in technology have significant impacts on the organizations. At present, global business environment demands for more proactive institutions on microfinance to provide an opportunity for the business success. Microfinance providers in Malaysia still accelerate its activities of funding by cash and cheque. These institutions are at high risk as the paper-based system is deemed to be slow and prone to human error, as well as requiring a major annual reconciliation process. The global transformation of financial services, growing involvement of technology, innovation and new business activities had progressively made risk management profile to be more subjective and diversified. The persistent, complex and dynamic nature of risk management activities in the institutions arise due to highly automated advancements of technology. This may thus manifest in a variety of ways throughout the financial services sector. This study seeks out to examine current operational risks management being experienced by microfinance providers in Malaysia; investigate the process of current practices on facilitator control factor mechanisms, and explore how the adoption of technology, innovation and use of management accounting practices would affect the risk management process of operation system in microfinance providers in Malaysia. A case study method was employed in this study. The case study also need to find that the vital past role of management accounting will be used for mitigation of risk management activities towards accountability as an information or guideline to microfinance provider. An empirical element obtainable with qualitative method is needed in this study, where multipart and in-depth information are essential to understand the issues of these institution phenomena. This study is expected to propose a theoretical model for implementation of technology, innovation and management accounting practices into the system of operation to improve internal control and subsequently lead to mitigation of risk management activities among microfinance providers to be more successful.Keywords: microfinance, accountability, operational risks, management accounting practices
Procedia PDF Downloads 4367093 World on the Edge: Migration and Cross Border Crimes in West Africa
Authors: Adeyemi Kamil Hamzah
Abstract:
The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation
Procedia PDF Downloads 2247092 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment
Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref
Abstract:
In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment
Procedia PDF Downloads 1787091 A Virtual Reality Simulation Tool for Reducing the Risk of Building Content during Earthquakes
Authors: Ali Asgary, Haopeng Zhou, Ghassem Tofighi
Abstract:
Use of virtual (VR), augmented reality (AR), and extended reality technologies for training and education has increased in recent years as more hardware and software tools have become available and accessible to larger groups of users. Similarly, the applications of these technologies in earthquake related training and education are on the rise. Several studies have reported promising results for the use of VR and AR for evacuation behaviour and training under earthquake situations. They simulate the impacts that earthquake has on buildings, buildings’ contents, and how building occupants and users can find safe spots or open paths to outside. Considering that considerable number of earthquake injuries and fatalities are linked to the behaviour, our goal is to use these technologies to reduce the impacts of building contents on people. Building on our artificial intelligence (AI) based indoor earthquake risk assessment application that enables users to use their mobile device to assess the risks associated with building contents during earthquakes, we develop a virtual reality application to demonstrate the behavior of different building contents during earthquakes, their associate moving, spreading, falling, and collapsing risks, and their risk mitigation methods. We integrate realistic seismic models, building contents behavior with and without risk mitigation measures in virtual reality environment. The application can be used for training of architects, interior design experts, and building users to enhance indoor safety of the buildings that can sustain earthquakes. This paper describes and demonstrates the application development background, structure, components, and usage.Keywords: virtual reality, earthquake damage, building content, indoor risks, earthquake risk mitigation, interior design, unity game engine, oculus
Procedia PDF Downloads 1027090 Extreme Value Modelling of Ghana Stock Exchange Indices
Authors: Kwabena Asare, Ezekiel N. N. Nortey, Felix O. Mettle
Abstract:
Modelling of extreme events has always been of interest in fields such as hydrology and meteorology. However, after the recent global financial crises, appropriate models for modelling of such rare events leading to these crises have become quite essential in the finance and risk management fields. This paper models the extreme values of the Ghana Stock Exchange All-Shares indices (2000-2010) by applying the Extreme Value Theory to fit a model to the tails of the daily stock returns data. A conditional approach of the EVT was preferred and hence an ARMA-GARCH model was fitted to the data to correct for the effects of autocorrelation and conditional heteroscedastic terms present in the returns series, before EVT method was applied. The Peak Over Threshold (POT) approach of the EVT, which fits a Generalized Pareto Distribution (GPD) model to excesses above a certain selected threshold, was employed. Maximum likelihood estimates of the model parameters were obtained and the model’s goodness of fit was assessed graphically using Q-Q, P-P and density plots. The findings indicate that the GPD provides an adequate fit to the data of excesses. The size of the extreme daily Ghanaian stock market movements were then computed using the Value at Risk (VaR) and Expected Shortfall (ES) risk measures at some high quantiles, based on the fitted GPD model.Keywords: extreme value theory, expected shortfall, generalized pareto distribution, peak over threshold, value at risk
Procedia PDF Downloads 5567089 The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues
Authors: Akram Waheb Nasef Alzordoky
Abstract:
The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases.Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures
Procedia PDF Downloads 217088 Determinants of International Volatility Passthroughs of Agricultural Commodities: A Panel Analysis of Developing Countries
Authors: Tetsuji Tanaka, Jin Guo
Abstract:
The extant literature has not succeeded in uncovering the common determinants of price volatility transmissions of agricultural commodities from international to local markets, and further, has rarely investigated the role of self-sufficiency measures in the context of national food security. We analyzed various factors to determine the degree of price volatility transmissions of wheat, rice, and maize between world and domestic markets using GARCH models with dynamic conditional correlation (DCC) specifications and panel-feasible generalized least square models. We found that the grain autarky system has the potential to diminish volatility pass-throughs for three grain commodities. Furthermore, it was discovered that the substitutive commodity consumption behavior between maize and wheat buffers the volatility transmissions of both, but rice does not function as a transmission-relieving element, either for the volatilities of wheat or maize. The effectiveness of grain consumption substitution to insulate the pass-throughs from global markets is greater than that of cereal self-sufficiency. These implications are extremely beneficial for developing governments to protect their domestic food markets from uncertainty in foreign countries and as such, improves food security.Keywords: food security, GARCH, grain self-sufficiency, volatility transmission
Procedia PDF Downloads 1537087 Risk Tolerance in Youth With Emerging Mood Disorders
Authors: Ange Weinrabe, James Tran, Ian B. Hickie
Abstract:
Risk-taking behaviour is common during youth. In the time between adolescence and early adulthood, young people (aged 15-25 years) are more vulnerable to mood disorders, such as anxiety and depression. What impact does an emerging mood disorder have on decision-making in youth at critical decision points in their lives? In this article, we explore the impact of risk and ambiguity on youth decision-making in a clinical setting using a well-known economic experiment. At two time points, separated by six to eight weeks, we measured risky and ambiguous choices concurrently with findings from three psychological questionnaires, the 10-item Kessler Psychological Distress Scale (K10), the 17-item Quick Inventory of Depressive Symptomatology Adolescent Version (QIDS-A17), and the 12-item Somatic and Psychological Health Report (SPHERE-12), for young help seekers aged 16-25 (n=30, mean age 19.22 years, 19 males). When first arriving for care, we found that 50% (n=15) of participants experienced severe anxiety (K10 ≥ 30) and were severely depressed (QIDS-A17 ≥ 16). In Session 2, taking attrition rates into account (n=5), we found that 44% (n=11) remained severe across the full battery of questionnaires. When applying multiple regression analyses of the pooled sample of observations (N=55), across both sessions, we found that participants who rated severely anxious avoided making risky decisions. We suggest there is some statistically significant (although weak) (p=0.09) relation between risk and severe anxiety scores as measured by K10. Our findings may support working with novel tools with which to evaluate youth experiencing an emerging mood disorder and their cognitive capacities influencing decision-making.Keywords: anxiety, decision-making, risk, adolescence
Procedia PDF Downloads 1157086 Existence of Systemic Risk in Turkish Banking Sector: An Evidence from Return Distributions
Authors: İlhami Karahanoglu, Oguz Ceylan
Abstract:
As its well-known definitions; systemic risk refers to whole economic system down-turn movement even collapse together in very severe cases. In fact, it points out the contagion effects of the defaults. Such a risk is can be depicted with the famous Chinese game of falling domino stones. During and after the Bear & Sterns and Lehman Brothers cases, it was well understood that there is a very strong effect of systemic risk in financial services sector. In this study, we concentrate on the existence of systemic risk in Turkish Banking Sector based upon the Halkbank Case during the end month of 2013; there was a political turmoil in Turkey in which the close relatives of the upper politicians were involved in illegal trading activities. In that operation, the CEO of Halkbank was also arrested and in investigation, Halkbank was considered as part of such illegal actions. That operation had an impact on Halkbanks stock value. The Halkbank stock value during that time interval decreased remarkably, the distributional profile of stock return changed and became more volatile as well as more skewed. In this study, the daily returns of 5 leading banks in Turkish banking sector were used to obtain 48 return distributions (for each month, 90-days-back stock value returns are used) of 5 banks for the period 12/2011-12/2013 (pre operation period) and 12/2013-12/2015 (post operation period). When those distributions are compared with timely manner, interestingly; the distribution of the 5 other leading banks in Turkey, public or private, had also distribution profiles which was different from the past 2011-2013 period just like Halkbank. Those 5 big banks, whose stock values are monitored with sub index in Istanbul stock exchange (BIST) as BN10, had more skewed distribution just following the Halkbank stock return movement during the post operation period, with lover mean value and as well higher volatility. In addition, the correlation between the stock value return distributions of the leading banks after Halkbank case, where the returns are more skewed to the left, increased (which is measured in monthly base before and after the operation). The dependence between those banks was stronger under the case where the stock values were falling compared with the normal market condition. Such distributional effect of stock returns between the leading banks in Turkey, which is valid for down sub-market (financial/banking sector) condition, can be evaluated as an evidence for the existence of contagious effect and systemic risk.Keywords: financial risk, systemic risk, banking sector, return distribution, dependency structure
Procedia PDF Downloads 2957085 Evaluating Climate Risks to Enhance Resilience in Durban, South Africa
Authors: Cabangile Ncengeni Ngwane, Gerald Mills
Abstract:
Anthropogenic climate change is exacerbating natural hazards such as droughts, heat waves and sea-level rise. The associated risks are the greatest in places where socio-ecological systems are exposed to these changes and the populations and infrastructure are vulnerable. Identifying the communities at risk and enhancing local resilience are key issues in responding to the current and project climate changes. This paper explores the types of risks associated with multiple overlapping hazards in Durban, South Africa where the social, cultural and economic dimensions that contribute to exposure and vulnerability are compounded by its history of apartheid. As a result, climate change risks are highly concentrated in marginalized communities that have the least adaptive capacity. In this research, a Geographic Information System is to explore the spatial correspondence among geographic layers representing hazards, exposure and vulnerability across Durban. This quantitative analysis will allow authors to identify communities at high risk and focus our study on the nature of the current human-environment relationships that result in risk inequalities. This work will employ qualitative methods to critically examine policies (including educational practices and financial support systems) and on-the-ground actions that are designed to improve the adaptive capacity of these communities and meet UN Sustainable Development Goals. This work will contribute to a growing body of literature on disaster risk management, especially as it relates to developing economies where socio-economic inequalities are correlated with ethnicity and race.Keywords: adaptive capacity, disaster risk reduction, exposure, resilience, South Africa
Procedia PDF Downloads 1487084 Stuttering Persistence in Children: Effectiveness of the Psicodizione Method in a Small Italian Cohort
Authors: Corinna Zeli, Silvia Calati, Marco Simeoni, Chiara Comastri
Abstract:
Developmental stuttering affects about 10% of preschool children; although the high percentage of natural recovery, a quarter of them will become an adult who stutters. An effective early intervention should help those children with high persistence risk for the future. The Psicodizione method for early stuttering is an Italian behavior indirect treatment for preschool children who stutter in which method parents act as good guides for communication, modeling their own fluency. In this study, we give a preliminary measure to evaluate the long-term effectiveness of Psicodizione method on stuttering preschool children with a high persistence risk. Among all Italian children treated with the Psicodizione method between 2018 and 2019, we selected 8 kids with at least 3 high risk persistence factors from the Illinois Prediction Criteria proposed by Yairi and Seery. The factors chosen for the selection were: one parent who stutters (1pt mother; 1.5pt father), male gender, ≥ 4 years old at onset; ≥ 12 months from onset of symptoms before treatment. For this study, the families were contacted after an average period of time of 14,7 months (range 3 - 26 months). Parental reports were gathered with a standard online questionnaire in order to obtain data reflecting fluency from a wide range of the children’s life situations. The minimum worthwhile outcome was set at "mild evidence" in a 5 point Likert scale (1 mild evidence- 5 high severity evidence). A second group of 6 children, among those treated with the Piscodizione method, was selected as high potential for spontaneous remission (low persistence risk). The children in this group had to fulfill all the following criteria: female gender, symptoms for less than 12 months (before treatment), age of onset <4 years old, none of the parents with persistent stuttering. At the time of this follow-up, the children were aged 6–9 years, with a mean of 15 months post-treatment. Among the children in the high persistence risk group, 2 (25%) hadn’t had stutter anymore, and 3 (37,5%) had mild stutter based on parental reports. In the low persistency risk group, the children were aged 4–6 years, with a mean of 14 months post-treatment, and 5 (84%) hadn’t had stutter anymore (for the past 16 months on average).62,5% of children at high risk of persistence after Psicodizione treatment showed mild evidence of stutter at most. 75% of parents confirmed a better fluency than before the treatment. The low persistence risk group seemed to be representative of spontaneous recovery. This study’s design could help to better evaluate the success of the proposed interventions for stuttering preschool children and provides a preliminary measure of the effectiveness of the Psicodizione method on high persistence risk children.Keywords: early treatment, fluency, preschool children, stuttering
Procedia PDF Downloads 2147083 The Diet Adherence in Cardiovascular Disease Risk Factors Patients in the North of Iran Based on the Mediterranean Diet Adherence
Authors: Marjan Mahdavi-Roshan, Arsalan Salari, Mahboobeh Gholipour, Moona Naghshbandi
Abstract:
Background and objectives: Before any nutritional intervention, it is necessary to have the prospect of eating habits of people with cardiovascular risk factors. In this study, we assessed the adherence of healthy diet based on Mediterranean dietary pattern and related factors in adults in the north of Iran. Methods: This study was conducted on 550 men and women with cardiovascular risk factors that referred to Heshmat hospital in Rasht, northern Iran. Information was collected by interview and reading medical history and measuring anthropometric indexes. The Mediterranean Diet Adherence Screener was used for assessing dietary adherence, this screener was modified according to religious beliefs and culture of Iran. Results: The mean age of participants was 58±0.38 years. The mean of body mass index was 27±0.01 kg/m2, and the mean of waist circumference was 98±0.2 cm. The mean of dietary adherence was 5.76±0.07. 45% of participants had low adherence, and just 4% had suitable adherence. The mean of dietary adherence in men was significantly higher than women (p=0. 07). Participants in rural area and high educational participants insignificantly had an unsuitable dietary Adherence. There was no significant association between some cardiovascular disease risk factors and dietary adherence. Conclusion: Education to different group about dietary intake correction and using a Mediterranean dietary pattern that is similar to dietary intake in the north of Iran, for controlling cardiovascular disease is necessary.Keywords: dietary adherence, Mediterranean dietary pattern, cardiovascular disease, north of Iran
Procedia PDF Downloads 2517082 Study of Components and Effective Factors on Organizational Commitment of Khoramabad Branchs Islamic Azad University’s Faculty Members
Authors: Mehry Daraei
Abstract:
The goal of this study was to survey the components and affective factors on organizational commitment of Islamic Azad university Khoramabad Baranch’s faculty members. The research method was correlation by causal modeling and data were gathered by questionnaire. Statistical society consisted of 147 faculty members in Islamic Azad University Khoramabad Branch and sample size was determined as 106 persons by Morgan’s sample table that were selected by class sampling. Correlation test, T-single group test and path analysis test were used for analysis of data. Data were analyzed by Lisrel software. The results showed that organizational corporate was the most effective element on organizational commitment and organizational corporate, experience work and organizational justice were only in direct relation with organizational commitment. Also, job security had direct and indirect effect on OC. Job security had effect on OC by gender. Gender variable had direct and indirect effect on OC. Gender had effect on OC by organizational corporate. Job opportunities out of university also had direct and indirect effect on OC, which means job opportunities had indirect effect on OC by organizational corporate.Keywords: organization, commitment, job security, Islamic Azad University
Procedia PDF Downloads 3217081 Secure Transfer of Medical Images Using Hybrid Encryption
Authors: Boukhatem Mohamed Belkaid, Lahdi Mourad
Abstract:
In this paper, we propose a new encryption system for security issues medical images. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity, and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every new session of encryption, that will be used to encrypt each frame of the medical image basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, medical images, encryption, decryption, key, correlation
Procedia PDF Downloads 4417080 A Method To Assess Collaboration Using Perception of Risk from the Architectural Engineering Construction Industry
Authors: Sujesh F. Sujan, Steve W. Jones, Arto Kiviniemi
Abstract:
The use of Building Information Modelling (BIM) in the Architectural-Engineering-Construction (AEC) industry is a form of systemic innovation. Unlike incremental innovation, (such as the technological development of CAD from hand based drawings to 2D electronically printed drawings) any form of systemic innovation in Project-Based Inter-Organisational Networks requires complete collaboration and results in numerous benefits if adopted and utilised properly. Proper use of BIM involves people collaborating with the use of interoperable BIM compliant tools. The AEC industry globally has been known for its adversarial and fragmented nature where firms take advantage of one another to increase their own profitability. Due to the industry’s nature, getting people to collaborate by unifying their goals is critical to successful BIM adoption. However, this form of innovation is often being forced artificially in the old ways of working which do not suit collaboration. This may be one of the reasons for its low global use even though the technology was developed more than 20 years ago. Therefore, there is a need to develop a metric/method to support and allow industry players to gain confidence in their investment into BIM software and workflow methods. This paper departs from defining systemic risk as a risk that affects all the project participants at a given stage of a project and defines categories of systemic risks. The need to generalise is to allow method applicability to any industry where the category will be the same, but the example of the risk will depend on the industry the study is done in. The method proposed seeks to use individual perception of an example of systemic risk as a key parameter. The significance of this study lies in relating the variance of individual perception of systemic risk to how much the team is collaborating. The method bases its notions on the claim that a more unified range of individual perceptions would mean a higher probability that the team is collaborating better. Since contracts and procurement devise how a project team operates, the method could also break the methodological barrier of highly subjective findings that case studies inflict, which has limited the possibility of generalising between global industries. Since human nature applies in all industries, the authors’ intuition is that perception can be a valuable parameter to study collaboration which is essential especially in projects that utilise systemic innovation such as BIM.Keywords: building information modelling, perception of risk, systemic innovation, team collaboration
Procedia PDF Downloads 184