Search results for: fall risk
5056 A Risk Assessment for the Small Hive Beetle Based on Meteorological Standard Measurements
Authors: J. Junk, M. Eickermann
Abstract:
The Small Hive Beetle, Aethina tumida (Coleoptera: Nitidulidae) is a parasite for honey bee colonies, Apis mellifera, and was recently introduced to the European continent, accidentally. Based on the literature, a model was developed by using regional meteorological variables (daily values of minimum, maximum and mean air temperature as well as mean soil temperature at 50 mm depth) to calculate the time-point of hive invasion by A. tumida in springtime, the development duration of pupae as well as the number of generations of A. tumida per year. Luxembourg was used as a test region for our model for 2005 to 2013. The model output indicates a successful surviving of the Small Hive Beetle in Luxembourg with two up to three generations per year. Additionally, based on our meteorological data sets a first migration of SHB to apiaries can be expected from mid of March up to April. Our approach can be transferred easily to other countries to estimate the risk potential for a successful introduction and spreading of A. tumida in Western Europe.Keywords: Aethina tumida, air temperature, larval development, soil temperature
Procedia PDF Downloads 1155055 Using the Structural Equation Model to Explain the Effect of Supervisory Practices on Regulatory Density
Authors: Jill Round
Abstract:
In the economic system, the financial sector plays a crucial role as an intermediary between market participants, other financial institutions, and customers. Financial institutions such as banks have to make decisions to satisfy the demands of all the participants by keeping abreast of regulatory change. In recent years, progress has been made regarding frameworks, development of rules, standards, and processes to manage risks in the banking sector. The increasing focus of regulators and policymakers placed on risk management, corporate governance, and the organization’s culture is of special interest as it requires a well-resourced risk controlling function, compliance function, and internal audit function. In the past years, the relevance of these functions that make up the so-called Three Lines of Defense has moved from the backroom to the boardroom. The approach of the model can vary based on the various organizational characteristics. Due to the intense regulatory requirements, organizations operating in the financial sector have more mature models. In less regulated industries there is more cloudiness about what tasks are allocated where. All parties strive to achieve their objectives through the effective management of risks and serve the identical stakeholders. Today, the Three Lines of Defense model is used throughout the world. The research looks at trends and emerging issues in the professions of the Three Lines of Defense within the banking sector. The answers are believed to helping to explain the increasing regulatory requirements for the banking sector. While the number of supervisory practices increases the risk management requirements intensify and demand more regulatory compliance at the same time. The Structural Equation Modeling (SEM) is applied by making use of conducted surveys in the research field. It aims to describe (i) the theoretical model regarding the applicable linearity relationships, (ii) the causal relationship between multiple predictors (exogenous) and multiple dependent variables (endogenous), (iii) taking into consideration the unobservable variables and (iv) the measurement errors. The surveys conducted on the research field suggest that the observable variables are caused by various latent variables. The SEM consists of the 1) measurement model and the 2) structural model. There is a detectable correlation regarding the cause-effect relationship among the performed supervisory practices and the increasing scope of regulation. Supervisory practices reinforce the regulatory density. In the past, controls were placed after supervisory practices were conducted or incidents occurred. In further research, it is of interest to examine, whether risk management is proactive, reactive to incidents and supervisory practices or can be both at the same time.Keywords: risk management, structural equation model, supervisory practice, three lines of defense
Procedia PDF Downloads 2235054 Objective and Subjective Preconditions for Entrepreneurship: From the Point of View of Enterprise Risk Management
Authors: Maria Luskova, Maria Hudakova, Katarina Buganova
Abstract:
Established objective and subjective preconditions for entrepreneurship, forming the business organically related whole, are the necessary condition of successful entrepreneurial activities. Objective preconditions for entrepreneurship are developed by the market economy that should stimulate entrepreneurship by allowing the use of economic opportunities for all those who want to do business in respective field while providing guarantees to all owners and creating a stable business environment for entrepreneurs. Subjective preconditions of entrepreneurship are formed primarily by personal characteristics of the entrepreneur. These are his properties, abilities, skills, physiological, and psychological preconditions which may be inherited, inborn or sequentially developed and obtained during his life on the basis of education and influences of surrounding environment. The paper is dealing with issues of objective and subjective preconditions for entrepreneurship and provides their analysis in view of the current situation in Slovakia. It presents risks of the business environment in Slovakia that the Slovak managers considered the most significant in 2014 and defines the dominant attributes of the entrepreneur in the current business environment in Slovakia.Keywords: entrepreneurship, innovations, opportunity, risk, uncertainty
Procedia PDF Downloads 5215053 Public Preferences for Lung Cancer Screening in China: A Discrete Choice Experiment
Authors: Zixuan Zhao, Lingbin Du, Le Wang, Youqing Wang, Yi Yang, Jingjun Chen, Hengjin Dong
Abstract:
Objectives: Few results from public attitudes for lung cancer screening are available both in China and abroad. This study aimed to identify preferred lung cancer screening modalities in a Chinese population and predict uptake rates of different modalities. Materials and Methods: A discrete choice experiment questionnaire was administered to 392 Chinese individuals aged 50–74 years who were at high risk for lung cancer. Each choice set had two lung screening options and an option to opt-out, and respondents were asked to choose the most preferred one. Both mixed logit analysis and stepwise logistic analysis were conducted to explore whether preferences were related to respondent characteristics and identify which kinds of respondents were more likely to opt out of any screening. Results: On mixed logit analysis, attributes that were predictive of choice at 1% level of statistical significance included the screening interval, screening venue, and out-of-pocket costs. The preferred screening modality seemed to be screening by low-dose computed tomography (LDCT) + blood test once a year in a general hospital at a cost of RMB 50; this could increase the uptake rate by 0.40 compared to the baseline setting. On stepwise logistic regression, those with no endowment insurance were more likely to opt out; those who were older and housewives/househusbands, and those with a health check habit and with commercial endowment insurance were less likely to opt out from a screening programme. Conclusions: There was considerable variance between real risk and self-perceived risk of lung cancer among respondents, and further research is required in this area. Lung cancer screening uptake can be increased by offering various screening modalities, so as to help policymakers further design the screening modality.Keywords: lung cancer, screening, China., discrete choice experiment
Procedia PDF Downloads 2585052 Intrusion Detection Using Dual Artificial Techniques
Authors: Rana I. Abdulghani, Amera I. Melhum
Abstract:
With the abnormal growth of the usage of computers over networks and under the consideration or agreement of most of the computer security experts who said that the goal of building a secure system is never achieved effectively, all these points led to the design of the intrusion detection systems(IDS). This research adopts a comparison between two techniques for network intrusion detection, The first one used the (Particles Swarm Optimization) that fall within the field (Swarm Intelligence). In this Act, the algorithm Enhanced for the purpose of obtaining the minimum error rate by amending the cluster centers when better fitness function is found through the training stages. Results show that this modification gives more efficient exploration of the original algorithm. The second algorithm used a (Back propagation NN) algorithm. Finally a comparison between the results of two methods used were based on (NSL_KDD) data sets for the construction and evaluation of intrusion detection systems. This research is only interested in clustering the two categories (Normal and Abnormal) for the given connection records. Practices experiments result in intrude detection rate (99.183818%) for EPSO and intrude detection rate (69.446416%) for BP neural network.Keywords: IDS, SI, BP, NSL_KDD, PSO
Procedia PDF Downloads 3825051 Achieving Design-Stage Elemental Cost Planning Accuracy: Case Study of New Zealand
Authors: Johnson Adafin, James O. B. Rotimi, Suzanne Wilkinson, Abimbola O. Windapo
Abstract:
An aspect of client expenditure management that requires attention is the level of accuracy achievable in design-stage elemental cost planning. This has been a major concern for construction clients and practitioners in New Zealand (NZ). Pre-tender estimating inaccuracies are significantly influenced by the level of risk information available to estimators. Proper cost planning activities should ensure the production of a project’s likely construction costs (initial and final), and subsequent cost control activities should prevent unpleasant consequences of cost overruns, disputes and project abandonment. If risks were properly identified and priced at the design stage, observed variance between design-stage elemental cost plans (ECPs) and final tender sums (FTS) (initial contract sums) could be reduced. This study investigates the variations between design-stage ECPs and FTS of construction projects, with a view to identifying risk factors that are responsible for the observed variance. Data were sourced through interviews, and risk factors were identified by using thematic analysis. Access was obtained to project files from the records of study participants (consultant quantity surveyors), and document analysis was employed in complementing the responses from the interviews. Study findings revealed the discrepancies between ECPs and FTS in the region of -14% and +16%. It is opined in this study that the identified risk factors were responsible for the variability observed. The values obtained from the analysis would enable greater accuracy in the forecast of FTS by Quantity Surveyors. Further, whilst inherent risks in construction project developments are observed globally, these findings have important ramifications for construction projects by expanding existing knowledge on what is needed for reasonable budgetary performance and successful delivery of construction projects. The findings contribute significantly to the study by providing quantitative confirmation to justify the theoretical conclusions generated in the literature from around the world. This therefore adds to and consolidates existing knowledge.Keywords: accuracy, design-stage, elemental cost plan, final tender sum
Procedia PDF Downloads 2685050 A Discrete Logit Survival Model with a Smooth Baseline Hazard for Age at First Alcohol Intake among Students at Tertiary Institutions in Thohoyandou, South Africa
Authors: A. Bere, H. G. Sithuba, K. Kyei, C. Sigauke
Abstract:
We employ a discrete logit survival model to investigate the risk factors for early alcohol intake among students at two tertiary institutions in Thohoyandou, South Africa. Data were collected from a sample of 744 students using a self-administered questionnaire. Significant covariates were arrived at through a regularization algorithm implemented using the glmmLasso package. The tuning parameter was determined using a five-fold cross-validation algorithm. The baseline hazard was modelled as a smooth function of time through the use of spline functions. The results show that the hazard of initial alcohol intake peaks at the age of about 16 years and that at any given time, being of a male gender, prior use of other drugs, having drinking peers, having experienced negative life events and physical abuse are associated with a higher risk of alcohol intake debut.Keywords: cross-validation, discrete hazard model, LASSO, smooth baseline hazard
Procedia PDF Downloads 1895049 Evaluation of the Environmental Risk from the Co-Deposition of Waste Rock Material and Fly Ash
Authors: A. Mavrikos, N. Petsas, E. Kaltsi, D. Kaliampakos
Abstract:
The lignite-fired power plants in the Western Macedonia Lignite Center produce more than 8 106 t of fly ash per year. Approximately 90% of this quantity is used for restoration-reclamation of exhausted open-cast lignite mines and slope stabilization of the overburden. The purpose of this work is to evaluate the environmental behavior of the mixture of waste rock and fly ash that is being used in the external deposition site of the South Field lignite mine. For this reason, a borehole was made within the site and 86 samples were taken and subjected to chemical analyses and leaching tests. The results showed very limited leaching of trace elements and heavy metals from this mixture. Moreover, when compared to the limit values set for waste acceptable in inert waste landfills, only few excesses were observed, indicating only minor risk for groundwater pollution. However, due to the complexity of both the leaching process and the contaminant pathway, more boreholes and analyses should be made in nearby locations and a systematic groundwater monitoring program should be implemented both downstream and within the external deposition site.Keywords: co-deposition, fly ash, leaching tests, lignite, waste rock
Procedia PDF Downloads 2375048 Disaster Preparedness for Academic Libraries in Malaysia: An Exploratory Study
Authors: Siti Juryiah Mohd Khalid, Norazlina Dol
Abstract:
Academic libraries in Malaysia are still not prepared for disaster even though several occasions have been reported. The study sets out to assess the current status of preparedness in disaster management among Malaysian academic libraries in the State of Selangor and the Federal Territory of Kuala Lumpur. To obtain a base level of knowledge on disaster preparedness of current practices, a questionnaire was distributed to chief librarians or their assignees in charge of disaster or emergency preparedness at 40 academic libraries and 34 responses were received. The study revolved around the current status of preparedness, on various issues including existence of disaster preparedness plan among academic libraries in Malaysia, disaster experiences by the academic libraries, funding, risk assessment activities and involvement of library staff in disaster management. Frequency and percentage tables were used in the analysis of the data collected. Some of the academic libraries under study have experienced one form of disaster or the other. Most of the academic libraries do not have a written disaster preparedness plan. The risk assessments and staff involvement in disaster preparedness by these libraries were generally adequate.Keywords: academic libraries, disaster preparedness plan, disaster management, emergency plan
Procedia PDF Downloads 3605047 Exploring Exposed Political Economy in Disaster Risk Reduction Efforts in Bangladesh
Authors: Shafiqul Islam, Cordia Chu
Abstract:
Bangladesh is one of the most vulnerable countries to climate related disasters such as flood and cyclone. Exploring from the semi-structured in-depth interviews of 38 stakeholders and literature review, this study examined the public spending distribution process in DRR. This paper demonstrates how the processes of political economy-enclosure, exclusion, encroachment, and entrenchment hinder the Disaster Risk Reduction (DRR) efforts of Department of Disaster Management (DDM) such as distribution of flood centres, cyclone centres and 40 days employment generation programs. Enclosure refers to when DRR projects allocated to less vulnerable areas or expand the roles of influencing actors into the public sphere. Exclusion refers to when DRR projects limit affected people’s access to resources or marginalize particular stakeholders in decision-making activities. Encroachment refers to when allocation of DRR projects and selection of location and issues degrade the environmental affect or contribute to other forms of disaster risk. Entrenchment refers to when DRR projects aggravate the disempowerment of common people worsen the concentrations of wealth and income inequality within a community. In line with United Nations (UN) Sustainable Development Goals (SDGs), Hyogo and Sendai Frameworks, in the case of Bangladesh, DRR policies implemented under the country’s national five-year plan, disaster-related acts and rules. These policies and practices have somehow enabled influential-elites to mobilize and distribute resources through bureaucracies. Exclusionary forms of fund distribution of DRR exist at both the national and local scales. DRR related allocations have encroached through the low land areas development project without consulting local needs. Most severely, DRR related unequal allocations have entrenched social class trapping the backward communities vulnerable to climate related disasters. Planners and practitioners of DRR need to take necessary steps to eliminate the potential risks from the processes of enclosure, exclusion, encroachment, and entrenchment happens in project fund allocations.Keywords: Bangladesh, disaster risk reduction, fund distribution, political economy
Procedia PDF Downloads 1295046 Rollet vs Rocket: A New in-Space Propulsion Concept
Authors: Arthur Baraov
Abstract:
Nearly all rocket and spacecraft propulsion concepts in existence today can be linked one way or the other to one of the two ancient warfare devices: the gun and the sling. Chemical, thermoelectric, ion, nuclear thermal and electromagnetic rocket engines – all fall into the first group which, for obvious reasons, can be categorized as “hot” space propulsion concepts. Space elevator, orbital tower, rolling satellite, orbital skyhook, tether propulsion and gravitational assist – are examples of the second category which lends itself for the title “cold” space propulsion concepts. The “hot” space propulsion concepts skyrocketed – literally and figuratively – from the naïve ideas of Jules Verne to the manned missions to the Moon. On the other hand, with the notable exception of gravitational assist, hardly any of the “cold” space propulsion concepts made any progress in terms of practical application. Why is that? This article aims to show that the right answer to this question has the potential comparable by its implications and practical consequences to that of transition from Jules Verne’s stillborn and impractical conceptions of space flight to cogent and highly fertile ideas of Konstantin Tsiolkovsky and Yuri Kondratyuk.Keywords: propulsion, rocket, rollet, spacecraft
Procedia PDF Downloads 5365045 Effects of Blood Pressure According to Age on End-Stage Renal Disease Development in Diabetes Mellitus Patients: A Nationwide Population-Based Cohort Study
Authors: Eun Hui Bae, Sang Yeob Lim, Bongseong Kim, Tae Ryom Oh, Su Hyun Song, Sang Heon Suh, Hong Sang Choi, Eun Mi Yang, Chang Seong Kim, Seong Kwon Ma, Kyung-Do Han, Soo Wan Kim
Abstract:
Background: Recent hypertension guidelines have recommended lower blood pressure (BP) targets in high-risk patients. However, there are no specific guidelines based on age or systolic and diastolic blood pressure (SBP and DBP, respectively). We aimed to assess the effects of age-related BP on the development of end-stage renal disease (ESRD) in patients with diabetes. Methods: A total of 2,563,870 patients with DM aged >20 years were selected from the Korean National Health Screening Program from 2009 to 2012 and followed up until the end of 2019. Participants were categorized into age and BP groups, and the hazard ratios (HRs) for ESRD were calculated. Results: During a median follow-up of 7.15 years, the incidence rates of ESRD increased with increasing SBP and DBP. The HR for ESRD was the highest in patients younger than 40 years of age with DBP ≥ 100 mmHg. The effect of SBP and DBP on ESRD development was attenuated with age (interaction p-value was <0.0001 for age and SBP and 0.0022 for age and DBP). The subgroup analysis for sex, anti-hypertension medication, and history of chronic kidney disease (CKD) showed higher HRs for ESRD among males younger than 40 years, not taking anti-hypertension medications and CKD compared to those among females older than 40 years, anti-hypertension medication and non-CKD groups. Conclusions: Higher SBP and DBP increase the risk of developing ESRD in patients with diabetes, and in particular, younger individuals face greater risk. Therefore, intensive BP management is warranted in younger patients to prevent ESRD.Keywords: hypertension, young adult, end-stage renal disease, diabetes mellitus, chronic kidney disease, blood pressure
Procedia PDF Downloads 1245044 Auto Rickshaw Impacts with Pedestrians: A Computational Analysis of Post-Collision Kinematics and Injury Mechanics
Authors: A. J. Al-Graitti, G. A. Khalid, P. Berthelson, A. Mason-Jones, R. Prabhu, M. D. Jones
Abstract:
Motor vehicle related pedestrian road traffic collisions are a major road safety challenge, since they are a leading cause of death and serious injury worldwide, contributing to a third of the global disease burden. The auto rickshaw, which is a common form of urban transport in many developing countries, plays a major transport role, both as a vehicle for hire and for private use. The most common auto rickshaws are quite unlike ‘typical’ four-wheel motor vehicle, being typically characterised by three wheels, a non-tilting sheet-metal body or open frame construction, a canvas roof and side curtains, a small drivers’ cabin, handlebar controls and a passenger space at the rear. Given the propensity, in developing countries, for auto rickshaws to be used in mixed cityscapes, where pedestrians and vehicles share the roadway, the potential for auto rickshaw impacts with pedestrians is relatively high. Whilst auto rickshaws are used in some Western countries, their limited number and spatial separation from pedestrian walkways, as a result of city planning, has not resulted in significant accident statistics. Thus, auto rickshaws have not been subject to the vehicle impact related pedestrian crash kinematic analyses and/or injury mechanics assessment, typically associated with motor vehicle development in Western Europe, North America and Japan. This study presents a parametric analysis of auto rickshaw related pedestrian impacts by computational simulation, using a Finite Element model of an auto rickshaw and an LS-DYNA 50th percentile male Hybrid III Anthropometric Test Device (dummy). Parametric variables include auto rickshaw impact velocity, auto rickshaw impact region (front, centre or offset) and relative pedestrian impact position (front, side and rear). The output data of each impact simulation was correlated against reported injury metrics, Head Injury Criterion (front, side and rear), Neck injury Criterion (front, side and rear), Abbreviated Injury Scale and reported risk level and adds greater understanding to the issue of auto rickshaw related pedestrian injury risk. The parametric analyses suggest that pedestrians are subject to a relatively high risk of injury during impacts with an auto rickshaw at velocities of 20 km/h or greater, which during some of the impact simulations may even risk fatalities. The present study provides valuable evidence for informing a series of recommendations and guidelines for making the auto rickshaw safer during collisions with pedestrians. Whilst it is acknowledged that the present research findings are based in the field of safety engineering and may over represent injury risk, compared to “Real World” accidents, many of the simulated interactions produced injury response values significantly greater than current threshold curves and thus, justify their inclusion in the study. To reduce the injury risk level and increase the safety of the auto rickshaw, there should be a reduction in the velocity of the auto rickshaw and, or, consideration of engineering solutions, such as retro fitting injury mitigation technologies to those auto rickshaw contact regions which are the subject of the greatest risk of producing pedestrian injury.Keywords: auto rickshaw, finite element analysis, injury risk level, LS-DYNA, pedestrian impact
Procedia PDF Downloads 1935043 Software Verification of Systematic Resampling for Optimization of Particle Filters
Authors: Osiris Terry, Kenneth Hopkinson, Laura Humphrey
Abstract:
Systematic resampling is the most popularly used resampling method in particle filters. This paper seeks to further the understanding of systematic resampling by defining a formula made up of variables from the sampling equation and the particle weights. The formula is then verified via SPARK, a software verification language. The verified systematic resampling formula states that the minimum/maximum number of possible samples taken of a particle is equal to the floor/ceiling value of particle weight divided by the sampling interval, respectively. This allows for the creation of a randomness spectrum that each resampling method can fall within. Methods on the lower end, e.g., systematic resampling, have less randomness and, thus, are quicker to reach an estimate. Although lower randomness allows for error by having a larger bias towards the size of the weight, having this bias creates vulnerabilities to the noise in the environment, e.g., jamming. Conclusively, this is the first step in characterizing each resampling method. This will allow target-tracking engineers to pick the best resampling method for their environment instead of choosing the most popularly used one.Keywords: SPARK, software verification, resampling, systematic resampling, particle filter, tracking
Procedia PDF Downloads 825042 Impact of Tuberculosis Co-infection on Cytokine Expression in HIV-Infected Individuals
Authors: M. Nosik, I. Rymanova, N. Adamovich, S. Sevostyanihin, K. Ryzhov, Y. Kuimova, A. Kravtchenko, N. Sergeeva, A. Sobkin
Abstract:
HIV and Tuberculosis (TB) infections each speed the other's progress. HIV-infection increases the risk of TB disease. At the same time, TB infection is associated with clinical progression of HIV-infection. HIV+TB co-infected patients are also at higher risk of acquiring new opportunistic infections. An important feature of disease progression and clinical outcome is the innate and acquired immune responses. HIV and TB, however, have a spectrum of dysfunctions of the immune response. As cytokines play a crucial role in the immunopathology of both infections, it is important to study immune interactions in patients with dual infection HIV+TB. Plasma levels of proinflammatory cytokines IL-2, IFN-γ and immunoregulating cytokines IL-4, IL-10 were evaluated in 75 patients with dual infection HIV+TB, 58 patients with HIV monoinfection and 50 patients with TB monoinfection who were previously naïve for HAART. The decreased levels of IL-2, IFN-γ, IL-4 and IL-10 were observed in patients with dual infection HIV+TB in comparison with patients who had only HIV or TB which means the profound suppression of Th1 and Th2 cytokine secretion. Thus, those cytokines could possibly serve as immunological markers of progression of HIV-infection in patients with TB.Keywords: HIV, tuberculosis (TB), HIV associated with TB, Th1/ Th2 cytokine expression
Procedia PDF Downloads 3625041 Syndrome of Irreversible Lithium-Effectuated Neurotoxicity: Case Report and Review of Literature
Authors: David J. Thomson, Joshua C. J. Chew
Abstract:
Background: Syndrome of Irreversible Lithium-Effectuated Neurotoxicity (SILENT) is a rare complication of lithium toxicity that typically causes irreversible cerebellar dysfunction. These patients may require hemodialysis and extensive supports in the intensive care. Methods: A review was performed on the available literature of SILENT with a focus on current pathophysiological hypotheses and advances in treatment. Articles were restricted to the English language. Results: Although the exact mechanism is unclear, CNS demyelination, especially in the cerebellum, was seen on the brain biopsies of a proportion of patients. There is no definitive management of SILENT but instead current management is focused on primary and tertiary prevention – detection of those at risk, and rehabilitation post onset of neurological deficits. Conclusions: This review draws conclusions from a limited amount of available literature, most of which are isolated case reports. Greater awareness of SILENT and further investigation into the risk factors and pathogenesis are required so this serious and irreversible syndrome may be avoided.Keywords: lithium toxicity, pathogenesis, SILENT, syndrome of irreversible lithium-effectuated neurotoxicity
Procedia PDF Downloads 4945040 Regulatory Frameworks and Bank Failure Prevention in South Africa: Assessing Effectiveness and Enhancing Resilience
Authors: Princess Ncube
Abstract:
In the context of South Africa's banking sector, the prevention of bank failures is of paramount importance to ensure financial stability and economic growth. This paper focuses on the role of regulatory frameworks in safeguarding the resilience of South African banks and mitigating the risks of failures. It aims to assess the effectiveness of existing regulatory measures and proposes strategies to enhance the resilience of financial institutions in the country. The paper begins by examining the specific regulatory frameworks in place in South Africa, including capital adequacy requirements, stress testing methodologies, risk management guidelines, and supervisory practices. It delves into the evolution of these measures in response to lessons learned from past financial crises and their relevance in the unique South African banking landscape. Drawing on empirical evidence and case studies specific to South Africa, this paper evaluates the effectiveness of regulatory frameworks in preventing bank failures within the country. It analyses the impact of these frameworks on crucial aspects such as early detection of distress signals, improvements in risk management practices, and advancements in corporate governance within South African financial institutions. Additionally, it explores the interplay between regulatory frameworks and the specific economic environment of South Africa, including the role of macroprudential policies in preventing systemic risks. Based on the assessment, this paper proposes recommendations to strengthen regulatory frameworks and enhance their effectiveness in bank failure prevention in South Africa. It explores avenues for refining existing regulations to align capital requirements with the risk profiles of South African banks, enhancing stress testing methodologies to capture specific vulnerabilities, and fostering better coordination among regulatory authorities within the country. Furthermore, it examines the potential benefits of adopting innovative approaches, such as leveraging technology and data analytics, to improve risk assessment and supervision in the South African banking sector.Keywords: banks, resolution, liquidity, regulation
Procedia PDF Downloads 865039 The Factors Associated with Health Status among Community Health Volunteers in Thailand
Authors: Lapatrada Numkham, Saowaluk Khakhong, Jeeraporn Kummabutr
Abstract:
Non-communicable diseases (NCDs) are the leading cause of death in worldwide. Thailand also concerns and focuses on reduction a new case of these diseases. Community Health Volunteers (CHV) is important health personnel in primary health care and performs as a health leader in the community. If the health of CHV changes, it would impact on the performance to promote health of families and community. This cross-sectional study aimed to 1) describe the health status of community health volunteers and 2) examine the factors associated with health status among community health volunteers. The sample included 360 community health volunteers in a province in central Thailand during September-December 2014. Data were collected using questionnaires on health information, knowledge of health behaviors, and health behaviors. Body weight, height, waist circumference (WC), blood pressure (BP), and blood glucose (BS) (fingertip) were assessed. Data were analyzed using descriptive statistics and chi-square test. There were three hundred and sixty participants with 82.5% being women. The mean age was 54 + 8.9 years. Forty-seven percent of the participants had co-morbidities. Hypertension was the most common co-morbidity (26.7%). The results revealed that the health status of the volunteers included: no underlying disease, having risk of hypertension (HT) & diabetes mellitus (DM), and having HT&DM at 38.3%, 30.0%, and 31.7% respectively. The chi-square test revealed that the factors associated with health status among the volunteers were gender, age, WC and body mass index (BMI). The results suggested that community health nurses should; 1) implement interventions to decrease waist circumference and lose weight through education programs, especially females; 2) monitor people that have a risk of HT&DM and that have HT&DM by meeting and recording BP level, BS level, WC and BMI; and 3) collaborate with a district public health officer to initiate a campaign to raise awareness of the risks of chronic diseases among community health volunteers.Keywords: community health volunteers, health status, risk of non-communicable disease, Thailand
Procedia PDF Downloads 3585038 Bank Specialization and Credit Risk: Evidence from Global Financial Crisis Shock
Authors: Lemu Abebe Geleta
Abstract:
In this study, it compare the performance of banks and financial services (operational, financial, and market) across four major regions including Asia, Europe, Africa, and North with the extent of sustainability reporting. We examine how the Environment, Social, and Governance score (ESG) and the three pillars such as Return on Assets, Return on Equity, and Tobin's (Q) affect the performance of banks using data collected from 3450 observations across 40 different nations over ten years of (2011-2020). it also consider implications for governance, macroeconomics, and specific bank attributes. The results indicate a negative correlation between ESG and operational performance (ROA), financial performance (ROE), and market performance (TQ). The inclusion of diverse political and economic contexts lends distinctiveness to this paper. the findings hold significant theoretical implications for global scholars and policymakers. The limited correlation between ESG, its pillars, and the performance of banks and financial services underscores managerial shortcomings within these sectors.Keywords: bank specialization, financial crisis, credit risk, difference-in-differences, herfindahl hirschman index
Procedia PDF Downloads 255037 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI
Authors: Brennan Lodge
Abstract:
Amidst a complex regulatory landscape, Retrieval Augmented Generation (RAG) emerges as a transformative tool for Governance Risk and Compliance (GRC) officers. This paper details the application of RAG in synthesizing Large Language Models (LLMs) with external knowledge bases, offering GRC professionals an advanced means to adapt to rapid changes in compliance requirements. While the development for standalone LLM’s (Large Language Models) is exciting, such models do have their downsides. LLM’s cannot easily expand or revise their memory, and they can’t straightforwardly provide insight into their predictions, and may produce “hallucinations.” Leveraging a pre-trained seq2seq transformer and a dense vector index of domain-specific data, this approach integrates real-time data retrieval into the generative process, enabling gap analysis and the dynamic generation of compliance and risk management content. We delve into the mechanics of RAG, focusing on its dual structure that pairs parametric knowledge contained within the transformer model with non-parametric data extracted from an updatable corpus. This hybrid model enhances decision-making through context-rich insights, drawing from the most current and relevant information, thereby enabling GRC officers to maintain a proactive compliance stance. Our methodology aligns with the latest advances in neural network fine-tuning, providing a granular, token-level application of retrieved information to inform and generate compliance narratives. By employing RAG, we exhibit a scalable solution that can adapt to novel regulatory challenges and cybersecurity threats, offering GRC officers a robust, predictive tool that augments their expertise. The granular application of RAG’s dual structure not only improves compliance and risk management protocols but also informs the development of compliance narratives with pinpoint accuracy. It underscores AI’s emerging role in strategic risk mitigation and proactive policy formation, positioning GRC officers to anticipate and navigate the complexities of regulatory evolution confidently.Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies
Procedia PDF Downloads 945036 Analysis of the Interference from Risk-Determining Factors of Cooperative and Conventional Construction Contracts
Authors: E. Harrer, M. Mauerhofer, T. Werginz
Abstract:
As a result of intensive competition, the building sector is suffering from a high degree of rivalry. Furthermore, there can be observed an unbalanced distribution of project risks. Clients are aimed to shift their own risks into the sphere of the constructors or planners. The consequence of this is that the number of conflicts between the involved parties is inordinately high or even increasing; an alternative approach to counter on that developments are cooperative project forms in the construction sector. This research compares conventional contract models and models with partnering agreements to examine the influence on project risks by an early integration of the involved parties. The goal is to show up deviations in different project stages from the design phase to the project transfer phase. These deviations are evaluated by a survey of experts from the three spheres: clients, contractors and planners. By rating the influence of the participants on specific risk factors it is possible to identify factors which are relevant for a smooth project execution.Keywords: building projects, contract models, partnering, project risks
Procedia PDF Downloads 2705035 Bio-Psycho-Social Consequences and Effects in Fall-Efficacy Scale in Seniors Using Exercise Intervention of Motor Learning According to Yoga Techniques
Authors: Milada Krejci, Martin Hill, Vaclav Hosek, Dobroslava Jandova, Jiri Kajzar, Pavel Blaha
Abstract:
The paper declares effects of exercise intervention of the research project “Basic research of balance changes in seniors”, granted by the Czech Science Foundation. The objective of the presented study is to define predictors, which influence bio-psycho-social consequences and effects of balance ability in senior 65 years old and above. We focused on the Fall-Efficacy Scale changes evaluation in seniors. Comprehensive hypothesis of the project declares, that motion uncertainty (dyskinesia) can negatively affect the well-being of a senior in bio-psycho-social context. In total, random selection and testing of 100 seniors (30 males, 70 females) from Prague and Central Bohemian region was provided. The sample was divided by stratified random selection into experimental and control groups, who underwent input and output testing. For diagnostics the methods of Medical Anamnesis, Functional anthropological examinations, Tinetti Balance Assessment Tool, SF-36 Health Survey, Anamnestic comparative self-assessment scale were used. Intervention method called "Life in Balance" based on yoga techniques was applied in four-week cycle. Results of multivariate regression were verified by repeated measures ANOVA: subject factor, phase of intervention (between-subject factor), body fluid (within-subject factor) and phase of intervention × body fluid interaction). ANOVA was performed with a repetition involving the factors of subjects, experimental/control group, phase of intervention (independent variable), and x phase interaction followed by Bonferroni multiple comparison assays with a test strength of at least 0.8 on the probability level p < 0.05. In the paper results of the first-year investigation of the three years running project are analysed. Results of balance tests confirmed no significant difference between females and males in pre-test. Significant improvements in balance and walking ability were observed in experimental group in females comparing to males (F = 128.4, p < 0.001). In the females control group, there was no significant change in post- test, while in the female experimental group positive changes in posture and spine flexibility in post-tests were found. It seems that females even in senior age react better to incentives of intervention in balance and spine flexibility. On the base of results analyses, we can declare the significant improvement in social balance markers after intervention in the experimental group (F = 10.5, p < 0.001). In average, seniors are used to take four drugs daily. Number of drugs can contribute to allergy symptoms and balance problems. It can be concluded that static balance and walking ability of seniors according Tinetti Balance scale correlate significantly with psychic and social monitored markers.Keywords: exercises, balance, seniors 65+, health, mental and social balance
Procedia PDF Downloads 1365034 Perception of Risk toward Traffic Violence among Road Users in Makassar, Indonesia
Authors: Sulasmi Sudirman, Rachmadanty Mujah Hartika
Abstract:
Traffic violence is currently a big issue in Indonesia. However, the road users perceived risk that is caused by traffic violence is low. The lack of safety driving awareness is one of the factors that road users committed to traffic violence. There are several lists of common traffic violence in Indonesia such as lack of physical fitness, not wearing helmet, unfasten seatbelt, breaking through the traffic light, not holding a driving license, and some more violence. This research sought to explore the perception of road users toward traffic violence. The participants were road users in Makassar, Indonesia who were using cars and motorbikes. The method of the research was a qualitative approach by using a personal interview to collect data. The research showed that there three main ideas of perceiving traffic violence which are motives, environment that supported traffic violence, and reinforcement. The road users committed traffic violence had particular motive, for example, rushing. The road users committed to traffic violence when other road users and significant other did the same. The road users committed traffic violence when the police were not there to give a ticket. It can be concluded that the perception of road users toward traffic violence determined by internal aspect, the social aspect, and regulation.Keywords: perception, road users, traffic, violence
Procedia PDF Downloads 2205033 The Change in Management Accounting from an Institutional Perspective: A Case Study for a Romania Company
Authors: Gabriel Jinga, Madalina Dumitru
Abstract:
The objective of this paper is to present the process of change in management accounting in Romania, a former communist country from Eastern Europe. In order to explain this process, we used the contingency and institutional theories. We focused on the following directions: the presentation of the scientific context and motivation of this research and the case study. We presented the state of the art in the process of change in the management accounting from the international and national perspective. We also described the evolution of management accounting in Romania in the context of economic and political changes. An important moment was the fall of communism in 1989. This represents a starting point for a new economic environment and for new management accounting. Accordingly, we developed a case study which presented this evolution. The conclusion of our research was that the changes in the management accounting system of the company analysed occurred in the same time with the institutionalization of some elements (e.g. degree of competition, training and competencies in management accounting). The management accounting system was modeled by the contingencies specific to this company (e.g. environment, industry, strategy).Keywords: management accounting, change, Romania, contingency, institutional theory
Procedia PDF Downloads 5155032 Qualitative Analysis of Current Child Custody Evaluation Practices
Authors: Carolyn J. Ortega, Stephen E. Berger
Abstract:
The role of the custody evaluator is perhaps one of the most controversial and risky endeavors in clinical practice. Complaints filed with licensing boards regarding a child-custody evaluation constitute the second most common reason for such an event. Although the evaluator is expected to answer for the family-law court what is in the “best interest of the child,” there is a lack of clarity on how to establish this in any empirically validated manner. Hence, practitioners must contend with a nebulous framework in formulating their methodological procedures that inherently places them at risk in an already litigious context. This study sought to qualitatively investigate patterns of practice among doctoral practitioners conducting child custody evaluations in the area of Southern California. Ten psychologists were interviewed who devoted between 25 and 100% of their California private practice to custody work. All held Ph.D. degrees with a range of eight to 36 years of experience in custody work. Semi-structured interviews were used to investigate assessment practices, ensure adherence to guidelines, risk management, and qualities of evaluators. Forty-three Specific Themes were identified using Interpretive Phenomenological Analysis (IPA). Seven Higher Order Themes clustered on salient factors such as use of Ethics, Law, Guidelines; Parent Variables; Child Variables; Psychologist Variables; Testing; Literature; and Trends. Evaluators were aware of the ever-present reality of a licensure complaint and thus presented idiosyncratic descriptions of risk management considerations. Ambiguity about quantifying and validly tapping parenting abilities was also reviewed. Findings from this study suggested a high reliance on unstructured and observational methods in child custody practices.Keywords: forensic psychology, psychological testing, assessment methodology, child custody
Procedia PDF Downloads 2835031 The Relationship between Proximity to Sources of Industrial-Related Outdoor Air Pollution and Children Emergency Department Visits for Asthma in the Census Metropolitan Area of Edmonton, Canada, 2004/2005 to 2009/2010
Authors: Laura A. Rodriguez-Villamizar, Alvaro Osornio-Vargas, Brian H. Rowe, Rhonda J. Rosychuk
Abstract:
Introduction/Objectives: The Census Metropolitan Area of Edmonton (CMAE) has important industrial emissions to the air from the Industrial Heartland Alberta (IHA) at the Northeast and the coal-fired power plants (CFPP) at the West. The objective of the study was to explore the presence of clusters of children asthma ED visits in the areas around the IHA and the CFPP. Methods: Retrospective data on children asthma ED visits was collected at the dissemination area (DA) level for children between 2 and 14 years of age, living in the CMAE between April 1, 2004, and March 31, 2010. We conducted a spatial analysis of disease clusters around putative sources with count (ecological) data using descriptive, hypothesis testing, and multivariable modeling analysis. Results: The mean crude rate of asthma ED visits was 9.3/1,000 children population per year during the study period. Circular spatial scan test for cases and events identified a cluster of children asthma ED visits in the DA where the CFPP are located in the Wabamum area. No clusters were identified around the IHA area. The multivariable models suggest that there is a significant decline in risk for children asthma ED visits as distance increases around the CFPP area this effect is modified at the SE direction with mean angle 125.58 degrees, where the risk increases with distance. In contrast, the regression models for IHA suggest that there is a significant increase in risk for children asthma ED visits as distance increases around the IHA area and this effect is modified at SW direction with mean angle 216.52 degrees, where the risk increases at shorter distances. Conclusions: Different methods for detecting clusters of disease consistently suggested the existence of a cluster of children asthma ED visits around the CFPP but not around the IHA within the CMAE. These results are probably explained by the direction of the air pollutants dispersion caused by the predominant and subdominant wind direction at each point. The use of different approaches to detect clusters of disease is valuable to have a better understanding of the presence, shape, direction and size of clusters of disease around pollution sources.Keywords: air pollution, asthma, disease cluster, industry
Procedia PDF Downloads 2815030 Sororicide in the Forbidden City: Women Oppressing Each Other in the Chinese TV Drama “The Legend of Zhen Huan”
Authors: Muriel Canas-Walker
Abstract:
The 2012 TV series "The Legend of Zhen Huan" is one of the most popular and influential historical dramas on Chinese television and is regularly discussed on Chinese social media such as Weibo. Set in the Qing dynasty, the 76 episodes series features palace intrigues focused on female characters. In the Forbidden City, concubines must survive the cruelty of an extreme polygamy system, constantly competing against each other. The patriarchal oppression of the women sequestred in the harem relies on fierce female competition and does not leave much room for compassion. Using Michel Foucault’s theory of power, feminist theories, and visual anthropology, this paper analyzes the complex relationships between the female characters, from their rise to power to their fall from grace, from alliances to betrayals, from sorority to sororicide. This analysis aims to understand what makes this series particularly popular with young female audiences in China and explain its importance in Chinese media.Keywords: Chinese TV Drama, feminism, popular culture, Theory of Power
Procedia PDF Downloads 1895029 An Eco-Systemic Typology of Fashion Resale Business Models in Denmark
Authors: Mette Dalgaard Nielsen
Abstract:
The paper serves the purpose of providing an eco-systemic typology of fashion resale business models in Denmark while pointing to possibilities to learn from its wisdom during a time when a fundamental break with the dominant linear fashion paradigm has become inevitable. As we transgress planetary boundaries and can no longer continue the unsustainable path of over-exploiting the Earth’s resources, the global fashion industry faces a tremendous need for change. One of the preferred answers to the fashion industry’s sustainability crises lies in the circular economy, which aims to maximize the utilization of resources by keeping garments in use for longer. Thus, in the context of fashion, resale business models that allow pre-owned garments to change hands with the purpose of being reused in continuous cycles are considered to be among the most efficient forms of circularity. Methodologies: The paper is based on empirical data from an ongoing project and a series of qualitative pilot studies that have been conducted on the Danish resale market over a 2-year time period from Fall 2021 to Fall 2023. The methodological framework is comprised of (n) ethnography and fieldwork in selected resale environments, as well as semi-structured interviews and a workshop with eight business partners from the Danish fashion and textiles industry. By focusing on the real-world circulation of pre-owned garments, which is enabled by the identified resale business models, the research lets go of simplistic hypotheses to the benefit of dynamic, vibrant and non-linear processes. As such, the paper contributes to the emerging research field of circular economy and fashion, which finds itself in a critical need to move from non-verified concepts and theories to empirical evidence. Findings: Based on the empirical data and anchored in the business partners, the paper analyses and presents five distinct resale business models with different product, service and design characteristics. These are 1) branded resale, 2) trade-in resale, 3) peer-2-peer resale, 4) resale boutiques and consignment shops and 5) resale shelf/square meter stores and flea markets. Together, the five business models represent a plurality of resale-promoting business model design elements that have been found to contribute to the circulation of pre-owned garments in various ways for different garments, users and businesses in Denmark. Hence, the provided typology points to the necessity of prioritizing several rather than single resale business model designs, services and initiatives for the resale market to help reconfigure the linear fashion model and create a circular-ish future. Conclusions: The article represents a twofold research ambition by 1) presenting an original, up-to-date eco-systemic typology of resale business models in Denmark and 2) using the typology and its eco-systemic traits as a tool to understand different business model design elements and possibilities to help fashion grow out of its linear growth model. By basing the typology on eco-systemic mechanisms and actual exemplars of resale business models, it becomes possible to envision the contours of a genuine alternative to business as usual that ultimately helps bend the linear fashion model towards circularity.Keywords: circular business models, circular economy, fashion, resale, strategic design, sustainability
Procedia PDF Downloads 575028 Effects of Macroprudential Policies on BankLending and Risks
Authors: Stefanie Behncke
Abstract:
This paper analyses the effects of different macroprudential policy measures that have recently been implemented in Switzerland. Among them is the activation and the increase of the countercyclical capital buffer (CCB) and a tightening of loan-to-value (LTV) requirements. These measures were introduced to limit systemic risks in the Swiss mortgage and real estate markets. They were meant to affect mortgage growth, mortgage risks, and banks’ capital buffers. Evaluation of their quantitative effects provides insights for Swiss policymakers when reassessing their policy. It is also informative for policymakers in other countries who plan to introduce macroprudential instruments. We estimate the effects of the different macroprudential measures with a Differences-in-Differences estimator. Banks differ with respect to the relative importance of mortgages in their portfolio, their riskiness, and their capital buffers. Thus, some of the banks were more affected than others by the CCB, while others were more affected by the LTV requirements. Our analysis is made possible by an unusually informative bank panel data set. It combines data on newly issued mortgage loans and quantitative risk indicators such as LTV and loan-to-income (LTI) ratios with supervisory information on banks’ capital and liquidity situation and balance sheets. Our results suggest that the LTV cap of 90% was most effective. The proportion of new mortgages with a high LTV ratio was significantly reduced. This result does not only apply to the 90% LTV, but also to other threshold values (e.g. 80%, 75%) suggesting that the entire upper part of the LTV distribution was affected. Other outcomes such as the LTI distribution, the growth rates of mortgages and other credits, however, were not significantly affected. Regarding the activation and the increase of the CCB, we do not find any significant effects: neither LTV/LTI risk parameters nor mortgage and other credit growth rates were significantly reduced. This result may reflect that the size of the CCB (1% of relevant residential real estate risk-weighted assets at activation, respectively 2% at the increase) was not sufficiently high enough to trigger a distinct reaction between the banks most likely to be affected by the CCB and those serving as controls. Still, it might be have been effective in increasing the resilience in the overall banking system. From a policy perspective, these results suggest that targeted macroprudential policy measures can contribute to financial stability. In line with findings by others, caps on LTV reduced risk taking in Switzerland. To fully assess the effectiveness of the CCB, further experience is needed.Keywords: banks, financial stability, macroprudential policy, mortgages
Procedia PDF Downloads 3605027 Addressing Supply Chain Data Risk with Data Security Assurance
Authors: Anna Fowler
Abstract:
When considering assets that may need protection, the mind begins to contemplate homes, cars, and investment funds. In most cases, the protection of those assets can be covered through security systems and insurance. Data is not the first thought that comes to mind that would need protection, even though data is at the core of most supply chain operations. It includes trade secrets, management of personal identifiable information (PII), and consumer data that can be used to enhance the overall experience. Data is considered a critical element of success for supply chains and should be one of the most critical areas to protect. In the supply chain industry, there are two major misconceptions about protecting data: (i) We do not manage or store confidential/personally identifiable information (PII). (ii) Reliance on Third-Party vendor security. These misconceptions can significantly derail organizational efforts to adequately protect data across environments. These statistics can be exciting yet overwhelming at the same time. The first misconception, “We do not manage or store confidential/personally identifiable information (PII)” is dangerous as it implies the organization does not have proper data literacy. Enterprise employees will zero in on the aspect of PII while neglecting trade secret theft and the complete breakdown of information sharing. To circumvent the first bullet point, the second bullet point forges an ideology that “Reliance on Third-Party vendor security” will absolve the company from security risk. Instead, third-party risk has grown over the last two years and is one of the major causes of data security breaches. It is important to understand that a holistic approach should be considered when protecting data which should not involve purchasing a Data Loss Prevention (DLP) tool. A tool is not a solution. To protect supply chain data, start by providing data literacy training to all employees and negotiating the security component of contracts with vendors to highlight data literacy training for individuals/teams that may access company data. It is also important to understand the origin of the data and its movement to include risk identification. Ensure processes effectively incorporate data security principles. Evaluate and select DLP solutions to address specific concerns/use cases in conjunction with data visibility. These approaches are part of a broader solutions framework called Data Security Assurance (DSA). The DSA Framework looks at all of the processes across the supply chain, including their corresponding architecture and workflows, employee data literacy, governance and controls, integration between third and fourth-party vendors, DLP as a solution concept, and policies related to data residency. Within cloud environments, this framework is crucial for the supply chain industry to avoid regulatory implications and third/fourth party risk.Keywords: security by design, data security architecture, cybersecurity framework, data security assurance
Procedia PDF Downloads 88