Search results for: cyber hygiene
449 Refuge(e)s in Digital Diaspora: Reimagining and Reimaging ‘Ethnically Cleansed’ Villages as ‘Cyber Villages’
Authors: Hariz Halilovich
Abstract:
Based on conventional and digital ethnography, this paper discusses the ways Bosnian refugees utilise digital technologies and new media to recreate, synchronise and sustain their identities and memories in the aftermath of ‘ethnic cleansing’ and genocide and in the contexts of their new emplacements and home-making practices in diaspora. In addition to discussing representations of displacement and emplacement in the ‘digital age’, the paper also aims to make a contribution to the understanding and application of digital ethnography as an emerging method of inquiry in anthropology and related social science disciplines. While some researchers see digital ethnography as an exclusively online–based research, the author of this paper argues that it is critical to understand the online world in the context of the real world—made of real people, places, and social relations.Keywords: Bosnia, cyber villages, digital diaspora, refugees
Procedia PDF Downloads 242448 Adaptive Data Approximations Codec (ADAC) for AI/ML-based Cyber-Physical Systems
Authors: Yong-Kyu Jung
Abstract:
The fast growth in information technology has led to de-mands to access/process data. CPSs heavily depend on the time of hardware/software operations and communication over the network (i.e., real-time/parallel operations in CPSs (e.g., autonomous vehicles). Since data processing is an im-portant means to overcome the issue confronting data management, reducing the gap between the technological-growth and the data-complexity and channel-bandwidth. An adaptive perpetual data approximation method is intro-duced to manage the actual entropy of the digital spectrum. An ADAC implemented as an accelerator and/or apps for servers/smart-connected devices adaptively rescales digital contents (avg.62.8%), data processing/access time/energy, encryption/decryption overheads in AI/ML applications (facial ID/recognition).Keywords: adaptive codec, AI, ML, HPC, cyber-physical, cybersecurity
Procedia PDF Downloads 78447 Approaches to Ethical Hacking: A Conceptual Framework for Research
Authors: Lauren Provost
Abstract:
The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.Keywords: ethical hacking, literature review, penetration testing, social engineering
Procedia PDF Downloads 218446 A Digital Twin Approach to Support Real-time Situational Awareness and Intelligent Cyber-physical Control in Energy Smart Buildings
Authors: Haowen Xu, Xiaobing Liu, Jin Dong, Jianming Lian
Abstract:
Emerging smart buildings often employ cyberinfrastructure, cyber-physical systems, and Internet of Things (IoT) technologies to increase the automation and responsiveness of building operations for better energy efficiency and lower carbon emission. These operations include the control of Heating, Ventilation, and Air Conditioning (HVAC) and lighting systems, which are often considered a major source of energy consumption in both commercial and residential buildings. Developing energy-saving control models for optimizing HVAC operations usually requires the collection of high-quality instrumental data from iterations of in-situ building experiments, which can be time-consuming and labor-intensive. This abstract describes a digital twin approach to automate building energy experiments for optimizing HVAC operations through the design and development of an adaptive web-based platform. The platform is created to enable (a) automated data acquisition from a variety of IoT-connected HVAC instruments, (b) real-time situational awareness through domain-based visualizations, (c) adaption of HVAC optimization algorithms based on experimental data, (d) sharing of experimental data and model predictive controls through web services, and (e) cyber-physical control of individual instruments in the HVAC system using outputs from different optimization algorithms. Through the digital twin approach, we aim to replicate a real-world building and its HVAC systems in an online computing environment to automate the development of building-specific model predictive controls and collaborative experiments in buildings located in different climate zones in the United States. We present two case studies to demonstrate our platform’s capability for real-time situational awareness and cyber-physical control of the HVAC in the flexible research platforms within the Oak Ridge National Laboratory (ORNL) main campus. Our platform is developed using adaptive and flexible architecture design, rendering the platform generalizable and extendable to support HVAC optimization experiments in different types of buildings across the nation.Keywords: energy-saving buildings, digital twins, HVAC, cyber-physical system, BIM
Procedia PDF Downloads 110445 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing
Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi
Abstract:
This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning
Procedia PDF Downloads 31444 Cyberfraud Schemes: Modus Operandi, Tools and Techniques and the Role of European Legislation as a Defense Strategy
Authors: Papathanasiou Anastasios, Liontos George, Liagkou Vasiliki, Glavas Euripides
Abstract:
The purpose of this paper is to describe the growing problem of various cyber fraud schemes that exist on the internet and are currently among the most prevalent. The main focus of this paper is to provide a detailed description of the modus operandi, tools, and techniques utilized in four basic typologies of cyber frauds: Business Email Compromise (BEC) attacks, investment fraud, romance scams, and online sales fraud. The paper aims to shed light on the methods employed by cybercriminals in perpetrating these types of fraud, as well as the strategies they use to deceive and victimize individuals and businesses on the internet. Furthermore, this study outlines defense strategies intended to tackle the issue head-on, with a particular emphasis on the crucial role played by European Legislation. European legislation has proactively adapted to the evolving landscape of cyber fraud, striving to enhance cybersecurity awareness, bolster user education, and implement advanced technical controls to mitigate associated risks. The paper evaluates the advantages and innovations brought about by the European Legislation while also acknowledging potential flaws that cybercriminals might exploit. As a result, recommendations for refining the legislation are offered in this study in order to better address this pressing issue.Keywords: business email compromise, cybercrime, European legislation, investment fraud, NIS, online sales fraud, romance scams
Procedia PDF Downloads 98443 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles
Authors: Vikram Prabhu, Mohammad Shikh Bahaei
Abstract:
This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark
Procedia PDF Downloads 301442 Anomaly Detection of Log Analysis using Data Visualization Techniques for Digital Forensics Audit and Investigation
Authors: Mohamed Fadzlee Sulaiman, Zainurrasyid Abdullah, Mohd Zabri Adil Talib, Aswami Fadillah Mohd Ariffin
Abstract:
In common digital forensics cases, investigation may rely on the analysis conducted on specific and relevant exhibits involved. Usually the investigation officer may define and advise digital forensic analyst about the goals and objectives to be achieved in reconstructing the trail of evidence while maintaining the specific scope of investigation. With the technology growth, people are starting to realize the importance of cyber security to their organization and this new perspective creates awareness that digital forensics auditing must come in place in order to measure possible threat or attack to their cyber-infrastructure. Instead of performing investigation on incident basis, auditing may broaden the scope of investigation to the level of anomaly detection in daily operation of organization’s cyber space. While handling a huge amount of data such as log files, performing digital forensics audit for large organization proven to be onerous task for the analyst either to analyze the huge files or to translate the findings in a way where the stakeholder can clearly understand. Data visualization can be emphasized in conducting digital forensic audit and investigation to resolve both needs. This study will identify the important factors that should be considered to perform data visualization techniques in order to detect anomaly that meet the digital forensic audit and investigation objectives.Keywords: digital forensic, data visualization, anomaly detection , log analysis, forensic audit, visualization techniques
Procedia PDF Downloads 287441 Improving Sanitation and Hygiene Using a Behavioral Change Approach in Public and Private Schools in Kampala, Uganda
Authors: G. Senoga, D. Nakimuli, B. Ndagire, B. Lukwago, D. Kyamagwa
Abstract:
Background: The COVID-19 epidemic affected the education sector, with some private schools closing while other children missed schooling for fear contracting COVID-19. Post COVID-19, PSIU in collaborated with Kampala City Council Authority Directorate of Education and Social Science, Water and Sanitation department, and Directorate of Public Health and Environment to improve sanitation and hygiene among pupils and staff in 50 public and private school system in Kampala city. The “Be Clean, Stay Healthy Campaign” used a behavioral change approach in educating, reinforcing and engaging learners on proper hand washing behaviors, proper toilet usage and garbage disposal. In April 2022, 40 Washa lots were constructed, to reduce the pupil - hand wash station ratio; distributed KCCA approved printed materials; oriented 50 teachers, WASH committees to execute and implement hygiene promotion. To ensure sustainability, WASH messages were memorized and practiced through hand washing songs, Pledge, prayer, Poems, Skits, Music, dance and drama, coupled with participatory, practical demonstrations using peer to peer approach, guest speakers at assemblies and in classes. This improved hygiene and sanitation practices. Premised on this, PSI conducted an end line assessment to explore the impact of a hand washing campaign in regards to improvements in hand washing practices and hand hygiene among pupils, accessibility, functionality and usage of the constructed hygiene and sanitation facilities. Method: A cross-sectional post intervention assessment using a mixed methods approach, targeting headteachers, wash committee members and pupils less <17 years was used. Quantitative approaches with a mix of open-ended questions were used in purposively selected respondents in 50 schools. Primary three to primary seven pupils were randomly selected, data was analyzed using the Statistical Package for Social Scientists (SPSS) Outcomes and Findings: 46,989 pupils (51% female), 1,127 and 524 teaching and non-teaching staff were reached by the intervention, respectively. 96% of schools trained on sanitation, sustainable water usage and hygiene constituted 17-man school WASH committees with teacher, parents and pupils representatives. (31%) of the WASH committees developed workplans, (78%) held WASH meetings monthly. This resulted into improved sanitation, water usage, waste management, proper use of toilets, and improved pupils’ health with reduced occurrences of stomach upsets, diarrhoea initially attributed to improper use of latrines and general waste management. Teachers reported reduced number of school absenteeism due to improved hygiene and general waste management at school, especially proper management of sanitary pads. School administrations response rate in purchase of hygiene equipment’s and detergents like soap improved. Regular WASH meetings in classes, teachers and community supervision ensured WASH facilities are used appropriately. Conclusion and Recommendations: Practical behaviour change innovations improves pupil’s knowledge and understanding of hygiene messages and usage. Over 70% of pupils had clear recall of key WASH Messages. There is need for continuous water flow in the Washa lots, harvesting rain water would reduce water bills while complementing National water supply coupled with increasing on Washa lots in densely populated schools.Keywords: handwashing, hygyiene, sanitation, behaviour change
Procedia PDF Downloads 90440 A Comparative Study of Public and Private School Adolescent Girls on the Issues of Menstrual Hygiene and the Management Issues
Authors: Ashok Pandey, Rajan Adhikari
Abstract:
Introduction: Menstruation is part of the female reproductive cycle that starts when girls become sexually mature at the time of puberty. It is a phenomenon unique to the females. During a menstrual period, a woman bleeds from her uterus via the vagina. For decades, in many countries, academic school ‘type,’ private or public, as a predictor of or factor in future academic success has been researched and debated. MATERIAL AND METHODS: The comparative study was carried out with adolescent girls studying in both public and private schools of Kathmandu valley. A total of 100 girls participated in the survey, and out of them 21 participated in the FGD and 5 in the in- depth interview. Quantitative data from the survey was analyzed using SPSS 16.0 software. Informed verbal consent with the respective head of school and the respondents were taken before data collection. Results:The age of the respondents ranges from 11 to 18 years, with mean age of menarche being 12.37 years in both school adolescent girls. 70 percent of the public school adolescent girls and 72 percent of the private school adolescent girls are feeling upset and tension during menarche. There is a statistically significant difference on take rest during the period and good hygienic practice during menstruation of public/private school, at α=0. 05 level of significance. There is a statistically significant difference on overall score of practice during menstruation between public and private adolescent girls. Conclusion: Private schools children are more knowledgeable and maintain hygiene as compere to public school even though, it can be said that among the adolescent school girls both in public and private school, menstrual knowledge and perceptions are poor and practices often not optimal for proper hygiene. Often ignored issues of privacy affect the hygienic practices and daily lives.Keywords: Comparison, Menstruation, Private school, Public School
Procedia PDF Downloads 441439 Cybervetting and Online Privacy in Job Recruitment – Perspectives on the Current and Future Legislative Framework Within the EU
Authors: Nicole Christiansen, Hanne Marie Motzfeldt
Abstract:
In recent years, more and more HR professionals have been using cyber-vetting in job recruitment in an effort to find the perfect match for the company. These practices are growing rapidly, accessing a vast amount of data from social networks, some of which is privileged and protected information. Thus, there is a risk that the right to privacy is becoming a duty to manage your private data. This paper investigates to which degree a job applicant's fundamental rights are protected adequately in current and future legislation in the EU. This paper argues that current data protection regulations and forthcoming regulations on the use of AI ensure sufficient protection. However, even though the regulation on paper protects employees within the EU, the recruitment sector may not pay sufficient attention to the regulation as it not specifically targeting this area. Therefore, the lack of specific labor and employment regulation is a concern that the social partners should attend to.Keywords: AI, cyber vetting, data protection, job recruitment, online privacy
Procedia PDF Downloads 86438 Seaworthiness and Liability Risks Involving Technology and Cybersecurity in Transport and Logistics
Authors: Eugene Wong, Felix Chan, Linsey Chen, Joey Cheung
Abstract:
The widespread use of technologies and cyber/digital means for complex maritime operations have led to a sharp rise in global cyber-attacks. They have generated an increasing number of liability disputes, insurance claims, and legal proceedings. An array of antiquated case law, regulations, international conventions, and obsolete contractual clauses drafted in the pre-technology era have become grossly inadequate in addressing the contemporary challenges. This paper offers a critique of the ambiguity of cybersecurity liabilities under the obligation of seaworthiness entailed in the Hague-Visby Rules, which apply either by law in a large number of jurisdictions or by express incorporation into the shipping documents. This paper also evaluates the legal and technological criteria for assessing whether a vessel is properly equipped with the latest offshore technologies for navigation and cargo delivery operations. Examples include computer applications, networks and servers, enterprise systems, global positioning systems, and data centers. A critical analysis of the carriers’ obligations to exercise due diligence in preventing or mitigating cyber-attacks is also conducted in this paper. It is hoped that the present study will offer original and crucial insights to policymakers, regulators, carriers, cargo interests, and insurance underwriters closely involved in dispute prevention and resolution arising from cybersecurity liabilities.Keywords: seaworthiness, cybersecurity, liabilities, risks, maritime, transport
Procedia PDF Downloads 134437 Achieving the Status of Total Sanitation in the Rural Nepalese Context: A Case Study from Amarapuri, Nepal
Authors: Ram Chandra Sah
Abstract:
Few years back, naturally a very beautiful country Nepal was facing a lot of problems related to the practice of open defecation (having no toilet) by almost 98% people of the country. Now, the scenario is changed. Government of Nepal set the target of achieving the situation of basic level sanitation (toilets) facilities by 2017 AD for which the Sanitation and Hygiene Master Plan (SHMP) was brought in 2011 AD with the major beauty as institutional set up formation, local formal authority leadership, locally formulated strategic plan; partnership, harmonized and coordinated approach to working; no subsidy or support at a blanket level, community and local institutions or organizations mobilization approaches. Now, the Open Defecation Free (ODF) movement in the country is at a full swing. The Sanitation and Hygiene Master Plan (SHMP) has clearly defined Total Sanitation which is accepted to be achieved if all the households of the related boundary have achieved the 6 indicators such as the access and regular use of toilet(s), regular use of soap and water at the critical moments, regular practice of use of food hygiene behavior, regular practice of use of water hygiene behavior including household level purification of locally available drinking water, maintenance of regular personal hygiene with household level waste management and the availability of the state of overall clean environment at the concerned level of boundary. Nepal has 3158 Village Development Committees (VDC's) in the rural areas. Amarapuri VDC was selected for the purpose of achieving Total Sanitation. Based on the SHMP; different methodologies such as updating of Village Water Sanitation and Hygiene Coordination Committee (V-WASH-CC), Total Sanitation team formation including one volunteer for each indicator, campaigning through settlement meetings, midterm evaluation which revealed the need of ward level 45 (5 for all 9 wards) additional volunteers, ward wise awareness creation with the help of the volunteers, informative notice boards and hoarding boards with related messages at important locations, management of separate waste disposal rings for decomposable and non-decomposable wastes, related messages dissemination through different types of local cultural programs, public toilets construction and management by community level; mobilization of local schools, offices and health posts; reward and recognition to contributors etc. were adopted for achieving 100 % coverage of each indicator. The VDC was in a very worse situation in 2010 with just 50, 30, 60, 60, 40, 30 percent coverage of the respective indicators and became the first VDC of the country declared with Total Sanitation. The expected result of 100 percent coverage of all the indicators was achieved in 2 years 10 months and 19 days. Experiences of Amarapuri were replicated successfully in different parts of the country and many VDC's have been declared with the achievement of Total Sanitation. Thus, Community Mobilized Total Sanitation Movement in Nepal has supported a lot for achieving a Total Sanitation situation of the country with a minimal cost and it is believed that the approach can be very useful for other developing or under developed countries of the world.Keywords: community mobilized, open defecation free, sanitation and hygiene master plan, total sanitation
Procedia PDF Downloads 199436 Quantitative Evaluation on Community Perceptions of Sanitation and Hygiene in Rural Guatemala
Authors: Akudo Ejelonu, Sarah Willig, J. Anthony Sauder, Heather Murphy, Frances Shofer
Abstract:
Background: The high prevalence of diarrheal diseases in the village of Tzununá, Guatemala is linked to lack of sanitation facilities and handwashing practices. Diarrheal diseases are preventable and improved access to latrines, hygiene education and clean water may improve sanitation by reducing the spread of disease. Objective: Between May 2015-January 2017, the University of Pennsylvania Chapter of Engineers Without Border (PennEWB) and local partners designed an intervention to reduce diarrheal disease by building pour flush latrines in 50 individual households and providing education on the importance of handwashing practice. Design/Methods: Through convenient sampling, we surveyed 45 households to evaluate the community’s knowledge of diarrheal disease, handwashing practices, and maintenance of the latrines. Results: 92% of the study participants experienced decrease of new cases of diarrheal disease after receiving a latrine. Only 11% washed their hands after defecating in the latrine. There was gap in understanding the health outcome of latrine sanitation and handwashing education. The respondents did not connect the reduction of diarrheal disease with latrine use and maintenance. Instead, they associated their motivation for latrine use with aesthetics, proximity to their home, ease and comfort, and reduction of shame. We recommend that PennEWB adopt UNICEF or WHO education on hand washing practice. Conclusion: Social interaction and social pressure drove the household use of latrines. The latrines are being valued and cleaned. The education that the residents received did not target norms and behaviors. Latrines could be used to create a new social norm that supports behavioral change.Keywords: diarrheal disease, latrine, open defecation, water, sanitation and hygiene
Procedia PDF Downloads 157435 Use of Cyber-Physical Devices for the Implementation of Virtual and Augmented Realities in Bridge Construction
Authors: Muhammmad Fawad
Abstract:
The bridge construction industry has been revolutionized by the applications of Virtual Reality (VR) and Augmented Reality (AR). In this article, the author has focused on the field applications of digital technologies in structural, especially in bridge engineering. This research analyzed the use of VR/AR for the assessment of bridge concepts. For this purpose, the author has used Cyber-Physical Devices, i.e., Oculus Quest (OQ) for the implementation of VR, Trimble Microsoft HoloLens (THL), and Trimble Site Vision (TSV) for the implementation of AR/MR by visualizing the models of bridge planned to be constructed in Poland. The visualization of the models in Extended Reality (XR) is based on the development of BIM models of the bridge, which are further uploaded to the platforms required to implement these models in XR. This research helped to implement the models in MR so a bridge with a 1:1 scale at the exact location was placed, and authorities were presented with the possibility to visualize the exact scale and location of the bridge before its construction.Keywords: augmented reality, virtual reality, HoloLens, BIM, bridges
Procedia PDF Downloads 122434 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 149433 Induced Pulsation Attack Against Kalman Filter Driven Brushless DC Motor Control System
Authors: Yuri Boiko, Iluju Kiringa, Tet Yeap
Abstract:
We use modeling and simulation tools, to introduce a novel bias injection attack, named the ’Induced Pulsation Attack’, which targets Cyber Physical Systems with closed-loop controlled Brushless DC (BLDC) motor and Kalman filter driver in the feedback loop. This attack involves engaging a linear function with a constant gradient to distort the coefficient of the injected bias, which falsifies the Kalman filter estimates of the rotor’s angular speed. As a result, this manipulation interaction inside the control system causes periodic pulsations in a form of asymmetric sine wave of both current and voltage in the circuit windings, with a high magnitude. It is shown that by varying the gradient of linear function, one can control both the frequency and structure of the induced pulsations. It is also demonstrated that terminating the attack at any point leads to additional compensating effort from the controller to restore the speed to its equilibrium value. This compensation effort produces an exponentially decaying wave, which we call the ’attack withdrawal syndrome’ wave. The conditions for maximizing or minimizing the impact of the attack withdrawal syndrome are determined. Linking the termination of the attack to the end of the full period of the induced pulsation wave has been shown to nullify the attack withdrawal syndrome wave, thereby improving the attack’s covertness.Keywords: cyber-attack, induced pulsation, bias injection, Kalman filter, BLDC motor, control system, closed loop, P- controller, PID-controller, saw-function, cyber-physical system
Procedia PDF Downloads 71432 Nurses as Being Participants of Sexual Health of Women
Authors: Malika Turganova, Aigul Abduldayeva
Abstract:
Modern conditions require nursing innovations at the primary ambulatory stage in the health system of Kazakhstan. There is a growing need for nurses involved in before-doctor attendance for preventive interview with a female population about reproductive health. We conducted questionnaire survey of the population of Astana in 2015. Questionnaires were drawn up according to the criteria of sexual health of World Health Organization. 3593 respondents out of 8000 questionnaires agreed to answer the questions anonymously, mM=±2,1. The average age of women comprised 37,4±11,2, Ме=31,7 years of age. Analysis of awareness about marriage hygiene revealed that 72,7% of respondents did not receive information about marriage hygiene and 89,1% respondents consider it more advisable before marriage. 45,9% of respondents specified the internet as a source of information on marriage hygiene issues, 24,5% of respondents pointed out friends, and 21,5% specified doctor. Comparing female age groups under and after 40 years old we see that proportion of cases when parents provide information about marriage hygiene issues comprises 4.3% (χ2 =9.8, p<0.05). The most important factor of preservation of women reproductive health is handling a problem of unwanted pregnancy. The responsibility lies equally in men and women. Data analysis of contraceptive methods by ranking showed three most frequently used methods: contraception sheath – 29.3%, then coitus interruptus – 18.7% and hormonal preparations – 16.9%. The most important factor of women's reproductive health preservation is a solving of the problem of unwanted pregnancy, and in this respect, the responsibility lies equally in men and women. Analyzing obtained data on contraceptive methods by ranking three of the most frequently used methods are condoms – 29,3%, then coitus interruptus – 18,7% and hormonal preparations – 16,9%. Additional oral survey of the population showed a low level of informational support of female population by family physicians, health care professionals of educational organizations (schools, universities, and colleges) about hormonal contraceptive. Females of both age groups used to think that hormonal contraceptives cause collateral damage such as blastoma, cancer, increased body weight, varix dilatation of lower limbs. Satisfaction with the frequency of sexual relations of the respondents comprised 57,6%. At that, women under 40 years of age are the most satisfied women among age groups (χ2 =5,8, p<0,05).Keywords: nurse, public health service of Kazakhstan, reproductive and sexual health, trust of population
Procedia PDF Downloads 272431 Application of Neural Network in Portfolio Product Companies: Integration of Boston Consulting Group Matrix and Ansoff Matrix
Authors: M. Khajezadeh, M. Saied Fallah Niasar, S. Ali Asli, D. Davani Davari, M. Godarzi, Y. Asgari
Abstract:
This study aims to explore the joint application of both Boston and Ansoff matrices in the operational development of the product. We conduct deep analysis, by utilizing the Artificial Neural Network, to predict the position of the product in the market while the company is interested in increasing its share. The data are gathered from two industries, called hygiene and detergent. In doing so, the effort is being made by investigating the behavior of top player companies and, recommend strategic orientations. In conclusion, this combination analysis is appropriate for operational development; as well, it plays an important role in providing the position of the product in the market for both hygiene and detergent industries. More importantly, it will elaborate on the company’s strategies to increase its market share related to a combination of the Boston Consulting Group (BCG) Matrix and Ansoff Matrix.Keywords: artificial neural network, portfolio analysis, BCG matrix, Ansoff matrix
Procedia PDF Downloads 143430 Assessment of the State of Hygiene in a Tunisian Hospital Kitchen: Interest of Mycological and Parasitological Samples from Food Handlers and Environment
Authors: Bouchekoua Myriam, Aloui Dorsaf, Trabelsi Sonia
Abstract:
Introduction Food hygiene in hospitals is important, particularly among patients who could be more vulnerable than healthy subjects to microbiological and nutritional risks. The consumption of contaminated food may be responsible for foodborne diseases, which can be severe among hospitalized patients, especially those immunocompromised. The aim of our study was to assess the state of hygiene in the internal catering department of a Tunisian hospital. Methodology and major results: A prospective study was conducted for one year in the Parasitology-Mycology laboratory of Charles Nicolle Hospital. Samples were taken from the kitchen staff, worktops, and cooking utensils used in the internal catering department. Thirty one employees have benefited from stool exams and scotch tape in order to evaluate the degree of infestation of parasites. 35% of stool exams were positive. Protozoa were the only parasites detected. Blastocystis sp was the species mostly found in nine food handlers. Its role as a human pathogen is still controversial. Pathogenic protozoa were detected in two food handlers (Giardia intestinalis in one person and Dientamoeba fragilis in the other one. Non-pathogenic protozoa were found in two cases; among them, only one had digestive symptoms without a statistically significant association with the carriage of intestinal parasites. Moreover, samples were performed from the hands of the staff in order to search for a fungal carriage. Thus, 25 employees (81%) were colonized by fungi, including molds. Besides, mycological examination among food handlers with a suspected dermatomycosis for diagnostic confirmation concluded foot onychomycosis in 32% of cases and interdigital intertrigo in 26%. Only one person had hand onychomycosis. Among the 17 samples taken from worktops and kitchen utensils, fungal contamination was detected in 13 sites. Hot and cold equipment were the most contaminated. Molds were mainly identified as belonging to five different genera. Cladosporium sp was predominant. Conclusion: In the view of the importance of intestinal parasites among food handlers, the intensity of fungi hand carriage among these employees, and the high level of fungal contamination in worktops and kitchen utensils, a reinforcement of hygiene measures is more than essential in order to minimize the alimentary contamination-risk.Keywords: hospital kitchen, environment, intestinal parasitosis, fungal carriage, fungal contamination
Procedia PDF Downloads 116429 AI-Based Information System for Hygiene and Safety Management of Shared Kitchens
Authors: Jongtae Rhee, Sangkwon Han, Seungbin Ji, Junhyeong Park, Byeonghun Kim, Taekyung Kim, Byeonghyeon Jeon, Jiwoo Yang
Abstract:
The shared kitchen is a concept that transfers the value of the sharing economy to the kitchen. It is a type of kitchen equipped with cooking facilities that allows multiple companies or chefs to share time and space and use it jointly. These shared kitchens provide economic benefits and convenience, such as reduced investment costs and rent, but also increase the risk of safety management, such as cross-contamination of food ingredients. Therefore, to manage the safety of food ingredients and finished products in a shared kitchen where several entities jointly use the kitchen and handle various types of food ingredients, it is critical to manage followings: the freshness of food ingredients, user hygiene and safety and cross-contamination of cooking equipment and facilities. In this study, it propose a machine learning-based system for hygiene safety and cross-contamination management, which are highly difficult to manage. User clothing management and user access management, which are most relevant to the hygiene and safety of shared kitchens, are solved through machine learning-based methodology, and cutting board usage management, which is most relevant to cross-contamination management, is implemented as an integrated safety management system based on artificial intelligence. First, to prevent cross-contamination of food ingredients, we use images collected through a real-time camera to determine whether the food ingredients match a given cutting board based on a real-time object detection model, YOLO v7. To manage the hygiene of user clothing, we use a camera-based facial recognition model to recognize the user, and real-time object detection model to determine whether a sanitary hat and mask are worn. In addition, to manage access for users qualified to enter the shared kitchen, we utilize machine learning based signature recognition module. By comparing the pairwise distance between the contract signature and the signature at the time of entrance to the shared kitchen, access permission is determined through a pre-trained signature verification model. These machine learning-based safety management tasks are integrated into a single information system, and each result is managed in an integrated database. Through this, users are warned of safety dangers through the tablet PC installed in the shared kitchen, and managers can track the cause of the sanitary and safety accidents. As a result of system integration analysis, real-time safety management services can be continuously provided by artificial intelligence, and machine learning-based methodologies are used for integrated safety management of shared kitchens that allows dynamic contracts among various users. By solving this problem, we were able to secure the feasibility and safety of the shared kitchen business.Keywords: artificial intelligence, food safety, information system, safety management, shared kitchen
Procedia PDF Downloads 69428 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 11427 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport
Authors: Polychronis Kapalidis
Abstract:
In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.Keywords: cybercrime, cybersecurity, organized crime, risk mitigation
Procedia PDF Downloads 157426 Classification of IoT Traffic Security Attacks Using Deep Learning
Authors: Anum Ali, Kashaf ad Dooja, Asif Saleem
Abstract:
The future smart cities trend will be towards Internet of Things (IoT); IoT creates dynamic connections in a ubiquitous manner. Smart cities offer ease and flexibility for daily life matters. By using small devices that are connected to cloud servers based on IoT, network traffic between these devices is growing exponentially, whose security is a concerned issue, since ratio of cyber attack may make the network traffic vulnerable. This paper discusses the latest machine learning approaches in related work further to tackle the increasing rate of cyber attacks, machine learning algorithm is applied to IoT-based network traffic data. The proposed algorithm train itself on data and identify different sections of devices interaction by using supervised learning which is considered as a classifier related to a specific IoT device class. The simulation results clearly identify the attacks and produce fewer false detections.Keywords: IoT, traffic security, deep learning, classification
Procedia PDF Downloads 153425 Menstrual Hygiene Management among Young Unmarried Women in India
Authors: Enu Anand, Jayakant Singh
Abstract:
Menstruation among women is an integral part and a natural process that starts with menarche and stops at menopause. Women use sanitary pad, clothes and other methods to prevent blood stain from becoming evident. This paper examines the prevalence and discrepancies in use of hygienic method during menstruation among unmarried women in India using nationally representative District Level Household and facility Survey data (2007-08). The findings suggest that only one-third of the study population used hygienic method during menstruation. Rural-urban and poor-non poor disparity persists across all background characteristics in use of hygienic method. Women with high school and above education (OR=8.8, p<0.001), from richest wealth quintile (OR=5.2, p<0.001) and women following Christian religion (OR=3.6, p<0.001) are more likely to use hygienic method as compared to women with no education, poor household and Hindu women respectively. Locally prepared, low-cost sanitary pads can be promoted across the country for easy accessibility and affordability. Efforts should be made to produce locally prepared low-cost sanitary napkins in bulk and supply it through female health workers such as ANM and Anganwadi worker across the country.Keywords: menstrual hygiene, sanitary pad, unmarried women, India
Procedia PDF Downloads 486424 Microbial Assessment of Dairy Byproducts in Albania as a Basis for Consumer Safety
Authors: Klementina Puto, Ermelinda Nexhipi, Evi Llaka
Abstract:
Dairy by-products are a fairly good environment for microorganisms due to their composition for their growth. Microbial populations have a significant impact in the production of cheese, butter, yogurt, etc. in terms of their organoleptic quality and at the same time some also cause their breakdown. In this paper, the microbiological contamination of soft cheese, butter and yogurt produced in the country (domestic) and imported is assessed, as an indicator of hygiene with impact on public health. The study was extended during September 2018-June 2019 and was divided into three periods, September-December, January-March, and April-June. During this study, a total of 120 samples were analyzed, of which 60 samples of cheese and butter locally produced, and 60 samples of imported soft cheese and butter productions. The microbial indicators analyzed are Staphylococcus aureus and E. coli. Analyzes have been conducted at the Food Safety Laboratory (FSIV) in Tirana in accordance with EU Regulation 2073/2005. Sampling was performed according to the specific international standards for these products (ISO 6887 and ISO 8261). Sampling and transport of samples were done under sterile conditions. Also, coding of samples was done to preserve the anonymity of subjects. After the analysis, the country's soft cheese products compared to imports were more contaminated with S. aureus and E. coli. Meanwhile, the imported butter samples that were analyzed, resulted within norms compared to domestic ones. Based on the results, it was concluded that the microbial quality of samples of cheese, butter and yogurt analyzed remains a real problem for hygiene in Albania. The study will also serve business operators in Albania to improve their work to ensure good hygiene on the basis of the HACCP plan and to provide a guarantee of consumer health.Keywords: consumer, health, dairy, by-products, microbial
Procedia PDF Downloads 127423 Occupational Exposure and Contamination to Antineoplastic Drugs of Healthcare Professionals in Mauritania
Authors: Antoine Villa, Moustapha Mohamedou, Florence Pilliere, Catherine Verdun-Esquer, Mathieu Molimard, Mohamed Sidatt Cheikh El Moustaph, Mireille Canal-Raffin
Abstract:
Context: In Mauritania, the activity of the National Center of Oncology (NCO) has steadily risen leading to an increase in the handling of antineoplastic drugs (AD) by healthcare professionals. In this context, the AD contamination of those professionals is a major concern for occupational physicians. It has been evaluated using biological monitoring of occupational exposure (BMOE). Methods: The intervention took place in 2015, in 2 care units, and evaluated nurses preparing and/or infusing AD and agents in charge of hygiene. Participants provided a single urine sample, at the end of the week, at the end of their shift. Five molecules were sought using specific high sensitivity methods (UHPLC-MS/MS) with very low limits of quantification (LOQ) (cyclophosphamide (CP), Ifosfamide (IF), methotrexate (MTX): 2.5ng/L; doxorubicin (Doxo): 10ng/L; α-fluoro-β-alanine (FBAL, 5-FU metabolite): 20ng/L). A healthcare worker was considered as 'contaminated' when an AD was detected at a urine concentration equal to or greater than the LOQ of the analytical method or at trace concentration. Results: Twelve persons participated (6 nurses, 6 agents in charge of hygiene). Twelve urine samples were collected and analyzed. The percentage of contamination was 66.6% for all participants (n=8/12), 100% for nurses (6/6) and 33% for agents in charge of hygiene (2/6). In 62.5% (n=5/8) of the contaminated workers, two to four of the AD were detected in the urine. CP was found in the urine of all contaminated workers. FBAL was found in four, MTX in three and Doxo in one. Only IF was not detected. Urinary concentrations (all drugs combined) ranged from 3 to 844 ng/L for nurses and from 3 to 44 ng/L for agents in charge of hygiene. The median urinary concentrations were 87 ng/L, 15.1 ng/L and 4.4 ng/L for FBAL, CP and MTX, respectively. The Doxo urinary concentration was found 218ng/L. Discussion: There is no current biological exposure index for the interpretation of AD contamination. The contamination of these healthcare professionals is therefore established by the detection of one or more AD in urine. These urinary contaminations are higher than the LOQ of the analytical methods, which must be as low as possible. Given the danger of AD, the implementation of corrective measures is essential for the staff. Biological monitoring of occupational exposure is the most reliable process to identify groups at risk, tracing insufficiently controlled exposures and as an alarm signal. These results show the necessity to educate professionals about the risks of handling AD and/or to care for treated patients.Keywords: antineoplastic drugs, Mauritania, biological monitoring of occupational exposure, contamination
Procedia PDF Downloads 316422 Democracy Bytes: Interrogating the Exploitation of Data Democracy by Radical Terrorist Organizations
Authors: Nirmala Gopal, Sheetal Bhoola, Audecious Mugwagwa
Abstract:
This paper discusses the continued infringement and exploitation of data by non-state actors for destructive purposes, emphasizing radical terrorist organizations. It will discuss how terrorist organizations access and use data to foster their nefarious agendas. It further examines how cybersecurity, designed as a tool to curb data exploitation, is ineffective in raising global citizens' concerns about how their data can be kept safe and used for its acquired purpose. The study interrogates several policies and data protection instruments, such as the Data Protection Act, Cyber Security Policies, Protection of Personal Information(PPI) and General Data Protection Regulations (GDPR), to understand data use and storage in democratic states. The study outcomes point to the fact that international cybersecurity and cybercrime legislation, policies, and conventions have not curbed violations of data access and use by radical terrorist groups. The study recommends ways to enhance cybersecurity and reduce cyber risks using democratic principles.Keywords: cybersecurity, data exploitation, terrorist organizations, data democracy
Procedia PDF Downloads 204421 Digital Immunity System for Healthcare Data Security
Authors: Nihar Bheda
Abstract:
Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology
Procedia PDF Downloads 67420 Youth Health Promotion Project for Indigenous People in Canada: Together against Bullying and Cyber-Dependence
Authors: Mohamed El Fares Djellatou, Fracoise Filion
Abstract:
The Ashukin program that means bridge in Naskapi or Atikamekw language, has been designed to offer a partnership between nursing students and an indigenous community. The students design a health promotion project tailored to the needs of the community. The issues of intimidation in primary school and cyber-dependence in high school were some concerns in a rural Atikamekw community. The goal of the project was to have a conversation with indigenous youths, aged 10-16 years old, on the challenges presented by intimidation and cyber dependence as well as promoting healthy relationships online and within the community. Methods: Multiple progressive inquiry questions (PIQs) were used to assess the feasibility and importance of this project for the Atikamekw nation, and to determine a plan to follow. The theoretical foundations to guide the conception of the project were the Population Health Promotion Model (PHPM), the First Nations Holistic Lifelong Learning Model, and the Medicine Wheel. A broad array of social determinants of health were addressed, including healthy childhood development, personal health practices, and coping skills, and education. The youths were encouraged to participate in interactive educational sessions, using PowerPoint presentations and pamphlets as the main effective strategies. Additional tools such as cultural artworks and physical activities were introduced to strengthen the inter-relational and team spirit within the Indigenous population. A quality assurance tool (QAT) was developed specifically to determine the appropriateness of these health promotion tools. Improvements were guided by the feedback issued by the indigenous schools’ teachers and social workers who filled the QATs. Post educational sessions, quantitative results have shown that 93.48% of primary school students were able to identify the different types of intimidation, 72.65% recognized more than two strategies, and 52.1% were able to list at least four resources to diffuse intimidation. On the other hand, around 75% of the adolescents were able to name at least three negative effects, and 50% listed three strategies to reduce cyber-dependence. This project was meant to create a bridge with the First Nation through health promotion, a population that is known to be disadvantaged due to systemic health inequity and disparities. Culturally safe care was proposed to deal with the two identified priority issues, and an educational toolkit was given to both schools to ensure the sustainability of the project. The project was self-financed through fundraising activities, and it yielded better results than expected.Keywords: indigenous, first nation, bullying, cyber-dependence, internet addiction, intimidation, youth, adolescents, school, community nursing, health promotion
Procedia PDF Downloads 98