Search results for: cyber physical social systems
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 21622

Search results for: cyber physical social systems

21472 Physical Activity Self-Efficacy among Pregnant Women with High Risk for Gestational Diabetes Mellitus: A Cross-Sectional Study

Authors: Xiao Yang, Ji Zhang, Yingli Song, Hui Huang, Jing Zhang, Yan Wang, Rongrong Han, Zhixuan Xiang, Lu Chen, Lingling Gao

Abstract:

Aim and Objectives: To examine physical activity self-efficacy, identify its predictors, and further explore the mechanism of action among the predictors in mainland Chinese pregnant women with high risk for gestational diabetes mellitus (GDM). Background: Physical activity could protect pregnant women from developing GDM. Physical activity self-efficacy was the key predictor of physical activity. Design: A cross-sectional study was conducted from October 2021 to May 2022 in Zhengzhou, China. Methods: 252 eligible pregnant women completed the Pregnancy Physical Activity Self-efficacy Scale, the Social Support for Physical Activity Scale, the Knowledge on Physical Activity Questionnaire, the 7-item Generalized Anxiety Disorder scale, the Edinburgh Postnatal Depression Scale, and a socio-demographic data sheet. Multiple linear regression was applied to explore the predictors of physical activity self-efficacy. Structural equation modeling was used to explore the mechanism of action among the predictors. Results: Chinese pregnant women with a high risk for GDM reported a moderate level of physical activity self-efficacy. The best-fit regression analysis revealed four variables explained 17.5% of the variance in physical activity self-efficacy. Social support for physical activity was the strongest predictor, followed by knowledge of the physical activity, intention to do physical activity, and anxiety symptoms. The model analysis indicated that knowledge of physical activity could release anxiety and depressive symptoms and then increase physical activity self-efficacy. Conclusion: The present study revealed a moderate level of physical activity self-efficacy. Interventions targeting pregnant women with high risk for GDM need to include the predictors of physical activity self-efficacy. Relevance to clinical practice: To facilitate pregnant women with high risk for GDM to engage in physical activity, healthcare professionals may find assess physical activity self-efficacy and intervene as soon as possible on their first antenatal visit. Physical activity intervention programs focused on self-efficacy may be conducted in further research.

Keywords: physical activity, gestational diabetes, self-efficacy, predictors

Procedia PDF Downloads 62
21471 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 48
21470 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 133
21469 Bystander Perceived Severity on Traditional versus Cyber Bullying

Authors: C. Smith, T. Goga, T. Hancock

Abstract:

Bullying has been an increasingly prevalent problem among society for decades. Approximately one out of every four students report being bullied at least once during the school year. Additionally, these instances of bullying are often witnessed but not reported by the bystanders, which could be dependent on the type of bullying situation. Thus, the present study aims to investigate any possible perceptual differences which may exist between traditional bullying (i.e., face to face) and cyberbullying from the bystander’s point of view. Undergraduate students were given a bullying scenario to read from either the traditional condition or the cyber condition. They were then asked to rate how severe they perceived this behavior on a Likert based scale. Participants were also asked if they would intervene (yes or no) and what their individual response would be to the witnessed behavior (report/ignore/confront/other). Results indicated that, while there was no significant difference in perceived severity between the two bullying conditions, there was a significant difference in whether or not participants would intervene between the two types of scenarios. A significant effect was also found between the scenarios for response type. Together, these findings suggest that even though individuals may not be aware of how severe they perceive certain bullying behaviors, the responses they exhibit might suggest otherwise.

Keywords: bullying, bystander, cyber, severity, traditional

Procedia PDF Downloads 116
21468 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 78
21467 Communication Layer Security in Smart Farming: A Survey on Wireless Technologies

Authors: Hossein Mohammadi Rouzbahani, Hadis Karimipour, Evan Fraser, Ali Dehghantanha, Emily Duncan, Arthur Green, Conchobhair Russell

Abstract:

Human population growth has driven rising demand for food that has, in turn, imposed huge impacts on the environment. In an effort to reconcile our need to produce more sustenance while also protecting the world’s ecosystems, farming is becoming more reliant on smart tools and communication technologies. Developing a smart farming framework allows farmers to make more efficient use of inputs, thus protecting water quality and biodiversity habitat. Internet of Things (IoT), which has revolutionized every sphere of the economy, is being applied to agriculture by connecting on-farm devices and providing real-time monitoring of everything from environmental conditions to market signals through to animal health data. However, utilizing IoT means farming networks are now vulnerable to malicious activities, mostly when wireless communications are highly employed. With that in mind, this research aims to review different utilized communication technologies in smart farming. Moreover, possible cyber-attacks are investigated to discover the vulnerabilities of communication technologies considering the most frequent cyber-attacks that have been happened.

Keywords: smart farming, Internet of Things, communication layer, cyber-attack

Procedia PDF Downloads 213
21466 Profile of Internet and Smartphone Overuse Based on Internet Usage Needs

Authors: Yeoju Chung

Abstract:

Adolescents internet and smartphone addiction are increasing in Korea. But differences between internet addiction and smartphone addiction have been researched in these days. The main objective of this article is to explore the presence of clusters within a sample of adolescents based on dimensions associated with addiction and internet usage needs. The sample consists of 617 adolescents in the 14-19 year age group who were recruited in Korea A cluster analysis identified four groups of participants: internet overuse(IO), smartphone overuse(SO), both overuse(B) and normal(N) use group. MANOVA analysis based on internet usage showed that there are differences among four groups in internet usage needs. IO has higher cyber self-seeking needs and emotion and thought expression needs than SO. SO has higher real relationship and life needs with cyberworld than IO, B, and N. B has the highest cyber self-seeking needs and emotion and thought expression needs, however, game fun seeking needs is the highest in IO. These results support that IO seeks game fun needs, SO seeks real relationship and life needs, and B seeks cyber self and expression in cyberworld.

Keywords: addiction, internet, needs, smartphone

Procedia PDF Downloads 253
21465 False Assumptions Made in Cybersecurity Curriculum: K-12

Authors: Nathaniel Evans, Jessica Boersma, Kenneth Kass

Abstract:

With technology and STEM fields growing every day, there is a significant projected shortfall in qualified cybersecurity workers. As such, it is essential to develop a cybersecurity curriculum that builds skills and cultivates interest in cybersecurity early on. With new jobs being created every day and an already significant gap in the job market, it is vital that educators are pro-active in introducing a cybersecurity curriculum where students are able to learn new skills and engage in an age-appropriate cyber curriculum. Within this growing world of cybersecurity, students should engage in age-appropriate technology and cybersecurity curriculum, starting with elementary school (k-5), extending through high school, and ultimately into college. Such practice will provide students with the confidence, skills, and, ultimately, the opportunity to work in the burgeoning information security field. This paper examines educational methods, pedagogical practices, current cybersecurity curricula, and other educational resources and conducts analysis for false assumptions and developmental appropriateness. It also examines and identifies common mistakes with current cyber curriculum and lessons and discuss strategies for improvement. Throughout the lessons that were reviewed, many common mistakes continued to pop up. These mistakes included age appropriateness, technology resources that were available, and consistency of student’s skill levels. Many of these lessons were written for the wrong grade levels. The ones written for the elementary level all had activities that assumed that every student in the class could read at grade level and also had background knowledge of the cyber activity at hand, which is not always the case. Another major mistake was that these lessons assumed that all schools had any kind of technology resource available to them. Some schools are 1:1, and others are only allotted three computers in their classroom where the students have to share. While coming up with a cyber-curriculum, it has to be kept in mind that not all schools are the same, not every classroom is the same. There are many students who are not reading at their grade level or have not had exposure to the digital world. We need to start slow and ease children into the cyber world. Once they have a better understanding, it will be easier to move forward with these lessons and get the students engaged. With a better understanding of common mistakes that are being made, a more robust curriculum and lessons can be created that no only spark a student’s interest in this much-needed career field but encourage learning while keeping our students safe from cyber-attacks.

Keywords: assumptions, cybersecurity, k-12, teacher

Procedia PDF Downloads 139
21464 Axiomatic Design and Organization Design: Opportunities and Challenges in Transferring Axiomatic Design to the Social Sciences

Authors: Nicolay Worren, Christopher A. Brown

Abstract:

Axiomatic design (AD) has mainly been applied to support the design of physical products and software solutions. However, it was intended as a general design approach that would also be applicable to the design of social systems, including organizations (i.e., organization design). In this article, we consider how AD may be successfully transferred to the field of organizational design. On the one hand, it provides a much-needed pragmatic approach that can help leaders clarify the link between the purpose and structure of their organizations, identify ineffective organizational structures, and increase the chance of achieving strategic goals. On the other hand, there are four conceptual challenges that may create uncertainty and resistance among scholars and practitioners educated in the social sciences: 1) The exclusive focus in AD on negative interdependencies ('coupling'); 2) No obvious way of representing the need for integration across design parameters (DPs); 3) A lack of principles for handling control processes that seem to require 'deliberate coupling' of FRs; and 4) A lack of principles for handling situations where conflicting FRs (i.e., coupling) might require integration rather than separation. We discuss alternative options for handling these challenges so that scholars and practitioners can make use of AD for organization design.

Keywords: axiomatic design, organization design, social systems, concept definitions

Procedia PDF Downloads 97
21463 Leveraging Digital Cyber Technology for Self-Care and Improved Management of DMPA-SC Clients

Authors: Oluwaseun Adeleke, Grace Amarachi Omenife, Jennifer Adebambo, Mopelola Raji, Anthony Nwala, Mogbonjubade Adesulure

Abstract:

Introduction: The incorporation of digital technology in healthcare systems is instrumental in transforming the delivery, management, and overall experience of healthcare and holds the potential to scale up access through over 200 million active mobile phones used in Nigeria. Digital tools enable increased access to care, stronger client engagement, progress in research and data-driven insights, and more effective promotion of self-care and do-it-yourself practices. The Delivering Innovation in Self-Care (DISC) project 2021 has played a pivotal role in granting women greater autonomy over their sexual and reproductive health (SRH) through a variety of approaches, including information and training to self-inject contraception (DMPA-SC). To optimize its outcomes, the project also leverages digital technology platforms like social media: Facebook, Instagram, and Meet Tina (Chatbot) via WhatsApp, Customer Relationship Management (CRM) applications Freshworks, and Viamo. Methodology: The project has been successful at optimizing in-person digital cyberspace interaction to sensitize individuals effectively about self-injection and provide linkages to SI services. This platform employs the Freshworks CRM software application, along with specially trained personnel known as Cyber IPC Agents and DHIS calling centers. Integration of Freshworks CRM software with social media allows a direct connection with clients to address emerging issues, schedule follow-ups, send reminders to improve compliance with self-injection schedules, enhance the overall user experience for self-injection (SI) clients, and generate comprehensive reports and analytics on client interactions. Interaction covers a range of topics, including – How to use SI, learning more about SI, side-effects and its management, accessing services, fertility, ovulation, other family planning methods, inquiries related to Sexual Reproductive Health as well as uses an address log to connect them with nearby facilities or online pharmaceuticals. Results: Between the months of March to September, a total of 5,403 engagements were recorded. Among these, 4,685 were satisfactorily resolved. Since the program's inception, digital advertising has created 233,633,075 impressions, reached 12,715,582 persons, and resulted in 3,394,048 clicks. Conclusion: Leveraging digital technology has proven to be an invaluable tool in client management and improving client experience. The use of Cyber technology has enabled the successful development and maintenance of client relationships, which have been effective at providing support, facilitating delivery and compliance with DMPA-SC self-injection services, and ensuring overall client satisfaction. Concurrently, providing qualitative data, including user experience feedback, has enabled the derivation of crucial insights that inform the decision-making process and guide in normalizing self-care behavior.

Keywords: selfcare, DMPA-SC self-injection, digital technology, cyber technology, freshworks CRM software

Procedia PDF Downloads 40
21462 Effect of Physical and Breathing Exercises on Quality of Life and Psychophysical Status among Haemodialysis Patients: A Scoping Review

Authors: Noof Eid Al Shammari

Abstract:

Background: Living with haemodialysis (HD) can impose several physical and social restrictions on the lives of individuals. Usually, the patient has three dialysis sessions per week that each run for three to four hours. This limits the social life of patients and causes a lower quality of life, in conjunction with the fact that people with chronic kidney disease must follow strict fluid and food regimens and use multiple medications. Given these factors, patients undergoing HD generally need psychological support. Objective: This scoping review study aims to evaluate the effectiveness of physical and breathing exercises on quality of life (QOL) and psychophysical status in patients undergoing HD. Methodology: Searches for relevant studies were performed in four databases (MEDLINE, CINAHL, Google Scholar, and PubMed) for articles published between 2011 and 2021. Out of all the searched literature, ten studies met the inclusion criteria (8 randomised controlled trials, one quasi-experimental study, and one pilot study), with a total of 588 patients. Different types of physical and breathing exercises were used (breathing, cardiopulmonary, and physical exercises). Results: All included studies in this scoping review revealed that most of the aerobic or anaerobic exercises, as well as breathing exercises, had a positive effect and significantly improved patients’ QOL, physical functioning, and psychological status. Conclusions: In this review, most of the articles demonstrated a positive effect of physical and breathing exercises on the QOL and psychophysical status of HD patients. Based on the findings of these studies, physical and breathing exercises were shown to improve muscle strength and other health-related aspects of QOL, including sexual, social, cognitive, and physical functions. However, more studies will need to be conducted with a larger sample to determine the best intervention that could be implemented and standardised in nursing care for patients undergoing HD.

Keywords: physical exercise, breathing exercises, quality of life, depression, hemodialysis

Procedia PDF Downloads 82
21461 The Influense of Alternative Farming Systems on Physical Parameters of the Soil

Authors: L. Masilionyte, S. Maiksteniene

Abstract:

Alternative farming systems are used to cultivate high quality food products and retain the viability and fertility of soil. The field experiments of different farming systems were conducted at Joniškėlis Experimental Station of the Lithuanian Research Centre for Agriculture and Forestry in 2006–2013. The soil of the experimental site was Endocalcari-Endohypogleyic Cambisol (CMg-n-w-can). In different farming systems, farmyard manure, straw and green manure catch crops used for fertilization both in the soil low in humus and in the soil moderate in humus. In the 0–20 cm depth layer, it had a more significant effect on soil moisture than on other physical soil properties. In the agricultural systems, in which catch crops had been grown, soil physical characteristics did not differ significantly before their biomass incorporation, except for the moisture content, which was lower in rainy periods and higher in drier periods than in the soil without catch crops. Soil bulk density and porosity in the topsoil layer were more dependent on soil humus content than on agricultural measures used: in the soil moderate in humus content, compared with the soil low in humus, bulk density was by 1.4 % lower, and porosity by 1.8 % higher. The research findings create a possibility to make improvements in alternative cropping systems by choosing organic fertilizers and catch crops’ combinations that have the sustainable effect on soil and that maintain the sustainability of soil productivity parameters. Rational fertilization systems, securing the stability of soil productivity parameters and crop rotation productivity will promote a development of organic agriculture.

Keywords: agro-measures, soil physical parameters, organic farming, sustainable farming

Procedia PDF Downloads 381
21460 Landslide Vulnerability Assessment in Context with Indian Himalayan

Authors: Neha Gupta

Abstract:

Landslide vulnerability is considered as the crucial parameter for the assessment of landslide risk. The term vulnerability defined as the damage or degree of elements at risk of different dimensions, i.e., physical, social, economic, and environmental dimensions. Himalaya region is very prone to multi-hazard such as floods, forest fires, earthquakes, and landslides. With the increases in fatalities rates, loss of infrastructure, and economy due to landslide in the Himalaya region, leads to the assessment of vulnerability. In this study, a methodology to measure the combination of vulnerability dimension, i.e., social vulnerability, physical vulnerability, and environmental vulnerability in one framework. A combined result of these vulnerabilities has rarely been carried out. But no such approach was applied in the Indian Scenario. The methodology was applied in an area of east Sikkim Himalaya, India. The physical vulnerability comprises of building footprint layer extracted from remote sensing data and Google Earth imaginary. The social vulnerability was assessed by using population density based on land use. The land use map was derived from a high-resolution satellite image, and for environment vulnerability assessment NDVI, forest, agriculture land, distance from the river were assessed from remote sensing and DEM. The classes of social vulnerability, physical vulnerability, and environment vulnerability were normalized at the scale of 0 (no loss) to 1 (loss) to get the homogenous dataset. Then the Multi-Criteria Analysis (MCA) was used to assign individual weights to each dimension and then integrate it into one frame. The final vulnerability was further classified into four classes from very low to very high.

Keywords: landslide, multi-criteria analysis, MCA, physical vulnerability, social vulnerability

Procedia PDF Downloads 282
21459 Perceived Ethnic Discrimination, Aggression, and School Connectedness among Adolescents in Finland

Authors: Isik Z. Ulubas, Kaj Bjorkqvist

Abstract:

The relationships between perceived ethnic discrimination, peer aggression and school connectedness are being examined among 1,000 adolescents in Ostrobothnia, Finland with an online questionnaire. The study aims at investigating perceived ethnic discrimination in school environment by peers and teachers, and within society in general. Six types of aggressive behavior are measured: physical, verbal, indirect, and cyber aggression, in addition to both verbal and physical sexual harassment. High perceived ethnic discrimination is expected to be related with high aggression and low school connectedness. Adolescents who have special diet and clothing because of their cultural or religious background are expected to score higher on perceived ethnic discrimination and lower school connectedness. Adolescents who have lower domestic language skills (Finnish/Swedish) are expected to show lower school connectedness and higher perceived ethnic discrimination.

Keywords: adolescents, aggression, ethnic discrimination, school connectedness

Procedia PDF Downloads 196
21458 A Framework for Event-Based Monitoring of Business Processes in the Supply Chain Management of Industry 4.0

Authors: Johannes Atug, Andreas Radke, Mitchell Tseng, Gunther Reinhart

Abstract:

In modern supply chains, large numbers of SKU (Stock-Keeping-Unit) need to be timely managed, and any delays in noticing disruptions of items often limit the ability to defer the impact on customer order fulfillment. However, in supply chains of IoT-connected enterprises, the ERP (Enterprise-Resource-Planning), the MES (Manufacturing-Execution-System) and the SCADA (Supervisory-Control-and-Data-Acquisition) systems generate large amounts of data, which generally glean much earlier notice of deviations in the business process steps. That is, analyzing these streams of data with process mining techniques allows the monitoring of the supply chain business processes and thus identification of items that deviate from the standard order fulfillment process. In this paper, a framework to enable event-based SCM (Supply-Chain-Management) processes including an overview of core enabling technologies are presented, which is based on the RAMI (Reference-Architecture-Model for Industrie 4.0) architecture. The application of this framework in the industry is presented, and implications for SCM in industry 4.0 and further research are outlined.

Keywords: cyber-physical production systems, event-based monitoring, supply chain management, RAMI (Reference-Architecture-Model for Industrie 4.0)

Procedia PDF Downloads 206
21457 Commutativity of Fractional Order Linear Time-Varying Systems

Authors: Salisu Ibrahim

Abstract:

The paper studies the commutativity associated with fractional order linear time-varying systems (LTVSs), which is an important area of study in control systems engineering. In this paper, we explore the properties of these systems and their ability to commute. We proposed the necessary and sufficient condition for commutativity for fractional order LTVSs. Through a simulation and mathematical analysis, we demonstrate that these systems exhibit commutativity under certain conditions. Our findings have implications for the design and control of fractional order systems in practical applications, science, and engineering. An example is given to show the effectiveness of the proposed method which is been computed by Mathematica and validated by the use of MATLAB (Simulink).

Keywords: fractional differential equation, physical systems, equivalent circuit, analog control

Procedia PDF Downloads 88
21456 Locally Crafted Sustainability: A Scoping Review for Nesting Social-Ecological and Socio-Technical Systems Towards Action Research in Agriculture

Authors: Marcia Figueira

Abstract:

Context: Positivist transformations in agriculture were responsible for top-down – often coercive – mechanisms of uniformed modernization that weathered local diversities and agency. New development pathways need to now shift according to comprehensive integrations of knowledge - scientific, indigenous, and local, and to be sustained on political interventions, bottom-up change, and social learning if climate goals are to be met – both in mitigation and adaptation. Objectives The objectives of this research are to understand how social-ecological and socio-technical systems characterisation can be nested to bridge scientific research/knowledge into a local context and knowledge system; and, with it, stem sustainable innovation. Methods To do so, we conducted a scoping review to explore theoretical and empirical works linked to Ostrom’s Social-Ecological Systems framework and Geels’ multi-level perspective of socio-technical systems transformations in the context of agriculture. Results As a result, we were able to identify key variables and connections to 1- understand the rules in use and the community attributes influencing resource management; and 2- how they are and have been shaped and shaping systems innovations. Conclusion Based on these results, we discuss how to leverage action research for mutual learning toward a replicable but highly place-based agriculture transformation frame.

Keywords: agriculture systems innovations, social-ecological systems, socio-technical systems, action research

Procedia PDF Downloads 66
21455 Influence of Psychosocial Factors on Physical Activity Level among Individuals with Asthma

Authors: Awotidebe Taofeek, Oyinsuyi Oluwafunmbi

Abstract:

Psychosocial factors play a significant role in physical activity participation in diseased conditions and the general population. However, little is known about the role of exercise self-efficacy (ESE), exercise perceived barriers (EPB), and social support (SOS) in patients with asthma. This study investigated the influence of psychosocial factors on physical activity participation in patients with asthma in ile-ife. This cross-sectional study involved 130 patients with asthma. They were recruited from the Chest Clinic of the Obafemi Awolowo University Teaching Hospitals Complex, Ile-ife using purposive sampling technique. Ethical approval was obtained from the Ethics and Research Committee of the Obafemi Awolowo University Teaching Hospitals Complex, Ile-ife, Nigeria. Socio-demographic characteristics of respondents were recorded. Information on ESE, EPB, and SOS were obtained using Exercise Self-Efficacy, Exercise Benefit, and Barrier and Medical Outcome Social Support Scales respectively. Physical activity level was assessed in the last 7 days using international physical activity questionnaire. Descriptive and inferential statistics were used to analyze the data. Alpha level was set at p<0.5. The mean age of the respondents was 25.15 ± 9.38, and a majority, 110 (84.60%), engaged in low physical activity, 69(53%) had low exercise self-efficacy. However, less than two-third 80 (62.20%) reported high social support, with the majority of 95 (73.10%) reported high exercise perceived barriers. The means of ESE for male and femalerespondents were 29.01 ± 20.62 and 24.35 ± 17.36, respectively. The means of SOS formale and female respondents were 49.52 ± 22.22 and 61.87 ± 22.66, respectively. Themeans of EPB for male and female respondents were 53.37 ± 10.23 and 57.43 ± 9.65, respectively. The respondents were comparable in exercise self-efficacy and physicalactivity level (p>0.05). However, there were significant differences in social support (t=-2.791; p=0.006) and exercise perceived barriers (t=-2.108, p=0.037).Theresultsshowthattherewasasignificantrelationshipbetweenexerciseperceivedbarriersandlowphysicalactivitylevel(r=-0.216;p=0.023).TherewasasignificantassociationbetweenExerciseself-efficacyandmarried individuals(OR=0.967;95%CI=0.936-0.998;p= 0.037). Similarly, However,thereweresignificantassociationsbetweensocialsupport Andagegroup35-54years(OR=1.036;95%CI=1.007-1.067;p=0.014),females(OR= 1.024;95%CI=1.006;p=0.009)andmarriedindividuals(OR=1.049;95%CI=1.020-1.079. p=0.001).Therewasasignificantassociationbetweenexerciseperceivedbarriersand females(OR=1.043;95%CI=1.002-1.085;p=0.040).However, thereweresignificant associationsbetweenexerciseperceivedbarriersandoccupationgroup;civilservants (OR=1.092;95%CI=1.009-1.182;p=0.028),retiree(OR=1.092;95%CI=1.040-1.469;p= 0.016)andstudents(OR=1.110;95%CI=1.040;p=0.002). Inconclusion,agreaterpercentageofpatientswithasthmahadlowphysicalactivityleveland it was associatedwithhighexerciseperceivedbarriers,whileexerciseself-efficacyandsocialsupportwerenot.

Keywords: asthma, psychosocial factors, physical activity, physical fitness

Procedia PDF Downloads 106
21454 Computer Fraud from the Perspective of Iran's Law and International Documents

Authors: Babak Pourghahramani

Abstract:

One of the modern crimes against property and ownership in the cyber-space is the computer fraud. Despite being modern, the aforementioned crime has its roots in the principles of religious jurisprudence. In some cases, this crime is compatible with the traditional regulations and that is when the computer is considered as a crime commitment device and also some computer frauds that take place in the context of electronic exchanges are considered as crime based on the E-commerce Law (approved in 2003) but the aforementioned regulations are flawed and until recent years there was no comprehensive law in this regard; yet after some years the Computer Crime Act was approved in 2009/26/5 and partly solved the problem of legal vacuum. The present study intends to investigate the computer fraud according to Iran's Computer Crime Act and by taking into consideration the international documents.

Keywords: fraud, cyber fraud, computer fraud, classic fraud, computer crime

Procedia PDF Downloads 308
21453 Agro-Measures Influence Soil Physical Parameters in Alternative Farming

Authors: Laura Masilionyte, Danute Jablonskyte-Rasce, Kestutis Venslauskas, Zita Kriauciuniene

Abstract:

Alternative farming systems are used to cultivate high-quality food products and sustain the viability and fertility of the soil. Plant nutrition in all ecosystems depends not only on fertilization intensity or soil richness in organic matter but also on soil physical parameters –bulk density, structure, pores with the optimum moisture and air ratio available to plants. The field experiments of alternative (sustainable and organic) farming systems were conducted at Joniskelis Experimental Station of the Lithuanian Research Centre for Agriculture and Forestry in 2006–2016. The soil of the experimental site was Endocalcari-Endohypogleyic Cambisol (CMg-n-w-can). In alternative farming systems, farmyard manure, straw and catch crops for green manure were used for fertilization both in the soil with low and moderate humus contents. It had a more significant effect in the 0–20 cm depth layer on soil moisture than on other physical soil properties. In the agricultural systems, where catch crops were grown, soil physical characteristics did not differ significantly before their biomass incorporation, except for the moisture content, which was lower in rainy periods and higher in drier periods than in the soil of farming systems without catch crops. Soil bulk density and porosity in the topsoil layer were more dependent on soil humus content than on agricultural measures used: in the soil with moderate humus content, compared with the soil with low humus content, bulk density was by 1.4% lower, and porosity by 1.8% higher. The research findings allow to make improvements in alternative farming systems by choosing appropriate combinations of organic fertilizers and catch crops that have a sustainable effect on soil and maintain the sustainability of soil productivity parameters. Rational fertilization systems, securing the stability of soil productivity parameters and crop rotation productivity will promote the development of organic agriculture.

Keywords: agro-measures, soil physical parameters, organic farming, sustainable farming

Procedia PDF Downloads 105
21452 Role of Physical Appearance in Associating People with a Group Identity

Authors: Gurleen Kaur

Abstract:

Being tall-short, fat-thin, black-white, etc. is an inevitable part of how people perceive you. This association of people with your external appearance carves out an identity for you. This paper will look at the reasons why people relate a person to a particular categorization on the basis of his/her physical appearance. The paper delves into reasons for this categorization into groups: Subconscious grouping, personal gain, ease of relating to the group, and social acceptance. Development of certain unique physical features also leads to a person relating himself to a collective identity. Thus, this paper will support the fact that physical appearance plays a crucial role in categorization of people into groups and hence forming a group identity for them. This paper is divided into three parts. The first part will discuss what physical appearance is and how is it linked to our daily lives. The second part will talk about why it works i.e. why this factor of external appearance is important in formation of identity. The last part will talk about the factors which lead to categorization of identity because of physical appearance.

Keywords: group identity, physical appearance, subconscious grouping, collective identity

Procedia PDF Downloads 399
21451 Information Technology and the Challenges Facing the Legal Profession in Nigeria

Authors: Odoh Ben Uruchi

Abstract:

Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.

Keywords: information technology, challenges, legal profession, Nigeria

Procedia PDF Downloads 496
21450 Personalized Social Resource Recommender Systems on Interest-Based Social Networks

Authors: C. L. Huang, J. J. Sia

Abstract:

The interest-based social networks, also known as social bookmark sharing systems, are useful platforms for people to conveniently read and collect internet resources. These platforms also providing function of social networks, and users can share and explore internet resources from the social networks. Providing personalized internet resources to users is an important issue on these platforms. This study uses two types of relationship on the social networks—following and follower and proposes a collaborative recommender system, consisting of two main steps. First, this study calculates the relationship strength between the target user and the target user's followings and followers to find top-N similar neighbors. Second, from the top-N similar neighbors, the articles (internet resources) that may interest the target user are recommended to the target user. In this system, users can efficiently obtain recent, related and diverse internet resources (knowledge) from the interest-based social network. This study collected the experimental dataset from Diigo, which is a famous bookmark sharing system. The experimental results show that the proposed recommendation model is more accurate than two traditional baseline recommendation models but slightly lower than the cosine model in accuracy. However, in the metrics of the diversity and executing time, our proposed model outperforms the cosine model.

Keywords: recommender systems, social networks, tagging, bookmark sharing systems, collaborative recommender systems, knowledge management

Procedia PDF Downloads 145
21449 The Visually Impaired Jogger: Enhancing Interaction and Fitness through the Fun Run

Authors: Zasha Romero, Joe Paschall

Abstract:

This poster will detail the importance of physical activity for the Visually Impaired students and how to promote inclusion in fitness through way of social gatherings and jogging. Furthermore, it will demonstrate how a Health & Kinesiology University Club cooperated in the journey of visually impaired students from participating in physical activity to completing their first 10K fun run. Purpose: The poster will detail how a university’s Health & Kinesiology Club developed a program to promote participation in fitness activities for visually impaired individuals. Also, it will detail their journey from participation in physical activity to completing a 10K fun run. Methods: In an effort to promote inclusion of all into physical activity, a university’s Health & Kinesiology Club developed a non-profit program to challenge visually impaired students to train and complete a 10 kilometer fun run in a South Texas town. The idea was to promote physical fitness through way of social interaction. In order to maintain runners interested, Club students developed training plans and strategies to be able to navigate in a race that was attended by over 18,000 runners. The idea was to promote interaction and life-long fitness amongst participants. Implications: This strategy was done in collaboration with different non-profit institutions to create awareness and provide opportunities for physical fitness, social interaction and life-long fitness skills associated with the jogging. The workshop provided collaboration amongst different entities and novel ideas to create opportunities for a typically underserved population.

Keywords: inclusion, participation, management, disability, fitness

Procedia PDF Downloads 368
21448 Pattern of Physical Activity and Its Impact on the Quality of Life: A Structural Equation Modelling Analysis

Authors: Ali Maksum

Abstract:

In a number of countries, including Indonesia, the tendency for non-communicable diseases is increasing. As a result, health costs must be paid by the state continues to increase as well. People's lifestyles, including due to lack of physical activity, are thought to have contributed significantly to the problem. This study aims to examine the impact of participation in sports on quality of life, which is reflected in three main indicators, namely health, psychological, and social aspects. The study was conducted in the city of Surabaya and its surroundings, with a total of 490 participants, consisting of 245 men and 245 women with an average age of 45.4 years. Data on physical activity and quality of life were collected by questionnaire and analyzed using structural equation modeling. The test results of the model prove that the value of chi-square = 8,259 with p = .409, RMSEA = .008, NFI = .992, and CFI = 1. This means that the model is compatible with the data. The model explains that physical activity has a significant effect on quality of life. People who exercise regularly are better able to cope with stress, have a lower risk of illness, and have higher pro-social behavior. Therefore, it needs serious efforts from stakeholders, especially the government, to create an ecosystem that allows the growth of movement culture in the community.

Keywords: participation, physical activity, quality of life, structural equation modelling

Procedia PDF Downloads 96
21447 Smart Grids Cyber Security Issues and Challenges

Authors: Imen Aouini, Lamia Ben Azzouz

Abstract:

The energy need is growing rapidly due to the population growth and the large new usage of power. Several works put considerable efforts to make the electricity grid more intelligent to reduce essentially energy consumption and provide efficiency and reliability of power systems. The Smart Grid is a complex architecture that covers critical devices and systems vulnerable to significant attacks. Hence, security is a crucial factor for the success and the wide deployment of Smart Grids. In this paper, we present security issues of the Smart Grid architecture and we highlight open issues that will make the Smart Grid security a challenging research area in the future.

Keywords: smart grids, smart meters, home area network, neighbor area network

Procedia PDF Downloads 396
21446 The Problem of Legal Regulation of Joint Physical Custody: The Polish Perspective

Authors: Katarzyna Kamińska

Abstract:

The main purpose of the work is to present the results of the studies regarding joint physical custody in the Polish legal system. The issues addressed fit into the ongoing process of modernising family law regulations and their adaptation to changing social reality in Poland. The Polish legislator now faces a dilemma: whether to introduce into Polish law a developed substantive or procedural regulation of joint physical custody and then whether it should be considered a legal presumption. Joint physical custody after divorce or separation is theoretically possible in Poland. It can either follow from the court’s independent proposal based on the assessment of the circumstances or from the parenting plan submitted by parents wishing to jointly retain full parental authority. However, joint physical custody does not result directly from the Polish Family and Guardianship Code. Therefore, there is real legal uncertainty in this matter, which leads to different treatment of citizens by the public authorities and courts. Another problem is that joint physical custody is misunderstood by the Polish courts. The main thesis of the work is that joint physical custody does not only mean the system of symmetrical child care (50/50), and the possibility to award joint physical custody will require the courts to carefully weigh the pros and cons of such an arrangement in each individual case.

Keywords: joint physical custody, shared parenting, divorce, separation, parental authority

Procedia PDF Downloads 46
21445 ISIS and Social Media

Authors: Neda Jebellie

Abstract:

New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.

Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies

Procedia PDF Downloads 460
21444 Effects of Screen Time on Children from a Systems Engineering Perspective

Authors: Misagh Faezipour

Abstract:

This paper explores the effects of screen time on children from a systems engineering perspective. We reviewed literature from several related works on the effects of screen time on children to explore all factors and interrelationships that would impact children that are subjected to using long screen times. Factors such as kids' age, parent attitudes, parent screen time influence, amount of time kids spend with technology, psychosocial and physical health outcomes, reduced mental imagery, problem-solving and adaptive thinking skills, obesity, unhealthy diet, depressive symptoms, health problems, disruption in sleep behavior, decrease in physical activities, problematic relationship with mothers, language, social, emotional delays, are examples of some factors that could be either a cause or effect of screen time. A systems engineering perspective is used to explore all the factors and factor relationships that were discovered through literature. A causal model is used to illustrate a graphical representation of these factors and their relationships. Through the causal model, the factors with the highest impacts can be realized. Future work would be to develop a system dynamics model to view the dynamic behavior of the relationships and observe the impact of changes in different factors in the model. The different changes on the input of the model, such as a healthier diet or obesity rate, would depict the effect of the screen time in the model and portray the effect on the children’s health and other factors that are important, which also works as a decision support tool.

Keywords: children, causal model, screen time, systems engineering, system dynamics

Procedia PDF Downloads 121
21443 Theoretical Approach and Proof of Concept Implementation of Adaptive Partition Scheduling Module for Linux

Authors: Desislav Andreev, Veselin Stanev

Abstract:

Linux operating system continues to gain popularity with every passed year. This is due to its open-source license and a great number of distributions, covering users’ needs. At first glance it seems that Linux can be integrated in every type of systems – it is already present in personal computers, smartphones and even in some embedded systems like Raspberry Pi. However, Linux still does not meet the performance and security requirements to run effectively on a real-time system. Real-time systems are very time-restricted – their processes have to execute and finish at strict time intervals. The Completely Fair Scheduler present in Linux does not have such scheduling capabilities and it is not able to ensure that critical-time processes will execute on time. One of the ways to solve this problem is implementing an Adaptive Partition Scheduler solution similar to that present in QNX Neutrino operating system. This type of scheduling divides the CPU in multiple adaptive partitions where each partition holds a percentage of CPU usage called budget, which allows optimal usage of the CPU resources and also provides protection against cyber attacks such as Denial of Service. This approach will also benefit systems, where functional safety is highly demanded, such as the instrumental clusters in the Automotive industry. The purpose of this paper is to present a concept of Adaptive Partition Scheduler designed for Linux-based operating systems.

Keywords: adaptive partitions, Linux kernel modules, real-time systems, scheduling

Procedia PDF Downloads 74