Search results for: online risks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4291

Search results for: online risks

2371 Optimization of the Transfer Molding Process by Implementation of Online Monitoring Techniques for Electronic Packages

Authors: Burcu Kaya, Jan-Martin Kaiser, Karl-Friedrich Becker, Tanja Braun, Klaus-Dieter Lang

Abstract:

Quality of the molded packages is strongly influenced by the process parameters of the transfer molding. To achieve a better package quality and a stable transfer molding process, it is necessary to understand the influence of the process parameters on the package quality. This work aims to comprehend the relationship between the process parameters, and to identify the optimum process parameters for the transfer molding process in order to achieve less voids and wire sweep. To achieve this, a DoE is executed for process optimization and a regression analysis is carried out. A systematic approach is represented to generate models which enable an estimation of the number of voids and wire sweep. Validation experiments are conducted to verify the model and the results are presented.

Keywords: dielectric analysis, electronic packages, epoxy molding compounds, transfer molding process

Procedia PDF Downloads 377
2370 An Evaluation of a Psychotherapeutic Service for Engineering Students: The Role of Race, Gender and Language

Authors: Nazeema Ahmed

Abstract:

Mental health in higher education has received increasing attention over the past few decades. The high academic demands of the engineering degree, coupled with students’ mental health challenges, have led to higher education institutions offering psychotherapeutic services to students. This paper discusses an evaluation of the psychotherapy service at the University of Cape Town. The aim was to determine (i) the efficacy of the service; and (ii) the impact of race, gender, and language of the therapist on the students’ therapeutic process. An online survey was sent to 109 students who attended psychotherapy. The majority expressed favorable experiences of psychotherapy, with reports of increased capacity to engage with their academic work. Most students did not experience the gender, race, or language of the psychologists to be barriers to their therapy. The findings point to a need for ongoing psychological support for students.

Keywords: psychotherapy, efficacy, engineering, education

Procedia PDF Downloads 119
2369 X-Ray Shielding Properties of Bismuth-Borate Glass Doped with Rare-Earth Ions

Authors: Vincent Kheswa

Abstract:

X-rays are ionizing electromagnetic radiation that is used in various industries such as computed tomography scans, dental X-rays, and screening freight trains. However, they pose health risks to humans if they are not shielded properly. In recent years, many researchers around the globe have been searching for nontoxic best possible glass materials for shielding X-rays. In this work, the x-ray shielding properties of 45Na₂O + 10 Bi₂O₃ + (5 - x)TiO₂+ (x) Nb₂O₅ + 40 P₂O₅, were x = 0, 1, 3, 5 mol%, glass materials were studied. The results revealed that the glass sample with the highest TiO2 content has the highest mass and linear attenuation coefficients and lowest half-value thickness, tenth-value thickness and mean-free path in the 20 to 80 keV energy region. The sample with 3 mol% of Nb₂O₅ has the highest mass and linear attenuation coefficients and the lowest half-value thickness, tenth-value thickness, and mean-free path at 15 keV and photon energies between 80 to 300 keV. It was, therefore, concluded that 45Na₂O + 10 Bi₂O₃ + 5 TiO₂ + 40 P₂O₅ glass is best for shielding x-rays of energies between 20 and 80 keV, while 45Na₂O + 10 Bi₂O₃ + 2 TiO₂ + 3 Nb₂O₅ + 40 P₂O₅ is best for shielding 15 keV x-rays and x-rays of energies between 80 keV and 300 keV.

Keywords: bismuth-titanium-phosphate glass, x-ray shielding, LAC, MAC, radiation shielding

Procedia PDF Downloads 53
2368 Bringing Together Student Collaboration and Research Opportunities to Promote Scientific Understanding and Outreach Through a Seismological Community

Authors: Michael Ray Brunt

Abstract:

China has been the site of some of the most significant earthquakes in history; however, earthquake monitoring has long been the provenance of universities and research institutions. The China Digital Seismographic Network was initiated in 1983 and improved significantly during 1992-1993. Data from the CDSN is widely used by government and research institutions, and, generally, this data is not readily accessible to middle and high school students. An educational seismic network in China is needed to provide collaboration and research opportunities for students and engaging students around the country in scientific understanding of earthquake hazards and risks while promoting community awareness. In 2022, the Tsinghua International School (THIS) Seismology Team, made up of enthusiastic students and facilitated by two experienced teachers, was established. As a group, the team’s objective is to install seismographs in schools throughout China, thus creating an educational seismic network that shares data from the THIS Educational Seismic Network (THIS-ESN) and facilitates collaboration. The THIS-ESN initiative will enhance education and outreach in China about earthquake risks and hazards, introduce seismology to a wider audience, stimulate interest in research among students, and develop students’ programming, data collection and analysis skills. It will also encourage and inspire young minds to pursue science, technology, engineering, the arts, and math (STEAM) career fields. The THIS-ESN utilizes small, low-cost RaspberryShake seismographs as a powerful tool linked into a global network, giving schools and the public access to real-time seismic data from across China, increasing earthquake monitoring capabilities in the perspective areas and adding to the available data sets regionally and worldwide helping create a denser seismic network. The RaspberryShake seismograph is compatible with free seismic data viewing platforms such as SWARM, RaspberryShake web programs and mobile apps are designed specifically towards teaching seismology and seismic data interpretation, providing opportunities to enhance understanding. The RaspberryShake is powered by an operating system embedded in the Raspberry Pi, which makes it an easy platform to teach students basic computer communication concepts by utilizing processing tools to investigate, plot, and manipulate data. THIS Seismology Team believes strongly in creating opportunities for committed students to become part of the seismological community by engaging in analysis of real-time scientific data with tangible outcomes. Students will feel proud of the important work they are doing to understand the world around them and become advocates spreading their knowledge back into their homes and communities, helping to improve overall community resilience. We trust that, in studying the results seismograph stations yield, students will not only grasp how subjects like physics and computer science apply in real life, and by spreading information, we hope students across the country can appreciate how and why earthquakes bear on their lives, develop practical skills in STEAM, and engage in the global seismic monitoring effort. By providing such an opportunity to schools across the country, we are confident that we will be an agent of change for society.

Keywords: collaboration, outreach, education, seismology, earthquakes, public awareness, research opportunities

Procedia PDF Downloads 69
2367 Using Tilted Façade to Reduce Thermal Discomfort in a UK Passivhaus Dwelling for a Warming Climate

Authors: Yahya Lavafpour, Steve Sharples

Abstract:

This study investigated the potential negative impacts of future UK climate change on dwellings. In particular, the risk of overheating was considered for a Passivhaus dwelling in London. The study used dynamic simulation modelling software to investigate the potential use of building geometry to control current and future overheating risks in the dwelling for London climate. Specifically, the focus was on the optimum inclination of a south façade to make use of the building’s shape to self-protect itself. A range of different inclined façades were examined to test their effectiveness in reducing the overheating risk. The research found that implementing a 115° tilted façade could completely eliminate the risk of overheating in current climate, but with some consequence for natural ventilation and daylighting. Future overheating was significantly reduced by the tilted façade. However, geometric considerations could not eradicate completely the risk of overheating particularly by the 2080s. The study also used CFD modelling and sensitivity analysis to investigate the effect of the façade geometry on the wind pressure distributions on and around the building surface. This was done to assess natural ventilation flows for alternative façade inclinations.

Keywords: climate change, tilt façade, thermal comfort, passivhaus, overheating

Procedia PDF Downloads 761
2366 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 129
2365 Potentials and Influencing Factors of Dynamic Pricing in Business: Empirical Insights of European Experts

Authors: Christopher Reichstein, Ralf-Christian Härting, Martina Häußler

Abstract:

With a continuously increasing speed of information exchange on the World Wide Web, retailers in the E-Commerce sector are faced with immense possibilities regarding different online purchase processes like dynamic price settings. By use of Dynamic Pricing, retailers are able to set short time price changes in order to optimize producer surplus. The empirical research illustrates the basics of Dynamic Pricing and identifies six influencing factors of Dynamic Pricing. The results of a structural equation modeling approach show five main drivers increasing the potential of dynamic price settings in the E-Commerce. Influencing factors are the knowledge of customers’ individual willingness to pay, rising sales, the possibility of customization, the data volume and the information about competitors’ pricing strategy.

Keywords: e-commerce, empirical research, experts, dynamic pricing (DP), influencing factors, potentials

Procedia PDF Downloads 259
2364 The Use of Budgeting as an Effective Management Tool for Small, Medium and Micro Enterprises during COVID-19 Pandemic: A Perspective from South Africa

Authors: Abongile Zweni, Grate Moyo, Ricardo Peters, Bingwen Yan

Abstract:

Budgets are one of the most important tools that organisations, big or small, need to use as management tools. When organisations, particularly Small, Medium and Micro Enterprises (SMMEs), do not use budgets, they are bound to fail in their infancy stage. The aim of this study was to assess whether or not SMMEs in South Africa used budgets as an effective management tool during the COVID-19 pandemic. For the purposes of this study, data was collected using an online questionnaire (survey). This study used the quantitative research approach. The study used descriptive statistics to analyse the research question. The study found that most SMMEs did not use budgets during the COVID-19 pandemic; one of the reasons, amongst others, was that most of them had to close down during the lockdown, and some of them did not even qualify for government bailout or government grants.

Keywords: budget management, SMMEs, COVID-19, South Africa

Procedia PDF Downloads 189
2363 The Online Advertising Speech that Effect to the Thailand Internet User Decision Making

Authors: Panprae Bunyapukkna

Abstract:

This study investigated figures of speech used in fragrance advertising captions on the Internet. The objectives of the study were to find out the frequencies of figures of speech in fragrance advertising captions and the types of figures of speech most commonly applied in captions. The relation between figures of speech and fragrance was also examined in order to analyze how figures of speech were used to represent fragrance. Thirty-five fragrance advertisements were randomly selected from the Internet. Content analysis was applied in order to consider the relation between figures of speech and fragrance. The results showed that figures of speech were found in almost every fragrance advertisement except one advertisement of Lancôme. Thirty-four fragrance advertising captions used at least one kind of figure of speech. Metaphor was most frequently found and also most frequently applied in fragrance advertising captions, followed by alliteration, rhyme, simile and personification, and hyperbole respectively.

Keywords: advertising speech, fragrance advertisements, figures of speech, metaphor

Procedia PDF Downloads 238
2362 Regulating the Emerging Platform Economy in Ethiopia: Issues in the Ride-Hailing Platforms

Authors: Nebiat Lemenih Lenger

Abstract:

Today, the digital economy is evolving faster than ever in Ethiopia. Platforms that provide a ride-hailing service are growing fast in the country. The market welcomed them as they disrupt it with quality services and lower prices. This revolution is, however, not without challenges. These include cybersecurity breaches, facilitating illegal economic activities, and challenging concepts of privacy. To mitigate the risks and utilize the benefits, appropriate regulation should be introduced in the economy. By identifying legal and institutional gaps in Ethiopia`s digital economy, this research work assists the government`s effort to create a better digital economy. Moreover, this study, being a pioneer study in the area, will be an input for further studies in academia. The research employs a qualitative legal research method and analyzes various legal and policy instruments in Ethiopia in comparison with best international experiences. As this research applies a qualitative research method, a grounded theory method of data analysis is used. The research concluded that Ethiopia is far from designing appropriate legal and regulatory infrastructures. Due to the government monopoly of the sector, there is poor digital infrastructure in the country. The existing labor laws have no specific provisions on the rights and obligations of gig workers.

Keywords: Ethiopia, gig economy, digital, ride-hailing, regulation

Procedia PDF Downloads 86
2361 Medical Aspects, Professionalism, and Bioethics of Anesthesia in Caesarean Section on Self-Request

Authors: Nasrudin Andi Mappaware, Muh. Wirawan Harahap, Erlin Syahril, Farah Ekawati Mulyadi

Abstract:

The increasing trend of cesarean sections, especially those performed on self-request without medical indications, presents complex dilemmas related to medical aspects, professionalism, and bioethics. This study aims to investigate the medical, professional, and bioethical considerations surrounding anesthesia in cesarean sections performed on self-request without medical indications. We report the case of a 27-year-old woman, G1P0A0 gravid 38 weeks, admitted to the hospital for a planned cesarean section on request for the reason that she could not tolerate pain and requested on a date that corresponded to the date and month of her mother's birth. Cesarean section on patient request fulfills the principle of autonomy, which states that patients have the right to themselves. However, this medical procedure is still considered no safer and riskier even though medical technology has developed rapidly. Furthermore, anesthesia during cesarean section at self-request without medical indications is a dilemma for anesthesiologists considering the risks and complications of anesthesia for both the fetus and the mother. The trend in increasing the number of cesarean sections is influenced by patient reasons such as not being able to tolerate pain, trust factors, and worry about damage to the birth canal.

Keywords: anesthesia, bioethics, cesarean section, self-request, professionalism

Procedia PDF Downloads 46
2360 Ontologies for Social Media Digital Evidence

Authors: Edlira Kalemi, Sule Yildirim-Yayilgan

Abstract:

Online Social Networks (OSNs) are nowadays being used widely and intensively for crime investigation and prevention activities. As they provide a lot of information they are used by the law enforcement and intelligence. An extensive review on existing solutions and models for collecting intelligence from this source of information and making use of it for solving crimes has been presented in this article. The main focus is on smart solutions and models where ontologies have been used as the main approach for representing criminal domain knowledge. A framework for a prototype ontology named SC-Ont will be described. This defines terms of the criminal domain ontology and the relations between them. The terms and the relations are extracted during both this review and the discussions carried out with domain experts. The development of SC-Ont is still ongoing work, where in this paper, we report mainly on the motivation for using smart ontology models and the possible benefits of using them for solving crimes.

Keywords: criminal digital evidence, social media, ontologies, reasoning

Procedia PDF Downloads 386
2359 Gender Moderates the Association Between Symbolization Trait (But Not Internalization Trait) and Smoking Behaviour

Authors: Kuay Hue San, Muaz Haqim Shaharum, Nasir Yusoff

Abstract:

Gender plays a big role in psychosocial development. This study aimed to investigate whether gender moderates the relationship between moral identity (internalization and symbolization) and risk-smoking behavior. An online cross-sectional study was carried out on 388 (61% female) youths who fulfilled the study’s inclusion and exclusion criteria. While viewing images of smoking behavior, participants rated their emotional state, which ranged from unpleasant to pleasant. Participants were also asked to fill out the eight-item Moral Identity Scale and provide their socio-demographic information. Gender significantly moderated the relationship between symbolization and smoking behavior. However, the moderation effect was not shown by internalization Finding highlights the implication of gender on moral identity and smoking behavior and the importance of considering this in the public health intervention and program.

Keywords: smoking behaviour, gender, emotion, moral identity

Procedia PDF Downloads 106
2358 Improving Public Service Delivery by E-Governance

Authors: Aneri Mehta, Neeti Chaudhary

Abstract:

Governments of the countries around the world have started utilizing the potential of technology to deliver online information and services to their citizens. Using ICT in the form of e-governance could yield great benefits in the reform and modernization of the public sector. The experience of e-governance in a number of developed and developing countries has shown that ICT can be a tool for greater service delivery with the goal of improving service quality. E-governance can also promote ‘good governance’, greater civic engagement can increase opportunities for direct representation and voice, and support for increased democracy. This paper discusses and presents the survey findings that seek to test the role of e-governance in improving service delivery by altering the principal-agent relationship. It further seeks to elucidate the quality aspects of public service. Strong leadership is required to implement e-governance to capture and internalize the benefits of quality services and satisfied citizens.

Keywords: public service, service delivery, e-governance, good governance

Procedia PDF Downloads 474
2357 The Effect of Engineering Construction in Online Consultancy

Authors: Mariam Wagih Nagib Eskandar

Abstract:

The engineering design process is the activities formulation, to help an engineer raising a plan with a specified goal and performance. The engineering design process is a multi-stage course of action including the conceptualization, research, feasibility studies, establishment of design parameters, preliminary and finally the detailed design. It is a progression from the abstract to the concrete; starting with probably abstract ideas about need, and thereafter elaborating detailed specifications of the object that would satisfy the needs, identified. Engineering design issues, problems, and solutions are discussed in this paper using qualitative approach from an information structure perspective. The objective is to identify the problems, to analyze them and propose solutions by integrating; innovation, practical experience, time and resource management, communications skills, isolating the problem in coordination with all stakeholders. Consequently, this would be beneficial for the engineering community to improve the Engineering design practices.

Keywords: education, engineering, math, performanceengineering design, architectural engineering, team-based learning, construction safetyrequirement engineering, models, practices, organizations

Procedia PDF Downloads 73
2356 Big Brain: A Single Database System for a Federated Data Warehouse Architecture

Authors: X. Gumara Rigol, I. Martínez de Apellaniz Anzuola, A. Garcia Serrano, A. Franzi Cros, O. Vidal Calbet, A. Al Maruf

Abstract:

Traditional federated architectures for data warehousing work well when corporations have existing regional data warehouses and there is a need to aggregate data at a global level. Schibsted Media Group has been maturing from a decentralised organisation into a more globalised one and needed to build both some of the regional data warehouses for some brands at the same time as the global one. In this paper, we present the architectural alternatives studied and why a custom federated approach was the notable recommendation to go further with the implementation. Although the data warehouses are logically federated, the implementation uses a single database system which presented many advantages like: cost reduction and improved data access to global users allowing consumers of the data to have a common data model for detailed analysis across different geographies and a flexible layer for local specific needs in the same place.

Keywords: data integration, data warehousing, federated architecture, Online Analytical Processing (OLAP)

Procedia PDF Downloads 232
2355 An Embarrassingly Simple Semi-supervised Approach to Increase Recall in Online Shopping Domain to Match Structured Data with Unstructured Data

Authors: Sachin Nagargoje

Abstract:

Complete labeled data is often difficult to obtain in a practical scenario. Even if one manages to obtain the data, the quality of the data is always in question. In shopping vertical, offers are the input data, which is given by advertiser with or without a good quality of information. In this paper, an author investigated the possibility of using a very simple Semi-supervised learning approach to increase the recall of unhealthy offers (has badly written Offer Title or partial product details) in shopping vertical domain. The author found that the semisupervised learning method had improved the recall in the Smart Phone category by 30% on A=B testing on 10% traffic and increased the YoY (Year over Year) number of impressions per month by 33% at production. This also made a significant increase in Revenue, but that cannot be publicly disclosed.

Keywords: semi-supervised learning, clustering, recall, coverage

Procedia PDF Downloads 117
2354 E-Learning in Life-Long Learning: Best Practices from the University of the Aegean

Authors: Chryssi Vitsilaki, Apostolos Kostas, Ilias Efthymiou

Abstract:

This paper presents selected best practices on online learning and teaching derived from a novel and innovating Lifelong Learning program through e-Learning, which has during the last five years been set up at the University of the Aegean in Greece. The university, capitalizing on an award-winning, decade-long experience in e-learning and blended learning in undergraduate and postgraduate studies, recently expanded into continuous education and vocational training programs in various cutting-edge fields. So, in this article we present: (a) the academic structure/infrastructure which has been developed for the administrative, organizational and educational support of the e-Learning process, including training the trainers, (b) the mode of design and implementation based on a sound pedagogical framework of open and distance education, and (c) the key results of the assessment of the e-learning process by the participants, as they are used to feedback on continuous organizational and teaching improvement and quality control.

Keywords: distance education, e-learning, life-long programs, synchronous/asynchronous learning

Procedia PDF Downloads 328
2353 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 285
2352 The Power of Words: A Corpus Analysis of Campaign Speeches of President Donald J. Trump

Authors: Aiza Dalman

Abstract:

Words are powerful when these are used wisely and strategically. In this study, twelve (12) campaign speeches of President Donald J. Trump were analyzed as to frequently used words and ethos, pathos and logos being employed. The speeches were read thoroughly, analyzed and interpreted. With the use of Word Counter Tool and Text Analyzer software accessible online, it was found out that the word ‘will’ has the highest frequency of 121, followed by Hillary (58), American (38), going (35), plan and Clinton (32), illegal (30), government (28), corruption (26) and criminal (24). When the speeches were analyzed as to ethos, pathos and logos, on the other hand, it revealed that these were all employed in his speeches. The statements under these pointed out against Hillary or in his favor. The unique strategy of President Donald J. Trump as to frequently used words and ethos, pathos and logos in persuading people perhaps lead the way to his victory.

Keywords: campaign speeches, corpus analysis, ethos, logos and pathos, power of words

Procedia PDF Downloads 277
2351 Providing Support On-Time: Need to Establish De-Radicalization Hotlines

Authors: Ashir Ahmed

Abstract:

Peacekeeping is a collective responsibility of governments, law enforcement agencies, communities, families, and individuals. Moreover, the complex nature of peacekeeping activities requires a holistic and collaborative approach where various community sectors work together to form collective strategies that are likely to be more effective than strategies designed and delivered in isolation. Similarly, it is important to learn from past programs to evaluate the initiatives that have worked well and the areas that need further improvement. Review of recent peacekeeping initiatives suggests that there have been tremendous efforts and resources put in place to deal with the emerging threat of terrorism, radicalization and violent extremism through number of de-radicalization programs. Despite various attempts in designing and delivering successful programs for deradicalization, the threat of people being radicalized is growing more than ever before. This research reviews the prominent de-radicalization programs to draw an understanding of their strengths and weaknesses. Some of the weaknesses in the existing programs include. Inaccessibility: Limited resources, geographical location of potential participants (for offline programs), inaccessibility or inability to use various technologies (for online programs) makes it difficult for people to participate in de-radicalization programs. Timeliness: People might need to wait for a program on a set date/time to get the required information and to get their questions answered. This is particularly true for offline programs. Lack of trust: The privacy issues and lack of trust between participants and program organizers are another hurdle in the success of de-radicalization programs. The fear of sharing participants information with organizations (such as law enforcement agencies) without their consent led them not to participate in these programs. Generalizability: Majority of these programs are very generic in nature and do not cater the specific needs of an individual. Participants in these programs may feel that the contents are irrelevant to their individual situations and hence feel disconnected with purpose of the programs. To address the above-mentioned weaknesses, this research developed a framework that recommends some improvements in de-radicalization programs. One of the recommendations is to offer 24/7, secure, private and online hotline (also referred as helpline) for the people who have any question, concern or situation to discuss with someone who is qualified (a counsellor) to deal with people who are vulnerable to be radicalized. To make these hotline services viable and sustainable, the existing organizations offering support for depression, anxiety or suicidal ideation could additionally host these services. These helplines should be available via phone, the internet, social media and in-person. Since these services will be embedded within existing and well-known services, they would likely to get more visibility and promotion. The anonymous and secure conversation between a person and a counsellor would ensure that a person can discuss the issues without being afraid of information sharing with any third party – without his/her consent. The next stage of this project would include the operationalization of the framework by collaborating with other organizations to host de-radicalization hotlines and would assess the effectiveness of such initiatives.

Keywords: de-radicalization, framework, hotlines, peacekeeping

Procedia PDF Downloads 212
2350 Effect of Enterprise Risk Management Commitee on the Financial Performance of Listed Banks in Nigeria

Authors: Joseph Uche Azubike, Evelyn Ngozi Agbasi, M. I. Ogbonna

Abstract:

The audit committee of the board of directors could no longer handle the enterprise's risks. Therefore, a risk management committee was created to control them. Thus, this study examined how enterprise risk management committee characteristics affected Nigerian exchange-listed banks' financial performance from 2013 to 2022. The study's hypotheses and three objectives were to determine how enterprise risk management committee size, composition, and gender diversity affect Nigerian banks' performance. An ex-post facto study design collected secondary data from bank annual reports. We used descriptive statistics, correlation analysis, and Ordinary least square regression to analyze panel data. Enterprise risk management committee size and composition had both negative and no significant effect on bank financial performance in Nigeria, whereas enterprise risk committee gender diversity has a 10% favorable effect. The report advises that adding more women with relevant knowledge to the risk committee to boost performance and allowing women to be at the lead of such risk management could improve bank performance in Nigeria since they are noted to be thorough in their tasks.

Keywords: bank, committee, enterprise, management, performance, risk

Procedia PDF Downloads 36
2349 Anti-Western Sentiment amongst Arabs and How It Drives Support for Russia against Ukraine

Authors: Soran Tarkhani

Abstract:

A glance at social media shows that Russia's invasion of Ukraine receives considerable support among Arabs. This significant support for the Russian invasion of Ukraine is puzzling since most Arab leaders openly condemned the Russian invasion through the UN ES‑11/4 Resolution, and Arabs are among the first who experienced the devastating consequences of war firsthand. This article tries to answer this question by using multiple regression to analyze the online content of Arab responses to Russia's invasion of Ukraine on seven major news networks: CNN Arabic, BBC Arabic, Sky News Arabic, France24 Arabic, DW, Aljazeera, and Al-Arabiya. The article argues that the underlying reason for this Arab support is a reaction to the common anti-Western sentiments among Arabs. The empirical result from regression analysis supports the central arguments and uncovers the motivations behind the endorsement of the Russian invasion of Ukraine and the opposing Ukraine by many Arabs.

Keywords: Ukraine, Russia, Arabs, Ukrainians, Russians, Putin, invasion, Europe, war

Procedia PDF Downloads 72
2348 Insider Fraud and its Risks to FinTechs

Authors: Claire Maillet

Abstract:

Insider fraud, including its various forms such as employee fraud or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective or past employer. ‘Employee’ covers anyone employed by the company, including contractors, agency workers, directors and part time staff. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic and the cost-of-living crisis, which have generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime; Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud. Given that the number of FinTechs is on the rise and there is a significant lack of empirically based solutions for reducing insider fraud, these are gaps in the research space that this thesis aims to fill. Finally, Kassem (2022) notes that “academic research plays a crucial role in raising awareness about fraud and researching effective methods for countering it”. Thus, this thesis may be used as an opportune tool to provide an extensive list of controls spanning detection, deterrence and prevention, that are recommended to be implemented to help combat the insider threat.

Keywords: insider fraud, internal fraud, pandemic, Covid-19

Procedia PDF Downloads 15
2347 Structural Analysis of Username Segment in E-Mail Addresses of Engineering Institutes of Gujarat State of India

Authors: Jatinderkumar R. Saini

Abstract:

E-mail has become a key mechanism of electronic communication. This is truer for professional organizations that like to communicate with their subjects online and are slowly shifting to paper-less office. The current paper focuses specifically on academic institutions offering Engineering course in Gujarat state and attempts for textual analysis of the usernames of the institutional e-mail addresses. We found that the institutions tend to design the username segment of their e-mail addresses by choosing words or combination of words from specific categories. The paper also highlights the use of special characters, digits and random words in designing the usernames. On the sidelines, the paper lists the style of employing department names and designations for the design process. To the best of our knowledge, this is the first formal attempt to analyze the selection of words employed for designing username segment of e-mail addresses of Engineering institutions.

Keywords: e-mail address, institute, engineering, username

Procedia PDF Downloads 332
2346 Trend and Distribution of Heavy Metals in Soil and Sediment: North of Thailand Region

Authors: Chatkaew Tansakul, Saovajit Nanruksa, Surasak Chonchirdsin

Abstract:

Heavy metals in the environment can be occurred by both natural weathering process and human activity, which may present significant risks to human health and the wider environment. A number of heavy metals, i.e. Arsenic (As) and Manganese (Mn), are found with a relatively high concentration in the northern part of Thailand that was assumptively from natural parent rocks and materials. However, scarce literature is challenging to identify the accurate root cause and best available explanation. This study is, therefore, aim to gather heavy metals data in 5 provinces of the North of Thailand where PTT Exploration and Production (PTTEP) public company limited has operated for more than 20 years. A thousand heavy metal analysis is collected and interpreted in term of Enrichment Factor (EF). The trend and distribution of heavy metals in soil and sediment are analyzed by considering altogether the geochemistry of the regional soil and rock. . In addition, the relationship between land use and heavy metals distribution is investigated. In the first conclusion, heavy metal concentrations of (As) and (Mn) in the studied areas are equal to 7.0 and 588.6 ppm, respectively, which are comparable to those in regional parent materials (1 – 12 and 850 – 1,000 ppm for As and Mn respectively). Moreover, there is an insignificant escalation of the heavy metals in these studied areas over two decades.

Keywords: contaminated soil, enrichment factor, heavy metals, parent materials in North of Thailand

Procedia PDF Downloads 150
2345 The Use of Visual Drawing and Writing Techniques to Elicit Adult Perceptions of Sex Offenders

Authors: Sasha Goodwin

Abstract:

Public perceptions can play a crucial role in influencing criminal justice policy and legislation, particularly concerning sex offenders. Studies have found a proximate relationship between public perception and policy to manage the risks posed by sex offenders. A significant body of research on public perceptions about sex offenders primarily uses survey methods and standardised instruments such as the Community Attitude Towards Sex Offenders (CATSO) and Perceptions of Sex Offenders (PSO) scales and finds a mostly negative and punitive attitude informed by common misconceptions. A transformative methodology from the emerging sub-field of visual criminology is where the construction of offences and offenders are understood via novel ways of collecting and analysing data. This research paper examines the public perceptions of sex offenders through the utilization of a content analysis of drawings. The study aimed to disentangle the emotions, stereotypes, and myths embedded in public perceptions by analysing the graphic representations and specific characteristics depicted by participants. Preliminary findings highlight significant discrepancies between public perceptions and empirical profiles of sex offenders, shedding light on the misunderstandings surrounding this heterogeneous group. By employing visual data, this research contributes to a deeper understanding of the complex interplay between societal perceptions and the realities of sex offenders.

Keywords: emotions, figural drawings, public perception, sex offenders

Procedia PDF Downloads 67
2344 Digitalization of Functional Safety - Increasing Productivity while Reducing Risks

Authors: Michael Scott, Phil Jarrell

Abstract:

Digitalization seems to be everywhere these days. So if one was to digitalize Functional Safety, what would that require: • Ability to directly use data from intelligent P&IDs / process design in a PHA / LOPA • Ability to directly use data from intelligent P&IDs in the SIS Design to support SIL Verification Calculations, SRS, C&Es, Functional Test Plans • Ability to create Unit Operation / SIF Libraries to radically reduce engineering manhours while ensuring consistency and improving quality of SIS designs • Ability to link data directly from a PHA / LOPA to SIS Designs • Ability to leverage reliability models and SRS details from SIS Designs to automatically program the Safety PLC • Ability to leverage SIS Test Plans to automatically create Safety PLC application logic Test Plans for a virtual FAT • Ability to tie real-time data from Process Historians / CMMS to assumptions in the PHA / LOPA and SIS Designs to generate leading indicators on protection layer health • Ability to flag SIS bad actors for proactive corrective actions prior to a near miss or loss of containment event What if I told you all of this was available today? This paper will highlight how the digital revolution has revolutionized the way Safety Instrumented Systems are designed, configured, operated and maintained.

Keywords: IEC 61511, safety instrumented systems, functional safety, digitalization, IIoT

Procedia PDF Downloads 176
2343 Analysis of Microbiological Quality and Detection of Antibiotic Residue in Bovine Raw Milk Produced in Blida State, Algeria

Authors: M. N. Boukhatem, M. A. Ferhat, K. Mansour

Abstract:

Bovine raw milk represents a favorable environment for the growth of several food-spoilage strains and some pathogens. It must meet stringent standards to ensure the highest microbiological and toxicological qualities.In order to assess the microbiological risks associated with the consumption of this food, we conducted this study to determine the microbiological quality of bovine raw milk (54 samples) commercialized at the state of Blida (Algeria). The samples analyzed were unsatisfactory in terms of total flora where 61.11% of samples were considered as non acceptable in terms of quality standards, fecal coliforms (40.74%), fecal streptococci (55.55%) and staphylococci (74.07%). Salmonella and Clostridium strains were not detected in all the samples. Furthermore, antibiotic residues were found in 26% of analysed samples. These results reflect non-compliance with the rules of good hygiene practices at milking, storage, transportatio, and sale of milk. Bovine raw milk consumed presents a serious health risk to the population of the study areas.The livestock coaching actors and dissemination of good hygiene practices throughout the production chain are needed to improve the quality of local milk.

Keywords: bovine raw milk, microbiological quality, fecal coliforms, antibiotic residue, Blida state

Procedia PDF Downloads 233
2342 Competition and Cooperation of Prosumers in Cournot Games with Uncertainty

Authors: Yong-Heng Shi, Peng Hao, Bai-Chen Xie

Abstract:

Solar prosumers are playing increasingly prominent roles in the power system. However, its uncertainty affects the outcomes and functions of the power market, especially in the asymmetric information environment. Therefore, an important issue is how to take effective measures to reduce the impact of uncertainty on market equilibrium. We propose a two-level stochastic differential game model to explore the Cournot decision problem of prosumers. In particular, we study the impact of punishment and cooperation mechanisms on the efficiency of the Cournot game in which prosumers face uncertainty. The results show that under the penalty mechanism of fixed and variable rates, producers and consumers tend to take conservative actions to hedge risks, and the variable rates mechanism is more reasonable. Compared with non-cooperative situations, prosumers can improve the efficiency of the game through cooperation, which we attribute to the superposition of market power and uncertainty reduction. In addition, the market environment of asymmetric information intensifies the role of uncertainty. It reduces social welfare but increases the income of prosumers. For regulators, promoting alliances is an effective measure to realize the integration, optimization, and stable grid connection of producers and consumers.

Keywords: Cournot games, power market, uncertainty, prosumer cooperation

Procedia PDF Downloads 105