Search results for: cyber hygiene
390 Prevalence of Foodborne Pathogens in Pig and Cattle Carcass Samples Collected from Korean Slaughterhouses
Authors: Kichan Lee, Kwang-Ho Choi, Mi-Hye Hwang, Young Min Son, Bang-Hun Hyun, Byeong Yeal Jung
Abstract:
Recently, worldwide food safety authorities have been strengthening food hygiene in order to curb foodborne illness outbreaks. The hygiene status of Korean slaughterhouses has been monitored annually by Animal and Plant Quarantine Agency and provincial governments through foodborne pathogens investigation using slaughtered pig and cattle meats. This study presented the prevalence of food-borne pathogens from 2014 to 2016 in Korean slaughterhouses. Sampling, microbiological examinations, and analysis of results were performed in accordance with ‘Processing Standards and Ingredient Specifications for Livestock Products’. In total, swab samples from 337 pig carcasses (100 samples in 2014, 135 samples in 2015, 102 samples in 2016) and 319 cattle carcasses (100 samples in 2014, 119 samples in 2015, 100 samples in 2016) from twenty slaughterhouses were examined for Listeria monocytogenes, Campylobacter jejuni, Campylobacter coli, Salmonella spp., Staphylococcus aureus, Clostridium perfringens, Yersinia enterocolitica, Escherichia coli O157:H7 and non-O157 enterohemorrhagic E. coli (EHEC, serotypes O26, O45, O103, O104, O111, O121, O128 and O145) as foodborne pathogens. The samples were analyzed using cultural and PCR-based methods. Foodborne pathogens were isolated in 78 (23.1%) out of 337 pig samples. In 2014, S. aureus (n=17) was predominant, followed by Y. enterocolitica (n=7), C. perfringens (n=2) and L. monocytogenes (n=2). In 2015, C. coli (n=14) was the most prevalent, followed by L. monocytogenes (n=4), S. aureus (n=3), and C. perfringens (n=2). In 2016, S. aureus (n=16) was the most prevalent, followed by C. coli (n=13), L. monocytogenes (n=2) and C. perfringens (n=1). In case of cattle carcasses, foodborne bacteria were detected in 41 (12.9%) out of 319 samples. In 2014, S. aureus (n=16) was the most prevalent, followed by Y. enterocolitica (n=3), C. perfringens (n=3) and L. monocytogenes (n=2). In 2015, L. monocytogenes was isolated from 4 samples, S. aureus from three, C. perfringens, Y. enterocolitica and Salmonella spp. from one, respectively. In 2016, L. monocytogenes (n=6) was the most prevalent, followed by C. perfringens (n=3) C. jejuni (n=1), respectively. It was found that 10 carcass samples (4 cattle and 6 pigs) were contaminated with two bacterial pathogen tested. Interestingly, foodborne pathogens were more detected from pig carcasses than cattle carcasses. Although S. aureus was predominantly detected in this study, other foodborne pathogens were also isolated in slaughtered meats. Results of this study alerted the risk of foodborne pathogen infection for humans from slaughtered meats. Therefore, the authors insisted that it was important to enhance hygiene level of slaughterhouses according to Hazard Analysis and Critical Control Point.Keywords: carcass, cattle, foodborne, Korea, pathogen, pig
Procedia PDF Downloads 344389 Constructing Evaluation Indicators for the Supply of Urban-Friendly Shelters from the Perspective of the Needs of the Elderly People in Taiwan
Authors: Chuan-Ming Tung, Tzu-Chiao Yuan
Abstract:
This research aims to construct the supply indicators and weights of shelter space from a perspective of the needs of the elderly by virtue of literature review, a systematical compilation of related regulations, and the use of the Analytical Hierarchy Process method, the questionnaires regarding the indicators filled out by 16 experts and scholars. The researcher then used 3 schools and 2 activity centers in Banqiao District, New Taipei City, as study cases to evaluate the ‘friendliness’ degree/level for the supply of shelters meeting the needs of elderly people. The supply evaluation indicators of friendly shelters meeting the needs of the elderly include "Administrative Operations and Service Needs" and "Residence-related and Living Needs"; under the "Administrative Operations and Service Needs" are "Management Operations and Information Provision", "Shelter Space Preparedness and Logistics Support", "Medical Care and Social Support", and "Shelters and Medical Environment", a total of 17 assessment items in four indicators, while under the "Residence-related and Living Needs" are "Dietary Needs", "Sleep Needs", "Hygiene and Sanitation Needs", "Accessibility and Convenience Needs ", etc., a total of 18 assessment items in four indicators. The results show that "Residence-related and Living Needs" is the most important item in the main levels of the supply indicators of the needs for friendly shelters to elderly people (weigh value 0.5504), followed by "Administrative Operations and Service Needs" (0.4496). The order of importance of the supply indicators of friendly shelters for the needs of elderly people is as follows: "Hygiene and Sanitation Needs" (0.1721), "Dietary Needs" (0.1340), "Medical Care and Social Support" (0.1300), "Sleep Needs" (0.1277), "Accessibility and Convenience Needs" (0.1166), "Basic Environment of Shelters" (0.1145), "Shelter Space Preparedness and Logistics Support" (0.1115) and "Management Operations and Information Provision" (0.0936). In addition, it can be noticed from the results of the case evaluation that the provision of refuges and shelters, mainly from schools and activity centers, is extremely inadequate for the needs of the elderly. In a set of comprehensive comparisons and contrasts, the evaluation indicators of refuges and shelters that need to be improved are "Medical Care and Social Support", "Hygiene and Sanitation Needs", "Sleep Needs", "Dietary Needs", and "Shelter Space Preparedness and Logistics Support".Keywords: needs of the elderly people, urban shelters, evaluation indicators/indices., taiwan
Procedia PDF Downloads 80388 Assessment of Knowledge, Attitudes and Practices of Street Vendors in Mangaung Metro South Africa
Authors: Gaofetoge Lenetha, Malerato Moloi, Ntsoaki Malebo
Abstract:
Microbial contamination of ready-to-eat foods and beverages sold by street vendors has become an important public health issue. In developing countries including South Africa, health risks related to such kinds of foods are thought to be common. Thus, this study assessed knowledge, attitude and practices of street food vendors. Street vendors in the city of Mangaung Metro were investigated in order to assess their knowledge, attitudes and handling practices. A semi-structured questionnaire and checklist were used in interviews to determine the status of the vending sites and associa. ted food-handling practices. Data was collected by means of a face-to-face interview. The majority of respondents were black females. Hundred percent (100%) of the participants did not have any food safety training. However, street vendors showed a positive attitude towards food safety. Despite the positive attitude, vendors showed some non-compliance when it comes to handling food. During the survey, it was also observed that the vending stalls lack basic infrastructures like toilets and potable water that is currently a major problem. This study indicates a need for improvements in the environmental conditions at these sites to prevent foodborne diseases. Moreover, based on the results observed food safety and food hygiene training or workshops for street vendors are highly recommended.Keywords: food hygiene, foodborne illnesses, food safety, Street foods
Procedia PDF Downloads 114387 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks
Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner
Abstract:
Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.Keywords: USB, device, cyber security, attack, detection
Procedia PDF Downloads 398386 Automated Monitoring System to Support Investigation of Contributing Factors of Work-Related Disorders and Accidents
Authors: Erika R. Chambriard, Sandro C. Izidoro, Davidson P. Mendes, Douglas E. V. Pires
Abstract:
Work-related illnesses and disorders have been a constant aspect of work. Although their nature has changed over time, from musculoskeletal disorders to illnesses related to psychosocial aspects of work, its impact on the life of workers remains significant. Despite significant efforts worldwide to protect workers, the disparity between changes in work legislation and actual benefit for workers’ health has been creating a significant economic burden for social security and health systems around the world. In this context, this study aims to propose, test and validate a modular prototype that allows for work environmental aspects to be assessed, monitored and better controlled. The main focus is also to provide a historical record of working conditions and the means for workers to obtain comprehensible and useful information regarding their work environment and legal limits of occupational exposure to different types of environmental variables, as means to improve prevention of work-related accidents and disorders. We show the developed prototype provides useful and accurate information regarding the work environmental conditions, validating them with standard occupational hygiene equipment. We believe the proposed prototype is a cost-effective and adequate approach to work environment monitoring that could help elucidate the links between work and occupational illnesses, and that different industry sectors, as well as developing countries, could benefit from its capabilities.Keywords: Arduino prototyping, occupational health and hygiene, work environment, work-related disorders prevention
Procedia PDF Downloads 126385 Smart Sensor Data to Predict Machine Performance with IoT-Based Machine Learning and Artificial Intelligence
Authors: C. J. Rossouw, T. I. van Niekerk
Abstract:
The global manufacturing industry is utilizing the internet and cloud-based services to further explore the anatomy and optimize manufacturing processes in support of the movement into the Fourth Industrial Revolution (4IR). The 4IR from a third world and African perspective is hindered by the fact that many manufacturing systems that were developed in the third industrial revolution are not inherently equipped to utilize the internet and services of the 4IR, hindering the progression of third world manufacturing industries into the 4IR. This research focuses on the development of a non-invasive and cost-effective cyber-physical IoT system that will exploit a machine’s vibration to expose semantic characteristics in the manufacturing process and utilize these results through a real-time cloud-based machine condition monitoring system with the intention to optimize the system. A microcontroller-based IoT sensor was designed to acquire a machine’s mechanical vibration data, process it in real-time, and transmit it to a cloud-based platform via Wi-Fi and the internet. Time-frequency Fourier analysis was applied to the vibration data to form an image representation of the machine’s behaviour. This data was used to train a Convolutional Neural Network (CNN) to learn semantic characteristics in the machine’s behaviour and relate them to a state of operation. The same data was also used to train a Convolutional Autoencoder (CAE) to detect anomalies in the data. Real-time edge-based artificial intelligence was achieved by deploying the CNN and CAE on the sensor to analyse the vibration. A cloud platform was deployed to visualize the vibration data and the results of the CNN and CAE in real-time. The cyber-physical IoT system was deployed on a semi-automated metal granulation machine with a set of trained machine learning models. Using a single sensor, the system was able to accurately visualize three states of the machine’s operation in real-time. The system was also able to detect a variance in the material being granulated. The research demonstrates how non-IoT manufacturing systems can be equipped with edge-based artificial intelligence to establish a remote machine condition monitoring system.Keywords: IoT, cyber-physical systems, artificial intelligence, manufacturing, vibration analytics, continuous machine condition monitoring
Procedia PDF Downloads 88384 High School Youth and College Freshmen Comparison Towards the Psychological Health Status under the Influence of Sleep Hygiene and Quality from a Chinese Second-Tier City Sample during the COVID-19 Pandemic
Authors: Ziyu Zhang, Xuanyu Ren, Fei Wu, Qinfei Lu, Yongmei Li, Xinyue Zhi
Abstract:
Introduction: Adolescents experience a critical period of physical and psychological growth. Few studies focus on the influence of sleep hygiene on psychological health from the high school period to freshmen year. Also, the influence of the COVID-19 pandemic has public health significance. Methods: Totally 698 students from high school and college were included in the manuscript, and a cross-sectional procedure was conducted; the objective was to make the epidemiological comparison of the social phobia/depression prevalence and discuss the effects of potential determinants. Results: Psychological problems, including social phobia and depression, are prevalent, especially among high school students, with gender differences. The current results indicated that the association between sleep status and social phobia is most obvious among high school students, while the higher MMR risk was found both for high school social phobia students and college depressive freshmen. Moreover, the interaction between social phobia and depression was also obvious for both populations. Conclusions: Psychological problems, including social phobia and depression, are more prevalent among high school girls when compared with their male and freshmen peers. Important influenced factors for the risk of psychological problems among the two populations were different, but media multitasking status should be paid attention to for both.Keywords: adolescence, psychological health, epidemiology, social culture
Procedia PDF Downloads 73383 Social Media's Roles in the Change of Vietnamese Society: Emerging Public Sphere for Citizens
Authors: Ly Thi Hai Yen
Abstract:
The Internet in Vietnam has developed significantly over the last 20 years and made impressive advances, permeating into every part of daily life, changing people's habits as well as the way people's communication. Under this situation, social media have become useful tools for the citizen to get and share information. About 10 years ago, most Vietnamese people got the information through state media, but thanks to the development of the Internet, nowadays, social media have been giving them rich sources of information at any area of society. By using case study research methods, documentary research method and in-depth interviews conducted with social media users, NGO activists, and Vietnamese scholars in 2017, the paper found that social media has been bringing a cyber public sphere to whom wish to discuss social and political issues. And, more importantly, it gives them a chance to connect with the government and policy makers quickly and effectively. Moreover, people use social media to supervise activities in society to prevent social evils and corruption in Vietnam. However, besides these positive points, people also have to cope with the rising situation of fake news which causing consequences for the society, such as pulling off crimes or cheating money and others. The paper concluded that social media plays important roles in the change of Vietnamese society, giving citizens a cyber public sphere unrestrictedly to discuss social and political issues but also bringing many bad risks to citizens.Keywords: Vietnamese, social media, politics-society
Procedia PDF Downloads 149382 Challenges for the Implementation of Community Led Total Sanitation in Rural Malawi
Authors: Save Kumwenda, Khumbo Kalulu, Kondwani Chidziwisano, Limbani Kalumbi, Vincent Doyle, Bagrey Ngwira
Abstract:
Introduction: The Malawi Government in partnership with Non-Governmental Organizations adopted Community Led Total Sanitation (CLTS) in 2008 as an approach in sanitation and hygiene promotion with an aim of declaring Malawi Open Defeacation Free (ODF) by 2015. While there is a significant body of research into CLTS available in public domain, there is little research done on challenges faced in implementing CLTS in Malawi. Methods: A cross-sectional qualitative study was carried out in three districts of Ntcheu, Balaka, and Phalombe. Data was collected using Focus Group Discussions (FGDs) and Key informant interviews (KII) and analysed manually. Results: In total, 96 people took part in FGDs and 9 people in KII. It was shown that choice of leaders after triggering was commonly done by chiefs, facilitators, and VHC without following CLTS principles as opposed to identifying individuals who showed leadership skills. Despite capacity building initiatives involving District Coordinating Teams, lack of resources to undertake follow-ups contributed to failure to sustain ODF in the community. It was also found that while most respondents appreciating the need for no subsidies, the elderly and those with disabilities felt the need for external support because do not have money for buying strong logs, slabs for durable toilet floor and also to hire people to build latrines for them. Conclusion: Effective implementation of CLTS requires comprehensive consideration of various issues that may affect its success.Keywords: open defecation, community-led, sanitation, faecal matter, hygiene, Malawi
Procedia PDF Downloads 381381 The Diminished Online Persona: A Semantic Change of Chinese Classifier Mei on Weibo
Authors: Hui Shi
Abstract:
This study investigates a newly emerged usage of Chinese numeral classifier mei (枚) in the cyberspace. In modern Chinese grammar, mei as a classifier should occupy the pre-nominal position, and its valid accompanying nouns are restricted to small, flat, fragile inanimate objects rather than humans. To examine the semantic change of mei, two types of data from Weibo.com were collected. First, 500 mei-included Weibo posts constructed a corpus for analyzing this classifier's word order distribution (post-nominal or pre-nominal) as well as its accompanying nouns' semantics (inanimate or human). Second, considering that mei accompanies a remarkable number of human nouns in the first corpus, the second corpus is composed of mei-involved Weibo IDs from users located in first and third-tier cities (n=8 respectively). The findings show that in the cyber community, mei frequently classifies human-related neologisms at the archaic post-normal position. Besides, the 23 to 29-year-old females as well as Weibo users from third-tier cities are the major populations who adopt mei in their user IDs for self-description and identity expression. This paper argues that the creative usage of mei gains popularity in the Chinese internet due to a humor effect. The marked word order switch and semantic misapplication combined to trigger incongruity and jocularity. This study has significance for research on Chinese cyber neologism. It may also lay a foundation for further studies on Chinese classifier change and Chinese internet communication.Keywords: Chinese classifier, humor, neologism, semantic change
Procedia PDF Downloads 253380 [Keynote Talk]: Surveillance of Food Safety Compliance of Hong Kong Street Food
Authors: Mabel Y. C. Yau, Roy C. F. Lai, Hugo Y. H. Or
Abstract:
This study is a pilot surveillance of hygiene compliance and food microbial safety of both licensed and mobile vendors selling Chinese ready–to-eat snack foods in Hong Kong. The study reflects similar situations in running mobile food vending business on trucks. Hong Kong is about to launch the Food Truck Pilot Scheme by the end of 2016 or early 2017. Technically, selling food on the vehicle is no different from hawking food on the street or vending food on the street. Each type of business bears similar food safety issues and cast the same impact on public health. Present findings demonstrate exemplarily situations that also apply to food trucks. 9 types of Cantonese style snacks of 32 samples in total were selected for microbial screening. A total of 16 vending sites including supermarkets, street markets, and snack stores were visited. The study finally focused on a traditional snack, the steamed rice cake with red beans called Put Chai Ko (PCK). PCK is a type of classical Cantonese pastry sold on push carts on the street. It used to be sold at room temperature and served with bamboo sticks in the old days. Some shops would have them sold steam fresh. Microbial examinations on aerobic counts, yeast, and mould, coliform, salmonella as well as Staphylococcus aureus detections were carried out. Salmonella was not detected in all samples. Since PCK does not contain ingredients of beef, poultry, eggs or dairy products, the risk of the presence of Salmonella in PCK was relatively lower although other source of contamination might be possible. Coagulase positive Staphylococcus aureus was found in 6 of the 14 samples sold at room temperature. Among these 6 samples, 3 were PCK. One of the samples was in an unacceptable range of total colony forming units higher than 105. The rest were only satisfactory. Observational evaluations were made with checklists on personal hygiene, premises hygiene, food safety control, food storage, cleaning and sanitization as well as waste disposals. The maximum score was 25 if total compliance were obtained. The highest score among vendors was 20. Three stores were below average, and two of these stores were selling PCK. Most of the non-compliances were on food processing facilities, sanitization conditions and waste disposal. In conclusion, although no food poisoning outbreaks happened during the time of the investigation, the risk of food hazard existed in these stores, especially among street vendors. Attention is needed in the traditional practice of food selling, and that food handlers might not have sufficient knowledge to properly handle food products. Variations in food qualities existed among supply chains or franchise eateries or shops. It was commonly observed that packaging and storage conditions are not properly enforced in the retails. The same situation could be reflected across the food business. It did indicate need of food safety training in the industry and loopholes in quality control among business.Keywords: cantonese snacks, food safety, microbial, hygiene, street food
Procedia PDF Downloads 303379 Assessment of Patient Cooperation and Compliance in Three Stages of Orthodontic Treatment in Adult Patients: A Cross-Sectional Study
Authors: Hafsa Qabool, Rashna Sukhia, Mubassar Fida
Abstract:
Introduction: Success of orthodontic mechanotherapy is highly dependent upon patient cooperation and compliance throughout the duration of treatment. This study was conducted to assess the cooperation and compliance of adult orthodontic patients during the leveling and alignment, space closure/molar correction, and finishing stages of tooth movement. Materials and Methods: Patient cooperation and compliance among three stages of orthodontic treatment were assessed using the Orthodontic Patient Cooperation Scale (OPCS) and Clinical Compliance Evaluation (CCE) form. A sample size of 38 was calculated for each stage of treatment; therefore, 114 subjects were included in the study. Shapiro-Wilk test identified that the data were normally distributed. One way ANOVA was used to evaluate the percentage cooperation and compliance among the three stages. Pair-wise comparisons between the three stages were performed using Post-hoc Tukey. Results: Statistically significant difference was seen for scores of patient compliance using CCE (p = 0.01); however, the results of the OPCS showed a non-significant difference for patient cooperation (p = 0.16) among the three stages of treatment. Post-hoc analysis showed significant differences (p = 0.01) in patient cooperation and compliance between space closure and the finishing stage. Highly significant (p < 0.001) decline in oral hygiene was found with the progression of orthodontic treatment. Conclusions: Improvement in the cooperation and compliance levels for adult orthodontic patients was observed during space closure & molar correction stage, which then showed a decline as treatment progressed. Oral hygiene was progressively compromised as orthodontic treatment progressed.Keywords: patient compliance, adult orthodontics, orthodontic motivation, orthodontic patient adherence
Procedia PDF Downloads 168378 Health Status among Government and Private Primary School Children in the Central of Thailand
Authors: Petcharat Kerdonfag, Supunnee Thrakul
Abstract:
School health services through regular screening of school students’ health status have been the main responsibility for community or school health nurses. The purposes of these retrospective study were to assess and compare health problems between government and private primary school students in the central region of Thailand. The data were collected from the school health records in October at the end of the first semester in the academic year 2018. Two thousand and fifty primary school health records from government and private primary schools were gathered to assess health problems regarding anthropometric measurements, physical examination/personal hygiene, and clinical findings for this study. Descriptive statistics and Chi-square were used to be analyzed. The results revealed that health problems of all the school students remained high magnitude. The five top ranks for prevalence rate of health problems were dental caries (36.6%), visual acuity problem (27.7%), over-nutrition (16.8%), head lice (12.8%), and under-nutrition (6.8%), respectively. However, when compared between government and private schools among five health problems; dental caries (55.0% vs 19.9%), visual acuity problem (23.1% vs 31.9%), over-nutrition (20.2% vs 13.8%), head lice (26.5% vs 0.3%), and under-nutrition (10.6% vs 3.4%) with Chi-square analysis, there were significantly different (p < .001). The problem of visual acuity seems to be more serious in private schools while other health problems tend to be more critical in government schools. The findings have suggested that parents who have children in the private primary schools should pay more attention to visual health defects whereas parents with children in the government school should pay more vigilance regards to hygiene and health behavior problems.Keywords: community health nursing, school health service, health status, primary school children
Procedia PDF Downloads 122377 Empowering and Educating Young People Against Cybercrime by Playing: The Rayuela Method
Authors: Jose L. Diego, Antonio Berlanga, Gregorio López, Diana López
Abstract:
The Rayuela method is a success story, as it is part of a project selected by the European Commission to face the challenge launched by itself for achieving a better understanding of human factors, as well as social and organisational aspects that are able to solve issues in fighting against crime. Rayuela's method specifically focuses on the drivers of cyber criminality, including approaches to prevent, investigate, and mitigate cybercriminal behavior. As the internet has become an integral part of young people’s lives, they are the key target of the Rayuela method because they (as a victim or as a perpetrator) are the most vulnerable link of the chain. Considering the increased time spent online and the control of their internet usage and the low level of awareness of cyber threats and their potential impact, it is understandable the proliferation of incidents due to human mistakes. 51% of Europeans feel not well informed about cyber threats, and 86% believe that the risk of becoming a victim of cybercrime is rapidly increasing. On the other hand, Law enforcement has noted that more and more young people are increasingly committing cybercrimes. This is an international problem that has considerable cost implications; it is estimated that crimes in cyberspace will cost the global economy $445B annually. Understanding all these phenomena drives to the necessity of a shift in focus from sanctions to deterrence and prevention. As a research project, Rayuela aims to bring together law enforcement agencies (LEAs), sociologists, psychologists, anthropologists, legal experts, computer scientists, and engineers, to develop novel methodologies that allow better understanding the factors affecting online behavior related to new ways of cyber criminality, as well as promoting the potential of these young talents for cybersecurity and technologies. Rayuela’s main goal is to better understand the drivers and human factors affecting certain relevant ways of cyber criminality, as well as empower and educate young people in the benefits, risks, and threats intrinsically linked to the use of the Internet by playing, thus preventing and mitigating cybercriminal behavior. In order to reach that goal it´s necessary an interdisciplinary consortium (formed by 17 international partners) carries out researches and actions like Profiling and case studies of cybercriminals and victims, risk assessments, studies on Internet of Things and its vulnerabilities, development of a serious gaming environment, training activities, data analysis and interpretation using Artificial intelligence, testing and piloting, etc. For facilitating the real implementation of the Rayuela method, as a community policing strategy, is crucial to count on a Police Force with a solid background in trust-building and community policing in order to do the piloting, specifically with young people. In this sense, Valencia Local Police is a pioneer Police Force working with young people in conflict solving, through providing police mediation and peer mediation services and advice. As an example, it is an official mediation institution, so agreements signed by their police mediators have once signed by the parties, the value of a judicial decision.Keywords: fight against crime and insecurity, avert and prepare young people against aggression, ICT, serious gaming and artificial intelligence against cybercrime, conflict solving and mediation with young people
Procedia PDF Downloads 128376 A Multi-Science Study of Modern Synergetic War and Its Information Security Component
Authors: Alexander G. Yushchenko
Abstract:
From a multi-science point of view, we analyze threats to security resulting from globalization of international information space and information and communication aggression of Russia. A definition of Ruschism is formulated as an ideology supporting aggressive actions of modern Russia against the Euro-Atlantic community. Stages of the hybrid war Russia is leading against Ukraine are described, including the elements of subversive activity of the special services, the activation of the military phase and the gradual shift of the focus of confrontation to the realm of information and communication technologies. We reveal an emergence of a threat for democratic states resulting from the destabilizing impact of a target state’s mass media and social networks being exploited by Russian secret services under freedom-of-speech disguise. Thus, we underline the vulnerability of cyber- and information security of the network society in regard of hybrid war. We propose to define the latter a synergetic war. Our analysis is supported with a long-term qualitative monitoring of representation of top state officials on popular TV channels and Facebook. From the memetics point of view, we have detected a destructive psycho-information technology used by the Kremlin, a kind of information catastrophe, the essence of which is explained in detail. In the conclusion, a comprehensive plan for information protection of the public consciousness and mentality of Euro-Atlantic citizens from the aggression of the enemy is proposed.Keywords: cyber and information security, hybrid war, psycho-information technology, synergetic war, Ruschism
Procedia PDF Downloads 134375 Oral Health Status in Sickle Cell Anemia Subjects
Authors: Surekha Rathod
Abstract:
Sickle cell disease is a vascular disorder characterized by chronic, ongoing organ damage that is punctuated by episodes of acutely painful vascular complications.1 It is the most common genetic blood disorder in the United States, with about 2000 infants being identified through routine blood screenings annually, and an estimated 104,000-138,000 affected individuals living in the United States. Approximately 0.3%-1.3% of African American are affected by Sickle Cell Diseases (SCD).3 The aim of this paper is to present oral health status of patients with SCD. A total of 200 subjects of both sexes in the age group 18- 40 years were included in this study. The subjects were examined and the following indices were recorded • Oral hygiene index – Simplified (OHI-S). • Probing depths (PD). • Clinical Attachment Levels (CAL). • Gingival Index - Loe and Sillness. • Turesky Gillmore Glickman Modification of the Quigley Hein Plaque Index. (1970) • DMFT index. • Sickle Cell Disease Severity Index. A total of 1478 patients were screened of which 200 subjects were found to be diagnosed with SCD by electrophoresis. The study thus, included 200 subjects (111 females & 89 males) diagnosed with Sickle Cell Disease in the age group of 18-40 years. The probing pocket depths (PPD) were measured in millimeters. 36% had PPD in the range of 2-4mm, 48% had PPD in the range of 4-6mm while 16% had PPD of more than 6mm. Similar results were obtained for the Clinical Attachment Levels (CAL). 29.5 % subjects had CAL 2-4mm, 44.5% had 4-6mm & 26% had CAL 6mm & above. We can thus conclude that although oral health is not a priority for patients with SCD, it is supported by increased plaque accumulation. Because of the chronic anemic state of the patients with SCD, they should be encouraged to pay strict attention to oral hygiene instructions and practice.Keywords: chronic, genetic, oral, sickle cell disease, vascular
Procedia PDF Downloads 399374 Dermatological Study on Risk Factors for Pruritic Skin: Skin Properties of Elderly
Authors: Dianis Wulan Sari, Takeo Minematsu, Mikako Yoshida, Hiromi Sanada
Abstract:
Introduction: Pruritus is diagnosed as itching without macroscopic abnormalities on skin. It is the most skin complaint of elderly people. In the present study, we conducted a dermatological study to examine the risk factors of pruritic skin and predicted how to prevent pruritus especially in the elderly population. Pruritus is caused several types of inflammation, including epidermal innate immunity based on keratinocyte responses and acquired immunity regulated by type 1 or 2 helper T (Th) cells. The triggers of pruritus differ among inflammation types, therefore we did separately assess the pruritus-associated factors of each inflammation type in an effort to contribute to the identification of intervention targets for preventing pruritus. Therefore, this study aimed to investigate the factors related with actual condition of pruritic skin by examine the skin properties. Method: This study was conducted in elderly population of Indonesian nursing home. Basic characteristics and behaviors were obtained by interview. The properties of pruritic skin were collected by examination of skin biomarker using skin blotting as novel method of non-invasive skin assessment method and examination of skin barrier function using stratum corneum hydration and skin pH. Result: The average age of participants was 74 years with independent status was 66.8%. Age (β = -0.130, p = 0.044), cumulative lifetime sun exposure (β = 0.145, p = 0.026), bathing duration (β = 0.151, p = 0.022), clothing change frequency (β = 0.135, p = 0.029), and clothing type (β = -0.139, p = 0.021) were risk factors of pruritic skin in multivariate analysis. Conclusion: Risk factors of pruritic skin in elderly population were caused by internal factors such as skin senescence and external factors such as sun exposure, hygiene care and skin care behavior.Keywords: aging, hygiene care, pruritus, skin care, sun exposure
Procedia PDF Downloads 226373 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks
Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas
Abstract:
Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model
Procedia PDF Downloads 59372 Digital Forensic Exploration Framework for Email and Instant Messaging Applications
Authors: T. Manesh, Abdalla A. Alameen, M. Mohemmed Sha, A. Mohamed Mustaq Ahmed
Abstract:
Email and instant messaging applications are foremost and extensively used electronic communication methods in this era of information explosion. These applications are generally used for exchange of information using several frontend applications from various service providers by its users. Almost all such communications are now secured using SSL or TLS security over HTTP communication. At the same time, it is also noted that cyber criminals and terrorists have started exchanging information using these methods. Since communication is encrypted end-to-end, tracing significant forensic details and actual content of messages are found to be unattended and severe challenges by available forensic tools. These challenges seriously affect in procuring substantial evidences against such criminals from their working environments. This paper presents a vibrant forensic exploration and architectural framework which not only decrypts any communication or network session but also reconstructs actual message contents of email as well as instant messaging applications. The framework can be effectively used in proxy servers and individual computers and it aims to perform forensic reconstruction followed by analysis of webmail and ICQ messaging applications. This forensic framework exhibits a versatile nature as it is equipped with high speed packet capturing hardware, a well-designed packet manipulating algorithm. It regenerates message contents over regular as well as SSL encrypted SMTP, POP3 and IMAP protocols and catalyzes forensic presentation procedure for prosecution of cyber criminals by producing solid evidences of their actual communication as per court of law of specific countries.Keywords: forensics, network sessions, packet reconstruction, packet reordering
Procedia PDF Downloads 344371 Environmental Sanitation Parameters Recording in Refugee-Migrants Camps in Greece, 2017
Authors: Crysovaladou Kefaloudi, Kassiani Mellou, Eirini Saranti-Papasaranti, Athanasios Koustenis, Chrysoula Botsi, Agapios Terzidis
Abstract:
Recent migration crisis led to a vast migrant – refugees movement to Greece which created an urgent need for hosting settlements. Taken into account the protection of public health from possible pathogens related to water and food supply as well as waste and sewage accumulation, a 'Living Conditions Recording Form' was created in the context of 'PHILOS' European Program funded by the Asylum Migration and Integration Fund (AMIF) of EU’s DG Migration and Home Affairs, in order to assess a number of environmental sanitation parameters, in refugees – migrants camps in mainland. The assessment will be completed until the end of July. From March to June 2017, mobile unit teams comprised of health inspectors of sub-action 2 of “PHILOS” proceeded with the assessment of living conditions in twenty-two out of thirty-one camps and 'Stata' was used for the statistical analysis of obtained information. Variables were grouped into the following categories: 1) Camp administration, 2) hosted population number, 3) accommodation, 4) heating installations, 5) personal hygiene, 6) sewage collection and disposal, 7) water supply, 8) waste collection and management, 9) pest control, 10) fire safety, 11) food handling and safety. Preliminary analysis of the results showed that camp administration was performed in 90% of the camps by a public authority with the coordination of various NGOs. The median number of hosted population was 222 ranging from 62 to 3200, and the median value of hosted population per accommodation type was 4 in 19 camps. Heating facilities were provided in 86.1% of camps. In 18.2 % of the camps, one personal hygiene facility was available per 6 people ranging in the rest of the camps from 1 per 3 to 1 per 20 hosted refugees-migrants. Waste and sewage collection was performed depending on populations demand in an adequate way in all recorded camps. In 90% of camps, water was supplied through the central water supply system. In 85% of camps quantity and quality of water supply inside camps was regularly monitored for microbial and chemical indices. Pest control was implemented in 86.4% of the camps as well as fire safety measures. Food was supplied by catering companies in 50% of the camps, and the quality and quantity food was monitored at a regular basis. In 77% of camps, food was prepared by the hosted population with the availability of proper storage conditions. Furthermore, in all camps, hosted population was provided with personal hygiene items and health sanitary educational programs were implemented in 77.3% of camps. In conclusion, in the majority of the camps, environmental sanitation parameters were satisfactory. However, waste and sewage accumulation, as well as inadequate pest control measures were recorded in some camps. The obtained data have led to a number of recommendations for the improvement of sanitary conditions, disseminated to all relevant stakeholders. Special emphasis was given to hygiene measures implementation during food handling by migrants – refugees, as well as to waste and sewage accumulation taking in to account the population’s cultural background.Keywords: environmental sanitation parameters, food borne diseases risk assessment, refugee – migrants camps, water borne diseases risk assessment
Procedia PDF Downloads 230370 Designing of Tooling Solution for Material Handling in Highly Automated Manufacturing System
Authors: Muhammad Umair, Yuri Nikolaev, Denis Artemov, Ighor Uzhinsky
Abstract:
A flexible manufacturing system is an integral part of a smart factory of industry 4.0 in which every machine is interconnected and works autonomously. Robots are in the process of replacing humans in every industrial sector. As the cyber-physical-system (CPS) and artificial intelligence (AI) are advancing, the manufacturing industry is getting more dependent on computers than human brains. This modernization has boosted the production with high quality and accuracy and shifted from classic production to smart manufacturing systems. However, material handling for such automated productions is a challenge and needs to be addressed with the best possible solution. Conventional clamping systems are designed for manual work and not suitable for highly automated production systems. Researchers and engineers are trying to find the most economical solution for loading/unloading and transportation workpieces from a warehouse to a machine shop for machining operations and back to the warehouse without human involvement. This work aims to propose an advanced multi-shape tooling solution for highly automated manufacturing systems. The currently obtained result shows that it could function well with automated guided vehicles (AGVs) and modern conveyor belts. The proposed solution is following requirements to be automation-friendly, universal for different part geometry and production operations. We used a bottom-up approach in this work, starting with studying different case scenarios and their limitations and finishing with the general solution.Keywords: artificial intelligence, cyber physics system, Industry 4.0, material handling, smart factory, flexible manufacturing system
Procedia PDF Downloads 132369 Cybersecurity Challenges and Solutions in ICT Management at the Federal Polytechnic, Ado-Ekiti: A Quantitative Study
Authors: Innocent Uzougbo Onwuegbuzie, Siene Elizabeth Eke
Abstract:
This study investigates cybersecurity challenges and solutions in managing Information and Communication Technology (ICT) at the Federal Polytechnic, Ado-Ekiti, South-West Nigeria. The rapid evolution of ICT has revolutionized organizational operations and impacted various sectors, including education, healthcare, and finance. While ICT advancements facilitate seamless communication, complex data analytics, and strategic decision-making, they also introduce significant cybersecurity risks such as data breaches, ransomware, and other malicious attacks. These threats jeopardize the confidentiality, integrity, and availability of information systems, necessitating robust cybersecurity measures. The primary aim of this research is to identify prevalent cybersecurity challenges in ICT management, evaluate their impact on the institution's operations, and assess the effectiveness of current cybersecurity solutions. Adopting a quantitative research approach, data was collected through surveys and structured questionnaires from students, staff, and IT professionals at the Federal Polytechnic, Ado-Ekiti. The findings underscore the critical need for continuous investment in cybersecurity technologies, employee and student training, and regulatory compliance to mitigate evolving cyber threats. This research contributes to bridging the knowledge gap in cybersecurity management and provides valuable insights into effective strategies and technologies for safeguarding ICT systems in educational institutions. The study's objectives are to enhance the security posture of the Federal Polytechnic, Ado-Ekiti, in an increasingly digital world by identifying and addressing the cybersecurity challenges faced by its ICT management.Keywords: cybersecurity challenges, cyber threat mitigation, federal polytechnic Ado-Ekiti, ICT management
Procedia PDF Downloads 40368 Infant and Young Child Dietary Diversification Using Locally Available Foods after Nutrition Education in Rural Malawi
Authors: G. C. Phiri, E. A. Heil, A. A. Kalimbira, E. Muehlhoff, C. Masangano, B. M. Mtimuni, J. Herrmann, M. B. Krawinkel, I. Jordan
Abstract:
Background and objectives: High prevalence of undernutrition in Malawi is caused by poor complementary foods. Lack of knowledge of age appropriate food within the household might affect utilization of available resources. FAO-Malawi implemented nutrition education (NE) sessions in 200 villages in Kasungu and Mzimba districts from December 2012 to April 2013 targeting 15 caregivers per village of children aged 6-18 months, grandmothers, spouses and community leaders. Two trained volunteers per village facilitated 10 NE sessions on breastfeeding, food safety and hygiene and complementary feeding using locally available resources. This study assessed the reported dietary diversification practices of infant and young child after nutrition education and the factors that influenced adoption of the practice. Methodology: Questionnaire-based interviews with caregivers were conducted in 16 randomly selected villages (n=108) before training-(t1) and seven months after training-(t2). Knowledge score (KS) was calculated on the indicators breastfeeding, hygiene and complementary feeding. Count regression was performed using SPSS 22. Eight focus group discussions (FGDs) were separately conducted among caregivers and grandmothers in 4 villages. Content analysis was used to analyze FGDs data. Results: Following NE, caregivers' KS significantly increased (p<0.001) between t1 and t2 for breastfeeding (7.7 vs. 9.8, max=18), hygiene (3.8 vs. 5.9, max=7) and complementary feeding (10.2 vs. 16.2, max=26). Caregivers indicated that they stopped preparation of plain-refined maize meal porridge after they gained knowledge on dietary diversification of complementary foods. They learnt mushing and pounding of ingredients for enriched porridge. Whole-maize meal or potatoes were often enriched with vegetables, legumes, small fish or eggs and cooking oil. Children liked the taste of enriched porridge. Amount of enriched porridge consumed at each sitting increase among previously fussy-eater children. Meal frequency increased by including fruits as snacks in child’s diet. Grandmothers observed preparation of enriched porridge among the mothers using locally available foods. Grandmothers liked the taste of enriched porridge and not the greenish color of the porridge. Both grandmothers and mothers reported that children were playing independently after consuming enriched porridge and were strong and healthy. These motivated adoption of the practice. Conclusion: Increased knowledge and skill of preparation and utilisation of locally available foods promoted children’s dietary diversification. Children liking the enriched porridge motivated adoption of dietary diversification.Keywords: behaviour change, complementary feeding, dietary diversification, IYCN
Procedia PDF Downloads 472367 Observations on Cultural Alternative and Environmental Conservation: Populations "Delayed" and Excluded from Health and Public Hygiene Policies in Mexico (1890-1930)
Authors: Marcela Davalos Lopez
Abstract:
The history of the circulation of hygienic knowledge and the consolidation of public health in Latin American cities towards the end of the 19th century is well known. Among them, Mexico City was inserted in international politics, strengthened institutions, medical knowledge, applied parameters of modernity and built sanitary engineering works. Despite the power that this hygienist system achieved, its scope was relative: it cannot be generalized to all cities. From a comparative and contextual analysis, it will be shown that conclusions derived from modern urban historiography present, from our contemporary observations, fractures. Between 1890 and 1930, the small cities and areas surrounding the Mexican capital adapted in their own way the international and federal public health regulations. This will be shown for neighborhoods located around Mexico City and in a medium city, close to the Mexican capital (about 80 km), called Cuernavaca. While the inhabitants of the neighborhoods kept awaiting the evolutionary process and the forms that public hygiene policies were taking (because they were witnesses and affected in their territories), in Cuernavaca, the dictates came as an echo. While the capital was drained, large roads were opened, roundabouts were erected, residents were expelled, and drains, sewers, drinking water pipes, etc., were built; Cuernavaca was sheltered in other times and practices. What was this due to? Undoubtedly, the time and energy that it took politicians and the group of "scientists" to carry out these enormous works in the Mexican capital took them away from addressing the issue in remote villages. It was not until the 20th century that the federal hygiene policy began to be strengthened. Despite this, there are other factors that emphasize the particularities of each site. I would like to draw attention here to the different receptions that each town prepared on public hygiene. We will see that Cuernavaca responded to its own semi-rural culture, history, orography and functions, prolonging for much longer, for example, the use of its deep ravines as sewers. For their part, the neighborhoods surrounding the capital, although affected and excluded from hygienist policies, chose to move away from them and solve the deficiencies with their own resources (they resorted to the waste that was left from the dried lake of Mexico to continue their lake practices). All of this points to a paradox that shapes our contemporary concerns: on the one hand, the benefits derived from medical knowledge and its technological applications (in this work referring particularly to the urban health system) and, on the other, the alteration it caused in environmental settings. Places like Cuernavaca (classified by the nineteenth-century and hygienists of the first decades of the twentieth century as backward), as well as landscapes such as neighborhoods, affected by advances in sanitary engineering, keep in their memory buried practices that we observe today as possible ways to reestablish environmental balances: alternative uses of water; recycling of organic materials; local uses of fauna; various systems for breaking down excreta, and so on. In sum, what the nineteenth and first half of the twentieth centuries graduated as levels of backwardness or progress, turn out to be key information to rethink the routes of environmental conservation. When we return to the observations of the scientists, politicians and lawyers of that period, we find historically rejected cultural alterity. Populations such as Cuernavaca that, due to their history, orography and/or insufficiency of federal policies, kept different relationships with the environment, today give us clues to reorient basic elements of cities: alternative uses of water, waste of raw materials, organic or consumption of local products, among others. It is, therefore, a matter of unearthing the rejected that cries out to emerge to the surface.Keywords: sanitary hygiene, Mexico city, cultural alterity, environmental conservation, environmental history
Procedia PDF Downloads 164366 Household Water Practices in a Rapidly Urbanizing City and Its Implications for the Future of Potable Water: A Case Study of Abuja Nigeria
Authors: Emmanuel Maiyanga
Abstract:
Access to sufficiently good quality freshwater has been a global challenge, but more notably in low-income countries, particularly in the Sub-Saharan countries, which Nigeria is one. Urban population is soaring, especially in many low-income countries, the existing centralised water supply infrastructures are ageing and inadequate, moreover in households peoples’ lifestyles have become more water-demanding. So, people mostly device coping strategies where municipal supply is perceived to have failed. This development threatens the futures of groundwater and calls for a review of management strategy and research approach. The various issues associated with water demand management in low-income countries and Nigeria, in particular, are well documented in the literature. However, the way people use water daily in households and the reasons they do so, and how the situation is constructing demand among the middle-class population in Abuja Nigeria is poorly understood. This is what this research aims to unpack. This is achieved by using the social practices research approach (which is based on the Theory of Practices) to understand how this situation impacts on the shared groundwater resource. A qualitative method was used for data gathering. This involved audio-recorded interviews of householders and water professionals in the private and public sectors. It also involved observation, note-taking, and document study. The data were analysed thematically using NVIVO software. The research reveals the major household practices that draw on the water on a domestic scale, and they include water sourcing, body hygiene and sanitation, laundry, kitchen, and outdoor practices (car washing, domestic livestock farming, and gardening). Among all the practices, water sourcing, body hygiene, kitchen, and laundry practices, are identified to impact most on groundwater, with impact scale varying with household peculiarities. Water sourcing practices involve people sourcing mostly from personal boreholes because the municipal water supply is perceived inadequate and unreliable in terms of service delivery and water quality, and people prefer easier and unlimited access and control using boreholes. Body hygiene practices reveal that every respondent prefers bucket bathing at least once daily, and the majority bathe twice or more every day. Frequency is determined by the feeling of hotness and dirt on the skin. Thus, people bathe to cool down, stay clean, and satisfy perceived social, religious, and hygiene demand. Kitchen practice consumes water significantly as people run the tap for vegetable washing in daily food preparation and dishwashing after each meal. Laundry practice reveals that most people wash clothes most frequently (twice in a week) during hot and dusty weather, and washing with hands in basins and buckets is the most prevalent and water wasting due to soap overdose. The research also reveals poor water governance as a major cause of current inadequate municipal water delivery. The implication poor governance and widespread use of boreholes is an uncontrolled abstraction of groundwater to satisfy desired household practices, thereby putting the future of the shared aquifer at great risk of total depletion with attendant multiplying effects on the people and the environment and population continues to soar.Keywords: boreholes, groundwater, household water practices, self-supply
Procedia PDF Downloads 123365 Leveraging Digital Cyber Technology for Self-Care and Improved Management of DMPA-SC Clients
Authors: Oluwaseun Adeleke, Grace Amarachi Omenife, Jennifer Adebambo, Mopelola Raji, Anthony Nwala, Mogbonjubade Adesulure
Abstract:
Introduction: The incorporation of digital technology in healthcare systems is instrumental in transforming the delivery, management, and overall experience of healthcare and holds the potential to scale up access through over 200 million active mobile phones used in Nigeria. Digital tools enable increased access to care, stronger client engagement, progress in research and data-driven insights, and more effective promotion of self-care and do-it-yourself practices. The Delivering Innovation in Self-Care (DISC) project 2021 has played a pivotal role in granting women greater autonomy over their sexual and reproductive health (SRH) through a variety of approaches, including information and training to self-inject contraception (DMPA-SC). To optimize its outcomes, the project also leverages digital technology platforms like social media: Facebook, Instagram, and Meet Tina (Chatbot) via WhatsApp, Customer Relationship Management (CRM) applications Freshworks, and Viamo. Methodology: The project has been successful at optimizing in-person digital cyberspace interaction to sensitize individuals effectively about self-injection and provide linkages to SI services. This platform employs the Freshworks CRM software application, along with specially trained personnel known as Cyber IPC Agents and DHIS calling centers. Integration of Freshworks CRM software with social media allows a direct connection with clients to address emerging issues, schedule follow-ups, send reminders to improve compliance with self-injection schedules, enhance the overall user experience for self-injection (SI) clients, and generate comprehensive reports and analytics on client interactions. Interaction covers a range of topics, including – How to use SI, learning more about SI, side-effects and its management, accessing services, fertility, ovulation, other family planning methods, inquiries related to Sexual Reproductive Health as well as uses an address log to connect them with nearby facilities or online pharmaceuticals. Results: Between the months of March to September, a total of 5,403 engagements were recorded. Among these, 4,685 were satisfactorily resolved. Since the program's inception, digital advertising has created 233,633,075 impressions, reached 12,715,582 persons, and resulted in 3,394,048 clicks. Conclusion: Leveraging digital technology has proven to be an invaluable tool in client management and improving client experience. The use of Cyber technology has enabled the successful development and maintenance of client relationships, which have been effective at providing support, facilitating delivery and compliance with DMPA-SC self-injection services, and ensuring overall client satisfaction. Concurrently, providing qualitative data, including user experience feedback, has enabled the derivation of crucial insights that inform the decision-making process and guide in normalizing self-care behavior.Keywords: selfcare, DMPA-SC self-injection, digital technology, cyber technology, freshworks CRM software
Procedia PDF Downloads 67364 Dual-use UAVs in Armed Conflicts: Opportunities and Risks for Cyber and Electronic Warfare
Authors: Piret Pernik
Abstract:
Based on strategic, operational, and technical analysis of the ongoing armed conflict in Ukraine, this paper will examine the opportunities and risks of using small commercial drones (dual-use unmanned aerial vehicles, UAV) for military purposes. The paper discusses the opportunities and risks in the information domain, encompassing both cyber and electromagnetic interference and attacks. The paper will draw conclusions on a possible strategic impact to the battlefield outcomes in the modern armed conflicts by the widespread use of dual-use UAVs. This article will contribute to filling the gap in the literature by examining based on empirical data cyberattacks and electromagnetic interference. Today, more than one hundred states and non-state actors possess UAVs ranging from low cost commodity models, widely are dual-use, available and affordable to anyone, to high-cost combat UAVs (UCAV) with lethal kinetic strike capabilities, which can be enhanced with Artificial Intelligence (AI) and Machine Learning (ML). Dual-use UAVs have been used by various actors for intelligence, reconnaissance, surveillance, situational awareness, geolocation, and kinetic targeting. Thus they function as force multipliers enabling kinetic and electronic warfare attacks and provide comparative and asymmetric operational and tactical advances. Some go as far as argue that automated (or semi-automated) systems can change the character of warfare, while others observe that the use of small drones has not changed the balance of power or battlefield outcomes. UAVs give considerable opportunities for commanders, for example, because they can be operated without GPS navigation, makes them less vulnerable and dependent on satellite communications. They can and have been used to conduct cyberattacks, electromagnetic interference, and kinetic attacks. However, they are highly vulnerable to those attacks themselves. So far, strategic studies, literature, and expert commentary have overlooked cybersecurity and electronic interference dimension of the use of dual use UAVs. The studies that link technical analysis of opportunities and risks with strategic battlefield outcomes is missing. It is expected that dual use commercial UAV proliferation in armed and hybrid conflicts will continue and accelerate in the future. Therefore, it is important to understand specific opportunities and risks related to the crowdsourced use of dual-use UAVs, which can have kinetic effects. Technical countermeasures to protect UAVs differ depending on a type of UAV (small, midsize, large, stealth combat), and this paper will offer a unique analysis of small UAVs both from the view of opportunities and risks for commanders and other actors in armed conflict.Keywords: dual-use technology, cyber attacks, electromagnetic warfare, case studies of cyberattacks in armed conflicts
Procedia PDF Downloads 102363 Nutritional Status of Children in a Rural Food Environment, Haryana: A Paradox for the Policy Action
Authors: Neha Gupta, Sonika Verma, Seema Puri, Nikhil Tandon, Narendra K. Arora
Abstract:
The concurrent increasing prevalence of underweight and overweight/obesity among children with changing lifestyle and the rapid transitioning society has necessitated the need for a unifying/multi-level approach to understand the determinants of the problem. The present community-based cross-sectional research study was conducted to assess the associations between lifestyle behavior and food environment of the child at household, neighborhood, and school with the BMI of children (6-12 year old) (n=612) residing in three rural clusters of Palwal district, Haryana. The study used innovative and robust methods for assessing the lifestyle and various components of food environment in the study. The three rural clusters selected for the study were located at three different locations according to their access to highways in the SOMAARTH surveillance site. These clusters were significantly different from each other in terms of their socio-demographic and socio-economic profile, living conditions, environmental hygiene, health seeking behavior and retail density. Despite of being different, the quality of living conditions and environmental hygiene was poor across three clusters. The children had higher intakes of dietary energy and sugars; one-fifth share of the energy being derived from unhealthy foods, engagement in high levels of physical activity and significantly different food environment at home, neighborhood and school level. However, despite having a high energy intake, 22.5% of the recruited children were thin/severe thin, and 3% were overweight/obese as per their BMI-for-age categories. The analysis was done using multi-variate logistic regression at three-tier hierarchy including individual, household and community level. The factors significantly explained the variability in governing the risk of getting thin/severe thin among children in rural area (p-value: 0.0001; Adjusted R2: 0.156) included age (>10years) (OR: 2.1; 95% CI: 1.0-4.4), the interaction between minority category and poor SES of the household (OR: 4.4; 95% CI: 1.6-12.1), availability of sweets (OR: 0.9; 95% CI: 0.8-0.99) and cereals (OR: 0.9; 95% CI: 0.8-1.0) in the household and poor street condition (proxy indicator of the hygiene and cleanliness in the neighborhood) (OR: 0.3; 95% CI: 0.1-1.1). The homogeneity of other factors at neighborhood and school level food environment diluted the heterogeneity in the lifestyles and home environment of the recruited children and their households. However, it is evident that when various individual factors interplay at multiple levels amplifies the risk of undernutrition in a rural community. Conclusion: These rural areas in Haryana are undergoing developmental, economic and societal transition. In correspondence, no improvements in the nutritional status of children have happened. Easy access to the unhealthy foods has become a paradox.Keywords: transition, food environment, lifestyle, undernutrition, overnutrition
Procedia PDF Downloads 180362 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems
Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy
Abstract:
The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.Keywords: smart grids, blockchain, fiber optic sensor, security
Procedia PDF Downloads 120361 Training During Emergency Response to Build Resiliency in Water, Sanitation, and Hygiene
Authors: Lee Boudreau, Ash Kumar Khaitu, Laura A. S. MacDonald
Abstract:
In April 2015, a magnitude 7.8 earthquake struck Nepal, killing, injuring, and displacing thousands of people. The earthquake also damaged water and sanitation service networks, leading to a high risk of diarrheal disease and the associated negative health impacts. In response to the disaster, the Environment and Public Health Organization (ENPHO), a Kathmandu-based non-governmental organization, worked with the Centre for Affordable Water and Sanitation Technology (CAWST), a Canadian education, training and consulting organization, to develop two training programs to educate volunteers on water, sanitation, and hygiene (WASH) needs. The first training program was intended for acute response, with the second focusing on longer term recovery. A key focus was to equip the volunteers with the knowledge and skills to formulate useful WASH advice in the unanticipated circumstances they would encounter when working in affected areas. Within the first two weeks of the disaster, a two-day acute response training was developed, which focused on enabling volunteers to educate those affected by the disaster about local WASH issues, their link to health, and their increased importance immediately following emergency situations. Between March and October 2015, a total of 19 training events took place, with over 470 volunteers trained. The trained volunteers distributed hygiene kits and liquid chlorine for household water treatment. They also facilitated health messaging and WASH awareness activities in affected communities. A three-day recovery phase training was also developed and has been delivered to volunteers in Nepal since October 2015. This training focused on WASH issues during the recovery and reconstruction phases. The interventions and recommendations in the recovery phase training focus on long-term WASH solutions, and so form a link between emergency relief strategies and long-term development goals. ENPHO has trained 226 volunteers during the recovery phase, with training ongoing as of April 2016. In the aftermath of the earthquake, ENPHO found that its existing pool of volunteers were more than willing to help those in their communities who were more in need. By training these and new volunteers, ENPHO was able to reach many more communities in the immediate aftermath of the disaster; together they reached 11 of the 14 earthquake-affected districts. The collaboration between ENPHO and CAWST in developing the training materials was a highly collaborative and iterative process, which enabled the training materials to be developed within a short response time. By training volunteers on basic WASH topics during both the immediate response and the recovery phase, ENPHO and CAWST have been able to link immediate emergency relief to long-term developmental goals. While the recovery phase training continues in Nepal, CAWST is planning to decontextualize the training used in both phases so that it can be applied to other emergency situations in the future. The training materials will become part of the open content materials available on CAWST’s WASH Resources website.Keywords: water and sanitation, emergency response, education and training, building resilience
Procedia PDF Downloads 305