Search results for: cyber risk assessment
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10535

Search results for: cyber risk assessment

10295 The Difference Between Islamic Terrorism and Tha Human Rights In The Middle East

Authors: Mina Latif Ghaly Sawiras

Abstract:

The difference between Islamic terrorism and human-rights has become a big question in the fight against Islamic terrorism globally. This is was raised on the fact that terrorism and human rights are interrelated to the extent that, when the former starts, the latter is violated. This direct linkage was recognized in the Vienna Declaration and Program of Action as adopted by the World Conference on Human Rights in Vienna on 25 June 1993 which agreed that acts of terrorism in all its forms and manifestations are aimed at the destruction of human rights. Hence, Islamic-terrorism constitutes a violation on our most basic human rights. To this end, the first part of this paper will focus on the nexus between terrorism and human rights and endeavors to draw a co-relation between these two concepts. The second part thereafter will analyse the emerging concept of cyber-terrorism and how it takes place. Further, an analysis of cyber counter-terrorism balanced as against human rights will also be undertaken. This will be done through the analysis of the concept of ‘securitization’ of human rights as well as the need to create a balance between counterterrorism efforts as against the protection of human rights at all costs. The paper will then conclude with recommendations on how to balance counter-terrorism and human rights in the modern age.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation

Procedia PDF Downloads 34
10294 Contact Address Levels and Human Health Risk of Metals In Milk and Milk Products Bought from Abeokuta, Southwestern Nigeria

Authors: Olukayode Bamgbose, Feyisola Agboola, Adewale M. Taiwo, Olanrewaju Olujimi Oluwole Terebo, Azeez Soyingbe, Akeem Bamgbade

Abstract:

The present study evaluated the contents and health risk assessment of metals determined in milk and milk product samples collected from the Abeokuta market. Forty-five milk and milk product (yoghurt) samples were digested and analysed for selected metals using Atomic Absorption Spectrophotometric method. Health risk assessment was evaluated for hazard quotient (HQ), hazard index (HI), and cancer risk (CR). Data were subjected to descriptive and inferential statistics. The concentrations of Zn, which ranged from 3.24±0.59 to 4.35±0.59 mg/kg, were the highest in the samples. Cr and Cd were measured below the detection limit of the analytical instrument, while the Pb level was higher than the Codex Alimentarius Commission value of 0.02 mg/kg, indicating unsafe for consumption. However, the HQ of Pb and other metals in milk and milk product samples was less than 1.0, thereby establishing no adverse health effects for Pb and other metals. The distribution pattern of metals in milk and milk product samples followed the decreasing order of Zn > Fe > Ni > Co > Cu > Mn > Pb > Cd/Cr. The CR levels of meals were also less than the permissible limit of 1.0 x 10-4, establishing no possible development of cancer. Keywords: adverse effects, cancer, metals, milk, milk product, the permissible limit.

Keywords: adverse effects, cancer, metals, milk, milk product, permissible limit

Procedia PDF Downloads 53
10293 Identifying Lead Poisoning Risk Factors among Non-Pregnant Adults in New York City through Motivational Interviewing Techniques

Authors: Nevila Bardhi, Joanna Magda, Kolapo Alex-Oni, Slavenka Sedlar, Paromita Hore

Abstract:

The New York City Department of Health and Mental Hygiene (NYC DOHMH) receives blood lead test results for NYC residents and conducts lead poisoning case investigations for individuals with elevated blood lead levels exposed to lead occupationally and non-occupationally. To (1) improve participant engagement, (2) aid the identification of potential lead sources, and (3) better tailor recommendations to reduce lead exposure, Motivational Interviewing (MI) techniques were incorporated during risk assessment interviews of non-pregnant adults by DOHMH’s Adult Lead Poisoning Prevention (ALP) Program. MI is an evidence-based counselling method used in clinical settings that have been effective in promoting behavior change by resolving ambivalence and enhancing motivation in treating both physiological and psychological health conditions. The incorporation of MI techniques in the ALP risk assessment interview was effective in improving the identification of lead sources for non-pregnant adult cases, thus, allowing for the opportunity to better tailor lead poisoning prevention recommendations. The embedding of MI cues in the ALP risk assessment interview also significantly increased engagement in the interview process, resulting in approximately 50 more interviews conducted per year and a decrease in interview refusals during case investigations. Additionally, the pre-MI interview completion rate was 57%, while the post-MI Interview completion rate was 68%. We recommend MI techniques to be used by other lead poisoning prevention programs during lead poisoning investigations in similar diverse populations.

Keywords: lead poisoning prevention, motivational interviewing, behavior change, lead poisoning risk factors, self-efficacy

Procedia PDF Downloads 61
10292 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 73
10291 From Intuitive to Constructive Audit Risk Assessment: A Complementary Approach to CAATTs Adoption

Authors: Alon Cohen, Jeffrey Kantor, Shalom Levy

Abstract:

The use of the audit risk model in auditing has faced limitations and difficulties, leading auditors to rely on a conceptual level of its application. The qualitative approach to assessing risks has resulted in different risk assessments, affecting the quality of audits and decision-making on the adoption of CAATTs. This study aims to investigate risk factors impacting the implementation of the audit risk model and propose a complementary risk-based instrument (KRIs) to form substance risk judgments and mitigate against heightened risk of material misstatement (RMM). The study addresses the question of how risk factors impact the implementation of the audit risk model, improve risk judgments, and aid in the adoption of CAATTs. The study uses a three-stage scale development procedure involving a pretest and subsequent study with two independent samples. The pretest involves an exploratory factor analysis, while the subsequent study employs confirmatory factor analysis for construct validation. Additionally, the authors test the ability of the KRIs to predict audit efforts needed to mitigate against heightened RMM. Data was collected through two independent samples involving 767 participants. The collected data was analyzed using exploratory factor analysis and confirmatory factor analysis to assess scale validity and construct validation. The suggested KRIs, comprising two risk components and seventeen risk items, are found to have high predictive power in determining audit efforts needed to reduce RMM. The study validates the suggested KRIs as an effective instrument for risk assessment and decision-making on the adoption of CAATTs. This study contributes to the existing literature by implementing a holistic approach to risk assessment and providing a quantitative expression of assessed risks. It bridges the gap between intuitive risk evaluation and the theoretical domain, clarifying the mechanism of risk assessments. It also helps improve the uniformity and quality of risk assessments, aiding audit standard-setters in issuing updated guidelines on CAATT adoption. A few limitations and recommendations for future research should be mentioned. First, the process of developing the scale was conducted in the Israeli auditing market, which follows the International Standards on Auditing (ISAs). Although ISAs are adopted in European countries, for greater generalization, future studies could focus on other countries that adopt additional or local auditing standards. Second, this study revealed risk factors that have a material impact on the assessed risk. However, there could be additional risk factors that influence the assessment of the RMM. Therefore, future research could investigate other risk segments, such as operational and financial risks, to bring a broader generalizability to our results. Third, although the sample size in this study fits acceptable scale development procedures and enables drawing conclusions from the body of research, future research may develop standardized measures based on larger samples to reduce the generation of equivocal results and suggest an extended risk model.

Keywords: audit risk model, audit efforts, CAATTs adoption, key risk indicators, sustainability

Procedia PDF Downloads 43
10290 Maternal Mental Health and Patient Reported Outcomes: Identifying At-Risk Pregnant and Postpartum Patients

Authors: Jennifer Reese, Josh Biber, Howard Weeks, Rachel Hess

Abstract:

Aim: The Edinburgh Postnatal Depression Screen (EPDS) is a mental health screening for pregnant women that has been widely used over the last 30 years. This screen is typically given in clinic on paper to patients throughout pregnancy and postpartum. The screen helps identify patients who may be at risk for pregnancy related depression or postpartum depression. In early 2016, University of Utah Health implemented an electronic version of the EPDS as well as the PROMIS Depression v1.0 instrument for all pregnant and postpartum patients. We asked patients both instruments to understand coverage of patients identified as at risk for each instrument. Methods: The EPDS is currently administered as part of our PRO template for pregnant and postpartum women. We also administer the PROMIS Depression as part of a standard PRO assessment to all patients. Patients are asked to complete an assessment no more often than every eight weeks. PRO assessments are either completed at home or in clinic with a tablet computer. Patients with a PROMIS score of ≥ 65 or a EPDS score of ≥ 10 were identified as at risk for depression Results: From April 2016 to April 2017, 1,330 unique patients were screened at University of Utah Health in OBGYN clinics with both the EPDS and PROMIS depression instrument on the same day. There were 28 (2.1%) patients were identified as at risk for depression using the PROMIS depression screen, while 262 (19.7%) patients were identified as at risk for postpartum depression using the EPDS screen. Overall, 27 (2%) patients were identified as at risk on both instruments. Conclusion: The EPDS identified a higher percent (19.7%) of patients at risk for depression when compared to the PROMIS depression (2.1%). Ninety-six percent of patients who screened positive on the PROMIS depression screen also screened positive on the EPDS screen. Mental health is an important component to a patient’s overall wellbeing. We want to ensure all patients, particularly pregnant or post-partum women, receive screening and treatment when necessary. A combination of screenings may be necessary to provide the overall best care for patients and to identify the highest percentage of patients at risk.

Keywords: patient reported outcomes, mental health, maternal, depression

Procedia PDF Downloads 347
10289 Instant Fire Risk Assessment Using Artifical Neural Networks

Authors: Tolga Barisik, Ali Fuat Guneri, K. Dastan

Abstract:

Major industrial facilities have a high potential for fire risk. In particular, the indices used for the detection of hidden fire are used very effectively in order to prevent the fire from becoming dangerous in the initial stage. These indices provide the opportunity to prevent or intervene early by determining the stage of the fire, the potential for hazard, and the type of the combustion agent with the percentage values of the ambient air components. In this system, artificial neural network will be modeled with the input data determined using the Levenberg-Marquardt algorithm, which is a multi-layer sensor (CAA) (teacher-learning) type, before modeling the modeling methods in the literature. The actual values produced by the indices will be compared with the outputs produced by the network. Using the neural network and the curves to be created from the resulting values, the feasibility of performance determination will be investigated.

Keywords: artifical neural networks, fire, Graham Index, levenberg-marquardt algoritm, oxygen decrease percentage index, risk assessment, Trickett Index

Procedia PDF Downloads 108
10288 Binary Decision Diagram Based Methods to Evaluate the Reliability of Systems Considering Failure Dependencies

Authors: Siqi Qiu, Yijian Zheng, Xin Guo Ming

Abstract:

In many reliability and risk analysis, failures of components are supposed to be independent. However, in reality, the ignorance of failure dependencies among components may render the results of reliability and risk analysis incorrect. There are two principal ways to incorporate failure dependencies in system reliability and risk analysis: implicit and explicit methods. In the implicit method, failure dependencies can be modeled by joint probabilities, correlation values or conditional probabilities. In the explicit method, certain types of dependencies can be modeled in a fault tree as mutually independent basic events for specific component failures. In this paper, explicit and implicit methods based on BDD will be proposed to evaluate the reliability of systems considering failure dependencies. The obtained results prove the equivalence of the proposed implicit and explicit methods. It is found that the consideration of failure dependencies decreases the reliability of systems. This observation is intuitive, because more components fail due to failure dependencies. The consideration of failure dependencies helps designers to reduce the dependencies between components during the design phase to make the system more reliable.

Keywords: reliability assessment, risk assessment, failure dependencies, binary decision diagram

Procedia PDF Downloads 449
10287 Cyber-Med: Practical Detection Methodology of Cyber-Attacks Aimed at Medical Devices Eco-Systems

Authors: Nir Nissim, Erez Shalom, Tomer Lancewiki, Yuval Elovici, Yuval Shahar

Abstract:

Background: A Medical Device (MD) is an instrument, machine, implant, or similar device that includes a component intended for the purpose of the diagnosis, cure, treatment, or prevention of disease in humans or animals. Medical devices play increasingly important roles in health services eco-systems, including: (1) Patient Diagnostics and Monitoring; Medical Treatment and Surgery; and Patient Life Support Devices and Stabilizers. MDs are part of the medical device eco-system and are connected to the network, sending vital information to the internal medical information systems of medical centers that manage this data. Wireless components (e.g. Wi-Fi) are often embedded within medical devices, enabling doctors and technicians to control and configure them remotely. All these functionalities, roles, and uses of MDs make them attractive targets of cyber-attacks launched for many malicious goals; this trend is likely to significantly increase over the next several years, with increased awareness regarding MD vulnerabilities, the enhancement of potential attackers’ skills, and expanded use of medical devices. Significance: We propose to develop and implement Cyber-Med, a unique collaborative project of Ben-Gurion University of the Negev and the Clalit Health Services Health Maintenance Organization. Cyber-Med focuses on the development of a comprehensive detection framework that relies on a critical attack repository that we aim to create. Cyber-Med will allow researchers and companies to better understand the vulnerabilities and attacks associated with medical devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The Cyber-Med detection framework will consist of two independent, but complementary detection approaches: one for known attacks, and the other for unknown attacks. These modules incorporate novel ideas and algorithms inspired by our team's domains of expertise, including cyber security, biomedical informatics, and advanced machine learning, and temporal data mining techniques. The establishment and maintenance of Cyber-Med’s up-to-date attack repository will strengthen the capabilities of Cyber-Med’s detection framework. Major Findings: Based on our initial survey, we have already found more than 15 types of vulnerabilities and possible attacks aimed at MDs and their eco-system. Many of these attacks target individual patients who use devices such pacemakers and insulin pumps. In addition, such attacks are also aimed at MDs that are widely used by medical centers such as MRIs, CTs, and dialysis engines; the information systems that store patient information; protocols such as DICOM; standards such as HL7; and medical information systems such as PACS. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched against MDs. Very little research has been conducted in order to protect these devices from cyber-attacks, since most of the development and engineering efforts are aimed at the devices’ core medical functionality, the contribution to patients’ healthcare, and the business aspects associated with the medical device.

Keywords: medical device, cyber security, attack, detection, machine learning

Procedia PDF Downloads 331
10286 Modeling and Analyzing Controversy in Large-Scale Cyber-Argumentation

Authors: Najla Althuniyan

Abstract:

Online discussions take place across different platforms. These discussions have the potential to extract crowd wisdom and capture the collective intelligence from a different perspective. However, certain phenomena, such as controversy, often appear in online argumentation that makes the discussion between participants heated. Heated discussions can be used to extract new knowledge. Therefore, detecting the presence of controversy is an essential task to determine if collective intelligence can be extracted from online discussions. This paper uses existing measures for estimating controversy quantitatively in cyber-argumentation. First, it defines controversy in different fields, and then it identifies the attributes of controversy in online discussions. The distributions of user opinions and the distance between opinions are used to calculate the controversial degree of a discussion. Finally, the results from each controversy measure are discussed and analyzed using an empirical study generated by a cyber-argumentation tool. This is an improvement over the existing measurements because it does not require ground-truth data or specific settings and can be adapted to distribution-based or distance-based opinions.

Keywords: online argumentation, controversy, collective intelligence, agreement analysis, collaborative decision-making, fuzzy logic

Procedia PDF Downloads 99
10285 Understanding Cyber Kill Chains: Optimal Allocation of Monitoring Resources Using Cooperative Game Theory

Authors: Roy. H. A. Lindelauf

Abstract:

Cyberattacks are complex processes consisting of multiple interwoven tasks conducted by a set of agents. Interdictions and defenses against such attacks often rely on cyber kill chain (CKC) models. A CKC is a framework that tries to capture the actions taken by a cyber attacker. There exists a growing body of literature on CKCs. Most of this work either a) describes the CKC with respect to one or more specific cyberattacks or b) discusses the tools and technologies used by the attacker at each stage of the CKC. Defenders, facing scarce resources, have to decide where to allocate their resources given the CKC and partial knowledge on the tools and techniques attackers use. In this presentation CKCs are analyzed through the lens of covert projects, i.e., interrelated tasks that have to be conducted by agents (human and/or computer) with the aim of going undetected. Various aspects of covert project models have been studied abundantly in the operations research and game theory domain, think of resource-limited interdiction actions that maximally delay completion times of a weapons project for instance. This presentation has investigated both cooperative and non-cooperative game theoretic covert project models and elucidated their relation to CKC modelling. To view a CKC as a covert project each step in the CKC is broken down into tasks and there are players of which each one is capable of executing a subset of the tasks. Additionally, task inter-dependencies are represented by a schedule. Using multi-glove cooperative games it is shown how a defender can optimize the allocation of his scarce resources (what, where and how to monitor) against an attacker scheduling a CKC. This study presents and compares several cooperative game theoretic solution concepts as metrics for assigning resources to the monitoring of agents.

Keywords: cyber defense, cyber kill chain, game theory, information warfare techniques

Procedia PDF Downloads 118
10284 Digital Immunity System for Healthcare Data Security

Authors: Nihar Bheda

Abstract:

Protecting digital assets such as networks, systems, and data from advanced cyber threats is the aim of Digital Immunity Systems (DIS), which are a subset of cybersecurity. With features like continuous monitoring, coordinated reactions, and long-term adaptation, DIS seeks to mimic biological immunity. This minimizes downtime by automatically identifying and eliminating threats. Traditional security measures, such as firewalls and antivirus software, are insufficient for enterprises, such as healthcare providers, given the rapid evolution of cyber threats. The number of medical record breaches that have occurred in recent years is proof that attackers are finding healthcare data to be an increasingly valuable target. However, obstacles to enhancing security include outdated systems, financial limitations, and a lack of knowledge. DIS is an advancement in cyber defenses designed specifically for healthcare settings. Protection akin to an "immune system" is produced by core capabilities such as anomaly detection, access controls, and policy enforcement. Coordination of responses across IT infrastructure to contain attacks is made possible by automation and orchestration. Massive amounts of data are analyzed by AI and machine learning to find new threats. After an incident, self-healing enables services to resume quickly. The implementation of DIS is consistent with the healthcare industry's urgent requirement for resilient data security in light of evolving risks and strict guidelines. With resilient systems, it can help organizations lower business risk, minimize the effects of breaches, and preserve patient care continuity. DIS will be essential for protecting a variety of environments, including cloud computing and the Internet of medical devices, as healthcare providers quickly adopt new technologies. DIS lowers traditional security overhead for IT departments and offers automated protection, even though it requires an initial investment. In the near future, DIS may prove to be essential for small clinics, blood banks, imaging centers, large hospitals, and other healthcare organizations. Cyber resilience can become attainable for the whole healthcare ecosystem with customized DIS implementations.

Keywords: digital immunity system, cybersecurity, healthcare data, emerging technology

Procedia PDF Downloads 36
10283 Health Risk Assessment and Source Apportionment of Elemental Particulate Contents from a South Asian Future Megacity

Authors: Afifa Aslam, Muhammad Ibrahim, Abid Mahmood, Muhammad Usman Alvi, Fariha Jabeen, Umara Tabassum

Abstract:

Many factors cause air pollution in Pakistan, which poses a significant threat to human health. Diesel fuel and gasoline motor vehicles, as well as industrial companies, pollute the air in Pakistan's cities. The study's goal is to determine the level of air pollution in a Pakistani industrial city and to establish risk levels for the health of the population. We measured the intensity of air pollution by chemical characterization and examination of air samples collected at stationary remark sites. The PM10 levels observed at all sampling sites, including residential, commercial, high-traffic, and industrial areas were well above the limits imposed by Pakistan EPA, the United States EPA, and WHO. We assessed the health risk via chemical factors using a methodology approved for risk assessment. All Igeo index values greater than one were considered moderately contaminated or moderately to severely contaminated. Heavy metals have a substantial risk of acute adverse effects. In Faisalabad, Pakistan, there was an enormously high risk of chronic effects produced by a heavy metal acquaintance. Concerning specified toxic metals, intolerable levels of carcinogenic risks have been determined for the entire population. As a result, in most of the investigated areas of Faisalabad, the indices and hazard quotients for chronic and acute exposure exceeded the permissible level of 1.0. In the current study, re-suspended roadside mineral dust, anthropogenic exhaust emissions from traffic and industry, and industrial dust were identified as major emission sources of elemental particulate contents. Because of the unacceptable levels of risk in the research area, it is strongly suggested that a comprehensive study of the population's health status as a result of air pollution should be conducted for policies to be developed against these risks.

Keywords: elemental composition, particulate pollution, Igeo index, health risk assessment, hazard quotient

Procedia PDF Downloads 56
10282 A Review of Benefit-Risk Assessment over the Product Lifecycle

Authors: M. Miljkovic, A. Urakpo, M. Simic-Koumoutsaris

Abstract:

Benefit-risk assessment (BRA) is a valuable tool that takes place in multiple stages during a medicine's lifecycle, and this assessment can be conducted in a variety of ways. The aim was to summarize current BRA methods used during approval decisions and in post-approval settings and to see possible future directions. Relevant reviews, recommendations, and guidelines published in medical literature and through regulatory agencies over the past five years have been examined. BRA implies the review of two dimensions: the dimension of benefits (determined mainly by the therapeutic efficacy) and the dimension of risks (comprises the safety profile of a drug). Regulators, industry, and academia have developed various approaches, ranging from descriptive textual (qualitative) to decision-analytic (quantitative) models, to facilitate the BRA of medicines during the product lifecycle (from Phase I trials, to authorization procedure, post-marketing surveillance and health technology assessment for inclusion in public formularies). These approaches can be classified into the following categories: stepwise structured approaches (frameworks); measures for benefits and risks that are usually endpoint specific (metrics), simulation techniques and meta-analysis (estimation techniques), and utility survey techniques to elicit stakeholders’ preferences (utilities). All these approaches share the following two common goals: to assist this analysis and to improve the communication of decisions, but each is subject to its own specific strengths and limitations. Before using any method, its utility, complexity, the extent to which it is established, and the ease of results interpretation should be considered. Despite widespread and long-time use, BRA is subject to debate, suffers from a number of limitations, and currently is still under development. The use of formal, systematic structured approaches to BRA for regulatory decision-making and quantitative methods to support BRA during the product lifecycle is a standard practice in medicine that is subject to continuous improvement and modernization, not only in methodology but also in cooperation between organizations.

Keywords: benefit-risk assessment, benefit-risk profile, product lifecycle, quantitative methods, structured approaches

Procedia PDF Downloads 119
10281 Cybersecurity Engineering BS Degree Curricula Design Framework and Assessment

Authors: Atma Sahu

Abstract:

After 9/11, there will only be cyberwars. The cyberwars increase in intensity the country's cybersecurity workforce's hiring and retention issues. Currently, many organizations have unfilled cybersecurity positions, and to a lesser degree, their cybersecurity teams are understaffed. Therefore, there is a critical need to develop a new program to help meet the market demand for cybersecurity engineers (CYSE) and personnel. Coppin State University in the United States was responsible for developing a cybersecurity engineering BS degree program. The CYSE curriculum design methodology consisted of three parts. First, the ACM Cross-Cutting Concepts standard's pervasive framework helped curriculum designers and students explore connections among the core courses' knowledge areas and reinforce the security mindset conveyed in them. Second, the core course context was created to assist students in resolving security issues in authentic cyber situations involving cyber security systems in various aspects of industrial work while adhering to the NIST standards framework. The last part of the CYSE curriculum design aspect was the institutional student learning outcomes (SLOs) integrated and aligned in content courses, representing more detailed outcomes and emphasizing what learners can do over merely what they know. The CYSE program's core courses express competencies and learning outcomes using action verbs from Bloom's Revised Taxonomy. This aspect of the CYSE BS degree program's design is based on these three pillars: the ACM, NIST, and SLO standards, which all CYSE curriculum designers should know. This unique CYSE curriculum design methodology will address how students and the CYSE program will be assessed and evaluated. It is also critical that educators, program managers, and students understand the importance of staying current in this fast-paced CYSE field.

Keywords: cyber security, cybersecurity engineering, systems engineering, NIST standards, physical systems

Procedia PDF Downloads 59
10280 Power Transformer Risk-Based Maintenance by Optimization of Transformer Condition and Transformer Importance

Authors: Kitti Leangkrua

Abstract:

This paper presents a risk-based maintenance strategy of a power transformer in order to optimize operating and maintenance costs. The methodology involves the study and preparation of a database for the collection the technical data and test data of a power transformer. An evaluation of the overall condition of each transformer is performed by a program developed as a result of the measured results; in addition, the calculation of the main equipment separation to the overall condition of the transformer (% HI) and the criteria for evaluating the importance (% ImI) of each location where the transformer is installed. The condition assessment is performed by analysis test data such as electrical test, insulating oil test and visual inspection. The condition of the power transformer will be classified from very poor to very good condition. The importance is evaluated from load criticality, importance of load and failure consequence. The risk matrix is developed for evaluating the risk of each power transformer. The high risk power transformer will be focused firstly. The computerized program is developed for practical use, and the maintenance strategy of a power transformer can be effectively managed.

Keywords: asset management, risk-based maintenance, power transformer, health index

Procedia PDF Downloads 281
10279 Geriatric Nutrition: An Important Marker for Oral Health Related Quality of Life of Complete Denture Patients

Authors: Rajlakshmi Banerjee, Sujoy Banerjee

Abstract:

The prevalence of malnutrition, as the most common cause of morbidity and mortality increases with old age, especially in developing countries like India, because of many factors out of which dentate status is one. It affects diet, nutritional status and general health due to reduced chewing ability and poor food choices. Aim and Objective: This study aimed to evaluate the effect of nutritional status, dietary intake on the Oral Health-related Quality of life (OHRQoL) of elderly edentulous complete denture wearing patients and to know whether they are at a higher risk of malnutrition. The objective was to assess the need to include dietary and nutritional counselling during Prosthodontic rehabilitation of elderly edentulous patients. Materials and method: A cross-sectional study was conducted among 200 elderly denture wearing patients above 60 yrs of age from Nagpur, Maharashtra. The majority of study subjects (60%) were between the age group 60 and 75 years. Mini-Nutritional Assessment (MNA) Questionnaire was used to assess nutritional status and General Oral Health Assessment Index (GOHAI) questionnaire was used to determine the Oral health related Quality of life of these patients.Descriptive statistics was used to analyze data using SPSS version 21. Results: Among the assessed subjects, nearly 80% of them had total scores of GOHAI between 12 and 57 which require ‘needed dental care.’ As per MNA, 10.5% had adequate nutrition, 70 % were at risk of malnutrition, and remaining 19.5 % of subjects were malnourished. There was a significant correlation between GOHAI and MNA scores. A strong association was found between mean GOHAI and MNA scores and thereby nutritional status and OHRQOL.Conclusion: The use of conventional dentures increases the risk of malnutrition in the elderly due to inability to eat and chew food properly and therefore severely affecting the quality of life. Dietary analysis and counselling should be strictly incorporated into geriatric treatment planning during Prosthetic rehabilitation.

Keywords: general oral health assessment index, General Oral Health Assessment Index (GOHAI), nutritional assessment, mini-nutritional assessment, Mini-Nutritional Assessment (MNA), quality of life

Procedia PDF Downloads 236
10278 Cybersecurity Protection Structures: The Case of Lesotho

Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule

Abstract:

The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.

Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team

Procedia PDF Downloads 128
10277 Risk Assessment of Particulate Matter (PM10) in Makkah, Saudi Arabia

Authors: Turki M. Habeebullah, Atef M. F. Mohammed, Essam A. Morsy

Abstract:

In recent decades, particulate matter (PM10) have received much attention due to its potential adverse health impact and the subsequent need to better control or regulate these pollutants. The aim of this paper is focused on study risk assessment of PM10 in four different districts (Shebikah, Masfalah, Aziziyah, Awali) in Makkah, Saudi Arabia during the period from 1 Ramadan 1434 AH - 27 Safar 1435 AH. samples was collected by using Low Volume Sampler (LVS Low Volume Sampler) device and filtration method for estimating the total concentration of PM10. The study indicated that the mean PM10 concentrations were 254.6 (186.1 - 343.2) µg/m3 in Shebikah, 184.9 (145.6 - 271.4) µg/m3 in Masfalah, 162.4 (92.4 - 253.8) µg/m3 in Aziziyah, and 56.0 (44.5 - 119.8) µg/m3 in Awali. These values did not exceed the permissible limits in PME (340 µg/m3 as daily average). Furthermore, health assessment is carried out using AirQ2.2.3 model to estimate the number of hospital admissions due to respiratory diseases. The cumulative number of cases per 100,000 were 1534 (18-3050 case), which lower than that recorded in the United States, Malaysia. The concentration response coefficient was 0.49 (95% CI 0.05 - 0.70) per 10 μg/m3 increase of PM10.

Keywords: air pollution, respiratory diseases, airQ2.2.3, Makkah

Procedia PDF Downloads 428
10276 A Comparative Study of Self, Peer and Teacher Assessment Based on an English Writing Checklist

Authors: Xiaoting Shi, Xiaomei Ma

Abstract:

In higher education, students' self-assessment and peer assessment of compositions in writing classes can effectively improve their ability of evaluative judgment. However, students' self-assessment and peer assessment are not advocated by most teachers because of the significant difference in scoring compared with teacher assessment. This study used a multi-faceted Rasch model to explore whether an English writing checklist containing 30 descriptors can effectively improve rating consistency among self-assessment, peer assessment and teacher assessment. Meanwhile, a questionnaire was adopted to survey students’ and teachers’ attitudes toward self-assessment and peer assessment using the writing checklist. Results of the multi-faceted Rasch model analysis show that the writing checklist can effectively distinguish the students’ writing ability (separate coefficient = 2.05, separate reliability = 0.81, chi-square value (df = 32) = 123.4). Moreover, the results revealed that the checklist could improve rating consistency among self-assessment, peer assessment and teacher assessment. (separate coefficient = 1.71, separate reliability = 0.75, chi-square value (df=4) = 20.8). The results of the questionnaire showed that more than 85% of students and all teachers believed that the checklist had a good advantage in self-assessment and peer assessment, and they were willing to use the checklist to conduct self-assessment and peer assessment in class in the future.

Keywords: english writing, self-assessment, peer assessment, writing checklist

Procedia PDF Downloads 129
10275 Spatial Distribution, Characteristics, and Pollution Risk Assessment of Microplastics in Sediments from Karnaphuli River Estuary, Bangladesh

Authors: Md. Refat Jahan Rakiba, M. Belal Hossaina, Rakesh Kumarc, Md. Akram Ullaha, Sultan Al Nahiand, Nazmun Naher Rimaa, Tasrina Rabia Choudhury, Samia Islam Libaf, Jimmy Yub, Mayeen Uddin Khandakerg, Abdelmoneim Suliemanh, Mohamed Mahmoud Sayedi

Abstract:

Microplastics (MPs) have become an emerging global pollutant due to their wide spread and dispersion and potential threats to marine ecosystems. However, studies on MPs of estuarine and coastal ecosystems of Bangladesh are very limited or not available. In this study, we conducted the first study on the abundance, distribution, characteristics and potential risk assessment of microplastics in the sediment of Karnaphuli River estuary, Bangladesh. Microplastic particles were extracted from sediments of 30 stations along the estuary by density separation, and then enumerated and characterize by using steromicroscope and Fourier Transform Infrared (FT-IR) spectroscopy. In the collected sediment, the number of MPs varied from 22.29 - 59.5 items kg−1 of dry weight (DW) with an average of 1177 particles kg−1 DW. The mean abundance was higher in the downstream and left bank of estuary where the predominant shape, colour, and size of MPs were films (35%), white (19%), and >5000 μm (19%), respectively. The main polymer types were polyethylene terephthalate, polystyrene, polyethylene, cellulose, and nylon. MPs were found to pose risks (low to high) in the sediment of the estuary, with the highest risk occuring at one station near a sewage outlet, according to the results of risk analyses using the pollution risk index (PRI), polymer risk index (H), contamination factors (CFs), and pollution load index (PLI). The single value index, PLI clearly demonastated that all sampling sites were considerably polluted (as PLI >1) with microplastics. H values showed toxic polymers even in lower proportions possess higher polymeric hazard scores and vice versa. This investigation uncovered new insights on the status of MPs in the sediments of Karnaphuli River estuary, laying the groundwork for future research and control of microplastic pollution and management.

Keywords: microplastics, polymers, pollution risk assessment, Karnaphuli esttuary

Procedia PDF Downloads 50
10274 Cyber-Softbook: A Platform for Collaborative Content Development and Delivery for Cybersecurity Education

Authors: Eniye Tebekaemi, Martin Zhao

Abstract:

The dichotomy between the skills set of newly minted college graduates and the skills required by cybersecurity employers is on the rise. Colleges are struggling to cope with the rapid pace of technology evolution using outdated tools and practices. Industries are getting frustrated due to the need to retrain fresh college graduates on skills they should have acquired. There is a dire need for academic institutions to develop new tools and systems to deliver cybersecurity education to meet the ever-evolving technology demands of the industry. The Cyber-Softbook project’s goal is to bridge the tech industry and tech education gap by providing educators a framework to collaboratively design, manage, and deliver cybersecurity academic courses that meet the needs of the tech industry. The Cyber-Softbook framework, when developed, will provide a platform for academic institutions and tech industries to collaborate on tech education and for students to learn about cybersecurity with all the resources they need to understand concepts and gain valuable skills available on a single platform.

Keywords: cybersecurity, education, skills, labs, curriculum

Procedia PDF Downloads 58
10273 Factors Constraining the Utilization of Risk Management Strategies in the Execution of Public Construction Projects in North East Nigeria

Authors: S. U. Kunya, S. A. Mohammad

Abstract:

Construction projects in Nigeria are characterized with risks emanating from delays and accompanying cost-overruns. The aim of the study was to identify and assess factors constraining the utilization of risk management strategies in the execution of public construction project in North-East Nigeria. Data was collected with the aid of a well-structured questionnaire administered to three identified projects in the North-east. Data collected were analysed using the severity index. Findings revealed political involvement, selection of inexperienced contractors and lack of coordinated public sector strategy as the most severe factors constraining the utilization of risk management strategies. The study recommended that: formulation of laws to prevent negative political meddling in construction projects; selection of experienced, risk-informed contractors; and comprehensive risk assessment and planning on all public construction projects.

Keywords: factors, Nigeria, north-east, public projects, risk management, strategies, utilization

Procedia PDF Downloads 488
10272 Enterprise Risk Management: A Future Outlook

Authors: Ruchi Agarwal, Jake Ansell

Abstract:

Austerity impacts on all aspects of society. Companies into the future will have to be more capable of dealing with the risks they face. Enterprise Risk Management (ERM) has widely been accepted in recent years as an approach to manage risks within businesses. ERM attempts to tackle risk holistically with gains from opportunities in a managing risk and reduction in the risk of failure. The paper reviews merits and demerits of approaches to risk management in regard to antifragility. A qualitative study has investigated current practices and the problems with ERM implementation by interviewing over 25 chief risk officers and senior management. The findings indicate the gap in ERM description, understanding, and implementation. The paper suggests risk learning and expertise knowledge supports development of effective enterprise risk management by designing systems with inherent resilience.

Keywords: risk management, interviews, antifragility, failure

Procedia PDF Downloads 527
10271 Credit Risk and Financial Stability

Authors: Zidane Abderrezzaq

Abstract:

In contrast to recent successful developments in macro monetary policies, the modelling, measurement and management of systemic financial stability has remained problematical. Indeed, the focus of most effort has been on improving individual, rather than systemic, bank risk management; the Basel II objective has been to bring regulatory bank capital into line with the (sophisticated) banks’ assessment of their own economic capital. Even at the individual bank level there are concerns over appropriate diversification allowances, differing objectives of banks and regulators, the need for a buffer over regulatory minima, and the distinction between expected and unexpected losses (EL and UL). At the systemic level the quite complex and prescriptive content of Basel II raises dangers of ‘endogenous risk’ and procyclicality. Simulations suggest that this latter could be a serious problem. In an extension to the main analysis we study how liquidity effects interact with banking structure to produce a greater chance of systemic breakdown. We finally consider how the risk of contagion might depend on the degree of asymmetry (tiering) inherent in the structure of the banking system. A number of our results have important implications for public policy, which this paper also draws out.

Keywords: systemic stability, financial regulation, credit risk, systemic risk

Procedia PDF Downloads 349
10270 Suicide Wrongful Death: Standard of Care Problems Involving the Inaccurate Discernment of Lethal Risk When Focusing on the Elicitation of Suicide Ideation

Authors: Bill D. Geis

Abstract:

Suicide wrongful death forensic cases are the fastest rising tort in mental health law. It is estimated that suicide-related cases have accounted for 15% of U.S. malpractice claims since 2006. Most suicide-related personal injury claims fall into the legal category of “wrongful death.” Though mental health experts may be called on to address a range of forensic questions in wrongful death cases, the central consultation that most experts provide is about the negligence element—specifically, the issue of whether the clinician met the clinical standard of care in assessing, treating, and managing the deceased person’s mental health care. Standards of care, varying from U.S. state to state, are broad and address what a reasonable clinician might do in a similar circumstance. This fact leaves the issue of the suicide standard of care, in each case, up to forensic experts to put forth a reasoned estimate of what the standard of care should have been in the specific case under litigation. Because the general state guidelines for standard of care are broad, forensic experts are readily retained to provide scientific and clinical opinions about whether or not a clinician met the standard of care in their suicide assessment, treatment, and management of the case. In the past and in much of current practice, the assessment of suicide has centered on the elicitation of verbalized suicide ideation. Research in recent years, however, has indicated that the majority of persons who end their lives do not say they are suicidal at their last medical or psychiatric contact. Near-term risk assessment—that goes beyond verbalized suicide ideation—is needed. Our previous research employed structural equation modeling to predict lethal suicide risk--eight negative thought patterns (feeling like a burden on others, hopelessness, self-hatred, etc.) mediated by nine transdiagnostic clinical factors (mental torment, insomnia, substance abuse, PTSD intrusions, etc.) were combined to predict acute lethal suicide risk. This structural equation model, the Lethal Suicide Risk Pattern (LSRP), Acute model, had excellent goodness-of-fit [χ2(df) = 94.25(47)***, CFI = .98, RMSEA = .05, .90CI = .03-.06, p(RMSEA = .05) = .63. AIC = 340.25, ***p < .001.]. A further SEQ analysis was completed for this paper, adding a measure of Acute Suicide Ideation to the previous SEQ. Acceptable prediction model fit was no longer achieved [χ2(df) = 3.571, CFI > .953, RMSEA = .075, .90% CI = .065-.085, AIC = 529.550].This finding suggests that, in this additional study, immediate verbalized suicide ideation information was unhelpful in the assessment of lethal risk. The LSRP and other dynamic, near-term risk models (such as the Acute Suicide Affective Disorder Model and the Suicide Crisis Syndrome Model)—going beyond elicited suicide ideation—need to be incorporated into current clinical suicide assessment training. Without this training, the standard of care for suicide assessment is out of sync with current research—an emerging dilemma for the forensic evaluation of suicide wrongful death cases.

Keywords: forensic evaluation, standard of care, suicide, suicide assessment, wrongful death

Procedia PDF Downloads 43
10269 Identifying Understanding Expectations of School Administrators Regarding School Assessment

Authors: Eftah Bte. Moh Hj Abdullah, Izazol Binti Idris, Abd Aziz Bin Abd Shukor

Abstract:

This study aims to identify the understanding expectations of school administrators concerning school assessment. The researcher utilized a qualitative descriptive study on 19 administrators from three secondary schools in the North Kinta district. The respondents had been interviewed on their understanding expectations of school assessment using the focus group discussion method. Overall findings showed that the administrators’ understanding expectations of school assessment was weak; especially in terms of content focus, articulation across age and grade, transparency and fairness, as well as the pedagogical implications. Findings from interviews indicated that administrators explained their understanding expectations of school assessment from the aspect of school management, and not from the aspect of instructional leadership or specifically as assessment leaders. The study implications from the administrators’ understanding expectations may hint at the difficulty of the administrators to function as assessment leaders, in order to reduce their focus as manager, and move towards their primary role in the process of teaching and learning. The administrator, as assessment leaders, would be able to reach assessment goals via collaboration in identifying and listing teacher assessment competencies, how to construct assessment capacity, how to interpret assessment correctly, the use of assessment and how to use assessment information to communicate confidently and effectively to the public.

Keywords: assessment leaders, assessment goals, instructional leadership, understanding expectation of assessment

Procedia PDF Downloads 424
10268 Early Screening of Risk Ergonomics among Workers at Madura's Batik Industrial: Rapid Entire Body Assessment and Quick Exposure Checklist

Authors: Abdul Kadir, L. Meily Kurniawidjaja

Abstract:

Batik Madura workers are exposed to many Musculoskeletal Disorders risk factors, particularly Low Back Pain (LBP). This study was conducted as an early detection of ergonomic risk level on Workers Industrial Sentra Batik Madura in Dusun Banyumas, Klampar Subdistrict, Proppo Pamekasan, Madura, East Java. This study includes 12 workers who 11 workers had pain in the upper and lower part of the neck, back, wrist right hand, also 10 workers had pain in the right shoulder. This is a descriptive observational study with cross-sectional approach. Qualitative research by observing workers activity such as draw and putting the wax motif, fabric dyeing, fabric painting, discoloration, washing, and drying. The results are workers have identified ergonomic hazards such as awkward postures, twisting movements, repetitive, and static work postures. Using the method of REBA and QEC, the results get a very high-risk level of activity in each of Madura batik making process is the draw and putting the wax motif, coloring, painting, discoloration, washing, and drying. The level of risk can be reduced by improvement of work equipment include the provision of seats, strut fabric, high settings furnaces, drums, coloring basin, and washing tub.

Keywords: activities of Madura's batik, ergonomic risk level, equipment, QEC (Quick Exposure Checklist), REBA (Rapid Entire Body Assessment)

Procedia PDF Downloads 164
10267 Identifying Psychosocial, Autonomic, and Pain Sensitivity Risk Factors of Chronic Temporomandibular Disorder by Using Ridge Logistic Regression and Bootstrapping

Authors: Haolin Li, Eric Bair, Jane Monaco, Quefeng Li

Abstract:

The temporomandibular disorder (TMD) is a series of musculoskeletal disorders ranging from jaw pain to chronic debilitating pain, and the risk factors for the onset and maintenance of TMD are still unclear. Prior researches have shown that the potential risk factors for chronic TMD are related to psychosocial factors, autonomic functions, and pain sensitivity. Using data from the Orofacial Pain: Prospective Evaluation and Risk Assessment (OPPERA) study’s baseline case-control study, we examine whether the risk factors identified by prior researches are still statistically significant after taking all of the risk measures into account in one single model, and we also compare the relative influences of the risk factors in three different perspectives (psychosocial factors, autonomic functions, and pain sensitivity) on the chronic TMD. The statistical analysis is conducted by using ridge logistic regression and bootstrapping, in which the performance of the algorithms has been assessed using extensive simulation studies. The results support most of the findings of prior researches that there are many psychosocial and pain sensitivity measures that have significant associations with chronic TMD. However, it is surprising that most of the risk factors of autonomic functions have not presented significant associations with chronic TMD, as described by a prior research.

Keywords: autonomic function, OPPERA study, pain sensitivity, psychosocial measures, temporomandibular disorder

Procedia PDF Downloads 157
10266 Identifying Knowledge Gaps in Incorporating Toxicity of Particulate Matter Constituents for Developing Regulatory Limits on Particulate Matter

Authors: Ananya Das, Arun Kumar, Gazala Habib, Vivekanandan Perumal

Abstract:

Regulatory bodies has proposed limits on Particulate Matter (PM) concentration in air; however, it does not explicitly indicate the incorporation of effects of toxicities of constituents of PM in developing regulatory limits. This study aimed to provide a structured approach to incorporate toxic effects of components in developing regulatory limits on PM. A four-step human health risk assessment framework consists of - (1) hazard identification (parameters: PM and its constituents and their associated toxic effects on health), (2) exposure assessment (parameters: concentrations of PM and constituents, information on size and shape of PM; fate and transport of PM and constituents in respiratory system), (3) dose-response assessment (parameters: reference dose or target toxicity dose of PM and its constituents), and (4) risk estimation (metric: hazard quotient and/or lifetime incremental risk of cancer as applicable). Then parameters required at every step were obtained from literature. Using this information, an attempt has been made to determine limits on PM using component-specific information. An example calculation was conducted for exposures of PM2.5 and its metal constituents from Indian ambient environment to determine limit on PM values. Identified data gaps were: (1) concentrations of PM and its constituents and their relationship with sampling regions, (2) relationship of toxicity of PM with its components.

Keywords: air, component-specific toxicity, human health risks, particulate matter

Procedia PDF Downloads 283