Search results for: risks and vulnerabilities
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1837

Search results for: risks and vulnerabilities

1597 Factors of Social Network Platform Usage and Privacy Risk: A Unified Theory of Acceptance and Use of Technology2 Model

Authors: Wang Xue, Fan Liwei

Abstract:

The trust and use of social network platforms by users are instrumental factors that contribute to the platform’s sustainable development. Studying the influential factors of the use of social network platforms is beneficial for developing and maintaining a large user base. This study constructed an extended unified theory of acceptance and use of technology (UTAUT2) moderating model with perceived privacy risks to analyze the factors affecting the trust and use of social network platforms. 444 participants completed our 35 surveys, and we verified the survey results by structural equation model. Empirical results reveal the influencing factors that affect the trust and use of social network platforms, and the extended UTAUT2 model with perceived privacy risks increases the applicability of UTAUT2 in social network scenarios. Social networking platforms can increase their use rate by increasing the economics, functionality, entertainment, and privacy security of the platform.

Keywords: perceived privacy risk, social network, trust, use, UTAUT2 model

Procedia PDF Downloads 73
1596 Analysis of Exponential Distribution under Step Stress Partially Accelerated Life Testing Plan Using Adaptive Type-I Hybrid Progressive Censoring Schemes with Competing Risks Data

Authors: Ahmadur Rahman, Showkat Ahmad Lone, Ariful Islam

Abstract:

In this article, we have estimated the parameters for the failure times of units based on the sampling technique adaptive type-I progressive hybrid censoring under the step-stress partially accelerated life tests for competing risk. The failure times of the units are assumed to follow an exponential distribution. Maximum likelihood estimation technique is used to estimate the unknown parameters of the distribution and tampered coefficient. Confidence interval also obtained for the parameters. A simulation study is performed by using Monte Carlo Simulation method to check the authenticity of the model and its assumptions.

Keywords: adaptive type-I hybrid progressive censoring, competing risks, exponential distribution, simulation, step-stress partially accelerated life tests

Procedia PDF Downloads 330
1595 Early Detection of Lymphedema in Post-Surgery Oncology Patients

Authors: Sneha Noble, Rahul Krishnan, Uma G., D. K. Vijaykumar

Abstract:

Breast-Cancer related Lymphedema is a major problem that affects many women. Lymphedema is the swelling that generally occurs in the arms or legs caused by the removal of or damage to lymph nodes as a part of cancer treatment. Treating it at the earliest possible stage is the best way to manage the condition and prevent it from leading to pain, recurrent infection, reduced mobility, and impaired function. So, this project aims to focus on the multi-modal approaches to identify the risks of Lymphedema in post-surgical oncology patients and prevent it at the earliest. The Kinect IR Sensor is utilized to capture the images of the body and after image processing techniques, the region of interest is obtained. Then, performing the voxelization method will provide volume measurements in pre-operative and post-operative periods in patients. The formation of a mathematical model will help in the comparison of values. Clinical pathological data of patients will be investigated to assess the factors responsible for the development of lymphedema and its risks.

Keywords: Kinect IR sensor, Lymphedema, voxelization, lymph nodes

Procedia PDF Downloads 117
1594 A Development of a Conceptual Framework for Safety Culture and Safety Risk Assessment: The Case of Chinese International Construction Projects under the “New Belt and Road” Initiative in Africa

Authors: Bouba Oumarou Aboubakar, HongXia Li, Sardar Annes Farooq

Abstract:

The Belt and Road Initiative’s success strongly depends on the safety of all the million workers on construction projects sites. As the new BRI is directed toward Africa and meets a completely different culture from the Chinese project managers, maintaining low risk for workers risks shall be closely related to cultural sharing and mutual understanding. This is why this work introduces a cultural-wise safety management framework for Chinese Construction projects in Africa. The theoretical contribution of this paper is an improved risk assessment framework that integrates language, culture and difficulty of controlling risk factors into one approach. Practically, this study provides not only a useful tool for project safety management practitioners but the full understanding of all risks that may arise in the BRI projects in Africa.

Keywords: cultural-wise, safety culture, risk assessment, Chinese construction, BRI projects, Africa

Procedia PDF Downloads 74
1593 The Structuring of Economic of Brazilian Innovation and the Institutional Proposal to the Legal Management for Global Conformity to Treat the Technological Risks

Authors: Daniela Pellin, Wilson Engelmann

Abstract:

Brazil has sought to accelerate your development through technology and innovation as a response to the global influences, which has received in internal management practices. For this, it had edited the Brazilian Law of Innovation 13.243/2016. However observing the Law overestimated economic aspects the respective application will not consider the stakeholders and the technological risks because there is no legal treatment. The economic exploitation and the technological risks must be controlled by limits of democratic system to find better social development to contribute with the economics agents for making decision to conform with global directions. The research understands this is a problem to face given the social particularities of the country because there has been the literal import of the North American Triple Helix Theory consolidated in developed countries and the negative consequences when applied in developing countries. Because of this symptomatic scenario, it is necessary to create adjustment to conduct the management of the law besides social democratic interests to increase the country development. For this, therefore, the Government will have to adopt some conducts promoting side by side with universities, civil society and companies, informational transparency, catch of partnerships, create a Confort Letter document for preparation to ensure the operation, joint elaboration of a Manual of Good Practices, make accountability and data dissemination. Also the Universities must promote informational transparency, drawing up partnership contracts and generating revenue, development of information. In addition, the civil society must do data analysis about proposals received for discussing to give opinion related. At the end, companies have to give public and transparent information about investments and economic benefits, risks and innovation manufactured. The research intends as a general objective to demonstrate that the efficiency of the propeller deployment will be possible if the innovative decision-making process goes through the institutional logic. As specific objectives, the American influence must undergo some modifications to better suit the economic-legal incentives to potentiate the development of the social system. The hypothesis points to institutional model for application to the legal system can be elaborated based on emerging characteristics of the country, in such a way that technological risks can be foreseen and there will be global conformity with attention to the full development of society as proposed by the researchers.The method of approach will be the systemic-constructivist with bibliographical review, data collection and analysis with the construction of the institutional and democratic model for the management of the Law.

Keywords: development, governance of law, institutionalization, triple helix

Procedia PDF Downloads 127
1592 Recurrent Neural Networks for Complex Survival Models

Authors: Pius Marthin, Nihal Ata Tutkun

Abstract:

Survival analysis has become one of the paramount procedures in the modeling of time-to-event data. When we encounter complex survival problems, the traditional approach remains limited in accounting for the complex correlational structure between the covariates and the outcome due to the strong assumptions that limit the inference and prediction ability of the resulting models. Several studies exist on the deep learning approach to survival modeling; moreover, the application for the case of complex survival problems still needs to be improved. In addition, the existing models need to address the data structure's complexity fully and are subject to noise and redundant information. In this study, we design a deep learning technique (CmpXRnnSurv_AE) that obliterates the limitations imposed by traditional approaches and addresses the above issues to jointly predict the risk-specific probabilities and survival function for recurrent events with competing risks. We introduce the component termed Risks Information Weights (RIW) as an attention mechanism to compute the weighted cumulative incidence function (WCIF) and an external auto-encoder (ExternalAE) as a feature selector to extract complex characteristics among the set of covariates responsible for the cause-specific events. We train our model using synthetic and real data sets and employ the appropriate metrics for complex survival models for evaluation. As benchmarks, we selected both traditional and machine learning models and our model demonstrates better performance across all datasets.

Keywords: cumulative incidence function (CIF), risk information weight (RIW), autoencoders (AE), survival analysis, recurrent events with competing risks, recurrent neural networks (RNN), long short-term memory (LSTM), self-attention, multilayers perceptrons (MLPs)

Procedia PDF Downloads 69
1591 Enzyme Linked Immuno Sorbent Assay Based Detection of Aflatoxin M1 and Ochratoxin A in Raw Milk in Punjab, India

Authors: Pallavi Moudgil, J. S. Bedi, R. S. Aulakh, J. P. S. Gill

Abstract:

Mycotoxins in milk are of major public health concern. The present study was envisaged with an aim to monitor the occurrence of aflatoxin M1 and ochratoxin A in raw milk samples collected from individual animals from dairy farms located in Punjab (India). A total of 168 raw milk samples were collected and analysed using competitive ELISA kits. Out of these, 9 (5.4%) samples were found positive for aflatoxin M1 with the mean concentration of 0.006-0.13 ng/ml and 2 (1.2%) samples exceeded the established maximum residue limit of 0.05 ng/ml established by the European Union. For ochratoxin A, 2 (0.1%) samples were found positive with the mean concentration of 0.61-0.83 ng/ml with both the samples below the established maximum residue limit of 2 ng/ml. The results showed that the milk of dairy cattle is safe with respect to ochratoxin A contamination but occurrence of aflatoxin M1 above maximum residue limit suggested that feed contaminated with mycotoxins might have been offered to dairy cattle that can pose serious health risks to consumers.

Keywords: Aflatoxin M1, health risks, maximum residue limit, milk, Ochratoxin A

Procedia PDF Downloads 462
1590 Identification of CLV for Online Shoppers Using RFM Matrix: A Case Based on Features of B2C Architecture

Authors: Riktesh Srivastava

Abstract:

Online Shopping have established an astonishing evolution in the last few years. And it is now apparent that B2C architecture is becoming progressively imperative channel for even traditional brick and mortar type traders as well. In this completion knowing customers and predicting behavior are extremely important. More important, when any customer logs onto the B2C architecture, the traces of their buying patterns can be stored and used for future predictions. Such a prediction is called Customer Lifetime Value (CLV). Earlier, we used Net Present Value to do so, however, it ignores two important aspects of B2C architecture, “market risks” and “big amount of customer data”. Now, we use RFM- Recency, Frequency and Monetary Value to estimate the CLV, and as the term exemplifies, market risks, is well sheltered. Big Data Analysis is also roofed in RFM, which gives real exploration of the Big Data and lead to a better estimation for future cash flow from customers. In the present paper, 6 factors (collected from varied sources) are used to determine as to what attracts the customers to the B2C architecture. For these 6 factors, RFM is computed for 3 years (2013, 2014 and 2015) respectively. CLV and Revenue are the two parameters defined using RFM analysis, which gives the clear picture of the future predictions.

Keywords: CLV, RFM, revenue, recency, frequency, monetary value

Procedia PDF Downloads 203
1589 Application of Failure Mode and Effects Analysis (FMEA) on the Virtual Process Hazard Analysis of Acetone Production Process

Authors: Princes Ann E. Prieto, Denise F. Alpuerto, John Rafael C. Unlayao, Neil Concibido, Monet Concepcion Maguyon-Detras

Abstract:

Failure Mode and Effects Analysis (FMEA) has been used in the virtual Process Hazard Analysis (PHA) of the Acetone production process through the dehydrogenation of isopropyl alcohol, for which very limited process risk assessment has been published. In this study, the potential failure modes, effects, and possible causes of selected major equipment in the process were identified. During the virtual FMEA mock sessions, the risks in the process were evaluated and recommendations to reduce and/or mitigate the process risks were formulated. The risk was estimated using the calculated risk priority number (RPN) and was classified into four (4) levels according to their effects on acetone production. Results of this study were also used to rank the criticality of equipment in the process based on the calculated criticality rating (CR). Bow tie diagrams were also created for the critical hazard scenarios identified in the study.

Keywords: chemical process safety, failure mode and effects analysis (FMEA), process hazard analysis (PHA), process safety management (PSM)

Procedia PDF Downloads 116
1588 Understanding Tacit Knowledge and DIKW

Authors: Bahadir Aydin

Abstract:

Today it is difficult to reach accurate knowledge because of mass data. This huge data makes the environment more and more caotic. Data is a main piller of intelligence. There is a close tie between knowledge and intelligence. Information gathered from different sources can be modified, interpreted and classified by using knowledge development process. This process is applied in order to attain intelligence. Within this process the effect of knowledge is crucial. Knowledge is classified as explicit and tacit knowledge. Tacit knowledge can be seen as "only the tip of the iceberg”. This tacit knowledge accounts for much more than we guess in all intelligence cycle. If the concept of intelligence scrutinized, it can be seen that it contains risks, threats as well as success. The main purpose for all organization is to be succesful by eliminating risks and threats. Therefore, there is a need to connect or fuse existing information and the processes which can be used to develop it. By the help of process the decision-maker can be presented with a clear holistic understanding, as early as possible in the decision making process. Planning, execution and assessments are the key functions that connects to information to knowledge. Altering from the current traditional reactive approach to a proactive knowledge development approach would reduce extensive duplication of work in the organization. By new approach to this process, knowledge can be used more effectively.

Keywords: knowledge, intelligence cycle, tacit knowledge, KIDW

Procedia PDF Downloads 501
1587 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 95
1586 PTSD in Peacekeepers: A Systematic Review

Authors: Laura Rodrigues Carmona, Maria José Chambel, Vânia Sofia Carvalho

Abstract:

Background: In peacekeeping operations, military personnel are often exposed to the same traumatic stress factors found during conventional war and may also be subject to the physical risks and psychological stressors associated with posttraumatic stress disorder (PTSD). Objectives: To discuss the prevalence of PTSD among peacekeepers as well as the risks of and protective factors against this disorder and its comorbidities and/or consequences. Methods: A systematic literature search was performed with relevant keywords, and 53 articles were identified for this review. Results and conclusions: Military personnel deployed in peacekeeping operations have a higher prevalence of PTSD than nonmilitary personnel, a prevalence similar to that of military personnel deployed in war situations. Concerning the salient risk factors, the contextual factors are highlighted, and in regard to the protective factors, the individual factors are highlighted. This study thus demonstrates that there are factors in which the role of the military is essential, via both its selection and monitoring of peacekeepers during and after their deployment, to protect deployed personnel’s mental health.

Keywords: peacekeepers, peacekeeping, military, PTSD, post-traumatic stress disorder, posttraumatic stress disorder

Procedia PDF Downloads 55
1585 Development of Risk-Based Dam Safety Framework in Climate Change Condition for Batu Dam, Malaysia

Authors: Wan Noorul Hafilah Binti Wan Ariffin

Abstract:

Dam safety management is the crucial infrastructure as dam failure has a catastrophic effect on the community. Dam safety management is the effective framework of key actions and activities for the dam owner to manage the safety of the dam for its entire life cycle. However, maintaining dam safety is a challenging task as there are changes in current dam states. These changes introduce new risks to the dam's safety, which had not been considered when the dam was designed. A new framework has to be developed to adapt to the changes in the dam risk and make the dams resilient. This study proposes a risk-based decision-making adaptation framework for dam safety management. The research focuses on climate change's impact on hydrological situations as it causes floods and damages the dam structure. The risk analysis framework is adopted to improve the dam management strategies. The proposed study encompasses four phases. To start with, measuring the effect by assessing the impact of climate change on embankment dam, the second phase is to analyze the potential embankment dam failures. The third is analyzing the different components of risks related to the dam and, finally, developing a robust decision-making framework.

Keywords: climate change, embankment dam, failure, risk-informed decision making

Procedia PDF Downloads 129
1584 Magnetomechanical Effects on MnZn Ferrites

Authors: Ibrahim Ellithy, Mauricio Esguerra, , Rewanth Radhakrishnan

Abstract:

In this study, the effects of hydrostatic stress on the magnetic properties of MnZn ferrite rings of different power grades, were measured and analyzed in terms of the magneto-mechanical effect on core losses was modeled via the Hodgdon-Esguerra hysteresis model. The results show excellent agreement with the model and a correlation between the permeability drop and the core loss increase in dependence of the material grade properties. These results emphasize the vulnerabilities of MnZn ferrites when subjected to mechanical perturbations, especially in real-world scenarios like under-road embedding for WPT.

Keywords: hydrostatic stress, power ferrites, core losses, wireless power transfer

Procedia PDF Downloads 50
1583 Classification of Health Risk Factors to Predict the Risk of Falling in Older Adults

Authors: L. Lindsay, S. A. Coleman, D. Kerr, B. J. Taylor, A. Moorhead

Abstract:

Cognitive decline and frailty is apparent in older adults leading to an increased likelihood of the risk of falling. Currently health care professionals have to make professional decisions regarding such risks, and hence make difficult decisions regarding the future welfare of the ageing population. This study uses health data from The Irish Longitudinal Study on Ageing (TILDA), focusing on adults over the age of 50 years, in order to analyse health risk factors and predict the likelihood of falls. This prediction is based on the use of machine learning algorithms whereby health risk factors are used as inputs to predict the likelihood of falling. Initial results show that health risk factors such as long-term health issues contribute to the number of falls. The identification of such health risk factors has the potential to inform health and social care professionals, older people and their family members in order to mitigate daily living risks.

Keywords: classification, falls, health risk factors, machine learning, older adults

Procedia PDF Downloads 128
1582 Effective Emergency Response and Disaster Prevention: A Decision Support System for Urban Critical Infrastructure Management

Authors: M. Shahab Uddin, Pennung Warnitchai

Abstract:

Currently more than half of the world’s populations are living in cities, and the number and sizes of cities are growing faster than ever. Cities rely on the effective functioning of complex and interdependent critical infrastructures networks to provide public services, enhance the quality of life, and save the community from hazards and disasters. In contrast, complex connectivity and interdependency among the urban critical infrastructures bring management challenges and make the urban system prone to the domino effect. Unplanned rapid growth, increased connectivity, and interdependency among the infrastructures, resource scarcity, and many other socio-political factors are affecting the typical state of an urban system and making it susceptible to numerous sorts of diversion. In addition to internal vulnerabilities, urban systems are consistently facing external threats from natural and manmade hazards. Cities are not just complex, interdependent system, but also makeup hubs of the economy, politics, culture, education, etc. For survival and sustainability, complex urban systems in the current world need to manage their vulnerabilities and hazardous incidents more wisely and more interactively. Coordinated management in such systems makes for huge potential when it comes to absorbing negative effects in case some of its components were to function improperly. On the other hand, ineffective management during a similar situation of overall disorder from hazards devastation may make the system more fragile and push the system to an ultimate collapse. Following the quantum, the current research hypothesizes that a hazardous event starts its journey as an emergency, and the system’s internal vulnerability and response capacity determine its destination. Connectivity and interdependency among the urban critical infrastructures during this stage may transform its vulnerabilities into dynamic damaging force. An emergency may turn into a disaster in the absence of effective management; similarly, mismanagement or lack of management may lead the situation towards a catastrophe. Situation awareness and factual decision-making is the key to win a battle. The current research proposed a contextual decision support system for an urban critical infrastructure system while integrating three different models: 1) Damage cascade model which demonstrates damage propagation among the infrastructures through their connectivity and interdependency, 2) Restoration model, a dynamic restoration process of individual infrastructure, which is based on facility damage state and overall disruptions in surrounding support environment, and 3) Optimization model that ensures optimized utilization and distribution of available resources in and among the facilities. All three models are tightly connected, mutually interdependent, and together can assess the situation and forecast the dynamic outputs of every input. Moreover, this integrated model will hold disaster managers and decision makers responsible when it comes to checking all the alternative decision before any implementation, and support to produce maximum possible outputs from the available limited inputs. This proposed model will not only support to reduce the extent of damage cascade but will ensure priority restoration and optimize resource utilization through adaptive and collaborative management. Complex systems predictably fail but in unpredictable ways. System understanding, situation awareness, and factual decisions may significantly help urban system to survive and sustain.

Keywords: disaster prevention, decision support system, emergency response, urban critical infrastructure system

Procedia PDF Downloads 203
1581 Mapping Actors in Sao Paulo's Urban Development Policies: Interests at Stake in the Challenge to Sustainability

Authors: A. G. Back

Abstract:

In the context of global climate change, extreme weather events are increasingly intense and frequent, challenging the adaptability of urban space. In this sense, urban planning is a relevant instrument for addressing, in a systemic manner, various sectoral policies capable of linking the urban agenda to the reduction of social and environmental risks. The Master Plan of the Municipality of Sao Paulo, 2014, presents innovations capable of promoting the transition to sustainability in the urban space. Among such innovations, the following stand out: i) promotion of density in the axes of mass transport involving mixture of commercial, residential, services, and leisure uses (principles related to the compact city); ii) vulnerabilities reduction based on housing policies, including regular sources of funds for social housing and land reservation in urbanized areas; iii) reserve of green areas in the city to create parks and environmental regulations for new buildings focused on reducing the effects of heat island and improving urban drainage. However, long-term implementation involves distributive conflicts and may change in different political, economic, and social contexts over time. Thus, the central objective of this paper is to identify which factors limit or support the implementation of these policies. That is, to map the challenges and interests of converging and/or divergent urban actors in the sustainable urban development agenda and what resources they mobilize to support or limit these actions in the city of Sao Paulo. Recent proposals to amend the urban zoning law undermine the implementation of the Master Plan guidelines. In this context, three interest groups with different views of the city come into dispute: the real estate market, upper middle class neighborhood associations ('not in my backyard' movements), and social housing rights movements. This paper surveys the different interests and visions of these groups taking into account their convergences, or not, with the principles of sustainable urban development. This approach seeks to fill a gap in the international literature on the causes that underpin or hinder the continued implementation of policies aimed at the transition to urban sustainability in the medium and long term.

Keywords: adaptation, ecosystem-based adaptation, interest groups, urban planning, urban transition to sustainability

Procedia PDF Downloads 102
1580 Community Engagement in Child Centered Space at Disaster Events: A Case Story of Sri Lanka

Authors: Wasantha Pushpakumara Hitihami Mudiyanselage

Abstract:

Since recent past, Sri Lanka is highly vulnerable to reoccurring climate shocks that severely impact the food security, loss of human & animal lives, destructions of human settlements, displacement of people and damaging properties. Hence, the Government of Sri Lanka has taken important steps towards strengthening legal and institutional arrangements for Disaster Risks management in the country in May 2005. Puttalam administrative district is one of the disaster prone districts in Sri Lanka which constantly face the devastating consequences of the increasing natural disasters annually. Therefore disaster risk management will be a timely intervention in the area to minimize the adverse impacts of the disasters. The few functioning Disaster Risk management networks do not take children’s specific needs and vulnerabilities during emergencies into account. The most affected children and their families were evacuated to the government schools and temples and it was observed that children were left to roaming around as their parents were busy queuing up for relief goods and other priorities. In this sense, VOICE understands that the community has vital role that has to be played in facing challenges of disaster management in the area. During and after the disaster, it was viewed that some children were having psychological disorders which could be impacted negatively to children well–being. Need of child friendly space at emergency is a must action in the area to turn away negative impact coming from the hazards. VOICE with the support of national & international communities have established safer places for the children (Child Centered Spaces – CCS) and their families at emergencies. Village religious venues and schools were selected and equipped with necessary materials to be used for the children at emergency. Materials such as tools, stationeries, play materials, which couldn’t be easily found in surrounding environment, were provided for CCS centers. Village animators, youth and elders were given comprehensive training on Disaster management and their role at CCS. They did the facilitation in keeping children without fear and stress at flooding occurred in 2015 as well as they were able to improve their skills when working with children. Flooding in 2016, the government agencies have taken service of these village animators at early stage of flooding to make all disaster-related recovery actions productively & efficiently. This mechanism is sustained at village level that can be used for disaster events.

Keywords: child centered space, impacts, psychological disorders, village animators

Procedia PDF Downloads 116
1579 Political Manipulation in Global Discourse

Authors: Gohar Madoyan, Kristine Harutyunyan, Gevorg Barseghyan

Abstract:

It is common knowledge that linguistic manipulation is and has always been a powerful instrument of political discourse. Politicians from different countries and through centuries have successfully used linguistic means to persuade the public. Yet, this persuasion should be linguistically unobtrusive. Small changes in wording may result in a huge difference in perception by the audience. Thus, manipulation is a strategy that is mostly used to convey a certain message to the manipulators, who should be aware of the vulnerabilities of their audience and who must use them to achieve control. Political manipulation, though commonly observed in the 21st century, can easily be traced back to ancient rhetoric, which warns us to choose words carefully while addressing the audience. On the other hand, modern manipulative techniques have become more sophisticated, making use of all scientific advances.

Keywords: manipulators, politics, persuasion, political discourse, linguo-stylistic analysis, rhetoric

Procedia PDF Downloads 58
1578 Assessment of Sustainable Sanitation Systems: Urban Slums

Authors: Ali Hamza, Bertug Akintug

Abstract:

Having an appropriate plan of sanitation systems is one of the critical issues for global urban slums. Poor sanitation systems in urban slums outcomes an enhanced vulnerability of severe diseases, low hygiene and environmental risks within our environment. Mentioning human excreta being one of the most highly risked pollutants among all the other major contributors of sanitation pollutants is increasing public health risks and amounts of pollution loads within the slum environment. Higher population growth, urge of urbanization and illegal status of urban slums makes it impossible to increase the level of performance of sanitation systems in urban slums. According to Sustainable Sanitation Alliance, design parameters for sanitation systems were set up to ensure sustainable environment. This paper reviews the characteristics of human excreta at present, treatment technologies, and procedures of processes that can be adopted feasibly in the urban slums. Keeping these factors as our significant concern of study, assessment of sustainable sanitation systems is done using sanitation chain concept in accordance to the pre-determined sustainability indicators and criteria which reflect the potential and feasible application of waterless sanitation systems bringing sustainable sanitation systems in urban slums.

Keywords: human excreta, sanitation chain, sustainable sanitation systems, urban slums

Procedia PDF Downloads 294
1577 Diversification and Risk Management in Non-Profit Organisations: A Case Study

Authors: Manzurul Alam, John Griffiths, David Holloway, Megan Paull, Anne Clear

Abstract:

Background: This paper investigates the nature of risk management practices in non-profit organizations. It is argued here that the risk exposure of these organizations has increased as a result of their entrepreneurial activities. This study explores how a particular non-profit organization formulates its risk strategies in the face funding restrictions. Design/Method/Approach: The study adopts a case study approach to report the results on how a non-profit organization diversifies its activities, tackles risks arising from such activities and improves performance. Results: The findings show that the organization made structural adjustments and leadership changes which helped to adjust their risk strategies. It also reports the organizational processes to deal with risks arising from both related and unrelated diversification strategies. Implications: Any generalization from this case example needs to be taken with caution as there are significant differences between non-profit organizations operating in different sectors. Originality: The paper makes a significant contribution to the non-profit literature by highlighting the diversification strategies along with risk performance.

Keywords: risk management, performance management, non-profit organizations, financial management

Procedia PDF Downloads 501
1576 Dry Binder Mixing of Field Trial Investigation Using Soil Mix Technology: Case Study on Contaminated Site Soil

Authors: Mary Allagoa, Abir Al-Tabbaa

Abstract:

The study explores the use of binders and additives, such as Portland cement, pulverized fuel ash, ground granulated blast furnace slag, and MgO, to decrease the concentration and leachability of pollutants in contaminated site soils. The research investigates their effectiveness and associated risks of using the binders, with a focus on Total Heavy metals (THM) and Total Petroleum Hydrocarbon (TPH). The goal of this research is to evaluate the performance and effectiveness of binders and additives in remediating soil pollutants. The study aims to assess the suitability of the mixtures for ground improvement purposes, determine the optimal dosage, and investigate the associated risks. The research utilizes physical (unconfined compressive strength) and chemical tests (batch leachability test) to assess the efficacy of the binders and additives. A completely randomized design one-way ANOVA is used to determine the significance within mix binders of THM. The study also employs incremental lifetime cancer risk assessments (ILCR) and other indexes to evaluate the associated risks. The study finds that Ground Granulated Blast Furnace Slag (GGBS): MgO is the most effective binder for remediation, particularly when using low dosages of MgO combined with higher dosages of GGBS binders on TPH. The results indicate that binders and additives can encapsulate and immobilize pollutants, thereby reducing their leachability and toxicity. The mean unconfined compressive strength of the soil ranges from 285.0- 320.5 kPa, while THM levels are less than 10 µg/l in GGBS: MgO and CEM: PFA but below 1 µg/l in CEM I based. The ILCR ranged from 6.77E-02 - 2.65E-01 and 5.444E-01 – 3.20 E+00, with the highest values observed under extreme conditions. The hazard index (HI), Risk allowable daily dose intake (ADI), and Risk chronic daily intake (CDI) were all less than 1 for the THM. The study identifies MgO as the best additive for use in soil remediation.

Keywords: risk ADI, risk CDI, ILCR, novel binders, additives binders, hazard index

Procedia PDF Downloads 757
1575 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 148
1574 The Effect of Tacit Knowledge for Intelligence Cycle

Authors: Bahadir Aydin

Abstract:

It is difficult to access accurate knowledge because of mass data. This huge data make environment more and more caotic. Data are main piller of intelligence. The affiliation between intelligence and knowledge is quite significant to understand underlying truths. The data gathered from different sources can be modified, interpreted and classified by using intelligence cycle process. This process is applied in order to progress to wisdom as well as intelligence. Within this process the effect of tacit knowledge is crucial. Knowledge which is classified as explicit and tacit knowledge is the key element for any purpose. Tacit knowledge can be seen as "the tip of the iceberg”. This tacit knowledge accounts for much more than we guess in all intelligence cycle. If the concept of intelligence cycle is scrutinized, it can be seen that it contains risks, threats as well as success. The main purpose of all organizations is to be successful by eliminating risks and threats. Therefore, there is a need to connect or fuse existing information and the processes which can be used to develop it. Thanks to this process the decision-makers can be presented with a clear holistic understanding, as early as possible in the decision making process. Altering from the current traditional reactive approach to a proactive intelligence cycle approach would reduce extensive duplication of work in the organization. Applying new result-oriented cycle and tacit knowledge intelligence can be procured and utilized more effectively and timely.

Keywords: information, intelligence cycle, knowledge, tacit Knowledge

Procedia PDF Downloads 504
1573 Assessing and Managing the Risk of Inland Acid Sulfate Soil Drainage via Column Leach Tests and 1D Modelling: A Case Study from South East Australia

Authors: Nicolaas Unland, John Webb

Abstract:

The acidification and mobilisation of metals during the oxidation of acid sulfate soils exposed during lake bed drying is an increasingly common phenomenon under climate scenarios with reduced rainfall. In order to assess the risk of generating high concentrations of acidity and dissolved metals, chromium suite analysis are fundamental, but sometimes limited in characterising the potential risks they pose. This study combines such fundamental test work, along with incubation tests and 1D modelling to investigate the risks associated with the drying of Third Reedy Lake in South East Australia. Core samples were collected from a variable depth of 0.5 m below the lake bed, at 19 locations across the lake’s footprint, using a boat platform. Samples were subjected to a chromium suite of analysis, including titratable actual acidity, chromium reducible sulfur and acid neutralising capacity. Concentrations of reduced sulfur up to 0.08 %S and net acidities up to 0.15 %S indicate that acid sulfate soils have formed on the lake bed during permanent inundation over the last century. A further sub-set of samples were prepared in 7 columns and subject to accelerated heating, drying and wetting over a period of 64 days in laboratory. Results from the incubation trial indicate that while pyrite oxidation proceeded, minimal change to soil pH or the acidity of leachate occurred, suggesting that the internal buffering capacity of lake bed sediments was sufficient to neutralise a large proportion of the acidity produced. A 1D mass balance model was developed to assess potential changes in lake water quality during drying based on the results of chromium suite and incubation tests. Results from the above test work and modelling suggest that acid sulfate soils pose a moderate to low risk to the Third Reedy Lake system. Further, the risks can be effectively managed during the initial stages of lake drying via flushing with available mildly alkaline water. The study finds that while test work such as chromium suite analysis are fundamental in characterizing acid sulfate soil environments, they can the overestimate risks associated with the soils. Subsequent incubation test work may more accurately characterise such soils and lead to better-informed management strategies.

Keywords: acid sulfate soil, incubation, management, model, risk

Procedia PDF Downloads 347
1572 Alternative Water Resources and Brominated Byproducts

Authors: Nora Kuiper, Candace Rowell, Hugues Preud'Homme, Basem Shomar

Abstract:

As the global dependence on seawater desalination as a primary drinking water resource increases, a unique class of secondary pollutants is emerging. The presence of bromide salts in seawater may result in increased levels of bromine and brominated byproducts in drinking water. The State of Qatar offers a unique setting to study these pollutants and their impacts on consumers as the country is 100% dependent on seawater desalination to supply municipal tap water and locally produced bottled water. Tap water (n=115) and bottled water (n=62) samples were collected throughout the State of Qatar and analyzed for a suite of inorganic and organic compounds, including 54 volatile organic compounds (VOCs), with an emphasis on brominated byproducts. All VOC identification and quantification was completed using a Bruker Scion GCMSMS with static headspace technologies. A risk survey tool was used to collect information regarding local consumption habits, health outcomes and perception of water sources for adults and children. This study is the first of its kind in the country. Dibromomethane, bromoform, and bromobenzene were detected in 61%, 88% and 2%, of the drinking water samples analyzed. The levels of dibromomethane ranged from approximately 100-500 ng/L and the concentrations of bromoform ranged from approximately 5-50 µg/L. Additionally, bromobenzene concentrations were 60 ng/L. The presence of brominated compounds in drinking water is a public health concern specific to populations using seawater as a feed water source and may pose unique risks that have not been previously studied. Risk assessments are ongoing to quantify the risks associated with prolonged consumption of disinfection byproducts; specifically the risks of brominated trihalomethanes as the levels of bromoform found in Qatar’s drinking water reach more than 60% of the US EPA’s Maximum Contaminant Level of all THMs.

Keywords: brominated byproducts, desalination, trihalomethanes, risk assessment

Procedia PDF Downloads 412
1571 A Comparative Study between Japan and the European Union on Software Vulnerability Public Policies

Authors: Stefano Fantin

Abstract:

The present analysis outcomes from the research undertaken in the course of the European-funded project EUNITY, which targets the gaps in research and development on cybersecurity and privacy between Europe and Japan. Under these auspices, the research presents a study on the policy approach of Japan, the EU and a number of Member States of the Union with regard to the handling and discovery of software vulnerabilities, with the aim of identifying methodological differences and similarities. This research builds upon a functional comparative analysis of both public policies and legal instruments from the identified jurisdictions. The result of this analysis is based on semi-structured interviews with EUNITY partners, as well as by the participation of the researcher to a recent report from the Center for EU Policy Study on software vulnerability. The European Union presents a rather fragmented legal framework on software vulnerabilities. The presence of a number of different legislations at the EU level (including Network and Information Security Directive, Critical Infrastructure Directive, Directive on the Attacks at Information Systems and the Proposal for a Cybersecurity Act) with no clear focus on such a subject makes it difficult for both national governments and end-users (software owners, researchers and private citizens) to gain a clear understanding of the Union’s approach. Additionally, the current data protection reform package (general data protection regulation), seems to create legal uncertainty around security research. To date, at the member states level, a few efforts towards transparent practices have been made, namely by the Netherlands, France, and Latvia. This research will explain what policy approach such countries have taken. Japan has started implementing a coordinated vulnerability disclosure policy in 2004. To date, two amendments can be registered on the framework (2014 and 2017). The framework is furthermore complemented by a series of instruments allowing researchers to disclose responsibly any new discovery. However, the policy has started to lose its efficiency due to a significant increase in reports made to the authority in charge. To conclude, the research conducted reveals two asymmetric policy approaches, time-wise and content-wise. The analysis therein will, therefore, conclude with a series of policy recommendations based on the lessons learned from both regions, towards a common approach to the security of European and Japanese markets, industries and citizens.

Keywords: cybersecurity, vulnerability, European Union, Japan

Procedia PDF Downloads 136
1570 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 514
1569 Intuitive Decision Making When Facing Risks

Authors: Katharina Fellnhofer

Abstract:

The more information and knowledge that technology provides, the more important are profoundly human skills like intuition, the skill of using nonconscious information. As our world becomes more complex, shaken by crises, and characterized by uncertainty, time pressure, ambiguity, and rapidly changing conditions, intuition is increasingly recognized as a key human asset. However, due to methodological limitations of sample size or time frame or a lack of real-world or cross-cultural scope, precisely how to measure intuition when facing risks on a nonconscious level remains unclear. In light of the measurement challenge related to intuition’s nonconscious nature, a technique is introduced to measure intuition via hidden images as nonconscious additional information to trigger intuition. This technique has been tested in a within-subject fully online design with 62,721 real-world investment decisions made by 657 subjects in Europe and the United States. Bayesian models highlight the technique’s potential to measure skill at using nonconscious information for conscious decision making. Over the long term, solving the mysteries of intuition and mastering its use could be of immense value in personal and organizational decision-making contexts.

Keywords: cognition, intuition, investment decisions, methodology

Procedia PDF Downloads 70
1568 Depression in Immigrants and Refugees

Authors: Fatou Cisse

Abstract:

Depression is one of the most serious health problems experienced by immigrants and refugees, who are likely to undergo heightened political, economic, social, and environmental stressors as they transition to a new culture. The purpose of this literature review is to identify and compare risks associated with depression among young adult immigrants and refugees aged 18 to 25. Ten articles focused on risks associated with depression symptoms among this population were reviewed, revealing several common themes: Stress, identity, culture, language barriers, discrimination, social support, self-esteem, length of time in the receiving country, origins, or background. Existing research has failed to account adequately for sample size, language barriers, how the concept of "depression" differs across cultures, and stressors immigrants and refugees experience prior to the transition to the new culture. The study revealed that immigrants and refugees are at risk for depression and that the risk is greater in the refugee population due to their history of trauma. The Roy Adaptation Model was employed to understand the coping mechanisms that refugees and immigrants could use to reduce rates of depression. The psychiatric nurse practitioner must be prepared to intervene and educate this population on these coping mechanisms to help them overcome the feelings that lead to depression and facilitate a smooth integration into the new culture.

Keywords: immigration, refugees, depression, young adults

Procedia PDF Downloads 177