Search results for: criminal digital evidence
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6516

Search results for: criminal digital evidence

6 Reassembling a Fragmented Border Landscape at Crossroads: Indigenous Rights, Rural Sustainability, Regional Integration and Post-Colonial Justice in Hong Kong

Authors: Chiu-Yin Leung

Abstract:

This research investigates a complex assemblage among indigenous identities, socio-political organization and national apparatus in the border landscape of post-colonial Hong Kong. This former British colony had designated a transient mode of governance in its New Territories and particularly the northernmost borderland in 1951-2012. With a discriminated system of land provisions for the indigenous villagers, the place has been inherited with distinctive village-based culture, historic monuments and agrarian practices until its sovereignty return into the People’s Republic of China. In its latest development imperatives by the national strategic planning, the frontier area of Hong Kong has been identified as a strategy site for regional economic integration in South China, with cross-border projects of innovation and technology zones, mega-transport infrastructure and inter-jurisdictional arrangement. Contemporary literature theorizes borders as the material and discursive production of territoriality, which manifest in state apparatus and the daily lives of its citizens and condense in the contested articulations of power, security and citizenship. Drawing on the concept of assemblage, this paper attempts to tract how the border regime and infrastructure in Hong Kong as a city are deeply ingrained in the everyday lived spaces of the local communities but also the changing urban and regional strategies across different longitudinal moments. Through an intensive ethnographic fieldwork among the borderland villages since 2008 and the extensive analysis of colonial archives, new development plans and spatial planning frameworks, the author navigates the genealogy of the border landscape in Ta Kwu Ling frontier area and its implications as the milieu for new state space, covering heterogeneous fields particularly in indigenous rights, heritage preservation, rural sustainability and regional economy. Empirical evidence suggests an apparent bias towards indigenous power and colonial representation in classifying landscape values and conserving historical monuments. Squatter and farm tenants are often deprived of property rights, statutory participation and livelihood option in the planning process. The postcolonial bureaucracies have great difficulties in mobilizing resources to catch up with the swift, political-first approach of the mainland counterparts. Meanwhile, the cultural heritage, lineage network and memory landscape are not protected altogether with any holistic view or collaborative effort across the border. The enactment of land resumption and compensation scheme is furthermore disturbed by lineage-based customary law, technocratic bureaucracy, intra-community conflicts and multi-scalar political mobilization. As many traces of colonial misfortune and tyranny have been whitewashed without proper management, the author argues that postcolonial justice is yet reconciled in this fragmented border landscape. The assemblage of border in mainstream representation has tended to oversimplify local struggles as a collective mist and setup a wider production of schizophrenia experiences in the discussion of further economic integration among Hong Kong and other mainland cities in the Pearl River Delta Region. The research is expected to shed new light on the theorizing of border regions and postcolonialism beyond Eurocentric perspectives. In reassembling the borderland experiences with other arrays in state governance, village organization and indigenous identities, the author also suggests an alternative epistemology in reconciling socio-spatial differences and opening up imaginaries for positive interventions.

Keywords: heritage conservation, indigenous communities, post-colonial borderland, regional development, rural sustainability

Procedia PDF Downloads 178
5 Acute Severe Hyponatremia in Patient with Psychogenic Polydipsia, Learning Disability and Epilepsy

Authors: Anisa Suraya Ab Razak, Izza Hayat

Abstract:

Introduction: The diagnosis and management of severe hyponatremia in neuropsychiatric patients present a significant challenge to physicians. Several factors contribute, including diagnostic shadowing and attributing abnormal behavior to intellectual disability or psychiatric conditions. Hyponatraemia is the commonest electrolyte abnormality in the inpatient population, ranging from mild/asymptomatic, moderate to severe levels with life-threatening symptoms such as seizures, coma and death. There are several documented fatal case reports in the literature of severe hyponatremia secondary to psychogenic polydipsia, often diagnosed only in autopsy. This paper presents a case study of acute severe hyponatremia in a neuropsychiatric patient with early diagnosis and admission to intensive care. Case study: A 21-year old Caucasian male with known epilepsy and learning disability was admitted from residential living with generalized tonic-clonic self-terminating seizures after refusing medications for several weeks. Evidence of superficial head injury was detected on physical examination. His laboratory data demonstrated mild hyponatremia (125 mmol/L). Computed tomography imaging of his brain demonstrated no acute bleed or space-occupying lesion. He exhibited abnormal behavior - restlessness, drinking water from bathroom taps, inability to engage, paranoia, and hypersexuality. No collateral history was available to establish his baseline behavior. He was loaded with intravenous sodium valproate and leveritircaetam. Three hours later, he developed vomiting and a generalized tonic-clonic seizure lasting forty seconds. He remained drowsy for several hours and regained minimal recovery of consciousness. A repeat set of blood tests demonstrated profound hyponatremia (117 mmol/L). Outcomes: He was referred to intensive care for peripheral intravenous infusion of 2.7% sodium chloride solution with two-hourly laboratory monitoring of sodium concentration. Laboratory monitoring identified dangerously rapid correction of serum sodium concentration, and hypertonic saline was switched to a 5% dextrose solution to reduce the risk of acute large-volume fluid shifts from the cerebral intracellular compartment to the extracellular compartment. He underwent urethral catheterization and produced 8 liters of urine over 24 hours. Serum sodium concentration remained stable after 24 hours of correction fluids. His GCS recovered to baseline after 48 hours with improvement in behavior -he engaged with healthcare professionals, understood the importance of taking medications, admitted to illicit drug use and drinking massive amounts of water. He was transferred from high-dependency care to ward level and was initiated on multiple trials of anti-epileptics before achieving seizure-free days two weeks after resolution of acute hyponatremia. Conclusion: Psychogenic polydipsia is often found in young patients with intellectual disability or psychiatric disorders. Patients drink large volumes of water daily ranging from ten to forty liters, resulting in acute severe hyponatremia with mortality rates as high as 20%. Poor outcomes are due to challenges faced by physicians in making an early diagnosis and treating acute hyponatremia safely. A low index of suspicion of water intoxication is required in this population, including patients with known epilepsy. Monitoring urine output proved to be clinically effective in aiding diagnosis. Early referral and admission to intensive care should be considered for safe correction of sodium concentration while minimizing risk of fatal complications e.g. central pontine myelinolysis.

Keywords: epilepsy, psychogenic polydipsia, seizure, severe hyponatremia

Procedia PDF Downloads 98
4 Recent Trends in Transportable First Response Healthcare Architecture

Authors: Stephen Verderber

Abstract:

The World Health Organization (WHO) calls for research and development on ecologically sustainable, resilient structures capable of effectively responding to disaster events globally, in response to climate change, politically based diasporas, earthquakes, and other adverse events upending the rhythms of everyday life globally. By 2050, nearly 80% of the world’s population will reside in coastal zones, and this, coupled with the increasingly dire impacts of climate change, constitute a recipe for further chaos and disruption, and in light of these events, architects have yet to rise up to meet the challenge. In the arena of healthcare, rapidly deployable clinics and field hospitals can provide immediate assistance in medically underserved disaster strike zones. Transportable facilities offer multiple advantages over conventional, fixed-site hospitals, as lightweight, comparatively unencumbered alternatives. These attributes have been proven repeatedly in 20th century vehicular and tent-based structures deployed in frontline combat theaters and in prior natural disasters. Prefab transportable clinics and trauma centers recently responded adroitly to medical emergencies in the aftermath of the Haitian (2010) and Ecuadorian (2016) earthquakes, and in North American post-hurricane relief efforts (2017) while architects continue to be castigated by their engineer colleagues as chronically poor first responders. Architecturally based portable structures for healthcare currently include Redeployable Health Centers (RHCs), Redeployable Trauma Centers (RTCs), and Permanent Modular Installations (PMIs). Five tectonic variants within this typology have recently been operationalized in the field: 1. Vehicular-based Nomadics: Prefab modules installed on a truck chassis with interior compartments dropped in prior to final assembly. Alternately, a two-component apparatus is preferred, with a truck cab pulling a modular medical unit, with independent transiting component; 2. Tent and Pneumatic Systems: Tent/yurt precursors and inflatable systems lightweight and responsive to topographically challenging terrain and diverse climates; 3. Containerized Systems: The standard modular intermodal-shipping container affords structural strength, resiliency in difficult transiting conditions, and can be densely close-packed and these can be custom-built or hold flat-pack systems; 4. Flat-Packs and Pop-Up Systems: These kit-of-part assemblies are shipped in standardized or specially-designed ISO containers; and 5. Hybrid Systems: These consist of composite facilities representing a synthesis of mobile vehicular components and/or tent or shipping containers, fused with conventional or pneumatically activated tent systems. Hybrids are advantageous in many installation contexts from an aesthetic, fabrication, and transiting perspective. Advantages/disadvantages of various modular systems are comparatively examined, followed by presentation of a compendium of 80 evidence (research)-based planning and design considerations addressing site/context, transiting and commissioning, triage, decontamination/intake, diagnostic and treatment, facility tectonics, and administration/total environment. The benefits of offsite pre-manufactured fabrication are examined, as is anticipated growth in international demand for transportable healthcare facilities to meet the challenges posed by accelerating global climate change and global conflicts. This investigation into rapid response facilities for pre and post-disaster zones is drawn from a recent book by the author, the first on architecture on this topic (Innovations in Transportable Healthcare Architecture).

Keywords: disaster mitigation, rapid response healthcare architecture, offsite prefabrication

Procedia PDF Downloads 96
3 Recent Developments in E-waste Management in India

Authors: Rajkumar Ghosh, Bhabani Prasad Mukhopadhay, Ananya Mukhopadhyay, Harendra Nath Bhattacharya

Abstract:

This study investigates the global issue of electronic waste (e-waste), focusing on its prevalence in India and other regions. E-waste has emerged as a significant worldwide problem, with India contributing a substantial share of annual e-waste generation. The primary sources of e-waste in India are computer equipment and mobile phones. Many developed nations utilize India as a dumping ground for their e-waste, with major contributions from the United States, China, Europe, Taiwan, South Korea, and Japan. The study identifies Maharashtra, Tamil Nadu, Mumbai, and Delhi as prominent contributors to India's e-waste crisis. This issue is contextualized within the broader framework of the United Nations' 2030 Agenda for Sustainable Development, which encompasses 17 Sustainable Development Goals (SDGs) and 169 associated targets to address poverty, environmental preservation, and universal prosperity. The study underscores the interconnectedness of e-waste management with several SDGs, including health, clean water, economic growth, sustainable cities, responsible consumption, and ocean conservation. Central Pollution Control Board (CPCB) data reveals that e-waste generation surpasses that of plastic waste, increasing annually at a rate of 31%. However, only 20% of electronic waste is recycled through organized and regulated methods in underdeveloped nations. In Europe, efficient e-waste management stands at just 35%. E-waste pollution poses serious threats to soil, groundwater, and public health due to toxic components such as mercury, lead, bromine, and arsenic. Long-term exposure to these toxins, notably arsenic in microchips, has been linked to severe health issues, including cancer, neurological damage, and skin disorders. Lead exposure, particularly concerning for children, can result in brain damage, kidney problems, and blood disorders. The study highlights the problematic transboundary movement of e-waste, with approximately 352,474 metric tonnes of electronic waste illegally shipped from Europe to developing nations annually, mainly to Africa, including Nigeria, Ghana, and Tanzania. Effective e-waste management, underpinned by appropriate infrastructure, regulations, and policies, offers opportunities for job creation and aligns with the objectives of the 2030 Agenda for SDGs, especially in the realms of decent work, economic growth, and responsible production and consumption. E-waste represents hazardous pollutants and valuable secondary resources, making it a focal point for anthropogenic resource exploitation. The United Nations estimates that e-waste holds potential secondary raw materials worth around 55 billion Euros. The study also identifies numerous challenges in e-waste management, encompassing the sheer volume of e-waste, child labor, inadequate legislation, insufficient infrastructure, health concerns, lack of incentive schemes, limited awareness, e-waste imports, high costs associated with recycling plant establishment, and more. To mitigate these issues, the study offers several solutions, such as providing tax incentives for scrap dealers, implementing reward and reprimand systems for e-waste management compliance, offering training on e-waste handling, promoting responsible e-waste disposal, advancing recycling technologies, regulating e-waste imports, and ensuring the safe disposal of domestic e-waste. A mechanism, Buy-Back programs, will compensate customers in cash when they deposit unwanted digital products. This E-waste could contain any portable electronic device, such as cell phones, computers, tablets, etc. Addressing the e-waste predicament necessitates a multi-faceted approach involving government regulations, industry initiatives, public awareness campaigns, and international cooperation to minimize environmental and health repercussions while harnessing the economic potential of recycling and responsible management.

Keywords: e-waste management, sustainable development goal, e-waste disposal, recycling technology, buy-back policy

Procedia PDF Downloads 53
2 “SockGEL/PLUG” Injectable Smart/Intelligent and Bio-Inspired Sol-Gel Nanomaterials for Simple and Complex Oro-Dental and Cranio-Maxillo-Facial Interventional Applications

Authors: Ziyad S. Haidar

Abstract:

Millions of teeth are removed annually, and dental extraction is one of the most commonly performed surgical procedures globally. Whether due to caries, periodontal disease or trauma, exodontia and the ensuing wound healing and bone remodeling processes of the resultant socket (hole in the jaw bone) usually result in serious deformities of the residual alveolar osseous ridge and surrounding soft tissues (reduced height/width). Such voluminous changes render the placement of a proper conventional bridge, denture or even an implant-supported prosthesis extremely challenging. Further, most extractions continue to be performed with no regard for preventing the onset of alveolar osteitis (also known as dry socket, a painful and difficult-to-treat/-manage condition post-exodontia). Hence, such serious resorptive morphological changes often result in significant facial deformities and a negative impact on the overall Quality of Life (QoL) of patients (and oral health-related QoL), alarming, particularly for the geriatric with compromised healing and in light of the thriving longevity statistics. Opportunity: Despite advances in tissue/wound grafting, serious limitations continue to exist, including efficacy and clinical outcome predictability, cost, treatment time, expertise and risk of immune reactions. For cases of dry sockets, specifically, the commercially-available and often-prescribed home remedies are highly lacking. Indeed, most are not recommended for use anymore. Alveogyl is a fine example. Hence, there is a great market demand and need for alternative solutions. Solution: Herein, SockGEL/PLUG (patent pending), an all-natural, drug-free and injectable stimuli-responsive hydrogel, was designed, formulated, characterized and evaluated as an osteogenic, angiogenic, anti-microbial and pain-soothing suture-free intra-alveolar dressing, safe and efficacious for use in several oro-dental and cranio-maxillo-facial interventional applications; for example: in fresh dental extraction sockets, immediately post-exodontia. It is composed of FDA-approved, biocompatible and biodegradable polymers, self-assembled electro-statically to formulate a scaffolding matrix to (a) prevent the onset of alveolar osteitis via securing the fibrin-clot in situ and protecting/sealing the socket from contamination/infection; and (b) endogenously promote/accelerate wound healing and bone remodeling to preserve the volume of the alveolus. Findings: The intrinsic properties of the SockGEL/PLUG hydrogel were evaluated physico-chemico-mechanically for safety (cell viability), viscosity, rheology, bio-distribution and essentially, capacity to induce wound healing and osteogenesis (small defect, in vivo) without any signaling cues from exogenous cells, growth factors or drugs. The performed animal model of cranial critical-sized and non-vascularized bone defects shall provide vitally critical insights into the role and mechanism of the employed natural bio-polymer blend and gel product in endogenous reparative regeneration of soft tissues and bone morphogenesis. Alongside, the fine-tuning of our modified formulation method will further tackle appropriateness, reproducibility, scalability, ease and speed in producing stable, biodegradable and sterilizable stimuli (thermo-sensitive and photo-responsive) matrices (3-dimensional interpenetrating yet porous polymeric network) suitable for an intra-socket application, and beyond. Conclusions and Perspective: Findings are anticipated to provide sufficient evidence to translate into pilot clinical trials and validate the bionanomaterial before engaging the market for feasibility, acceptance and cost-effectiveness studies. The SockGEL/PLUG platform is patent pending: SockGEL is a bio-inspired drug-free hydrogel; SockPLUG is a drug-loaded hydrogel designed for complex indications.

Keywords: hydrogel, injectable, dentistry, craniomaxillofacial complex, bioinspired, nanobiotechnology, biopolymer, sol-gel, stimuli-responsive, matrix, tissue engineering, regenerative medicine

Procedia PDF Downloads 42
1 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 47