Search results for: critical risk factors (CRFs)
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 18201

Search results for: critical risk factors (CRFs)

17901 Key Affecting Factors for Social Sustainability through Urban Green Space Planning

Authors: Raziyeh Teimouri, Sadasivam Karuppannan, Alpana Sivam, Ning Gu

Abstract:

Urban Green Space (UGS) is one of the most critical components of urban systems to create sustainable cities. UGS has valuable social benefits that closely correlate with people's life quality. Studying social sustainability factors that can be achieved by green spaces is required for optimal UGS planning to increase urban social sustainability. This paper aims to identify key factors that enhance urban social sustainability through UGS planning. To reach the goal of the study international experts’ survey has been conducted. According to the results of the survey analysis, factors of proper distribution, links to public transportation, walkable access, sense of place, social interactions, public education, safety and security, walkability and cyclability, physical activity and recreational facilities, suitability for all ages, disabled people, women, and children are among the key factors that should consider in UGS planning programs to promote urban social sustainability.

Keywords: UGS, planning, social sustainability, key factors

Procedia PDF Downloads 40
17900 A Risk Management Approach for Nigeria Manufacturing Industries

Authors: Olaniyi O. Omoyajowo

Abstract:

To be successful in today’s competitive global environment, manufacturing industry must be able to respond quickly to changes in technology. These changes in technology introduce new risks and hazards. The management of risk/hazard in a manufacturing process recommends method through which the success rate of an organization can be increased. Thus, there is a continual need for manufacturing industries to invest significant amount of resources in risk management, which in turn optimizes the production output and profitability of any manufacturing industry (if implemented properly). To help improve the existing risk prevention and mitigation practices in Small and Medium Enterprise (SME) in Nigeria Manufacturing Industries (NMI), the researcher embarks on this research to develop a systematic Risk Management process.

Keywords: manufacturing management, risk, risk management, SMEs

Procedia PDF Downloads 363
17899 Environmental Safety and Occupational Health Risk Assessment for Rocket Static Test

Authors: Phontip Kanlahasuth

Abstract:

This paper presents the environmental safety and occupational health risk assessment of rocket static test by assessing risk level from probability and severity and then appropriately applying the risk control measures. Before the environmental safety and occupational health measures are applied, the serious hazards level is 31%, medium level is 24% and low level is 45%. Once risk control measures are practically implemented, the serious hazard level can be diminished, medium level is 38%, low level is 45% and eliminated level is 17%. It is clearly shown that the environmental safety and occupational health measures can significantly reduce the risk level.

Keywords: rocket static test, hazard, risk, risk assessment, risk analysis, environment, safety, occupational health, acceptable risk, probability, severity, risk level

Procedia PDF Downloads 558
17898 Evaluating the Impact of Extreme Weather (Flooding) Experience on Climate Change Perceptions in Accra, Ghana

Authors: Bright Annang Baah

Abstract:

Evaluating public perceptions of climate change risk and the elements that impact them has been shown to be critical in developing support for climate change action. Previous research has found a variety of elements, including the experience of extreme weather events, that impact public perceptions and worries about climate change. However, little is known about the public's perception of climate change risks and the variables that influence them in developing countries. Using a household survey, this study attempted to evaluate respondents' risk perceptions of climate change, as well as the impact of flooding experience on such beliefs. The findings demonstrate that flood victims have a greater risk perception and are more concerned about climate change than non-victims. Concerns regarding the effects of climate change, on the other hand, were found to be the lowest when compared to other pressing challenges confronting the country. This study's findings contribute to the understanding of climate change risk perception and the impact of extreme weather events from the perspective of a developing nation.

Keywords: climate change risk perception, harsh weather, perceived concern, Accra, Ghana

Procedia PDF Downloads 10
17897 An Evaluation of the Efficacy of School-Based Suicide Prevention Programs

Authors: S. Wietrzychowski

Abstract:

The following review has identified specific programs, as well as the elements of these programs, that have been shown to be most effective in preventing suicide in schools. Suicide is an issue that affects many students each year. Although this is a prominent issue, there are few prevention programs used within schools. The primary objective of most prevention programs is to reduce risk factors such as depression and hopelessness, and increase protective factors like support systems and help-seeking behaviors. Most programs include a gatekeeper training model, education component, peer support group, and/or counseling/treatment. Research shows that some of these programs, like the Signs of Suicide and Youth Aware of Mental Health Programme, are effective in reducing suicide behaviors and increasing protective factors. These programs have been implemented in many countries across the world and have shown promising results. Since schools can provide easy access to adolescents, implement education programs, and train staff members and students how to identify and to report suicide behaviors, school-based programs seem to be the best way to prevent suicide among adolescents. Early intervention may be an effective way to prevent suicide. Although, since early intervention is not always an option, school-based programs in high schools have also been shown to decrease suicide attempts by up to 50%. As a result of this presentation, participants will be able to 1.) list at least 2 evidence-based suicide prevention programs, 2.) identify at least 3 factors which protect against suicide, and 3.) describe at least 3 risk factors for suicide.

Keywords: school, suicide, prevention, programs

Procedia PDF Downloads 315
17896 Risk Factors and Biomarkers for the Recurrence of Ovarian Endometrioma: About the Immunoreactivity of Progesterone Receptor Isoform B and Nuclear Factor Kappa B.

Authors: Ae Ra Han, Taek Hoo Lee, Sun Zoo Kim, Hwa Young Lee

Abstract:

Introduction: Ovarian endometrioma is one of the important causes of poor ovarian reserve and up to half of them have recurred. However, the treatment for recurrence prevention has limited efficiency and repeated surgical management makes worsen the ovarian reserve. To find better management for recurrence prevention, we investigated risk factors and biomarkers for the recurrence of ovarian endometrioma. Methods: The medical records of women with the history of surgical dissection for ovarian endometrioma were collected. After exclusion of the cases with concurrent hysterectomy, been menopaused during follow-up, incomplete medical record, and loss of follow-up, a total of 134 women were enrolled. Immunohistochemical staining for progesterone receptor isoform B (PR-B) and nuclear factor kappa B (NFκB) was done with the fixed tissue blocks of their endometriomas which were collected at the time of surgery. Results: Severity of dysmenorrhea and co-existence of adenomyosis had significant correlation with recurrence of endometrioma. Increased PR-B (P = .041) and decreased NFκB (P = .036) immunoreactivity were found in recurrent group. Serum CA-125 level at the time of recurrence was higher than the highest level of CA-125 during follow-up in unrecurred group (55.6 vs. 21.3 U/mL, P = .014). Conclusion: We found that the severity of dysmenorrhea and coexistence of adenomyosis are risk factors for recurrence of ovarian endometrioma, and serial follow-up of CA-125 is effective to detect and prevent the recurrence. However, to determine the possibility of immunoreactivity of PR-B and NFκB as biomarkers for ovarian endometrioma, further studies of various races and large numbers with prospective design are needed.

Keywords: endometriosis, recurrence, biomarker, risk factor

Procedia PDF Downloads 527
17895 CFD Analysis of the Blood Flow in Left Coronary Bifurcation with Variable Angulation

Authors: Midiya Khademi, Ali Nikoo, Shabnam Rahimnezhad Baghche Jooghi

Abstract:

Cardiovascular diseases (CVDs) are the main cause of death globally. Most CVDs can be prevented by avoiding habitual risk factors. Separate from the habitual risk factors, there are some inherent factors in each individual that can increase the risk potential of CVDs. Vessel shapes and geometry are influential factors, having great impact on the blood flow and the hemodynamic behavior of the vessels. In the present study, the influence of bifurcation angle on blood flow characteristics is studied. In order to approach this topic, by simplifying the details of the bifurcation, three models with angles 30°, 45°, and 60° were created, then by using CFD analysis, the response of these models for stable flow and pulsatile flow was studied. In the conducted simulation in order to eliminate the influence of other geometrical factors, only the angle of the bifurcation was changed and other parameters remained constant during the research. Simulations are conducted under dynamic and stable condition. In the stable flow simulation, a steady velocity of 0.17 m/s at the inlet plug was maintained and in dynamic simulations, a typical LAD flow waveform is implemented. The results show that the bifurcation angle has an influence on the maximum speed of the flow. In the stable flow condition, increasing the angle lead to decrease the maximum flow velocity. In the dynamic flow simulations, increasing the bifurcation angle lead to an increase in the maximum velocity. Since blood flow has pulsatile characteristics, using a uniform velocity during the simulations can lead to a discrepancy between the actual results and the calculated results.

Keywords: coronary artery, cardiovascular disease, bifurcation, atherosclerosis, CFD, artery wall shear stress

Procedia PDF Downloads 137
17894 The Impact of Structural Empowerment on Risk Management Practices: A Case Study of Saudi Arabia Construction Small and Medium-Sized Enterprises

Authors: S. Alyami, S. Mohammad

Abstract:

These Risk management practices have a significant impact on construction SMEs. The effective utilisation of these practices depends on culture change in order to optimise decision making for critical activities within construction projects. Thus, successful implementation of empowerment strategies would enhance operational employees to participate in effective decision making. However, there remain many barriers to individuals and organisations within empowerment strategies that require empirical investigation before the industry can benefit from their implementation. Gaps in understanding the relationship between employee empowerment and risk management practices still exist. This research paper aims to examine the impact of the structural empowerment on risk management practices in construction SMEs. The questionnaire has been distributed to participants (162 employees) that involve projects and civil engineers within a case study from Saudi construction SMEs. Partial least squares based structural equation modeling (PLS-SEM) was utilised to perform analysis. The results reveal a positive relationship between empowerment and risk management practices. The study shows how structural empowerment contributes to operational employees in risk management practices through involving activities such as decision making, self-efficiency, and autonomy. The findings of this study will contribute to close the current gaps in the construction SMEs context.

Keywords: construction SMEs, culture, decision making, empowerment, risk management

Procedia PDF Downloads 86
17893 Determinants of Smallholder Farmers' Intention to Adopt Jatropha as Raw Material for Biodiesel Production: A Proposed Model for Nigeria

Authors: Abdulsalam Mas’ud

Abstract:

Though Nigerian Biofuel Policy and Incentive was introduced in 2007, however, little if any is known about the impact of such policy for biodiesel development in Nigeria. It can be argued that lack of raw materials is one of the important factors that hinder the proper implementation of the policy. In line with this argument, this study aims to explore the determinants of smallholder farmers’ intention to adopt Jatropha as raw materials for biodiesel development in northern Nigeria, with Jigawa State as area of study. The determinants proposed for investigation covers personal factors, physical factors, institutional factors, economic factors, risk and uncertainty factors as well as social factors. The validation of the proposed model will have the implication of guiding policymakers towards enhancement of farmers’ participation in the Jatropha project for biodiesel raw materials production. The eventual byproducts of the proposed model validation and implementation will be employment generation, poverty reduction, combating dessert encroachment, economic diversification to renewable energy sources and electricity generation.

Keywords: adoption, biodiesel, factors, jatropha

Procedia PDF Downloads 277
17892 Toward a Risk Assessment Model Based on Multi-Agent System for Cloud Consumer

Authors: Saadia Drissi

Abstract:

The cloud computing is an innovative paradigm that introduces several changes in technology that have resulted a new ways for cloud providers to deliver their services to cloud consumers mainly in term of security risk assessment, thus, adapting a current risk assessment tools to cloud computing is a very difficult task due to its several characteristics that challenge the effectiveness of risk assessment approaches. As consequence, there is a need of risk assessment model adapted to cloud computing. This paper requires a new risk assessment model based on multi-agent system and AHP model as fundamental steps towards the development of flexible risk assessment approach regarding cloud consumers.

Keywords: cloud computing, risk assessment model, multi-agent system, AHP model, cloud consumer

Procedia PDF Downloads 518
17891 Vulnerability Assessment of Healthcare Interdependent Critical Infrastructure Coloured Petri Net Model

Authors: N. Nivedita, S. Durbha

Abstract:

Critical Infrastructure (CI) consists of services and technological networks such as healthcare, transport, water supply, electricity supply, information technology etc. These systems are necessary for the well-being and to maintain effective functioning of society. Critical Infrastructures can be represented as nodes in a network where they are connected through a set of links depicting the logical relationship among them; these nodes are interdependent on each other and interact with each at other at various levels, such that the state of each infrastructure influences or is correlated to the state of another. Disruption in the service of one infrastructure nodes of the network during a disaster would lead to cascading and escalating disruptions across other infrastructures nodes in the network. The operation of Healthcare Infrastructure is one such Critical Infrastructure that depends upon a complex interdependent network of other Critical Infrastructure, and during disasters it is very vital for the Healthcare Infrastructure to be protected, accessible and prepared for a mass casualty. To reduce the consequences of a disaster on the Critical Infrastructure and to ensure a resilient Critical Health Infrastructure network, knowledge, understanding, modeling, and analyzing the inter-dependencies between the infrastructures is required. The paper would present inter-dependencies related to Healthcare Critical Infrastructure based on Hierarchical Coloured Petri Nets modeling approach, given a flood scenario as the disaster which would disrupt the infrastructure nodes. The model properties are being analyzed for the various state changes which occur when there is a disruption or damage to any of the Critical Infrastructure. The failure probabilities for the failure risk of interconnected systems are calculated by deriving a reachability graph, which is later mapped to a Markov chain. By analytically solving and analyzing the Markov chain, the overall vulnerability of the Healthcare CI HCPN model is demonstrated. The entire model would be integrated with Geographic information-based decision support system to visualize the dynamic behavior of the interdependency of the Healthcare and related CI network in a geographically based environment.

Keywords: critical infrastructure interdependency, hierarchical coloured petrinet, healthcare critical infrastructure, Petri Nets, Markov chain

Procedia PDF Downloads 497
17890 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia

Authors: Tim Nedyalkov

Abstract:

A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.

Keywords: cloud compliance, cloud security, data governance, privacy protection

Procedia PDF Downloads 94
17889 Multi-Criteria Bid/No Bid Decision Support Framework for General Contractors: A Case of Pakistan

Authors: Nida Iftikhar, Jamaluddin Thaheem, Bilal Iftikhar

Abstract:

In the construction industry, adequate and effective decision-making can mean the difference between success and failure. Bidding is the most important element of the construction business since it is a mean by which contractors obtain work. This is probably the only option for any contractor firm to sustain in the market and achieve its objective of earning the profits by winning tenders. The capability to select most appropriate ventures not only defines the success and wellbeing of contractor firms but also their survival and sustainability in the industry. The construction practitioners are usually on their own when it comes to deciding on bidding for a project or not. Usually, experience-based solutions are offered where a lot of subjectivity is involved. This research has been opted considering the local construction industry of Pakistan in order to examine the critical success factors from contractors’ perspective while making bidding decisions, listing and evaluating critical factors in order of their importance, categorization of these factors into decision support & decision oppose groups and to develop a framework to help contractors in the decision-making process. Literature review, questionnaires, and structured interviews are used for identification and quantification of factors affecting bid/no bid decision-making. Statistical methods of ranking analysis and analytical hierarchy process of multi-criteria decision-making method are used for analysis. It is found that profitability, need for work and financial health of client are the most decisive factors in bid/no bid decision-making while project size, project type, fulfilling the tender conditions imposed by the client and relationship, identity & reputation of the client are least impact factors in bid/no bid decision-making. Further, to verify the developed framework, case studies have been conducted to evaluate the bid/no bid decision-making in building procurement. This is the first of its nature study in the context of the local construction industry and recommends using a holistic decision-making framework for such business-critical deliberations.

Keywords: bidding, bid decision-making, construction procurement, contractor

Procedia PDF Downloads 157
17888 Prevalence and Risk Factors of Faecal Carriage Fluoroquinolone-Resistant Escherichia coli among Hospitalized Patients in Ado-Ekiti, Nigeria

Authors: C. A. Ologunde

Abstract:

Escherichia coli have been a major microorganisms associated with, and isolated from feacal samples either in adult or children all over the world. Strains of these organisms are resistant to cephalosporins and fluoroquinolone (FQ) antimicrobial agents among hospitalized patients and FQs are the most frequently prescribed antimicrobial class in hospitals, and the level of resistant of E. coli to these antimicrobial agents is a risk factor that should be assessed. Hence, this study was conducted to determine the prevalence and risk factors for colonization with fluoroquinolone (FQ)-resistant E. coli in hospitalized patients in Ado-Ekiti. Rectal swabs were obtained from patients in hospitals in the study area and FQ-resistant E. coli were isolated and identified by means of Nalidixic acid multi-disk and a 1-step screening procedure. Species identification and FQ resistance were confirmed by automated testing (Vitek, bioMerieux, USA). Individual colonies were subjected to pulse-field gel electrophoresis (PAGE) to determine macro-restriction polymorphism after digestion of chromosomal DNA. FQ-resistant E. coli was detected in the stool sample of 37(62%) hospitalized patient. With multivariable analyses, the use of FQ before hospitalization was the only independent risk factor for FQ-resistant E. coli carriage and was consistent for FQ exposures for the 3-12 months of study. Pulsed-field gel electrophoresis of FQ-resistant E. coli identified conal spread of 1(one) strain among 18 patients. Loss (9 patients) or acquisition (10 residents) of FQ-resistant E. coli was documented and was associated with de novo colonization with genetically distinct strains. It was concluded that FQ-resistant E. coli carriage was associated with clonal spread. The differential effects of individual fluoroquinolone on antimicrobial drug resistance are an important area for future study, as hospitals manipulate their formularies with regard to use of individual fluoroquinolone, often for economic reasons.

Keywords: E. coli, fluoroquinolone, risk factors, feacal carriage, hospitalized patients, Ado-Ekiti

Procedia PDF Downloads 206
17887 Optimal Secondary Prevention and Background Risk

Authors: Mohamed Anouar Razgallah

Abstract:

This paper examines in the context of a one-period model the impact of background risk on the optimal secondary prevention. We conduct our study based on various configurations of the background risk. We intend to show that in most cases the level of secondary prevention effort varied after the introduction of background risk, however, in very few cases this level remains constant.

Keywords: secondary prevention, primary prevention, background risk, ecomomics

Procedia PDF Downloads 399
17886 Risk Factors of Becoming NEET Youth in Iran: A Machine Learning Approach

Authors: Hamed Rahmani, Wim Groot

Abstract:

The term "youth not in employment, education or training (NEET)" refers to a combination of youth unemployment and school dropout. This study investigates the variables that increase the risk of becoming NEET in Iran. A selection bias-adjusted Probit model was employed using machine learning to identify these risk factors. We used cross-sectional data obtained from the Statistical Centre of Iran and the Ministry of Cooperatives Labour and Social Welfare that was taken from the labour force survey conducted in the spring of 2021. We look at years of education, work experience, housework, the number of children under the age of six in the home, family education, birthplace, and the amount of land owned by households. Results show that hours spent performing domestic chores enhance the likelihood of youth becoming NEET, and years of education and years of potential work experience decrease the chance of being NEET. The findings also show that female youth born in cities were less likely than those born in rural regions to become NEET.

Keywords: NEET youth, probit, CART, machine learning, unemployment

Procedia PDF Downloads 79
17885 The Relationship between Risk and Capital: Evidence from Indian Commercial Banks

Authors: Seba Mohanty, Jitendra Mahakud

Abstract:

Capital ratio is one of the major indicators of the stability of the commercial banks. Pertinent to its pervasive importance, over the years the regulators, policy makers focus on the maintenance of the particular level of capital ratio to minimize the solvency and liquidation risk. In this context, it is very much important to identify the relationship between capital and risk and find out the factors which determine the capital ratios of commercial banks. The study examines the relationship between capital and risk of the commercial banks operating in India. Other bank specific variables like bank size, deposit, profitability, non-performing assets, bank liquidity, net interest margin, loan loss reserves, deposits variability and regulatory pressure are also considered for the analysis. The period of study is 1997-2015 i.e. the period of post liberalization. To identify the impact of financial crisis and implementation of Basel II on capital ratio, we have divided the whole period into two sub-periods i.e. 1997-2008 and 2008-2015. This study considers all the three types of commercial banks, i.e. public sector, the private sector and foreign banks, which have continuous data for the whole period. The main sources of data are Prowess data base maintained by centre for monitoring Indian economy (CMIE) and Reserve Bank of India publications. We use simultaneous equation model and more specifically Two Stage Least Square method to find out the relationship between capital and risk. From the econometric analysis, we find that capital and risk affect each other simultaneously, and this is consistent across the time period and across the type of banks. Moreover, regulation has a positive significant impact on the ratio of capital to risk-weighted assets, but no significant impact on the banks risk taking behaviour. Our empirical findings also suggest that size has a negative impact on capital and risk, indicating that larger banks increase their capital less than the other banks supported by the too-big-to-fail hypothesis. This study contributes to the existing body of literature by predicting a strong relationship between capital and risk in an emerging economy, where banking sector plays a majority role for financial development. Further this study may be considered as a primary study to find out the macro economic factors which affecting risk and capital in India.

Keywords: capital, commercial bank, risk, simultaneous equation model

Procedia PDF Downloads 293
17884 Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)

Authors: Gampel Alexander, Mazzuchi Thomas, Sarkani Shahram

Abstract:

The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems.

Keywords: authorization-to-operate (ATO), industrial control systems (ICS), model-based system’s engineering (MBSE), risk management framework (RMF)

Procedia PDF Downloads 57
17883 Development of a Risk Disclosure Index and Examination of Its Determinants: An Empirical Study in Indian Context

Authors: M. V. Shivaani, P. K. Jain, Surendra S. Yadav

Abstract:

Worldwide regulators, practitioners and researchers view risk-disclosure as one of the most important steps that will promote corporate accountability and transparency. Recognizing this growing significance of risk disclosures, the paper first develops a risk disclosure index. Covering 69 risk items/themes, this index is developed by employing thematic content analysis and encompasses three attributes of disclosure: namely, nature (qualitative or quantitative), time horizon (backward-looking or forward-looking) and tone (no impact, positive impact or negative impact). As the focus of study is on substantive rather than symbolic disclosure, content analysis has been carried out manually. The study is based on non-financial companies of Nifty500 index and covers a ten year period from April 1, 2005 to March 31, 2015, thus yielding 3,872 annual reports for analysis. The analysis reveals that (on an average) only about 14% of risk items (i.e. about 10 out 69 risk items studied) are being disclosed by Indian companies. Risk items that are frequently disclosed are mostly macroeconomic in nature and their disclosures tend to be qualitative, forward-looking and conveying both positive and negative aspects of the concerned risk. The second objective of the paper is to gauge the factors that affect the level of disclosures in annual reports. Given the panel nature of data, and possible endogeneity amongst variables, Diff-GMM regression has been applied. The results indicate that age and size of firms have a significant positive impact on disclosure quality, whereas growth rate does not have a significant impact. Further, post-recession period (2009-2015) has witnessed significant improvement in quality of disclosures. In terms of corporate governance variables, board size, board independence, CEO duality, presence of CRO and constitution of risk management committee appear to be significant factors in determining the quality of risk disclosures. It is noteworthy that the study contributes to literature by putting forth a variant to existing disclosure indices that not only captures the quantity but also the quality of disclosures (in terms of semantic attributes). Also, the study is a first of its kind attempt in a prominent emerging market i.e. India. Therefore, this study is expected to facilitate regulators in mandating and regulating risk disclosures and companies in their endeavor to reduce information asymmetry.

Keywords: risk disclosure, voluntary disclosures, corporate governance, Diff-GMM

Procedia PDF Downloads 137
17882 Analysis of Risks of Adopting Integrated Project Delivery: Application of Bayesian Theory

Authors: Shan Li, Qiuwen Ma

Abstract:

Integrated project delivery (IPD) is a project delivery method distinguished by a shared risk/rewards mechanism and multiparty agreement. IPD has drawn increasing attention from construction industry due to its reliability to deliver high-performing buildings. However, unavailable IPD specific insurance concerns the industry participants who are interested in IPD implementation. Even though the risk management capability can be enhanced using shared risk mechanism, some risks may occur when the partners do not commit themselves into the integrated practices in a desired manner. This is because the intense collaboration and close integration can not only create added value but bring new opportunistic behaviors and disputes. The study is aimed to investigate the risks of implementing IPD using Bayesian theory. IPD risk taxonomy is presented to identify all potential risks of implementing IPD and a risk network map is developed to capture the interdependencies between IPD risks. The conditional relations between risk occurrences and the impacts of IPD risks on project performances are evaluated and simulated based on Bayesian theory. The probability of project outcomes is predicted by simulation. In addition, it is found that some risks caused by integration are most possible occurred risks. This study can help the IPD project participants identify critical risks of adopting IPD to improve project performances. In addition, it is helpful to develop IPD specific insurance when the pertinent risks can be identified.

Keywords: Bayesian theory, integrated project delivery, project risks, project performances

Procedia PDF Downloads 268
17881 Epidemiological Investigation of Abortion in Ewes in Algeria

Authors: Laatra Zemmouri, Said Boukhechem, Samia Haffaf, Mohamed Lafri

Abstract:

A study was conducted in order to determine the prevalence and risk factors associated with abortion in ewes in the region of M’sila, located in central-eastern Algeria. A questionnaire was carried out to obtain information about the occurrence of abortion, sheep housing conditions, vaccination, feeding and management practices, and whether the farmers kept other livestock. This cross-sectional study was conducted for 36 months (between 2016 and 2019). A total of 71 sheep flocks were visited. Among 8168 ewes, we recorded 734 (8.99%) abortions and 3861 lambings. The risk factor analysis using multivariable logistic regression showed an association between abortion and vaccination against brucellosis (CI 95%= 2,76-1,35; p<0,001). Abortion decreased when dogs are owned (CI 95%= 0,36-0,84; p= 0.006), however, abortion increased with the presence of cats in farms (CI 95%= 1,24-2,8; p=0.003). There was a significant association between abortion and keeping goats (CI 95%= 1,18-2,40; p= 0.004), bovins (CI 95%= 0,3-0,68; p<0,001) and poultry CI 95%= 0,39-0,77; p= 0.001) in farms. Through this study, it is noticed that a strong association between the occurrence of abortion and estrus synchronization, stillbirth occurrence, and feed supplementation (p<0.05). Identification of the causes of abortion is an important task to reduce foetal losses and to improve livestock productivity.

Keywords: abortion, ewes, questionnaire, risk factors

Procedia PDF Downloads 193
17880 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 336
17879 Development of Performance Measures for the Implementation of Total Quality Management in Indian Industry

Authors: Perminderjit Singh, Sukhvir Singh

Abstract:

Total Quality Management (TQM) refers to management methods used to enhance quality and productivity in business organizations. Total Quality Management (TQM) has become a frequently used term in discussions concerning quality. Total Quality management has brought rise in demands on the organizations policy and the customers have gained more importance in the organizations focus. TQM is considered as an important management tool, which helps the organizations to satisfy their customers. In present research critical success factors includes management commitment, customer satisfaction, continuous improvement, work culture and environment, supplier quality management, training and development, employee satisfaction and product/process design are studied. A questionnaire is developed to implement these critical success factors in implementation of total quality management in Indian industry. Questionnaires filled by consulting different industrial organizations. Data collected from questionnaires is analyzed by descriptive and importance indexes.

Keywords: total quality management, critical success factor, employee satisfaction, supplier quality management, customer focus, quality information, quality measurement

Procedia PDF Downloads 453
17878 Youth and Radicalization: Main Causes Who Lead Young People to Radicalize in a Context with Background of Radicalization

Authors: Zineb Emrane

Abstract:

This abstract addresses the issue of radicalization of young people in a context with background of radicalization, in North of Morocco, 5 terrorist of Madrid's Attacts on 11th March, were coming from this context. It were developed a study pilot that describing young people perception about the main causes that lead and motivate for radicalization. Whenever we talk about this topic, we obtain information from studies and investigations by specialists in field, but we don’t give voice to the protagonists who in many cases are victims, specifically, young people at social risk because of social factors. Extremist radicalization is an expanding phenomenon, that affect young people, in north of Morocco. They live in a context with radical background and at risk of social exclusion, their social, economic and familiar needs make them vulnerable. The extremist groups take advantage of this vulnerability to involve them in a process of radicalization, offering them an alternative environment where they can found all they are looking for. This study pilot approaches the main causes that lead and motivates young people to become radicals, analyzing their context with emphasis on influencing factors, and bearing in mind the analysis of young people about how the radical background affect them and their opinion this phenomenon. The pilot study was carried out through the following actions: - Group dynamics with young people to analyze the process of violent radicalization of young people. -A participatory workshop with members of organizations that work directly with young people at risk of radicalization. -Interviews with institutional managers -Participant observation. The implementation of actions has led to the conclusion that young people define violent radicalization as a sequential process, depending on the stage, it can be deconstructed. Young people recognize that they stop feeling belonging to their family, school and neighborhood when they see behavior contrary to what they consider good and evil. The emotional rupture and the search for references outside their circle, push them to sympathize with groups that have an extremist ideology and that offer them what they need. The radicalization is a process with different stages, the main causes and the factors which lead young people to use extremist violence are related their low level of belonging feeling to their context, and lack of critical thinking about important issues. The young people are in a vulnerable stage, searching their identity, a space in which they can be accepted, and when they don't find it they are easily manipulated and susceptible to being attracted by extremist groups.

Keywords: exclusion, radicalization, vulnerability, youth

Procedia PDF Downloads 137
17877 Comparison between Deterministic and Probabilistic Stability Analysis, Featuring Consequent Risk Assessment

Authors: Isabela Moreira Queiroz

Abstract:

Slope stability analyses are largely carried out by deterministic methods and evaluated through a single security factor. Although it is known that the geotechnical parameters can present great dispersal, such analyses are considered fixed and known. The probabilistic methods, in turn, incorporate the variability of input key parameters (random variables), resulting in a range of values of safety factors, thus enabling the determination of the probability of failure, which is an essential parameter in the calculation of the risk (probability multiplied by the consequence of the event). Among the probabilistic methods, there are three frequently used methods in geotechnical society: FOSM (First-Order, Second-Moment), Rosenblueth (Point Estimates) and Monte Carlo. This paper presents a comparison between the results from deterministic and probabilistic analyses (FOSM method, Monte Carlo and Rosenblueth) applied to a hypothetical slope. The end was held to evaluate the behavior of the slope and consequent risk analysis, which is used to calculate the risk and analyze their mitigation and control solutions. It can be observed that the results obtained by the three probabilistic methods were quite close. It should be noticed that the calculation of the risk makes it possible to list the priority to the implementation of mitigation measures. Therefore, it is recommended to do a good assessment of the geological-geotechnical model incorporating the uncertainty in viability, design, construction, operation and closure by means of risk management. 

Keywords: probabilistic methods, risk assessment, risk management, slope stability

Procedia PDF Downloads 347
17876 Analysis of the Interference from Risk-Determining Factors of Cooperative and Conventional Construction Contracts

Authors: E. Harrer, M. Mauerhofer, T. Werginz

Abstract:

As a result of intensive competition, the building sector is suffering from a high degree of rivalry. Furthermore, there can be observed an unbalanced distribution of project risks. Clients are aimed to shift their own risks into the sphere of the constructors or planners. The consequence of this is that the number of conflicts between the involved parties is inordinately high or even increasing; an alternative approach to counter on that developments are cooperative project forms in the construction sector. This research compares conventional contract models and models with partnering agreements to examine the influence on project risks by an early integration of the involved parties. The goal is to show up deviations in different project stages from the design phase to the project transfer phase. These deviations are evaluated by a survey of experts from the three spheres: clients, contractors and planners. By rating the influence of the participants on specific risk factors it is possible to identify factors which are relevant for a smooth project execution.

Keywords: building projects, contract models, partnering, project risks

Procedia PDF Downloads 247
17875 A Development of a Conceptual Framework for Safety Culture and Safety Risk Assessment: The Case of Chinese International Construction Projects under the “New Belt and Road” Initiative in Africa

Authors: Bouba Oumarou Aboubakar, HongXia Li, Sardar Annes Farooq

Abstract:

The Belt and Road Initiative’s success strongly depends on the safety of all the million workers on construction projects sites. As the new BRI is directed toward Africa and meets a completely different culture from the Chinese project managers, maintaining low risk for workers risks shall be closely related to cultural sharing and mutual understanding. This is why this work introduces a cultural-wise safety management framework for Chinese Construction projects in Africa. The theoretical contribution of this paper is an improved risk assessment framework that integrates language, culture and difficulty of controlling risk factors into one approach. Practically, this study provides not only a useful tool for project safety management practitioners but the full understanding of all risks that may arise in the BRI projects in Africa.

Keywords: cultural-wise, safety culture, risk assessment, Chinese construction, BRI projects, Africa

Procedia PDF Downloads 61
17874 The Role of Cognitive Control and Social Camouflage Associated with Social Anxiety Autism Spectrum Conditions

Authors: Siqing Guan, Fumiyo Oshima, Eiji Shimizu, Nozomi Tomita, Toru Takahashi, Hiroaki Kumano

Abstract:

Risk factors for social anxiety in autism spectrum conditions involve executive attention, emotion regulation, and thought regulation as processes of cognitive dysregulation. Social camouflaging behaviors as strategies used to mask and/or compensate for autism characteristics during social interactions in autism spectrum conditions have also been emphasized. However, the role of cognitive dysregulation and social camouflaging related to social anxiety in autism spectrum conditions has not been clarified. Whether these factors are specific to social anxiety in autism spectrum conditions or common to social anxiety independent of autism spectrum conditions needs to be clarified. Here, we explored risk factors specific to social anxiety in autism spectrum conditions and general risk factors for social anxiety independent of autism spectrum conditions. From the Japanese participants in early adulthood (age=18~39) of the online survey in Japan, those who exceeded the Japanese version Autism-Spectrum Quotient cutoff (33 points or more )were divided into the autism spectrum conditions group (ASC; N=255, mean age=32.08, SD age=5.16)and those who did not exceed the cutoff were divided into the non-autism spectrum conditions group (Non-ASC; N=255, mean age=31.70, SD age=5.09). Using the Japanese versions of the Social Phobia Scale, the Social Interaction Anxiety Scale, and the Short Fear of Negative Evaluation Scale, a composite score for social anxiety was calculated using a method of principal. We also measured emotional control difficulties using the Difficulties in Emotion Regulation Scale, executive attention using the Effortful Control Scale for Adults, rumination using the Rumination-Reflection Questionnaire, and worry using the Penn State Worry Questionnaire. This study was passed through the review of the Ethics Committee. No conflicts of interest. Multiple regression analysis with forced entry method was used to predict social anxiety in the ASC and non-ASC groups separately, based on executive attention, emotion dysregulation, worry, rumination, and social camouflage. In the ASC group, emotion dysregulation (β=.277, p<.001), worry (β=.162, p<.05), assimilation (β=.308, p<.001) and masking (β=.275, p<.001) were significant predictors of social anxiety (F (7,247) = 45.791, p <.001, R2=.565). In the non-ASC groups,emotion dysregulation (β=.171, p<.05), worry (β=.344,p <.001), assimilation (β=.366,p <.001) and executive attention (β=-.132,p <.05) were significant predictors of social anxiety (F (7,207) =47.333, p <.001, R2=.615).The findings suggest that masking was shown to be a risk factor for social anxiety specific to autism spectrum conditions, while emotion dysregulation, worry, and assimilation were shown to be common risk factors for social anxiety, regardless of autism spectrum conditions. In addition, executive attention is a risk factor for social anxiety without autism spectrum conditions.

Keywords: autism spectrum, cognitive control, social anxiety, social camouflaging

Procedia PDF Downloads 184
17873 Combined Analysis of m⁶A and m⁵C Modulators on the Prognosis of Hepatocellular Carcinoma

Authors: Hongmeng Su, Luyu Zhao, Yanyan Qian, Hong Fan

Abstract:

Aim: Hepatocellular carcinoma (HCC) is one of the most common malignant tumors that endanger human health seriously. RNA methylation, especially N6-methyladenosine (m⁶A) and 5-methylcytosine (m⁵C), a crucial epigenetic transcriptional regulatory mechanism, plays an important role in tumorigenesis, progression and prognosis. This research aims to systematically evaluate the prognostic value of m⁶A and m⁵C modulators in HCC patients. Methods: Twenty-four modulators of m⁶A and m⁵C were candidates to analyze their expression level and their contribution to predict the prognosis of HCC. Consensus clustering analysis was applied to classify HCC patients. Cox and LASSO regression were used to construct the risk model. According to the risk score, HCC patients were divided into high-risk and low/medium-risk groups. The clinical pathology factors of HCC patients were analyzed by univariate and multivariate Cox regression analysis. Results: The HCC patients were classified into 2 clusters with significant differences in overall survival and clinical characteristics. Nine-gene risk model was constructed including METTL3, VIRMA, YTHDF1, YTHDF2, NOP2, NSUN4, NSUN5, DNMT3A and ALYREF. It was indicated that the risk score could serve as an independent prognostic factor for patients with HCC. Conclusion: This study constructed a Nine-gene risk model by modulators of m⁶A and m⁵C and investigated its effect on the clinical prognosis of HCC. This model may provide important consideration for the therapeutic strategy and prognosis evaluation analysis of patients with HCC.

Keywords: hepatocellular carcinoma, m⁶A, m⁵C, prognosis, RNA methylation

Procedia PDF Downloads 37
17872 Evaluating Value of Users' Personal Information Based on Cost-Benefit Analysis

Authors: Jae Hyun Park, Sangmi Chai, Minkyun Kim

Abstract:

As users spend more time on the Internet, the probability of their personal information being exposed has been growing. This research has a main purpose of investigating factors and examining relationships when Internet users recognize their value of private information with a perspective of an economic asset. The study is targeted on Internet users, and the value of their private information will be converted into economic figures. Moreover, how economic value changes in relation with individual attributes, dealer’s traits, circumstantial properties will be studied. In this research, the changes in factors on private information value responding to different situations will be analyzed in an economic perspective. Additionally, this study examines the associations between users’ perceived risk and value of their personal information. By using the cost-benefit analysis framework, the hypothesis that the user’s sense in private information value can be influenced by individual attributes and situational properties will be tested. Therefore, this research will attempt to provide answers for three research objectives. First, this research will identify factors that affect value recognition of users’ personal information. Second, it provides evidences that there are differences on information system users’ economic value of information responding to personal, trade opponent, and situational attributes. Third, it investigates the impact of those attributes on individuals’ perceived risk. Based on the assumption that personal, trade opponent and situation attributes make an impact on the users’ value recognition on private information, this research will present the understandings on the different impacts of those attributes in recognizing the value of information with the economic perspective and prove the associative relationships between perceived risk and decision on the value of users’ personal information. In order to validate our research model, this research used the regression methodology. Our research results support that information breach experience and information security systems is associated with users’ perceived risk. Information control and uncertainty are also related to users’ perceived risk. Therefore, users’ perceived risk is considered as a significant factor on evaluating the value of personal information. It can be differentiated by trade opponent and situational attributes. This research presents new perspective on evaluating the value of users’ personal information in the context of perceived risk, personal, trade opponent and situational attributes. It fills the gap in the literature by providing how users’ perceived risk are associated with personal, trade opponent and situation attitudes in conducting business transactions with providing personal information. It adds to previous literature that the relationship exists between perceived risk and the value of users’ private information in the economic perspective. It also provides meaningful insights to the managers that in order to minimize the cost of information breach, managers need to recognize the value of individuals’ personal information and decide the proper amount of investments on protecting users’ online information privacy.

Keywords: private information, value, users, perceived risk, online information privacy, attributes

Procedia PDF Downloads 202