Search results for: cyber ethics
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 882

Search results for: cyber ethics

312 An Introduction to the Current Epistemology of Ethical Philosophy of Islamic Banking

Authors: Mohd Iqbal Malik

Abstract:

Ethical philosophy of Quran pinnacled virtue and economics as the part and parcel of human life. Human beings are to be imagined by the sign of morals. Soul and morality are both among the essences of human personality. Islam lays the foundation of ethics by installation of making a momentous variance between virtue and vice. It suggests for the distribution of wealth in-order to terminate accumulation of economic resources. Quran claims for the ambiguous pavement to attain virtue by saying, ‘Never will you attain the good (reward) until you spend (in the way of Allah) from that which you love. And whatever you spend indeed, Allah knows of it.’ The essence of Quran is to eliminate all the deep-seated approaches through which the wealth of nations is being accumulated within few hands. The paper will study the Quranic Philosophy Of Islamic Economic System. In recent times, to get out of the human resource development mystery of Muslims, Ismail Al-Raji Faruqi led the way in the so-called ‘Islamization’ of knowledge. Rahman and Faruqi formed opposite opinions on this project. Al-Faruqi thought of the Islamization of knowledge in terms of introducing Western learning into received Islamic values and vice versa. This proved to be a mere peripheral treatment of Islamic values in relation to Western knowledge. It is true that out of the programme of Islamization of knowledge arose Islamic universities in many Muslim countries. Yet the academic programmes of these universities were not founded upon a substantive understanding and application of the tawhidi epistemology.

Keywords: ethical philosophy, modern Islamic finance, knowledge of finance, Islamic banking

Procedia PDF Downloads 278
311 Real-Time Hybrid Simulation for a Tuned Liquid Column Damper Implementation

Authors: Carlos Riascos, Peter Thomson

Abstract:

Real-time hybrid simulation (RTHS) is a modern cyber-physical technique used for the experimental evaluation of complex systems, that treats the system components with predictable behavior as a numerical substructure and the components that are difficult to model as an experimental substructure. Therefore it is an attractive method for evaluation of the response of civil structures under earthquake, wind and anthropic loads. Another practical application of RTHS is the evaluation of control systems, as these devices are often nonlinear and their characterization is an important step in the design of controllers with the desired performance. In this paper, the response of three-story shear frame controlled by a tuned liquid column damper (TLCD) and subject to base excitation is considered. Both passive and semi-active control strategies were implemented and are compared. While the passive TLCD achieved a reduction of 50% in the acceleration response of the main structure in comparison with the structure without control, the semi-active TLCD achieved a reduction of 70%, and was robust to variations in the dynamic properties of the main structure. In addition, a RTHS was implemented with the main structure modeled as a linear, time-invariant (LTI) system through a state space representation and the TLCD, with both control strategies, was evaluated on a shake table that reproduced the displacement of the virtual structure. Current assessment measures for RTHS were used to quantify the performance with parameters such as generalized amplitude, equivalent time delay between the target and measured displacement of the shake table, and energy error using the measured force, and prove that the RTHS described in this paper is an accurate method for the experimental evaluation of structural control systems.

Keywords: structural control, hybrid simulation, tuned liquid column damper, semi-active sontrol strategy

Procedia PDF Downloads 274
310 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 511
309 Effect of Information and Communication Technology (ICT) Usage by Cassava Farmers in Otukpo Local Government Area of Benue State, Nigeria

Authors: O. J. Ajayi, J. H. Tsado, F. Olah

Abstract:

The study analyzed the effect of information and communication technology (ICT) usage on cassava farmers in Otukpo local government area of Benue state, Nigeria. Primary data was collected from 120 randomly selected cassava farmers using multi-stage sampling technique. A structured questionnaire and interview schedule was employed to generate data. Data were analyzed using descriptive (frequency, mean and percentage) and inferential statistics (OLS (ordinary least square) and Chi-square). The result revealed that majority (78.3%) were within the age range of 21-50 years implying that the respondents were within the active age for maximum production. 96.8% of the respondents had one form of formal education or the other. The sources of ICT facilities readily available in area were radio(84.2%), television(64.2%) and mobile phone(90.8%) with the latter being the most relied upon for cassava farming. Most of the farmers were aware (98.3%) and had access (95.8%) to these ICT facilities. The dependence on mobile phone and radio were highly relevant in cassava stem selection, land selection, land preparation, cassava planting technique, fertilizer application and pest and disease management. The value of coefficient of determination (R2) indicated an 89.1% variation in the output of cassava farmers explained by the inputs indicated in the regression model implying that, there is a positive and significant relationship between the inputs and output. The results also indicated that labour, fertilizer and farm size were significant at 1% level of probability while ICT use was significant at 10%. Further findings showed that finance (78.3%) was the major constraint associated with ICT use. Recommendations were made on strengthening the use of ICT especially contemporary ones like the computer and internet among farmers for easy information sourcing which can boost agricultural production, improve livelihood and subsequently food security. This may be achieved by providing credit or subsidies and information centres like telecentres and cyber cafes through government assistance or partnership.

Keywords: ICT, cassava farmers, inputs, output

Procedia PDF Downloads 284
308 Sexting Phenomenon in Educational Settings: A Data Mining Approach

Authors: Koutsopoulou Ioanna, Gkintoni Evgenia, Halkiopoulos Constantinos, Antonopoulou Hera

Abstract:

Recent advances in Internet Computer Technology (ICT) and the ever-increasing use of technological equipment amongst adolescents and young adults along with unattended access to the internet and social media and uncontrolled use of smart phones and PCs have caused social problems like sexting to emerge. The main purpose of the present article is first to present an analytic theoretical framework of sexting as a recent social phenomenon based on studies that have been conducted the last decade or so; and second to investigate Greek students’ and also social network users, sexting perceptions and to record how often social media users exchange sexual messages and to retrace demographic variables predictors. Data from 1,000 students were collected and analyzed and all statistical analysis was done by the software package WEKA. The results indicate among others, that the use of data mining methods is an important tool to draw conclusions that could affect decision and policy making especially in the field and related social topics of educational psychology. To sum up, sexting lurks many risks for adolescents and young adults students in Greece and needs to be better addressed in relevance to the stakeholders as well as society in general. Furthermore, policy makers, legislation makers and authorities will have to take action to protect minors. Prevention strategies based on Greek cultural specificities are being proposed. This social problem has raised concerns in recent years and will most likely escalate concerns in global communities in the future.

Keywords: educational ethics, sexting, Greek sexters, sex education, data mining

Procedia PDF Downloads 157
307 Fostering Students' Engagement with Historical Issues Surrounding the Field of Graphic Design

Authors: Sara Corvino

Abstract:

The aim of this study is to explore the potential of inclusive learning and assessment strategies to foster students' engagement with historical debates surrounding the field of graphic design. The goal is to respond to the diversity of L4 Graphic Design students, at Nottingham Trent University, in a way that instead of 'lowering standards' can benefit everyone. This research tests, measures, and evaluates the impact of a specific intervention, an assessment task, to develop students' critical visual analysis skills and stimulate a deeper engagement with the subject matter. Within the action research approach, this work has followed a case study research method to understand students' views and perceptions of a specific project. The primary methods of data collection have been: anonymous electronic questionnaire and a paper-based anonymous critical incident questionnaire. NTU College of Business Law and Social Sciences Research Ethics Committee granted the Ethical approval for this research in November 2019. Other methods used to evaluate the impact of this assessment task have been Evasys's report and students' performance. In line with the constructivist paradigm, this study embraces an interpretative and contextualized analysis of the collected data within the triangulation analytical framework. The evaluation of both qualitative and quantitative data demonstrates that active learning strategies and the disruption of thinking patterns can foster greater students' engagement and can lead to meaningful learning.

Keywords: active learning, assessment for learning, graphic design, higher education, student engagement

Procedia PDF Downloads 151
306 Bereavement Risk Assessment of Family Caregivers of Patients with Cancer: Relationship between Bereavement Risk and Post-Loss Psychological Distress

Authors: Tomohiro Uchida, Noriaki Satake, Toshimichi Nakaho, Akira Inoue, Hidemitsu Saito

Abstract:

In this study, we assessed the bereavement risk of family caregivers of patients with cancer. In the palliative care unit of Tohoku University Hospital, we conducted a family psychoeducation session to support the family caregivers of patients with cancer. A total of 50 participants (8 males and 42 females; mean age = 62.98 years, SD = 11.10) were assessed after the session for bereavement risk using the Japanese version of the Bereavement Risk Assessment Tool (BRAT-J). According to the BRAT-J scores, eight participants were considered to be having no known risk (Level 1), seventeen had minimal risk (Level 2), twenty had a low risk (Level 3), four had a moderate risk (Level 4), and one had a high risk (Level 5). Of these participants, seven participants had completed the follow-up postal survey that assessed their psychological distress (the Kessler Psychological Distress Scale: K6) to compare the bereavement risk. According to the K6 scores, three-fourth of the individuals, who were considered to be at Level 3 on the BRAT-J, scored higher than the cutoff point (>10) for the detection of depressive disorder. On the other hand, one-third of the individuals, who were considered to be at Level 2 on the BRAT-J, scored higher than the cutoff point. Therefore, it appears that the BRAT-J can predict the likelihood of difficulties or complications in bereaved family caregivers. This research was approved by the Ethics Committee of Tohoku University Graduate School of Medicine and Tohoku University Hospital.

Keywords: palliative care, family caregivers, bereavement risk, BRAT, post-loss psychological distress

Procedia PDF Downloads 430
305 The Role of Androgens in Prediction of Success in Smoking Cessation in Women

Authors: Michaela Dušková, Kateřina Šimůnková, Martin Hill, Hana Hruškovičová, Hana Pospíšilová, Eva Králíková, Luboslav Stárka

Abstract:

Smoking represents the most widespread substance dependence in the world. Several studies show the nicotine's ability to alter women hormonal homeostasis. Women smokers have higher testosterone and lower estradiol levels throughout life compared to non-smoker women. We monitored the effect of smoking discontinuation on steroid spectrum with 40 premenopausal and 60 postmenopausal women smokers. These women had been examined before they discontinued smoking and also after 6, 12, 24, and 48 weeks of abstinence. At each examination, blood was collected to determine steroid spectrum (measured by GC-MS), LH, FSH, and SHBG (measured by IRMA). Repeated measures ANOVA model was used for evaluation of the data. The study has been approved by the local Ethics Committee. Given the small number of premenopausal women who endured not to smoke, only the first 6 week period data could be analyzed. A slight increase in androgens after the smoking discontinuation occurred. In postmenopausal women, an increase in testosterone, dihydrotestosterone, dehydroepiandrosterone, and other androgens occurred, too. Nicotine replacement therapy, weight changes, and age does not play any role in the androgen level increase. The higher androgens levels correlated with failure in smoking cessation. Women smokers have higher androgen levels, which might play a role in smoking dependence development. Women successful in smoking cessation, compared to the non-successful ones, have lower androgen levels initially and also after smoking discontinuation. The question is what androgen levels women have before they start smoking.

Keywords: addiction, smoking, cessation, androgens

Procedia PDF Downloads 355
304 Biomphalaria alexandrina Snail as a Bio-Indicator of Pollution With Manganese Metal and Its Effect on Physiological, Immunological, Histopathological Parameters and Larvicidal Potencies

Authors: Amina M. Ibrahim, Ahmed A. Abdel-Haleem, Rania G. Taha

Abstract:

Metal pollution results in many dangerous consequences to the environment and human health due to the bioaccumulation in their tissues. The present study aims to measure the bioaccumulation factor of the Manganese (Mn) heavy metal in Biomphlaria alexandrina snails' tissues and water samples. The present results showed the concentration of Mn heavy metal in water (87.5 mg/l) and its bioaccumulation factor in Helisoma duryi tissue was higher than that in tissues of Physa acuta and B. alexandrina snails. Results showed that 87.5 mg/l Mn concentration had miracidial and cercaricidal activities. Also, this concentration decreased the mean total number of the hemocytes after exposure for 24h or 48h, while increased both the mean mortality and phagocytic indices of the hemocytes of exposed snails. It caused alterations in the cytomorphology of the hemocytes of exposed snails after 24 or 48h, where, the granulocytes had irregular cell membrane, and forming pseudopodia. Besides, both levels of Testosterone (T) and Estradiol (E) were increased after exposure to 87.5mg/l Mn metal compared to the control group. Also, it increased MDA (Malonaldehyde) and TAC (Total antioxidant capacity) contents, while, decreased SOD (superoxide dismutase). Besides, it caused great histopathological damages in both hermaphrodite and digestive glands, represented in the degeneration of the gonadal, digestive, secretory cells and the connective tissues. Therefore, B. alexandrina might be used as sensitive bio-indicator of pollution with Mn heavy metal to avoid ethics rules; beside they are easily available and large in number.

Keywords: manganese metal, B. alexandrina, hormonal alterations, histopathology

Procedia PDF Downloads 27
303 Smokeless Tobacco Oral Manifestation and Inflammatory Biomarkers in Saliva

Authors: Sintija Miļuna, Ričards Melderis, Loreta Briuka, Dagnija Rostoka, Ingus Skadiņš, Juta Kroiča

Abstract:

Objectives Smokeless tobacco products in Latvia become more available and favorable to young adults, especially students and athletes like hockey and floorball players. The aim of the research was to detect visual mucosal changes in the oral cavity in smokeless tobacco users and to evaluate pro - inflammatory and anti - inflammatory cytokine (IL-6, IL-1, IL-8, TNF Alpha) levels in saliva from smokeless tobacco users. Methods A smokeless tobacco group (n=10) and a control group (non-tobacco users) (n=10) were intraorally examined for oral lesions and 5 ml of saliva were collected. Saliva was analysed for Il-6, IL-1, Il-8, TNF Alpha using ELISA Sigma-Aldrich. For statistical analysis IBM Statistics 27 was used (Mann - Whitney U test, Spearman’s Rank Correlation coefficient). This research was approved by the Ethics Committee of Rīga Stradiņš University No.22/28.01.2016. This research has been developed with financing from the European Social Fund and Latvian state budget within the project no. 8.2.2.0/20/I/004 “Support for involving doctoral students in scientific research and studies” at Rīga Stradiņš University. Results IL-1, IL-6, IL-8, TNF Alpha levels were higher in the smokeless tobacco group (IL-1 83.34 pg/ml vs. 74.26 pg/ml; IL-6 195.10 pg/ml vs. 6.16 pg/ml; IL-8 736.34 pg/ml vs. 285.26 pg/ml; TNF Alpha 489.27 pg/ml vs. 200.9 pg/ml), but statistically there is no difference between control group and smokeless tobacco group (IL1 p=0.190, IL6 p=0.052, IL8 p=0.165, TNF alpha p=0.089). There was statistical correlation between IL1 and IL6 (p=0.023), IL6 and TNF alpha (p=0.028), IL8 and IL6 (p=0.005). Conclusions White localized lesions were detected in places where smokeless tobacco users placed sachets. There is a statistical correlation between IL6 and IL1 levels, IL6 and TNF alpha levels, IL8 and IL6 levels in saliva. There are no differences in the inflammatory cytokine levels between control group and smokeless tobacco group.

Keywords: smokeless tobacco, Snus, inflammatory biomarkers, oral lesions, oral pathology

Procedia PDF Downloads 110
302 The Relationship between Job Stress and Handover Effectiveness of Nurses

Authors: Rujnan Tuna, Ayse Cil Akinci

Abstract:

Work life takes up an important place in human life, and an employed person faces many stimuli from internal and external environments and is affected by them in a positive or negative way. Also, the handover process, which is the process of sharing information about the patient with other health professionals, is an important criterion to maintain patient care and enhance the quality of care provided. Handover is a key component for sustaining daily basic clinical practices and is also essential to maintain the safe patient care. This investigation followed a descriptive and correlation design in order to establish job stress and the handover efficiency of nurses and the relationship in between. The study was conducted with 192 nurses working in a public hospital in Istanbul between January and March 2017. Descriptive information form, Job Stressors Scale, and Handover Evaluation Scale were used to collect the data of the study. The data were analyzed by using IBM SPSS Statistics 22.0 statistical software. Approvals from participants, managers of institution, and ethics committee were taken for the study. As a result of the research, it was found that job stress was above the median value, and the highest score in the ‘work role conflict’ subdimension. Also, it was found that the effectiveness of the nurses' handover effectiviness was above the median value and the highest score in the ‘quality of information’ subdimension. In the study, there was a negatively weak correlation between ‘work role overload’ subdimension of Job Stressors Scale and ‘interaction and support’ subdimension of Handover Evaluation Scale. There is a need for further study in order to maintain patient safety.

Keywords: handover, job stress, nurse, patient

Procedia PDF Downloads 134
301 Critical Pedagogy and Ecoliteracy in the Teaching of Foreign Languages

Authors: Anita De Melo

Abstract:

Today we live in a crucial time of ecological crisis, of environmental catastrophes worldwide, and this scenario is, arrogantly, overlooked by powerful economic forces and their politics. Thus, a critical pedagogy that leads to action and that fosters ecoliteracy, environment education, is now inevitable, and it must become an integral part of the school curriculum across the disciplines, including the social sciences and the humanities. One of the most important contemporary and emerging movement of today is ecopedagogy, a movement that blends theory and ethics towards a curriculum that focus on an environmental education that will promote ecological justice, respect, and care by educating students to become planetary citizens. This paper aims, first, to emphasize the need for discussions and investigations regarding ecoliteracy within our field of teaching foreign languages, which will consider, among others, the of role language in stimulating sustainability, and the role of second language proficiency in fostering positive transnational dialogues conducive to fighting our current planetary crisis. Second, this paper suggests and discusses some critical ecopedagogical practices -- in the form of project-based learning, service-learning and environmental-oriented study abroad programs – apropos to ecoliteracy. These interdisciplinary projects can and should bring students in contact with communities speaking the target language, and such encounter would facilitate cultural exchanges and promote positive language proficiency whilst it would also give students the opportunity to work with finding ideas/projects to fight our current ecological catastrophe.

Keywords: critical pedagogy, ecoliteracy, ecopedagogy, planetary crisis

Procedia PDF Downloads 224
300 Moral Identity and Moral Attentiveness as Predictors of Ethical Leadership in Financial Sector

Authors: Pilar Gamarra Gamarra, Michele Girotto

Abstract:

In the expanding field of leaders’ ethical behavior research, little attention has been paid to the association between finance leaders’ ethical traits (beyond personality) and ethical leadership, and more importantly, how these ethical characteristics can be predictors of ethical behavior at the leadership level in the financial sector. In this study, we tested a theoretical model based on uponsocial cognitive theory (Bandura, 1986) and the cognitive-developmental model (Piaget, 1932) to examine leaders’ moral identity and moral attentiveness as antecedents of ethical leadership. After the 2008 economic crisis, the marketplace has awakened to the potential dangers of unethical behavior. The unethical behavior of the leaders of the financial sector was identified as guilty of this economic catastrophe. For that reason, it seems increasingly prudent for organizations to have leaders who are cognitively inclined toward ethical behavior. This evidence suggests that moral attentiveness and moral identity is perhaps one way of identifying those kinds of leaders. For leaders who are morally attentive and have a high moral identity, themes of ethics interventions are consistent with their way of seeing the word. As a result, these leaders could become critical components of change in organizations and could provide the energy and skills necessary for these efforts to be successful. Ethical behavior of leader from the financial sector and marketing sectors must be joined to manage the change. In this study, a leader’s moral identity, leader’s moral attentiveness, and self-importance of Ethical Leadership are measured for financial and marketing leaders to be compared to determine the relationship between the three variables in each sector. Other conclusion related to gender, educational level or generation are obtained.

Keywords: ethical leadership, moral identity, moral attentiveness, financial leaders, marketing leaders, ethical behavior

Procedia PDF Downloads 146
299 Effects of the Supplementary for Understanding and Preventing Plagiarism on EFL Students’ Writing

Authors: Surichai Butcha, Dararat Khampusaen

Abstract:

As the Internet is recognized as a high potential and powerful educational tool to access sources of knowledge, plagiarism is an increasing unethical issue found in students’ writing. This paper is deriving from the 1st phase of an on-going study investigating the effects of the supplementary on citing sources on undergraduate students’ writing. The 40 participants were divided into 1 experimental group and 1 control group. Both groups were administered with a questionnaire on knowledge and an interview on attitude related to using sources in writing. Only the experimental group undertook the 4 lessons focusing on using outside sources and citing the original work (quoting, synthesizing, summarizing and paraphrasing) were delivered to them via e-learning tools throughout a semester. Participants were required to produce 4 writing tasks after each lesson. The results were concerned with types and factors on using outside sources in writing of Thai undergraduate EFL students from the survey. The interview results supported and clarified the survey result. In addition, the writing rubrics confirmed the types of plagiarism frequently occurred in students’ writing. The results revealed the types and factors on plagiarism including their perceptions on using the outside sources in their writing from the interview. The discussion shed the lights on cultural dimensions of plagiarism in student writing, roles of teachers, library, and university policy on the rate of plagiarism. Also, the findings promoted the awareness on ethics in writing and prevented the rate of potential unintentional plagiarism. Additionally, the results of this phase of study could lead to the appropriate contents to be considered for inclusion in the supplementary on using sources for writing for future research.

Keywords: citing source, EFL writing, e-learning, Internet, plagiarism

Procedia PDF Downloads 124
298 Update on Genetic Diversity for Lamotrigine Induced Stevens-Johnson Syndrome and Toxic Epidermal Necrolysis

Authors: Natida Thongsima, Patompong Satapornpong

Abstract:

Introduction: Lamotrigine is widely used in the treatment of epilepsy and bipolar disorder. However, lamotrigine leads to adverse drug reactions (ADRs) consist of severe cutaneous adverse reactions (SCARs) include Stevens–Johnson syndrome (SJS), toxic epidermal necrolysis (TEN) and drug rash with eosinophilia and systemic symptoms (DRESS). Moreover, lamotrigine-induced SCARs are usually manifested between 2 and 8 weeks after treatment initiation. According to a previous study, the association between HLA-B*15:02 and lamotrigine-induced cutaneous adverse drug reactions in the Thai population (odds ratio 4.89; 95% CI 1.28–18.66; p-value = 0.014) was found. Therefore, the distribution of pharmacogenetics markers a major role in predicting the culprit drugs for SCARs in many populations. Objective: In this study, we want to investigate the prevalence of HLA-B allele, which correlates with lamotrigine-induced SCARs in the healthy Thai population. Materials and Methods: We enrolled 350 healthy Thai individuals and were approved by the ethics committee of Rangsit University. HLA-B alleles were genotyped by the Lifecodes HLA SSO typing kits (Immucor, West Avenue, Stamford, USA). Results: The results presented HLA-B allele frequency in healthy Thai population were 14.71% (HLA-B*46:01), 8.57% (HLA-B*15:02), 6.71% (HLA-B*40:01), 5.86% (HLA-B*13:01), 5.71% (HLA-B*58:01), 5.14% (HLA-B*38:02), 4.86% (HLA-B*18:01), 4.86% (HLA-B*51:01), 3.86% (HLA-B*44:03) and 2.71% (HLA-B*07:05). Especially, HLA-B*15:02 allele was the high frequency in the Thais (8.57%), Han Chinese (7.30%), Vietnamese (13.50%), Malaysian (6.06%) and Indonesian (11.60%). Nevertheless, this allele was much lower in other populations, namely, Africans, Caucasians, and Japanese. Conclusions: Although the sample size of the healthy Thai population in this research was limited, there were found the frequency of the HLA-B*15:02 allele could predispose them toward to lamotrigine-induced SCARs in Thailand.

Keywords: lamotrigine, cutaneous adverse drug reactions, HLA-B, Thai population

Procedia PDF Downloads 165
297 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 45
296 Human Factors Interventions for Risk and Reliability Management of Defence Systems

Authors: Chitra Rajagopal, Indra Deo Kumar, Ila Chauhan, Ruchi Joshi, Binoy Bhargavan

Abstract:

Reliability and safety are essential for the success of mission-critical and safety-critical defense systems. Humans are part of the entire life cycle of defense systems development and deployment. The majority of industrial accidents or disasters are attributed to human errors. Therefore, considerations of human performance and human reliability are critical in all complex systems, including defense systems. Defense systems are operating from the ground, naval and aerial platforms in diverse conditions impose unique physical and psychological challenges to the human operators. Some of the safety and mission-critical defense systems with human-machine interactions are fighter planes, submarines, warships, combat vehicles, aerial and naval platforms based missiles, etc. Human roles and responsibilities are also going through a transition due to the infusion of artificial intelligence and cyber technologies. Human operators, not accustomed to such challenges, are more likely to commit errors, which may lead to accidents or loss events. In such a scenario, it is imperative to understand the human factors in defense systems for better systems performance, safety, and cost-effectiveness. A case study using Task Analysis (TA) based methodology for assessment and reduction of human errors in the Air and Missile Defense System in the context of emerging technologies were presented. Action-oriented task analysis techniques such as Hierarchical Task Analysis (HTA) and Operator Action Event Tree (OAET) along with Critical Action and Decision Event Tree (CADET) for cognitive task analysis was used. Human factors assessment based on the task analysis helps in realizing safe and reliable defense systems. These techniques helped in the identification of human errors during different phases of Air and Missile Defence operations, leading to meet the requirement of a safe, reliable and cost-effective mission.

Keywords: defence systems, reliability, risk, safety

Procedia PDF Downloads 107
295 Feature Engineering Based Detection of Buffer Overflow Vulnerability in Source Code Using Deep Neural Networks

Authors: Mst Shapna Akter, Hossain Shahriar

Abstract:

One of the most important challenges in the field of software code audit is the presence of vulnerabilities in software source code. Every year, more and more software flaws are found, either internally in proprietary code or revealed publicly. These flaws are highly likely exploited and lead to system compromise, data leakage, or denial of service. C and C++ open-source code are now available in order to create a largescale, machine-learning system for function-level vulnerability identification. We assembled a sizable dataset of millions of opensource functions that point to potential exploits. We developed an efficient and scalable vulnerability detection method based on deep neural network models that learn features extracted from the source codes. The source code is first converted into a minimal intermediate representation to remove the pointless components and shorten the dependency. Moreover, we keep the semantic and syntactic information using state-of-the-art word embedding algorithms such as glove and fastText. The embedded vectors are subsequently fed into deep learning networks such as LSTM, BilSTM, LSTM-Autoencoder, word2vec, BERT, and GPT-2 to classify the possible vulnerabilities. Furthermore, we proposed a neural network model which can overcome issues associated with traditional neural networks. Evaluation metrics such as f1 score, precision, recall, accuracy, and total execution time have been used to measure the performance. We made a comparative analysis between results derived from features containing a minimal text representation and semantic and syntactic information. We found that all of the deep learning models provide comparatively higher accuracy when we use semantic and syntactic information as the features but require higher execution time as the word embedding the algorithm puts on a bit of complexity to the overall system.

Keywords: cyber security, vulnerability detection, neural networks, feature extraction

Procedia PDF Downloads 45
294 The Factors Affecting on Promoting Productivity from Nurses' View

Authors: Mahnaz Sanjari, Sedigheh Salemi, Mohammad Mirzabeigi

Abstract:

Nowadays, the world is facing a crisis of workforce and one of the most striking examples is the shortage of nurses. Nursing workforce productivity is related by various factors such as absenteeism, professional effectiveness and quality care. This cross-sectional study was conducted in 700 nurses who work in government hospitals from 35 hospitals of 9 provinces in Iran. The study was approved by the Nursing Council and was carried out with the authorization of the Research Ethics Committee. The questionnaire included 33 questions and 4 sub categories such as human resource, education and management. The reliability was evaluated by Cronbach's alpha (α=0/85). Statistical analyzes were performed, using SPSS version 16. The result showed that nurses emphasized on "respect to nurse-to-bed ratio" and less importance item was "using less experienced nurse". In addition, another important factor in clinical productivity is "Proper physical structure and amenities","good communication with colleagues" and "having good facilities". Also, "human resources at all levels of standard", "promoting on merit" and "well defined relationship in health system" are another important factors in productivity from nurse` view. The main managerial factor is "justice between employees" and the main educational component of productivity is “updating nursing knowledge”. The results show that more than half of the participants emphasized on the management and educational factors. Productivity as one of the main part of the health care quality leads to appropriate use of human and organizational resources, reduce cost services, and organizational development.

Keywords: productivity, nursing services, workforce, cost services

Procedia PDF Downloads 322
293 Local Cultural Beliefs and Practices of the Indiginous Communities Related to Wildlife in the Buffer Zone of Chitwan National Park

Authors: Neeta Pokharel

Abstract:

Cultural beliefs and practices have been shaping indigenous community’s resource use and attitude toward the conservation of natural flora and fauna around them. Understanding these cultural dimensions is vital for identifying effective strategies that align with conservation efforts. This study focused on investigating the wildlife-related cultural beliefs and practices of two indigenous communities: Bote and Musahars. The study applied ethnographic methods that included Key-informant interviews, Focal Group discussion, and Household survey methods. Out of 100 respondents, 51% were male and 49% female. A significant portion (65%) of the respondents confirmed animal worship, with a majority worshipping tigers (81.5%), rhinos (73.8%), crocodiles (66%), and dolphins (40%). Additionally, 16.9% disclosed worshipping Elephants, while 10 % affirmed animal worship without specifying the particular animals. Ritualistic practices often involve the sacrifice of pigs, goats, hens, and pigeons. Their cultural ethics place a significant emphasis on biodiversity conservation, as the result shows 41 % refraining from causing harm to wild animals and 9% doing so for ethical considerations, respectively. Moreover, the majority of the respondents believe that cultural practices could enhance conservation efforts. However, the encroachment of modernization and religious conversion within the community poses a tangible risk of cultural degradation, highlighting the urgent need to preserve the cultural practices. Integrating such indigenous practices into the National Biodiversity Strategy and conservation policies can ensure sustainable conservation of endangered animals with appropriate cultural safeguards.

Keywords: tribal communities, societal belief, wild fauna, “barana”, safeguarding

Procedia PDF Downloads 46
292 Estimation of Effective Radiation Dose Following Computed Tomography Urography at Aminu Kano Teaching Hospital, Kano Nigeria

Authors: Idris Garba, Aisha Rabiu Abdullahi, Mansur Yahuza, Akintade Dare

Abstract:

Background: CT urography (CTU) is efficient radiological examination for the evaluation of the urinary system disorders. However, patients are exposed to a significant radiation dose which is in a way associated with increased cancer risks. Objectives: To determine Computed Tomography Dose Index following CTU, and to evaluate organs equivalent doses. Materials and Methods: A prospective cohort study was carried at a tertiary institution located in Kano northwestern. Ethical clearance was sought and obtained from the research ethics board of the institution. Demographic, scan parameters and CT radiation dose data were obtained from patients that had CTU procedure. Effective dose, organ equivalent doses, and cancer risks were estimated using SPSS statistical software version 16 and CT dose calculator software. Result: A total of 56 patients were included in the study, consisting of 29 males and 27 females. The common indication for CTU examination was found to be renal cyst seen commonly among young adults (15-44yrs). CT radiation dose values in DLP, CTDI and effective dose for CTU were 2320 mGy cm, CTDIw 9.67 mGy and 35.04 mSv respectively. The probability of cancer risks was estimated to be 600 per a million CTU examinations. Conclusion: In this study, the radiation dose for CTU is considered significantly high, with increase in cancer risks probability. Wide radiation dose variations between patient doses suggest that optimization is not fulfilled yet. Patient radiation dose estimate should be taken into consideration when imaging protocols are established for CT urography.

Keywords: CT urography, cancer risks, effective dose, radiation exposure

Procedia PDF Downloads 304
291 The Experiences of Claiming Welfare Benefits for People with Disabilities in the UK

Authors: Jennifer McNeill

Abstract:

Over the years UK Governments have extended the use of welfare conditionality to more marginalised groups. Whereas in the past, disabled people’s rights to unconditional welfare were defended, significant numbers of disabled people have in recent years been re-classified as ‘fit for work’ as a result of this policy shift towards increased conditionality targeting more welfare service user groups. This paper discusses findings from a five-year project exploring the ethics and efficacy of welfare conditionality. Drawing on repeat interviews over three years with 58 disabled welfare service users across England and Scotland, the paper explores the experience of, and impact of conditionality upon, disabled participants. In particular, participants described the process of claiming disability-related benefits as stigmatising, with some describing the medical assessments as demeaning, traumatic and even painful. The medical assessments are conducted by private contractors and participants felt they were treated unfairly, under suspicion and under surveillance. This finding is important in line with a recent UN report concerned with the practice of such assessments. The findings reveal that notions of ‘deservedness’ are embedded in this system as disabled recipients argue for their entitlement to welfare claims relative to what are deemed to be less deserving groups of benefit claimants. This indicates an increasing competition ethic within different sections of the most marginalised social groups that facilitate further forms of social fragmentation, particularly in relation to opposition to benefit cuts and other changes requiring concerted and organised forms of resistance. The impact of media and political scapegoating of the most marginal has generated divisions within even those who position themselves as legitimate recipients.

Keywords: disability, medical assessments, stigma, welfare conditionality

Procedia PDF Downloads 164
290 Surveillance of Hepatitis C Virus Genotype Circulating in North India

Authors: Shantanu Prakash, Suruchi Shukla, Amita Jain

Abstract:

Introduction: The hepatitis C virus (HCV) is a major public health problem and a leading cause of chronic liver disease. Injection drug use and individuals receiving blood and blood products are the primary modes of HCV transmission. Our study aims to establish the prevalent genotypes/ subtypes of HCV circulating in Uttar Pradesh, North India, as reported from a tertiary care hospital. Methods: It is a retrospective observational analysis of consecutive 404 HCV RNA positive cases referred to our hospital during September 2014 to April 2017. The study was approved by an institutional ethics committee. Written informed consent was taken from each participant. Clinical and demographic details of these patients were recorded using predesigned questionnaires. All the laboratory testing was carried on stored serum sample of enrolled cases. Genotyping of all 404 strains was done by Sanger’s sequencing of the core region. The phylogenetic analysis of 179 HCV strains with high -quality sequencing data was performed. Results: The distribution of prevalent genotypes/ subtypes as noted in the present study was; Genotype (GT)1a [n-101(25%)], GT1b [n-12(2.9%)], GT1c [1(0.25%)], GT3a [275(68.07%)], GT3b [9(2.2%)], GT3g [2(0.49%)], GT3i [3(0.74%)], and GT4a [1(0.24%)]. HCV genotypes GT2, GT5 and GT6 were not detected from our region. Sequence analysis showed high genotypic variability in HCV GT3. Phylogenetic analysis showed that HCV GT3 and GT1 circulating in our region were related to Indian strains reported earlier. Conclusions: HCV genotypes 3a and 1a are commonest circulating genotypes in Uttar Pradesh (UP), India.

Keywords: Hepatitis C virus, genetic variation, bioinformatics, genotype, HCV

Procedia PDF Downloads 128
289 The Importance of Erythrocyte Parameters in Obese Children

Authors: Orkide Donma, M. Metin Donma, Burcin Nalbantoglu, Birol Topcu, Feti Tulubas, Murat Aydin, Tuba Gokkus, Ahmet Gurel

Abstract:

Increasing prevalence of childhood obesity has increased the interest in early and late indicators of gaining weight. Cell blood counts may be indicators of proinflammatory states. The aim was to evaluate associations of hematological parameters, including Hematocrit (HTC), hemoglobin, blood cell counts, and their indices with the degree of obesity in pediatric population. A total of 249; -139 morbidly obese (MO), 82 healthy Normal Weight (NW) and 28 Overweight (OW) children were included into the scope of the study. WHO BMI-for age percentiles were used to form age- and sex-matched groups. Informed consent forms and the Ethics Committee approval were obtained. Anthropometric measurements were performed. Hematological parameters were determined. Statistical analyses were performed using SPSS. The degree for statistical significance was p≤0.05. Significant differences (p=0.000) between waist-to-hip ratios and head-to-neck ratios (hnrs) of MO and NW children were detected. A significant difference between hnrs of OW and MO children (p=0.000) was observed. Red cell Distribution Width (RDW) was higher in OW children than NW group (p=0.030). Such finding couldn’t be detected between MO and NW groups. Increased RDW was prominent in OW children. The decrease in Mean Corpuscular Hemoglobin Concentration (MCHC) values in MO children was sharper than the values in OW children (p=0.006 vs p=0.042) compared to those in NW group. Statistically higher HTC levels were observed between MO-NW (p=0.014), but none between OW-NW. Though the cause-effect relationship between obesity and erythrocyte indices still needs further investigation, alterations in RDW, HTC, MCHC during obesity may be of significance in the early life.

Keywords: anthropometry, children, erythrocytes, obesity

Procedia PDF Downloads 326
288 Kinetic Analysis for Assessing Gait Disorders in Muscular Dystrophy Disease

Authors: Mehdi Razeghi

Abstract:

Background: The purpose of this case series was to quantify gait to study muscular dystrophy disease. In this research, the quantitative differences between normal and waddling gaits were assessed by force plate analysis. Methods: Nineteen myopathy patients and twenty normal subjects serving as the control group participated in this research. In this study, quantitative analyses of gait have been used to investigate the differences between the mobility of normal subjects and myopathy patients. This study was carried out at the Iranian Muscular Dystrophy Association in Boali Hospital, Tehran, Iran, from October 2015 to July 2020. Patient data were collected from Iranian Muscular Dystrophy Association members. individuals signed an informed consent form approved by the ethics committee of the Azad University. All of the gait tests were performed using a Kistler force platform. Participants walked at a self-selected speed, barefoot, independently, and without assistive devices. Results: Our findings indicate that there were no significant differences between the patients and the control group in the anterior-posterior components of the ground reaction forces; however, there were considerable differences in the force components between the groups in the medial-lateral and vertical directions of the ground reaction force. In addition, there were significant differences in the time parameters between the groups in the vertical and medial-lateral directions.

Keywords: biomechanics, force plate analysis, gait disorder, ground reaction force, kinetic analysis, myopathy disease, rehabilitation engineering

Procedia PDF Downloads 46
287 Structure of the Working Time of Nurses in Emergency Departments in Polish Hospitals

Authors: Jadwiga Klukow, Anna Ksykiewicz-Dorota

Abstract:

An analysis of the distribution of nurses’ working time constitutes vital information for the management in planning employment. The objective of the study was to analyze the distribution of nurses’ working time in an emergency department. The study was conducted in an emergency department of a teaching hospital in Lublin, in Southeast Poland. The catalogue of activities performed by nurses was compiled by means of continuous observation. Identified activities were classified into four groups: Direct care, indirect care, coordination of work in the department and personal activities. Distribution of nurses’ working time was determined by work sampling observation (Tippett) at random intervals. The research project was approved by the Research Ethics Committee by the Medical University of Lublin (Protocol 0254/113/2010). On average, nurses spent 31% of their working time on direct care, 47% on indirect care, 12% on coordinating work in the department and 10% on personal activities. The most frequently performed direct care tasks were diagnostic activities – 29.23% and treatment-related activities – 27.69%. The study has provided information on the complexity of performed activities and utilization of nurses’ working time. Enhancing the effectiveness of nursing actions requires working out a strategy for improved management of the time nurses spent at work. Increasing the involvement of auxiliary staff and optimizing communication processes within the team may lead to reduction of the time devoted to indirect care for the benefit of direct care.

Keywords: emergency nurses, nursing care, workload, work sampling

Procedia PDF Downloads 302
286 Urban Transport Demand Management Multi-Criteria Decision Using AHP and SERVQUAL Models: Case Study of Nigerian Cities

Authors: Suleiman Hassan Otuoze, Dexter Vernon Lloyd Hunt, Ian Jefferson

Abstract:

Urbanization has continued to widen the gap between demand and resources available to provide resilient and sustainable transport services in many fast-growing developing countries' cities. Transport demand management is a decision-based optimization concept for both benchmarking and ensuring efficient use of transport resources. This study assesses the service quality of infrastructure and mobility services in the Nigerian cities of Kano and Lagos through five dimensions of quality (i.e., Tangibility, Reliability, Responsibility, Safety Assurance and Empathy). The methodology adopts a hybrid AHP-SERVQUAL model applied on questionnaire surveys to gauge the quality of satisfaction and the views of experts in the field. The AHP results prioritize tangibility, which defines the state of transportation infrastructure and services in terms of satisfaction qualities and intervention decision weights in the two cities. The results recorded ‘unsatisfactory’ indices of quality of performance and satisfaction rating values of 48% and 49% for Kano and Lagos, respectively. The satisfaction indices are identified as indicators of low performances of transportation demand management (TDM) measures and the necessity to re-order priorities and take proactive steps towards infrastructure. The findings pilot a framework for comparative assessment of recognizable standards in transport services, best ethics of management and a necessity of quality infrastructure to guarantee both resilient and sustainable urban mobility.

Keywords: transportation demand management, multi-criteria decision support, transport infrastructure, service quality, sustainable transport

Procedia PDF Downloads 195
285 Human Quality Treatment and Organizational Growth: The Principle of Respect at Nestle Nigeria

Authors: Rose Ogbechie, Nicholas Anakwue

Abstract:

In recent times, research has centered, in the area of Business Ethics, on the issue of human quality treatment (HQT), regarding the way people are dealt with, in organizations, taking into cognizance, respect for the dignity of the human person, as well as, the rights and responsibilities of the corporate individual. As such, the principle of respect is an essential ethical principle that should govern professional relationships in the workplace. There is a prevailing myth in the Nigerian business space, that to drive business success, business leadership must coerce and drive people, oftentimes, beyond comfort to meet work expectations. This has, most times, necessitated abuses and insults on subordinates in the workplace, and instituted a rigid hierarchy of management in business relationships. Nestlé Nigeria, one of the largest foods and beverage companies in Africa, provides a contrast to this myth in their success heuristic. Over the years in Nigeria, the company has registered significant successes in the Nigerian Fast-Moving Consumer Goods (FMCG) Market, with stellar performances year-on-year, and a high-penetration rate of its products in the Nigerian consumer space. At the heart of the FMCG giant’s success and culture is the principle of respect—respect for stakeholders, respect for all peoples, respect for cultures, respect for the environment. Utilizing qualitative research methods, through interviews and focus group discussions with Nestlé’s stakeholders, this paper explores the ethical principle of respect, and how, through it, human quality treatment influences positively organizational growth.

Keywords: human quality treatment, respect, Nestlé Nigeria, FMCG, organizational growth

Procedia PDF Downloads 87
284 E-Government Development in Nigeria, 'Bank Verification No': An Anti-Corruption Tool

Authors: Ernest C. Nwadinobi, Amanda Peart, Carl Adams

Abstract:

The leading countries like the USA, UK and some of the European countries have moved their focus away from just developing the e-government platform towards just the electronic services which aim at providing access to information to its citizens or customers, but they have gone to make significant backroom changes that can accommodate this electronic service being provided to its customers or citizens. E-government has moved from just providing electronic information to citizens and customers alike to serving their needs. In developing countries like Nigeria, the enablement of e-government is being used as an anti-corruption tool. The introduction of the Bank verification number (BVN) scheme by the Central Bank of Nigeria, has helped the government in not just saving money but also protecting customer’s transaction and enhancing confidence in the banking sector. This has helped curtail the high rate of cyber and financial crime that has been part of the system. The use of BVN as an anti-corruption tool in Nigeria came at a time there was need for openness, accountability, and discipline, after years of robbing the treasury and recklessness in handling finances. As there has not been a defined method for measuring the strength or success of e-government development, in this case BVN, in Nigeria, progress will remain at the same level. The implementation strategy of the BVN in Nigeria has mostly been a quick fix, quick win solution. In fact, there is little or no indication to show evidence of a framework for e-government. Like other leading countries, there is the need for proper implementation of strategy and framework especially towards a customer orientated process, which will accommodate every administrative body of the government institution including private business rather than focusing on a non-flexible organisational structure. The development of e-government must have a strategy and framework for it to work, and this strategy must enclose every public administration and will not be limited to any individual bodies or organization. A defined framework or monitoring method must be put in place to help evaluate and benchmark government development in e-government. This framework must follow the same concept or principles. In censorious analyses of the existing methods, this paper will denote areas that must be included in the existing approach to be able to channel e-government development towards its defined strategic objectives.

Keywords: Bank Verification No (BVN), quick-fix, anti-corruption, quick-win

Procedia PDF Downloads 137
283 The Effect of General Data Protection Regulation on South Asian Data Protection Laws

Authors: Sumedha Ganjoo, Santosh Goswami

Abstract:

The rising reliance on technology places national security at the forefront of 21st-century issues. It complicates the efforts of emerging and developed countries to combat cyber threats and increases the inherent risk factors connected with technology. The inability to preserve data securely might have devastating repercussions on a massive scale. Consequently, it is vital to establish national, regional, and global data protection rules and regulations that penalise individuals who participate in immoral technology usage and exploit the inherent vulnerabilities of technology. This study paper seeks to analyse GDPR-inspired Bills in the South Asian Region and determine their suitability for the development of a worldwide data protection framework, considering that Asian countries are much more diversified than European ones. In light of this context, the objectives of this paper are to identify GDPR-inspired Bills in the South Asian Region, identify their similarities and differences, as well as the obstacles to developing a regional-level data protection mechanism, thereby satisfying the need to develop a global-level mechanism. Due to the qualitative character of this study, the researcher did a comprehensive literature review of prior research papers, journal articles, survey reports, and government publications on the aforementioned topics. Taking into consideration the survey results, the researcher conducted a critical analysis of the significant parameters highlighted in the literature study. Many nations in the South Asian area are in the process of revising their present data protection measures in accordance with GDPR, according to the primary results of this study. Consideration is given to the data protection laws of Thailand, Malaysia, China, and Japan. Significant parallels and differences in comparison to GDPR have been discussed in detail. The conclusion of the research analyses the development of various data protection legislation regimes in South Asia.

Keywords: data privacy, GDPR, Asia, data protection laws

Procedia PDF Downloads 53