Search results for: cyber hygiene
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 567

Search results for: cyber hygiene

507 Knowledge, Attitudes and Practices of Menstrual Hygiene of Adolescent Girls Aged 12 to 19 Years Old at Lake Tanganyika Lycee

Authors: Yvette Nsabimana, Nadine Misago, Minani Methode

Abstract:

Context: the issue of menstrual hygiene is an entry point for demonstrating the gender-specific nature of the needs of women and adolescent girls. Women and girls around the world face many challenges in managing their periods. They may be deprived of certain basic human rights, including those relating to education, work and health. This work describes the Knowledge, Attitudes and Practices of menstrual hygiene among adolescent girls from 12 to 19 years of Lake Tanganyika Secondary School. Method: This is a descriptive cross-sectional study among 384 adolescent girls from Lake Tanganyika secondary school over a period of 2 weeks from September 13 to September 27 and with a purely general objective of describing the Knowledge, Attitudes and Practices of menstrual hygiene in secondary schools. The study was conducted using a non-probability method and the sampling technique was for convenience. The data collection technique used was the survey by questionnaire and the exploitation of the documentary. The data collection tool used was the questionnaire. Microsoft Word 2013, Microsoft Excel 2.13 and EPI INFO7 software were used for this purpose. Results: We noticed that 55.47% of the participants knew that menstruation is a physiological process; 57.55% of the teenage girls surveyed get their information about menstrual hygiene from their mothers; 75.72% use sanitary napkins and 24.02% use fabrics as protective material; 35.16% of respondents have already lacked sanitary napkins since their menarche; 37.29% are absent from classes due to lack of sanitary napkins; 23.82% use soap and other products to wash.

Keywords: knowledge, attitudes, practices, menstrual hygiene

Procedia PDF Downloads 45
506 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 101
505 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 402
504 The Effect of Progressive Muscle Relaxation and Sleep Hygiene Education to Change Sleep Quality Index Scores of Patient with Breast Cancer

Authors: Ika Wulansari, Yati Afiyanti, Indang Trihandini

Abstract:

Sleeping disorder experienced by patients with breast cancer can affect the physical, mental, health, and well-being. This study examines the effect of progressive muscle relaxation training and sleep hygiene education to change sleep quality scores of the patient with breast cancer. The study design using quasi-experiment with pre-post test within the control group, involving 62 breast cancer patients using consecutive sampling method in Jakarta. Statistical test results with independent t-test showed a significant difference in score of sleep quality between in intervention group and the control group (6,66±3,815; 9,30±3,334, p-value = 0,005). Progressive muscle relaxation exercise and sleep hygiene education proven to be affective to change the patients sleeping quality, so that it can be an alternative therapeutic option to overcome sleeping disorders.

Keywords: sleeping disorders, breast cancer, progressive muscle relaxation, sleep hygiene education

Procedia PDF Downloads 290
503 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance

Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle

Abstract:

Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.

Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model

Procedia PDF Downloads 77
502 Assessing the Effectiveness of Machine Learning Algorithms for Cyber Threat Intelligence Discovery from the Darknet

Authors: Azene Zenebe

Abstract:

Deep learning is a subset of machine learning which incorporates techniques for the construction of artificial neural networks and found to be useful for modeling complex problems with large dataset. Deep learning requires a very high power computational and longer time for training. By aggregating computing power, high performance computer (HPC) has emerged as an approach to resolving advanced problems and performing data-driven research activities. Cyber threat intelligence (CIT) is actionable information or insight an organization or individual uses to understand the threats that have, will, or are currently targeting the organization. Results of review of literature will be presented along with results of experimental study that compares the performance of tree-based and function-base machine learning including deep learning algorithms using secondary dataset collected from darknet.

Keywords: deep-learning, cyber security, cyber threat modeling, tree-based machine learning, function-based machine learning, data science

Procedia PDF Downloads 121
501 Challenges in Anti-Counterfeiting of Cyber-Physical Systems

Authors: Daniel Kliewe, Arno Kühn, Roman Dumitrescu, Jürgen Gausemeier

Abstract:

This paper examines the system protection for cyber-physical systems (CPS). CPS are particularly characterized by their networking system components. This means they are able to adapt to the needs of their users and its environment. With this ability, CPS have new, specific requirements on the protection against anti-counterfeiting, know-how loss and manipulation. They increase the requirements on system protection because piracy attacks can be more diverse, for example because of an increasing number of interfaces or through the networking abilities. The new requirements were identified and in a next step matched with existing protective measures. Due to the found gap the development of new protection measures has to be forced to close this gap. Moreover a comparison of the effectiveness between selected measures was realized and the first results are presented in the paper.

Keywords: anti-counterfeiting, cyber physical systems, intellectual property (IP), knowledge management, system protection

Procedia PDF Downloads 462
500 Artificial Intelligence in Penetration Testing of a Connected and Autonomous Vehicle Network

Authors: Phillip Garrad, Saritha Unnikrishnan

Abstract:

The recent popularity of connected and autonomous vehicles (CAV) corresponds with an increase in the risk of cyber-attacks. These cyber-attacks have been instigated by both researchers or white-coat hackers and cyber-criminals. As Connected Vehicles move towards full autonomy, the impact of these cyber-attacks also grows. The current research details challenges faced in cybersecurity testing of CAV, including access and cost of the representative test setup. Other challenges faced are lack of experts in the field. Possible solutions to how these challenges can be overcome are reviewed and discussed. From these findings, a software simulated CAV network is established as a cost-effective representative testbed. Penetration tests are then performed on this simulation, demonstrating a cyber-attack in CAV. Studies have shown Artificial Intelligence (AI) to improve runtime, increase efficiency and comprehensively cover all the typical test aspects in penetration testing in other industries. There is an attempt to introduce similar AI models to the software simulation. The expectation from this implementation is to see similar improvements in runtime and efficiency for the CAV model. If proven to be an effective means of penetration test for CAV, this methodology may be used on a full CAV test network.

Keywords: cybersecurity, connected vehicles, software simulation, artificial intelligence, penetration testing

Procedia PDF Downloads 81
499 Oral Hygiene Behaviors among Pregnant Women with Diabetes Who Attend Primary Health Care Centers at Baghdad City

Authors: Zena F. Mushtaq, Iqbal M. Abbas

Abstract:

Background: Diabetes mellitus during pregnancy is one of the major medical and social problems with increasing prevalence in last decades and may lead to more vulnerable to dental problems and increased risk for periodontal diseases. Objectives: To assess oral hygiene behaviors among pregnant women with diabetes who attended primary health care centers and find out the relationship between oral hygiene behaviors and studied variables. Methodology: A cross sectional design was conducted from 7 July to 30 September 2014 on non probability (convenient sample) of 150 pregnant women with diabetes was selected from twelve Primary Health Care Centers at Baghdad city. Questionnaire format is tool for data collection which had designed and consisted of three main parts including: socio demographic, reproductive characteristics and items of oral hygiene behaviors among pregnant women with diabetes. Reliability of the questionnaire was determined through internal consistency of correlation coefficient (R= 0.940) and validity of content was determined through reviewing it by (12) experts in different specialties and was determined through pilot study. Descriptive and inferential statistics were used to analyze collected data. Result: Result of study revealed that (35.3%) of study sample was (35-39) years old with mean and SD is (X & SD = 33.57 ± 5.54) years, and (34.7%) of the study sample was graduated from primary school and less, half of the study sample was government employment and self employed, (42.7%) of the study sample had moderate socioeconomic status, the highest percentage (70.0%) of the study sample was nonsmokers, The result indicates that oral hygiene behaviors have moderate mean score in all items. There are no statistical significant association between oral hygiene domain and studied variables. Conclusions: All items related to health behavior concerning oral hygiene is in moderate mean of score, which may expose pregnant women with diabetes to high risk of periodontal diseases. Recommendations: Dental care provider should perform a dental examination at least every three months for each pregnant woman with diabetes, explanation of the effect of DM on periodontal health, oral hygiene instruction, oral prophylaxis, professional cleaning and treatment of periodontal diseases(scaling and root planing) when needed.

Keywords: diabetes, health behavior, pregnant women, oral hygiene

Procedia PDF Downloads 261
498 Effect of Climate Change and Water Sources: Sustainability of Rural Water Sanitation and Hygiene of Tanahun District

Authors: Bharat Sapkota

Abstract:

Nepal is the one of the victim country of climate change. Decreasing snow line, sometimes higher and sometime non-rain fall are common phenomena in hill area. Natural flood disaster and drought is also common every year in certain place of the country. So this paper analyze the effect of climate and natural water sources for sustainability of water sanitation and hygiene of Tanahun district. It is one of the Rural Water Supply and Sanitation Project Western Nepal Phase-II (RWSSP-WN Phase-II) project district out of 14 project districts of western and mid-western Nepal. RWSSP-WN II is a bilateral development cooperation of governments of Nepal and Finland. Big investment is still going on in water sanitation and hygiene sector but sustainability is still a challenge throughout the country. So RWSSP-WN has started the strengthen of the capacity of local Governments to deliver services in water supply, sanitation and hygiene and its sustainability through the implementation of cross cutting approach of climate change and disaster risk reduction. The study shows that the average yield in 685 natural point sources were around 0.045 l/s in 2014 but it was twice as high in 2004 i.e. 0.09 l/s. The maximum measured yield in 2014 was 1.87 l/s, whereas, the maximum yield was 3 l/s in 2004. Likewise, spring source mean and maximum yield measured in 2014 were 0.16 l/s and 3.33 l/s respectively, whereas, mean and maximum yields in 2004 were 0.204 l/s and 3 l/s respectively. Small streams average yield measured in 2014 was 0.32 l/s with the maximum of around 4.99 l/s. In 2004, mean and maximum yields of streams were 0.485 l/s and 5 l/s respectively. The overall climate between years 2002 to 2013 and measured yield data between 2004 and 2014 shows climate as one of the causes of water source decline. The temperature is rising with pace of 0.041°C per year and rainfall is decreased by 16.8 mm/year. The Khosla’s empirical formula shows decrease of 1.7 cm/year in runoff. At present sustainability of water, sanitation and hygiene is more challenge due to sources decreasing in the district. Sanitation and hygiene total behavior change and watershed conservation as well as design and implementation of recharge pound construction are the way forward of sustainability of water, sanitation and hygiene.

Keywords: water sanitation, hygiene, sustainability, climate change

Procedia PDF Downloads 305
497 Technical and Legal Definitions in Cyber Terrorism

Authors: Pardis Moslemzadeh Tehrani, Nazura Abdul Manap, Hamed Ladoni Damghani, Rohimi Bin Shapiee

Abstract:

In recent years the speed of new technology has brought forth so many new issues. Cyberspace is among the new technologies that need novel ways to address the various issues that have arisen. While cyberspace is a technical notion that defies a single definition, this new technology requires the adoption and application of new laws. In order to manage issues arising from the existence of cyberspace, proper policies and definitions must be formulated which satisfy both technical and legal aspects. One difficulty in this regard is due to the unique features of cyberspace architecture. This article proposes to define cyberspace and cyber terrorism. This will allow for a more effective and comprehensive addressing of legal issues as they can then be handled better by introducing a new factor to the otherwise ordinary analysis in whichever field is implicated such as the nature and place of use.

Keywords: cyberspace, cyber terrorism, technical definition, legal definition

Procedia PDF Downloads 555
496 Knowledge, Attitude and Practice on Swimming Pool Hygiene and Assessment of Microbial Contamination in Educational Institution in Selangor

Authors: Zarini Ismail, Mas Ayu Arina Mohd Anuwar, Ling Chai Ying, Tengku Zetty Maztura Tengku Jamaluddin, Nurul Azmawati Mohamed, Nadeeya Ayn Umaisara Mohamad Nor

Abstract:

The transmission of infectious diseases can occur anywhere, including in the swimming pools. A large number of swimmers turnover and poor hygienic behaviours will increase the occurrence of direct and indirect water contamination. A wide variety of infections such as the gastrointestinal illnesses, skin rash, eye infections, ear infections and respiratory illnesses had been reported following the exposure to the contaminated water. Understanding the importance of pool hygiene with a healthy practice will reduce the risk of infection. The aims of the study are to investigate the knowledge, attitude and practices on pool hygiene among swimming pool users and to determine the microbial contaminants in swimming pools. A cross-sectional study was conducted using self-administered questionnaires to 600 swimming pool users from four swimming pools belong to the three educational institutions in Selangor. Data was analyzed using SPSS Statistics version 22.0 for Windows. The knowledge, attitude and practice of the study participants were analyzed using the sum score based on Bloom’s cut-off point (80%). Having a score above the cut-off point was classified as having high levels of knowledge, positive attitude and good practice. The association between socio-demographic characteristics, knowledge and attitude with practice on pool hygiene was determined by Chi-Square test. The physicochemical parameters and the microbial contamination were determined using a standard method for examination of waste and wastewater. Of the 600 respondents, 465 (77.5%) were females with the mean age of 21 years old. Most of the respondents are the students (98.8%) which belong to the three educational institutions in Selangor. Overall, the majority of the respondents (89.2%) had low knowledge on pool hygiene, but had positive attitudes (91.3%). Whereas only half of the respondents (50%) practice good hygiene while using the swimming pools. There was a significant association between practice level on pool hygiene with knowledge (p < 0.001) and also the attitude (p < 0.001). The measurements of the physicochemical parameters showed that all 4 swimming pools had low levels of pH and two had low levels of free chlorine. However, all the water samples tested were negative for Escherichia coli. The findings of this study suggested that high knowledge and positive attitude towards pool hygiene ensure a good practice among swimming pool users. Thus, it is recommended that educational interventions should be given to the swimming pool users to increase their knowledge regarding the pool hygiene and this will prevent the unnecessary outbreak of infectious diseases related to swimming pool.

Keywords: attitude, knowledge, pool hygiene, practice

Procedia PDF Downloads 268
495 Cyber-Victimization among Higher Education Students as Related to Academic and Personal Factors

Authors: T. Heiman, D. Olenik-Shemesh

Abstract:

Over the past decade, with the rapid growth of electronic communication, the internet and, in particular, social networking has become an inseparable part of people's daily lives. Along with its benefits, a new type of online aggression has emerged, defined as cyber bullying, a form of interpersonal aggressive behavior that takes place through electronic means. Cyber-bullying is characterized by repetitive behavior over time of maladaptive authority and power usage using computers and cell phones via sending insulting messages and hurtful pictures. Preliminary findings suggest that the prevalence of involvement in cyber-bullying among higher education students varies between 10 and 35%. As to date, universities are facing an uphill effort in trying to restrain online misbehavior. As no studies examined the relationships between cyber-bullying involvement with personal aspects, and its impacts on academic achievement and work functioning, this present study examined the nature of cyber-bullying involvement among 1,052 undergraduate students (mean age = 27.25, S.D = 4.81; 66.2% female), coping with, as well as the effects of social support, perceived self-efficacy, well-being, and body-perception, in relation to cyber-victimization. We assume that students in higher education are a vulnerable population and at high risk of being cyber-victims. We hypothesize that social support might serve as a protective factor and will moderate the relationships between the socio-emotional variables and the occurrence of cyber- victimization. The findings of this study will present the relationships between cyber-victimization and the social-emotional aspects, which constitute risk and protective factors. After receiving approval from the Ethics Committee of the University, a Google Drive questionnaire was sent to a random sample of students, studying in the various University study centers. Students' participation was voluntary, and they completed the five questionnaires anonymously: Cyber-bullying, perceived self-efficacy, subjective well-being, social support and body perception. Results revealed that 11.6% of the students reported being cyber-victims during last year. Examining the emotional and behavioral reactions to cyber-victimization revealed that female emotional and behavioral reactions were significantly greater than the male reactions (p < .001). Moreover, females reported on a significant higher social support compared to men; male reported significantly on a lower social capability than female; and men's body perception was significantly more positive than women's scores. No gender differences were observed for subjective well-being scale. Significant positive correlations were found between cyber-victimization and fewer friends, lower grades, and work ineffectiveness (r = 0.37- .40, p < 0 .001). The results of the Hierarchical regression indicated significantly that cyber-victimization can be predicted by lower social support, lower body perception, and gender (female), that explained 5.6% of the variance (R2 = 0.056, F(5,1047) = 12.47, p < 0.001). The findings deepen our understanding of the students' involvement in cyber-bullying, and present the relationships of the social-emotional and academic aspects on cyber-victim students. In view of our findings, higher education policy could help facilitate coping with cyber-bullying incidents, and student support units could develop intervention programs aimed at reducing cyber-bullying and its impacts.

Keywords: academic and personal factors, cyber-victimization, social support, higher education

Procedia PDF Downloads 264
494 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies

Authors: Lindelwa Mngomezulu, Tonderai Muchenje

Abstract:

Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.

Keywords: e-mail security, cyber-attacks, data integrity, authentication

Procedia PDF Downloads 106
493 The Need for a Tool to Support Users of E-Science Infrastructures in a Virtual Laboratory Environment

Authors: Hashim Chunpir

Abstract:

Support processes play an important role to facilitate researchers (users) to accomplish their research activities with the help of cyber-infrastructure(s). However, the current user-support process in cyber-infrastructure needs a feasible tool to support users. This tool must enable the users of a cyber-infrastructure to communicate efficiently with the staffs of a cyber-infrastructure in order to get technical and scientific assistance, whilst saving resources at the same time. This research paper narrates the real story of employing various forms of tools to support the user and staff communication. In addition, this paper projects the lessons learned from an exploration of the help-desk tools in the current state of user support process in Earth System Grid Federation (ESGF) from support staffs’ perspective. ESGF is a climate cyber-infrastructure that facilitates Earth System Modeling (ESM) and is taken as a case study in this paper. Finally, this study proposes a need for a tool, a framework or a platform that not only improves the user support process to address support servicing needs of end-users of e-Science infrastructures but also eases the life of staffs in providing assistance to the users. With the help of such a tool; the collaboration between users and the staffs of cyber-infrastructures is made easier. Consequently, the research activities of the users of e-Science infrastructure will thrive as the scientific and technical support will be available to users. Finally, this results into painless and productive e-Research.

Keywords: e-Science User Services, e-Research in Earth Sciences, Information Technology Services Management (ITSM), user support process, service desk, management of support activities, help desk tools, application of social media

Procedia PDF Downloads 449
492 Engaging Women Entrepreneurs in School Adolescent Health Program to Ensure Menstrual Hygiene Management in Rural Bangladesh

Authors: Toslim Uddin Khan, Jesmin Akter, Mohiuddin Ahmed

Abstract:

Menstrual hygiene management (MHM) and personal health-care practice is a critical issue to prevent morbidity and other reproductive health complications among adolescent girls in Bangladesh. Inadequate access to water, sanitation and hygiene (WASH) facilities lead to unhealthy MHM practices that resulted in poor reproductive health outcomes. It is evident from different studies that superstitions and misconception are more common in rural communities that limit young girls’ access to and understanding of the menstrual hygiene and self care practices. The state-of-the-art approach of Social Marketing Company (SMC) is proved to be instrumental in delivering reinforcing health messages, making public health and hygiene products available at the door steps of the community through community mobilization programs in rural Bangladesh. School health program is one of the flagship interventions of SMC to equip adolescent girls and boys with correct knowledge of health and hygiene practices among themselves, their families and peers. In Bangladeshi culture, adolescent girls often feel shy to ask fathers or male family members about buying sanitary napkin from local pharmacy and they seem to be reluctant to seek help regarding their menstrual problems. A recent study reveals that 48% adolescent girls are using sanitary napkins while majority of them are unaware of menstrual hygiene practices in Bangladesh. Under school adolescent program, SMC organizes health education sessions for adolescent girls from grade seven to ten using enter-educate approach with special focus on sexual and reproductive health and menstrual hygiene issues including delaying marriage and first pregnancy. In addition, 2500 rural women entrepreneurs branded as community sales agents are also involved in disseminating health messages and selling priority health products including sanitary napkin at the household level. These women entrepreneurs are serving as a source of sustainable supply of the sanitary napkins for the rural adolescent girls and thereby they are earning profit margins on the sales they make. A recent study on the impact of adolescent program activities reveals that majority (71%) of the school adolescent girls are currently using sanitary napkins. Health education equips and empowers adolescent girls with accurate knowledge about menstrual hygiene practices and self-care as well. Therefore, engagement of female entrepreneurs in school adolescent health program at the community level is one of the promising ways to improve menstrual hygiene practices leading to increased use of sanitary napkin in rural and semi-rural communities in Bangladesh.

Keywords: school adolescent program, social marketing, women entrepreneurs, menstrual hygiene management

Procedia PDF Downloads 161
491 Cyber Violence Behaviors Among Social Media Users in Ghana: An Application of Self-Control Theory and Social Learning Theory

Authors: Aisha Iddrisu

Abstract:

The proliferation of cyberviolence in the wave of increased social media consumption calls for immediate attention both at the local and global levels. With over 4.70 billion social media users worldwide and 8.8 social media users in Ghana, various forms of violence have become the order of the day in most countries and communities. Cyber violence is defined as producing, retrieving, and sharing of hurtful or dangerous online content to cause emotional, psychological, or physical harm. The urgency and severity of cyber violence have led to the enactment of laws in various countries though lots still need to be done, especially in Ghana. In Ghana, studies on cyber violence have not been extensively dealt with. Existing studies concentrate only on one form or the other form of cyber violence, thus cybercrime and cyber bullying. Also, most studies in Africa have not explored cyber violence forms using empirical theories and the few that existed were qualitatively researched, whereas others examine the effect of cyber violence rather than examining why those who involve in it behave the way they behave. It is against this backdrop that this study aims to examine various cyber violence behaviour among social media users in Ghana by applying the theory of Self-control and Social control theory. This study is important for the following reasons. The outcome of this research will help at both national and international level of policymaking by adding to the knowledge of understanding cyberviolence and why people engage in various forms of cyberviolence. It will also help expose other ways by which such behaviours are enforced thereby serving as a guide in the enactment of the rightful rules and laws to curb such behaviours. It will add to literature on consequences of new media. This study seeks to confirm or reject to the following research hypotheses. H1 Social media usage has direct significant effect of cyberviolence behaviours. H2 Ineffective parental management has direct significant positive relation to Low self-control. H3 Low self-control has direct significant positive effect on cyber violence behaviours among social, H4 Differential association has significant positive effect on cyberviolence behaviour among social media users in Ghana. H5 Definitions have a significant positive effect on cyberviolence behaviour among social media users in Ghana. H6 Imitation has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H7 Differential reinforcement has a significant positive effect on cyberviolence behaviour among social media users in Ghana. H8 Differential association has a significant positive effect on definitions. H9 Differential association has a significant positive effect on imitation. H10 Differential association has a significant positive effect on differential reinforcement. H11 Differential association has significant indirect positive effects on cyberviolence through the learning process.

Keywords: cyberviolence, social media users, self-control theory, social learning theory

Procedia PDF Downloads 48
490 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 358
489 Supervised Learning for Cyber Threat Intelligence

Authors: Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk

Abstract:

The major aim of cyber threat intelligence (CTI) is to provide sophisticated knowledge about cybersecurity threats to ensure internal and external safeguards against modern cyberattacks. Inaccurate, incomplete, outdated, and invaluable threat intelligence is the main problem. Therefore, data analysis based on AI algorithms is one of the emergent solutions to overcome the threat of information-sharing issues. In this paper, we propose a supervised machine learning-based algorithm to improve threat information sharing by providing a sophisticated classification of cyber threats and data. Extensive simulations investigate the accuracy, precision, recall, f1-score, and support overall to validate the designed algorithm and to compare it with several supervised machine learning algorithms.

Keywords: threat information sharing, supervised learning, data classification, performance evaluation

Procedia PDF Downloads 116
488 Experiences and Challenges of Menstruation Among Rural Schoolgirls in Ghana: A Case of Nadowli-Kaleo District in the Upper West Region of Ghana

Authors: Rosemond Mbii

Abstract:

Menstruation is a critical topic. However normal menstruation is, it has become a determinant in the education of young women today. The research focuses on Breaking the silence and accessing menstrual hygiene management's challenges and experiences among rural schoolgirls in Ghana. The study's goal was to examine the menstrual hygiene practices of female students. Participants described their menstrual hygiene practices, their problems, and how they coped with their menstrual symptoms. The research used a qualitative technique through group interviews, personal interviews, and open-ended questionnaires since it is easier to understand a phenomenon from the subject's viewpoint. Sen's capacities approach and Feminist Political Ecology (FPE) were used to analyze the data. Menstruation was known to girls even before their menarche. A mother or grandmother, friends, and teachers were the primary sources of menstrual knowledge. The study also found that most girls use sanitary products made of fabrics, pads, and cotton during menstruation. Among the difficulties the girls faced, the study found were emotional upset, physical discomfort (cramps in the stomach, fatigue), embarrassment, and inadequate sanitation hygiene facilities. The girls wore many garments to avoid leaks; checked their skirts continuously, went to the bathroom with their friends to act as spics while they changed; sat differently on the chairs, and took medicine to reduce period discomfort. Introduction of a health care teacher who supplies sanitary products and medications to girls during school time. Euphemisms as a form of communication amongst girls were all coping mechanisms girls and the school developed. Another finding was that some girls continued to go to school even while having their periods, while others did not. Discomfort and menstruation cramps hampered class participation. In addition, the study revealed insufficient sanitation and hygiene for females to change sanitary products in private and manage menstrual hygiene comfortably.

Keywords: MHM (menstrual hygiene management), rural area, sanitation, menstruation, water, schoolgirl, rural area, sanitation, menstruation, water

Procedia PDF Downloads 85
487 The Legal Position of Criminal Prevention in the Metaverse World

Authors: Andi Intan Purnamasari, Supriyadi, Sulbadana, Aminuddin Kasim

Abstract:

Law functions as social control. Providing arrangements not only for legal certainty, but also in the scope of justice and expediency. The three values ​​achieved by law essentially function to bring comfort to each individual in carrying out daily activities. However, it is undeniable that global conditions have changed the orientation of people's lifestyles. Some people want to ensure their existence in the digital world which is popularly known as the metaverse. Some countries even project their city to be a metaverse city. The order of life is no longer limited to the real space, but also to the cyber world. Not infrequently, legal events that occur in the cyber world also force the law to position its position and even prevent crime in cyberspace. Through this research, conceptually it provides a view of the legal position in crime prevention in the Metaverse world. when the law acts to regulate the situation in the virtual world, of course some people will feel disturbed, this is due to the thought that the virtual world is a world in which an avatar can do things that cannot be done in the real world, or can be called a world without boundaries. Therefore, when the law is present to provide boundaries, of course the concept of the virtual world itself becomes no longer a cyber world that is not limited by space and time, it becomes a new order of life. approach, approach, approach, approach, and approach will certainly be the method used in this research.

Keywords: crime, cyber, metaverse, law

Procedia PDF Downloads 120
486 Cybersecurity Awareness through Laboratories and Cyber Competitions in the Education System: Practices to Promote Student Success

Authors: Haydar Teymourlouei

Abstract:

Cybersecurity is one of the greatest challenges society faces in an age revolving around technological development. With cyber-attacks on the continuous rise, the nation needs to understand and learn ways that can prevent such attacks. A major contribution that can change the education system is to implement laboratories and competitions into academia. This method can improve and educate students with more hands-on exercises in a highly motivating setting. Considering the fact that students are the next generation of the nation’s workforce, it is important for students to understand concepts not only through books, but also through actual hands-on experiences in order for them to be prepared for the workforce. An effective cybersecurity education system is critical for creating a strong cyber secure workforce today and for the future. This paper emphasizes the need for awareness and the need for competitions and cybersecurity laboratories to be implemented into the education system.

Keywords: awareness, competition, cybersecurity, laboratories, workforce

Procedia PDF Downloads 308
485 Food Safety Management in Riyadh’s Ministry of Health Hospitals

Authors: A. Alrasheed, I. Connerton

Abstract:

Providing patients with safe meals on a daily basis is one of the challenges in the healthcare sector. In Saudi Arabia matters related to food safety and hygiene have been the heart of the Ministry of Health (MOH) and Saudi Food and Drugs Authority (SFDA). The aim of this study is to examine the causes of inadequate implementation of food safety management systems such as HACCP in Riyadh’s MOH hospitals. By the law, food safety must be managed using a documented, HACCP based approach, and food handlers must be appropriately trained in food safety. Food handlers in Saudi Arabia are not required to provide a certificate or attend a food handling training course even in healthcare sectors. Since food safety and hygiene issues are of increasing importance for Saudi Arabian health decision makers, the SFDA has been established to apply food hygiene requirements in all food operations. It should be pointed out that the implications of food outbreaks on the whole society may potentially go beyond individual health impacts but also impact on the Nation’s health and bring about economic repercussions.

Keywords: food safety, patient, hospital, HACCP

Procedia PDF Downloads 844
484 A Collaborative Learning Model in Engineering Science Based on a Cyber-Physical Production Line

Authors: Yosr Ghozzi

Abstract:

The Cyber-Physical Systems terminology has been well received by the industrial community and specifically appropriated in educational settings. Indeed, our latest educational activities are based on the development of experimental platforms on an industrial scale. In fact, we built a collaborative learning model because of an international market study that led us to place ourselves at the heart of this technology. To align with these findings, a competency-based approach study was conducted, and program content was revised by reflecting the projectbased approach. Thus, this article deals with the development of educational devices according to a generated curriculum and specific educational activities while respecting the repository of skills adopted from what constitutes the educational cyber-physical production systems and the laboratories that are compliant and adapted to them. The implementation of these platforms was systematically carried out in the school's workshops spaces. The objective has been twofold, both research and teaching for the students in mechatronics and logistics of the electromechanical department. We act as trainers and industrial experts to involve students in the implementation of possible extension systems around multidisciplinary projects and reconnect with industrial projects for better professional integration.

Keywords: education 4.0, competency-based learning, teaching factory, project-based learning, cyber-physical systems, industry 4.0

Procedia PDF Downloads 70
483 A Framework for Protecting Teenagers from Cyber Crimes and Cyberbullying

Authors: Sultan Alanazi, Adwan Alanazi

Abstract:

Social applications consist of powerful tools that allow people to connect and interact with each other. However, its negative use cannot be ignored. Cyberbullying is a new and serious Internet problem. Cyberbullying is one of the most common risks for teenagers to go online. More than half of young people report that they do not tell their parents when this will occur, which can have significant physiological consequences. Cyberbullying involves the deliberate use of digital media on the Internet to convey false or embarrassing information about others. Therefore, this article provides a way to detect cyber-bullying in social media applications for parents. The purpose of our work is to develop an architectural model for identifying and measuring the state of Cyberbullying faced by children on social media applications. For parents, this will be a good tool for monitoring their children without invading their privacy. Finally, some interesting open-ended questions were raised, suggesting promising ideas for starting new research in this new field.

Keywords: cyberbullying, cyber bullying, internet crimes, social media security, E-crimes

Procedia PDF Downloads 115
482 Criminal Laws Associated with Cyber-Medicine and Telemedicine in Current Law Systems in the World

Authors: Shahryar Eslamitabar

Abstract:

Currently, the internet plays an important role in the various scientific, commercial and service practices. Thanks to information and communication technology, the healthcare industry via the internet, generally known as cyber-medicine, can offer professional medical service in a wider geographical area. Having some appealing benefits such as convenience in offering healthcare services, improved accessibility to the services, enhanced information exchange, cost-effectiveness, time-saving, etc. Tele-health has increasingly developed innovative models of healthcare delivery. However, it presents many potential hazards to cyber-patients, inherent in the use of the system. First, there are legal issues associated with the communication and transfer of information on the internet. These include licensure, malpractice, liabilities and jurisdictions as well as privacy, confidentiality and security of personal data as the most important challenge brought about by this system. Additional items of concern are technological and ethical. Although, there are some rules to deal with pitfalls associated with cyber-medicine practices in the USA and some European countries, yet for all developments, it is being practiced in a legal vacuum in many countries. In addition to the domestic legislations to deal with potential problems arisen from the system, it is also imperative that some international or regional agreement should be developed to achieve the harmonization of laws among countries and states. This article discusses some implications posed by the practice of cyber-medicine in the healthcare system according to the experience of some developed countries using a comparative study of laws. It will also review the status of tele-health laws in Iran. Finally, it is intended to pave the way to outline a plan for countries like Iran, with newly-established judicial system for health laws, to develop appropriate regulations through providing some recommendations.

Keywords: tele-health, cyber-medicine, telemedicine, criminal laws, legislations, time-saving

Procedia PDF Downloads 633
481 Measuring Hazard Analysis and Critical Control Points Implementation in Riyadh Hospitals

Authors: A. Alrasheed, I. Connerton

Abstract:

Daily provision of high quality food and hygiene to patients is a challenging goal of the healthcare. In Saudi Arabia, matters related to food safety and hygiene are regulated by the Ministry of Health (MOH) and the Saudi Food and Drugs Authority (SFDA). The purpose of this research is to discuss the food safety management inconsistencies and flaws, in particular the ones related to Hazard Analysis and Critical Control Points (HACCP) in Riyadh’s MOH hospitals. As required by law, written HACCP regulations must be implemented, and food handlers need to receive the training accordingly. However, in Saudi hospitals, this is not a requirement, and the food handlers do not need to hold training certificates in food safety or HACCP. Nowadays, the matter of food safety and hygiene have become increasingly important since the decision makers want to align these regulations with the majority of the world and to implement HACCP fully and for this purpose, the SFDA was established. 

Keywords: food safety, patients, hospitals, HACCP, Saudi Arabia

Procedia PDF Downloads 244
480 Adolescent Sleep Hygiene Scale and Adolescent Sleep Wake Scale: Factorial Analysis and Validation for Indian Population

Authors: Sataroopa Mishra, Mona Basker, Sneha Varkki, Ram Kumar Pandian, Grace Rebekah

Abstract:

Background: Sleep deprivation is a matter of public health importance among adolescents. We used adolescent sleep wake scale and adolescent sleep hygiene scale to determine the sleep quality and sleep hygiene respectively of school going adolescents in Vellore city of India. The objective of the study was to do factorial analysis of the scales and validate it for use in local population. Methods: Observational questionnaire based cross sectional study. Setting: Community based school survey in a semi-urban setting in three schools in Vellore city. Data collection: Non probability sample was collected form students studying in standard 9 and 11. Students filled Adolescent Sleep Wake scale (ASWS) and Adolescent Sleep Hygiene Scale (ASHS) translated into vernacular language. Data Analysis: Exploratory Factorial Analysis was used to see the factor loading of various components of the two scales. Confirmatory factorial analysis is subsequently planned for assessing the internal validity of the scales.Results: 557 adolescents were included in the study of 12 – 17 years old. Exploratory factorial analysis of adolescent sleep hygiene scale indicated significant factor loading for 18 items from 28 items originally devised by the authors and has been reconstructed to four domains instead of 9 domains in the original scale namely sleep stability, cognitive – emotional, Physiological - bed time routine - behavioural arousal factor (activites before bedtime and during bed time), Sleep environment (lighting and bed sharing). Factorial analysis of Adolescent sleep wake scale showed factor loading of 18 items out of 28 items in original scale reconstructed into 5 aspects of sleep quality. Conclusions: The factorial analysis gives a reconstructed scale useful for the local population. Further a confirmatory factorial analysis has been subsequently planned to determine the internal consistency of the scale for local population.

Keywords: factorial analysis, sleep hygiene, sleep quality, adolescent sleep scale

Procedia PDF Downloads 248
479 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 141
478 An Exploration of Cyberspace Security, Strategy for a New Era

Authors: Laxmi R. Kasaraneni

Abstract:

The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.

Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security

Procedia PDF Downloads 267