Search results for: human vulnerabilities
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8233

Search results for: human vulnerabilities

8053 Understanding Human Trafficking in Benin City: Implications for Social Work Intervention

Authors: Tracy B. E. Omorogiuwa

Abstract:

Human trafficking also known as modern-day slavery can be seen as an effort by some privileged and criminally minded persons to take advantage of vulnerable individuals for their economic gains. Some factors; poverty, unemployment, poor educational opportunities, ignorance and traditional attitudes are attributed as causes and psychological, sexual, moral and health problems as impacts of human trafficking. This study examines the phenomenon of human trafficking in Benin City, one of the cities in Nigeria, situated as a source of trafficked persons for exploitation in Europe and African countries. Even though the Nigerian government and Non-governmental organizations have made considerable efforts in the past to reduce the incidence of human trafficking, the result has been an adjustment in the personality of the trafficked persons rather than professional measures to combat the issue. Hence, the study adopts the focused group discussions as a method for data collection; to sort the opinions of community members towards the understanding of the phenomenon. In addition, this paper provides social work implications to address the issue of human trafficking in the Benin City, Nigeria.

Keywords: human trafficking, trafficking in persons, modern-day slavery, social work implication

Procedia PDF Downloads 161
8052 Human Capital Divergence and Team Performance: A Study of Major League Baseball Teams

Authors: Yu-Chen Wei

Abstract:

The relationship between organizational human capital and organizational effectiveness have been a common topic of interest to organization researchers. Much of this research has concluded that higher human capital can predict greater organizational outcomes. Whereas human capital research has traditionally focused on organizations, the current study turns to the team level human capital. In addition, there are no known empirical studies assessing the effect of human capital divergence on team performance. Team human capital refers to the sum of knowledge, ability, and experience embedded in team members. Team human capital divergence is defined as the variation of human capital within a team. This study is among the first to assess the role of human capital divergence as a moderator of the effect of team human capital on team performance. From the traditional perspective, team human capital represents the collective ability to solve problems and reducing operational risk of all team members. Hence, the higher team human capital, the higher the team performance. This study further employs social learning theory to explain the relationship between team human capital and team performance. According to this theory, the individuals will look for progress by way of learning from teammates in their teams. They expect to have upper human capital, in turn, to achieve high productivity, obtain great rewards and career success eventually. Therefore, the individual can have more chances to improve his or her capability by learning from peers of the team if the team members have higher average human capital. As a consequence, all team members can develop a quick and effective learning path in their work environment, and in turn enhance their knowledge, skill, and experience, leads to higher team performance. This is the first argument of this study. Furthermore, the current study argues that human capital divergence is negative to a team development. For the individuals with lower human capital in the team, they always feel the pressure from their outstanding colleagues. Under the pressure, they cannot give full play to their own jobs and lose more and more confidence. For the smart guys in the team, they are reluctant to be colleagues with the teammates who are not as intelligent as them. Besides, they may have lower motivation to move forward because they are prominent enough compared with their teammates. Therefore, human capital divergence will moderate the relationship between team human capital and team performance. These two arguments were tested in 510 team-seasons drawn from major league baseball (1998–2014). Results demonstrate that there is a positive relationship between team human capital and team performance which is consistent with previous research. In addition, the variation of human capital within a team weakens the above relationships. That is to say, an individual working with teammates who are comparable to them can produce better performance than working with people who are either too smart or too stupid to them.

Keywords: human capital divergence, team human capital, team performance, team level research

Procedia PDF Downloads 206
8051 Location Tracking of Human Using Mobile Robot and Wireless Sensor Networks

Authors: Muazzam A. Khan

Abstract:

In order to avoid dangerous environmental disasters, robots are being recognized as good entrants to step in as human rescuers. Robots has been gaining interest of many researchers in rescue matters especially which are furnished with advanced sensors. In distributed wireless robot system main objective for a rescue system is to track the location of the object continuously. This paper provides a novel idea to track and locate human in disaster area using stereo vision system and ZigBee technology. This system recursively predict and updates 3D coordinates in a robot coordinate camera system of a human which makes the system cost effective. This system is comprised of ZigBee network which has many advantages such as low power consumption, self-healing low data rates and low cost.

Keywords: stereo vision, segmentation, classification, human tracking, ZigBee module

Procedia PDF Downloads 461
8050 The Context of Human Rights in a Poverty-Stricken Africa: A Reflection

Authors: Ugwu Chukwuka E.

Abstract:

The African context of human right instruments as recognized today can be traced to Africa’s relationship with the Western World. A significant preponderance of these instruments are found in both colonial and post colonial statutes as the colonial laws, the post colonial legal documents as constitutions or Africa’s adherence to relevant international instruments on human rights as the Universal Declaration of Human Rights (1948) and the African Charter on Human and Peoples’ Rights (1981). In spite of all these human rights instruments inherent in the African continent, it is contended in this paper that, these Western-oriented notion of human rights, emphasizes rights that hardly meets the current needs of contemporary African citizens. Adopting a historical research methodology, this study interrogates the dynamics of the African poverty context in relation to the implementation of human rights instruments in the continent. In this vein, using human rights and poverty scenarios from one Anglophone (Uganda) and one Francophone (Senegal) countries in Africa, the study hypothesized that, majority of Africans are not in a historical condition for the realization of these rights. The raison d’etre for this claim emerges from the fact that, the present generations of African hoi polloi are inundated with extensive powerlessness, ignorance, diseases, hunger and overall poverty that emasculates their interest in these rights instruments. In contrast, the few Africans who have access to the enjoyment of these rights in the continent hardly needs these instruments, as their power and resources base secures them that. The paper concludes that the stress of African states and stakeholders on African affairs should concentrated significantly, on the alleviation of the present historical poverty squalor of Africans, which when attended to, enhances the realization of human right situations in the continent.

Keywords: Africa, human rights, poverty, western world

Procedia PDF Downloads 415
8049 Theoretical Aspects and Practical Approach in the Research of the Human Capital of Student Volunteer Community

Authors: Kalinina Anatasiia, Pevnaya Mariya

Abstract:

The article concerns theoretical basis in the research of student volunteering, identifies references of student volunteering as a social community, classifies human capital indicators of student volunteers. Also there are presented the results of research of 450 student volunteers in Russia concerning the correlation between international volunteering and indicators of human capital of youth. Findings include compared characteristics of human capital of “potential” and “real” international student volunteers. Factor analysis revealed two categories of active students categories of active students.

Keywords: human capital, international volunteering, student volunteering, social community, youth volunteering, youth politics

Procedia PDF Downloads 529
8048 A Resource Based View: Perspective on Acquired Human Resource towards Competitive Advantage

Authors: Monia Hassan Abdulrahman

Abstract:

Resource-based view is built on many theories in addition to diverse perspectives, we extend this view placing emphasis on human resources addressing the tools required to sustain competitive advantage. Highlighting on several theories and judgments, assumptions were established to clearly reach if resource possession alone suffices for the sustainability of competitive advantage, or necessary accommodation are required for better performance. New practices were indicated in terms of resources used in firms, these practices were implemented on the human resources in particular, and results were developed in compliance to the mentioned assumptions. Such results drew attention to the significance of practices that provide enhancement of human resources that have a core responsibility of maintaining resource-based view for an organization to lead the way to gaining competitive advantage.

Keywords: competitive advantage, resource based value, human resources, strategic management

Procedia PDF Downloads 368
8047 Analysis of the Unmanned Aerial Vehicles’ Incidents and Accidents: The Role of Human Factors

Authors: Jacob J. Shila, Xiaoyu O. Wu

Abstract:

As the applications of unmanned aerial vehicles (UAV) continue to increase across the world, it is critical to understand the factors that contribute to incidents and accidents associated with these systems. Given the variety of daily applications that could utilize the operations of the UAV (e.g., medical, security operations, construction activities, landscape activities), the main discussion has been how to safely incorporate the UAV into the national airspace system. The types of UAV incidents being reported range from near sightings by other pilots to actual collisions with aircraft or UAV. These incidents have the potential to impact the rest of aviation operations in a variety of ways, including human lives, liability costs, and delay costs. One of the largest causes of these incidents cited is the human factor; other causes cited include maintenance, aircraft, and others. This work investigates the key human factors associated with UAV incidents. To that end, the data related to UAV incidents that have occurred in the United States is both reviewed and analyzed to identify key human factors related to UAV incidents. The data utilized in this work is gathered from the Federal Aviation Administration (FAA) drone database. This study adopts the human factor analysis and classification system (HFACS) to identify key human factors that have contributed to some of the UAV failures to date. The uniqueness of this work is the incorporation of UAV incident data from a variety of applications and not just military data. In addition, identifying the specific human factors is crucial towards developing safety operational models and human factor guidelines for the UAV. The findings of these common human factors are also compared to similar studies in other countries to determine whether these factors are common internationally.

Keywords: human factors, incidents and accidents, safety, UAS, UAV

Procedia PDF Downloads 209
8046 Street Begging: A Loss of Human Resource in Nigeria

Authors: Sulaiman Kassim Ibrahim

Abstract:

Human Resource is one of the most important elements in any country. They are very important in actualizing the potential of every sector in the country, i.e Agric, Education, Finance, Judiciary and all formal and informal sectors. The purpose of this study is to investigate the loss of human resource in Nigeria through street begging. The study used intensive literature review. Finding from the review indicate that a significant number of human resource are into street begging in the country undeveloped and untapped. The paper recommend that policy should be initiated to discourage street begging, develop this resource through education and empowerment, stop rural-urban migration by providing infrastructure in the rural areas and abolish informal (Almajiri or beggars school) and transform it into formal school.

Keywords: human resource, street begging, Nigeria, Almajiri

Procedia PDF Downloads 217
8045 Humans, Social Robots, and Mutual Love: An Application of Aristotle’s Nicomachean Ethics

Authors: Ruby Jean Hornsby

Abstract:

In our rapidly advancing techno-moral world, human-robot relationships are increasingly becoming a part of intimate human life. Indeed, social robots - that is, autonomous or semi-autonomous embodied artificial agents that generally possess human or animal-like qualities (such as responding to environmental stimuli, communicating, learning, performing human tasks, and making autonomous decisions) - have been designed to function as human friends. In light of such advances, immediate philosophical scrutiny is imperative in order to examine the extent to which human-robot interactions constitute genuine friendship and therefore contribute towards the good human life. Aristotle's conception of friendship is philosophically illuminating and sufficiently broad in scope to guide such analysis. On his account, it is necessary (though not sufficient) that for a friendship to exist between two agents - A and B - both agents must have a mutual love for one another. Aristotle claims that A loves B if: Condition 1: A desires those apparent good (qua pleasant, useful, or virtuous) properties attributable to B, and Condition 2: A has goodwill (wishes what is best) for B. This paper argues that human-robot interaction can (and does) successfully meet both conditions; as such, it demonstrates that robots and humans can reciprocally love one another. It will argue for this position by first justifying the claim that a human can desire apparent good features attributable to a robot (i.e., by taking them to be pleasant and/or useful) and outlining how it is that a human can wish a robot well in light of that robot's (quasi-) interests. Next, the paper will argue that a robot can (quasi-)desire certain properties that are attributable to a human before elucidating how it is possible for a robot to act in the interests of a human. Accordingly, this paper will conclude that it is already the case that humans can formulate relationships with robots that involve reciprocated love. This is significant because it suggests that social robots are candidates for human friendship and can therefore contribute toward flourishing human futures.

Keywords: ancient philosophy, friendship, inter-disciplinary applied ethics, love, social robotics

Procedia PDF Downloads 81
8044 A Study on the Role of Human Rights in the Aid Allocations of China and the United States

Authors: Shazmeen Maroof

Abstract:

The study is motivated by a desire to investigate whether there is substance to claims that, relative to traditional donors, China disregards human rights considerations when allocating overseas aid. While the stated policy of the U.S. is that consideration of potential aid recipients’ respect for human rights is mandatory, some quantitative studies have cast doubt on whether this is reflected in actual allocations. There is a lack of academic literature that formally assesses the extent to which the two countries' aid allocations differ; which is essential to test whether the criticisms of China's aid policy in comparison to that of the U.S. are justified. Using data on two standard human rights measures, 'Political Terror Scale' and 'Civil Liberties', the study analyse the two donors’ aid allocations among 125 countries over the period 2000 to 2014. The bivariate analysis demonstrated that a significant share of China’s aid flow to countries with poor human rights record. At the same time, the U.S. seems little different in providing aid to these countries. The empirical results obtained from the Fractional Logit model also provided some support to the general pessimism regarding China’s provision of aid to countries with poor human rights record, yet challenge the optimists expecting better targeted aid from the U.S. These findings are consistent with the split between humanitarian and non-humanitarian aid and in the sample of countries whose human rights record is below some threshold level.

Keywords: China's aid policy, foreign aid allocation, human rights, United States Foreign Assistance Act

Procedia PDF Downloads 85
8043 Negotiating Sovereign Debt and Human Rights: A Cross Cultural Study

Authors: Prajwal Raj Gyawali, Aastha Dahal

Abstract:

The tension between human rights and loans provided by international development banks with hidden conditions in the pretext of development is a complex issue with significant implications for the rights of citizens in borrowing countries. It is important for all parties involved, including international banks, borrowing countries, and affected communities, to consider and respect human rights in the negotiation and implementation of development projects. Yet, it is rare for human rights actors or communities to have a seat at the negotiation table when loans are finalized. In our research, we conducted negotiation simulations in law schools to examine how international loan negotiations would play out if human rights actors and communities had seats at the table. We ran the negotiation simulations in Bangladesh, Nepal and India. We found that the presence of community groups and human rights actors makes a difference in loan outcomes. While the international development loan was accepted as opposed to rejected by negotiators in three countries, the cultural values of the respective countries played a significant part in terms of the final agreement. We present the findings and their implications for the design of human rights courses in law schools as well as larger policy implications for expanding the participation of actors in international development loan negotiations.

Keywords: law, development, debt, human rights

Procedia PDF Downloads 32
8042 Regional Trade Agreements versus the WTO: A Human Rights Perspective

Authors: Mohsen Qasemi

Abstract:

In the international economic order multilateral trading system which established by General Agreement on Tariffs and Trade 1947 (GATT) was dominant until about two decades ago. Regional Trade Agreements (RTAs) have changed this order and become an important phenomenon. One of the main objectives of the World Trade Organization (WTO) as a central institution of multilateral trading system is raising standards of living. There are many scholars who suggest that WTO should take steps to protect human rights in its activities. Although it has always been opposing views who declare that since WTO has no explicit rule for human rights, it has no human rights related obligations. At the time that the WTO was established, member states began to join RTAs and since then, the escalating growth of these agreements and their effects on multilateral trading system has been controversial. There are some aspects of RTAs that have received too little attention from scholars. It is important to take a different view and evaluate the RTAs based on non-commercial aspects. The present paper seeks to answer this question: which system could be more useful in protecting human rights, RTAs or WTO?

Keywords: WTO, RTAs, human rights, multilateral trading system, non discrimination

Procedia PDF Downloads 334
8041 Human Development Outcomes and Macroeconomic Indicators Nexus in Nigeria: An Empirical Investigation

Authors: Risikat Oladoyin S. Dauda, Onyebuchi Iwegbu

Abstract:

This study investigates the response of human development outcomes to selected macroeconomic indicators in Nigeria. Human development outcomes is measured by human development index while the selected macroeconomic variables are inflation rate, real interest rate, government capital expenditure, real exchange rate, current account balance, and savings. Structural Vector Autoregression (SVAR) technique is employed in examining the response of human development index to the macroeconomic shocks. The result from the forecast error variance decomposition and Impulse-Response analysis reveals that fiscal policy (government capital expenditure) shock is the greatest determinant of human development outcomes. This result reiterates the role which the government plays in improving the welfare of the citizenry. The fiscal policy tool is pivotal in human development which comes in the form of investment in education, health, housing, and infrastructure. Further conclusion drawn from this study is that human development outcome positively and significantly responds to shocks from real interest rate, a monetary policy transmission variable and is felt greatly in the short run period. The policy implication of this study is that if capital budget implementation falls below expectations, human development will be engendered. Hence, efforts should be made to ensure that full implementation and appraisal of government capital expenditure is taken sacrosanct as any shock from such plan, engenders human development outcome.

Keywords: human development outcome, macroeconomic outcomes, structural vector autoregression, SVAR

Procedia PDF Downloads 132
8040 Child Soldier in Africa: A Big Challenge to Human Right

Authors: Adegboyega Adeolapo Ola, Gerelene Jagganath

Abstract:

One of the greatest challenges of human right in the world, especially African states is the use of child soldiers in armed conflict, constituting a major source of destruction of lives and properties. Mostly, they are in developing countries with the situation in Sub-Saharan Africa, the abduction and employment of children as soldiers is a form of exploitative labour that is tantamount to slavery. Since the end of cold war, Child soldier has increased in Africa countries like Angola, Liberia, Sierra Leone and Uganda. This study examines the main cause of the recruitment and use of child soldiers and its challenges to human right. It further assesses the role of international regional bodies and various governments in curbing child soldiers with a view to proffer suggestions on how to address some of the resultant threat of human right. The study posits that the control of small arms and light weapons is essential in curtailing the spread of child soldier and abuse of human right. This hopefully should result in the sustainability of human/child right in African continent. It is a recommendation of this study that, in order to sustain human right in the region, all Africa leaders, government and regional bodies; such as African Union, Economic Community of West African States, South African Development Community among others, should cooperate and work together to address the issue of illicit small arms, which could eventually lead to child soldier.

Keywords: arms control, child soldier, human right, small arms

Procedia PDF Downloads 182
8039 Exploring the Correlation between Human Security, Human Rights and Justice in Addressing and Remedying Contemporary Challenges in Africa

Authors: Sikhumbuzo Zondi, Serges A. Kamga

Abstract:

Human security and human rights are mutually reinforcing concepts given that human security addresses questions related to human conditions such as the safety of individuals and the protection of individual rights and civil liberties. It does this by suggesting that the proper referent for security should be the individual and not the nation-state, due to the individual’s vulnerability to threats such as malnutrition and poverty, conflicts, exploitation and marginalization, despotism and climate change. Due to the primacy of the individual, human security comfortably expand to the notion of social justice, given that for far too-long, many individuals around the world have been denied of their basic human rights through racial discrimination, unfair labour and segregation policies and as a result encountered widespread social, environmental and economic injustices which are evident in the current structural division of the world between the developed north and the underdeveloped or developing south. In light of this view, ensuring freedom from want and freedom from fear, for all individuals is arguably the sound route to addressing and remedying the global ills of our time and a way to promoting human rights for all. The promotion of human security provides an important part of human/societal progress because inclusive security facilitates development and human rights protection, while insecurity reduces people’s growth and investment prospects and prolongs historical injustices. Therefore, this paper seeks to show that human security and human rights complements one another and that this correlation provides the necessary mechanisms for addressing and remedying the historical injustices that still affect most of the world’s population. It will look at linkages between human security and the individual right to equality and freedom from discrimination, right to life, liberty, and personal security; development; own property; adequate living standard; education; desirable work and to join trade unions; participate in government and in free elections; social security and equality before the law. The paper considers these human rights and liberties as vital for securing the core values of human life while at the same addressing socio-economic injustices that still persist in the contemporary world. The paper will be a desktop study using qualitative research methods on two case studies in Africa namely Cameroun and South Africa.

Keywords: justice, human security, human rights, injustices

Procedia PDF Downloads 146
8038 Fitness Action Recognition Based on MediaPipe

Authors: Zixuan Xu, Yichun Lou, Yang Song, Zihuai Lin

Abstract:

MediaPipe is an open-source machine learning computer vision framework that can be ported into a multi-platform environment, which makes it easier to use it to recognize the human activity. Based on this framework, many human recognition systems have been created, but the fundamental issue is the recognition of human behavior and posture. In this paper, two methods are proposed to recognize human gestures based on MediaPipe, the first one uses the Adaptive Boosting algorithm to recognize a series of fitness gestures, and the second one uses the Fast Dynamic Time Warping algorithm to recognize 413 continuous fitness actions. These two methods are also applicable to any human posture movement recognition.

Keywords: computer vision, MediaPipe, adaptive boosting, fast dynamic time warping

Procedia PDF Downloads 79
8037 Role of Strategic Human Resource Practices and Knowledge Management Capacity

Authors: Ploychompoo Kittikunchotiwut

Abstract:

This study examines the relationships between human resource practices, knowledge management capacity, and innovation performance. The data were collected by using a questionnaire from 241 firms in the hotels in Thailand. The hypothesized relationships among variables are examined by using ordinary least square (OLS) regression analysis. The findings show that human resource practices have a positive effect on knowledge management capacity. Besides, knowledge management capacity was found to positively affect innovation performance. Finally, the limitations of the study and directions for future research are discussed.

Keywords: human resource practices, knowledge management capacity, innovation performance

Procedia PDF Downloads 279
8036 Human Rights Violations and the Inability of International Law to Solve Them

Authors: Amin Osama Amin Mohamed Elbaramawy

Abstract:

In the last period of time, about ten years ago, wars caused violations of human rights in many places, and despite international condemnations, they did not stop, and the truth is that international law was unable to stop them. The global wars and conflicts that the world has been witnessing for more than ten years have caused the displacement of millions of people in all parts of the earth, causing a violation of the human rights of those people. Despite international condemnations of these conflicts, these conflicts have not stopped and have not been resolved until now. Therefore, I call for international law and international courts to be more effective and not just in words, taking into account the speed in this due to the increase in those wars and conflicts every day and new violations every day.

Keywords: war, freedom, human rights, international law

Procedia PDF Downloads 56
8035 A Grey-Box Text Attack Framework Using Explainable AI

Authors: Esther Chiramal, Kelvin Soh Boon Kai

Abstract:

Explainable AI is a strong strategy implemented to understand complex black-box model predictions in a human-interpretable language. It provides the evidence required to execute the use of trustworthy and reliable AI systems. On the other hand, however, it also opens the door to locating possible vulnerabilities in an AI model. Traditional adversarial text attack uses word substitution, data augmentation techniques, and gradient-based attacks on powerful pre-trained Bidirectional Encoder Representations from Transformers (BERT) variants to generate adversarial sentences. These attacks are generally white-box in nature and not practical as they can be easily detected by humans e.g., Changing the word from “Poor” to “Rich”. We proposed a simple yet effective Grey-box cum Black-box approach that does not require the knowledge of the model while using a set of surrogate Transformer/BERT models to perform the attack using Explainable AI techniques. As Transformers are the current state-of-the-art models for almost all Natural Language Processing (NLP) tasks, an attack generated from BERT1 is transferable to BERT2. This transferability is made possible due to the attention mechanism in the transformer that allows the model to capture long-range dependencies in a sequence. Using the power of BERT generalisation via attention, we attempt to exploit how transformers learn by attacking a few surrogate transformer variants which are all based on a different architecture. We demonstrate that this approach is highly effective to generate semantically good sentences by changing as little as one word that is not detectable by humans while still fooling other BERT models.

Keywords: BERT, explainable AI, Grey-box text attack, transformer

Procedia PDF Downloads 111
8034 The Role of Human Beings as Caliphs in Preserving Nature

Authors: Firdaus Khairi Abdul Kadir, Nazihah Rusli, Noor Aisyah Abdul Aziz

Abstract:

Islam is a comprehensive religion encompassing all aspects of society’s life such as social, economic, political, cultural and environmental. The environment is part of the manifestation of God’s greatness which has pearls of wisdom, bestowed upon human beings to make them realize that everything is in the hands of God (Allah SWT). However, the equilibrium of nature could be disturbed from the excessive exploitation by humans’ hands. As a caliph on this earth, it is the responsibility of human beings to look after the environment proactively. Besides, Islam calls for the execution of accountable development and respecting the principles of sustainability. Therefore, this study focuses on the role of human beings as caliphs on this earth who are responsible for nature and their acts in conserving and preserving the environment based on the approach of religious education. This study also used the research method of the survey library.

Keywords: environment, human beings, caliph, tauhid, Allah SWT

Procedia PDF Downloads 96
8033 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 47
8032 Optimization of the Control Scheme for Human Extremity Exoskeleton

Authors: Yang Li, Xiaorong Guan, Cheng Xu

Abstract:

In order to design a suitable control scheme for human extremity exoskeleton, the interaction force control scheme with traditional PI controller was presented, and the simulation study of the electromechanical system of the human extremity exoskeleton was carried out by using a MATLAB/Simulink module. By analyzing the simulation calculation results, it was shown that the traditional PI controller is not very suitable for every movement speed of human body. So, at last the fuzzy self-adaptive PI controller was presented to solve this problem. Eventually, the superiority and feasibility of the fuzzy self-adaptive PI controller was proved by the simulation results and experimental results.

Keywords: human extremity exoskeleton, interaction force control scheme, simulation study, fuzzy self-adaptive pi controller, man-machine coordinated walking, bear payload

Procedia PDF Downloads 334
8031 Development of Real Time System for Human Detection and Localization from Unmanned Aerial Vehicle Using Optical and Thermal Sensor and Visualization on Geographic Information Systems Platform

Authors: Nemi Bhattarai

Abstract:

In recent years, there has been a rapid increase in the use of Unmanned Aerial Vehicle (UAVs) in search and rescue (SAR) operations, disaster management, and many more areas where information about the location of human beings are important. This research will primarily focus on the use of optical and thermal camera via UAV platform in real-time detection, localization, and visualization of human beings on GIS. This research will be beneficial in disaster management search of lost humans in wilderness or difficult terrain, detecting abnormal human behaviors in border or security tight areas, studying distribution of people at night, counting people density in crowd, manage people flow during evacuation, planning provisions in areas with high human density and many more.

Keywords: UAV, human detection, real-time, localization, visualization, haar-like, GIS, thermal sensor

Procedia PDF Downloads 434
8030 Information Technologies in Human Resources Management - Selected Examples

Authors: A. Karasek

Abstract:

Rapid growth of Information Technologies (IT) has had huge influence on enterprises, and it has contributed to its promotion and increasingly extensive use in enterprises. Information Technologies have to a large extent determined the processes taking place in a enterprise; what is more, IT development has brought the need to adopt a brand new approach to human resources management in an enterprise. The use of IT in Human Resource Management (HRM) is of high importance due to the growing role of information and information technologies. The aim of this paper is to evaluate the use of information technologies in human resources management in enterprises. These practices will be presented in the following areas: Recruitment and selection, development and training, employee assessment, motivation, talent management, personnel service. Results of conducted survey show diversity of solutions applied in particular areas of human resource management. In the future, further development in this area should be expected, as well as integration of individual HRM areas, growing mobile-enabled HR processes and their transfer into the cloud. Presented IT solutions applied in HRM are highly innovative, which is of great significance due to their possible implementation in other enterprises.

Keywords: e-HR, human resources management, HRM practices, HRMS, information technologies

Procedia PDF Downloads 321
8029 Discovering the Real Psyche of Human Beings

Authors: Sheetla Prasad

Abstract:

The objective of this study is ‘discovering the real psyche of human beings for prediction of mode, direction and strength of the potential of actions of the individual. The human face was taken as a source of central point to search for the route of real psyche. Analysis of the face architecture (shape and salient features of face) was done by three directional photographs ( 600 left and right and camera facing) of human beings. The shapes and features of the human face were scaled in 177 units on the basis of face–features locations (FFL). The mathematical analysis was done of FFLs by self developed and standardized formula. At this phase, 800 samples were taken from the population of students, teachers, advocates, administrative officers, and common persons. The finding shows that real psyche has two external rings (ER). These ER are itself generator of two independent psyches (manifested and manipulated). Prima-facie, it was proved that micro differences in FFLs have potential to predict the state of art of the human psyche. The potential of psyches was determined by the saving and distribution of mental energy. It was also mathematically proved.

Keywords: face architecture, psyche, potential, face functional ratio, external rings

Procedia PDF Downloads 481
8028 Production Structures of Energy Based on Water Force, Its Infrastructure Protection, and Possible Causes of Failure

Authors: Gabriela-Andreea Despescu, Mădălina-Elena Mavrodin, Gheorghe Lăzăroiu, Florin Adrian Grădinaru

Abstract:

The purpose of this paper is to contribute to the enhancement of a hydroelectric plant protection by coordinating protection measures and existing security and introducing new measures under a risk management process. Also, the plan identifies key critical elements of a hydroelectric plant, from its level vulnerabilities and threats it is subjected to in order to achieve the necessary protection measures to reduce the level of risk.

Keywords: critical infrastructure, risk analysis, critical infrastructure protection, vulnerability, risk management, turbine, impact analysis

Procedia PDF Downloads 512
8027 Human Kinetics Education and the Computer Operations, Effects and Merits

Authors: Kehinde Adeyeye Adelabu

Abstract:

Computer applications has completely revolutionized the way of life of people which does not exclude the field of sport education. There are computer technologies which help to enhance teaching in every field of education. Invention of computers has done great to the field of education. This study was therefore carried out to examine the effects and merits of computer operations in Human Kinetics Education and Sports. The study was able to identify the component of computer, uses of computer in Human Kinetics education (sports), computer applications in some branches of human kinetics education. A qualitative research method was employed by the author in gathering experts’ views and used to analyze the effects and merits of computer applications in the field of human kinetics education. No experiment was performed in the cause of carrying out the study. The source of information for the study was text-books, journal, articles, past project reports, internet i.e. Google search engine. Computer has significantly helped to improve Education (Human Kinetic), it has complemented the basic physical fitness testing and gave a more scientific basis to the testing. The use of the software and packages has made cost projections, database applications, inventory control, management of events, word processing, electronic mailing and record keeping easier than the pasts.

Keywords: application, computer operation, education, human kinetics

Procedia PDF Downloads 149
8026 Laser Keratoplasty in Human Eye Considering the Fluid Aqueous Humor and Vitreous Humor Fluid Flow

Authors: Dara Singh, Keikhosrow Firouzbakhsh, Mohammad Taghi Ahmadian

Abstract:

In this paper, conventional laser Keratoplasty surgeries in the human eye are studied. For this purpose, a validated 3D finite volume model of the human eye is introduced. In this model the fluid flow has also been considered. The discretized domain of the human eye incorporates a bio-heat transfer equation coupled with a Boussinesq equation. Both continuous and pulsed lasers have been modeled and the results are compared. Moreover, two different conventional surgical positions that are upright and recumbent are compared for these laser therapies. The simulation results show that in these conventional surgeries, the temperature rises above the critical values at the laser insertion areas. However, due to the short duration and the localized nature, the potential damages are restricted to very small regions and can be ignored. The conclusion is that the present day lasers are acceptably safe to the human eye.

Keywords: eye, heat-transfer, keratoplasty laser, surgery

Procedia PDF Downloads 248
8025 Human Trafficking In North East India

Authors: Neimenuo Kengurusie

Abstract:

Human trafficking is considered a form of slavery in modern day era and a gross violation of human rights and one of the most organized crimes of the day transcending cultures, geography and time. Human trafficking is a highly complex phenomenon involving many actors like victims, survivors, their families, communities and third parties that recruit, transport and exploit the trafficked victims. It takes different forms such as child trafficking, trafficking for labour, trafficking for sexual exploitation, trafficking for organ transplantation etc. and affects virtually every corner of the world. This research draws on a variety of sources, including books, articles, journals, newspaper reports, human rights reports, online materials and interviews. In India, particularly the North East region, the issue of human trafficking has become a concern regionally, nationally and internationally. The focus of this paper is on the North Eastern part of India as it is a socially and economically backward region of the country which makes women and children susceptible to trafficking. Women and children from these regions are trafficked within and outside the state. Therefore, the paper seeks to explore the issue of human trafficking, especially trafficking of women and children in North East India, which receives insufficient attention in literature. The paper seeks to analyze and understand the trend and patterns of trafficking and the mechanisms that reinforces the process and perpetuates the phenomenon of trafficking considering the nature and scope of the problem. The paper also analyzes the anti-trafficking laws initiated by India and the North East states in particular for combating human trafficking in North East India.

Keywords: children, human trafficking, North East India, women

Procedia PDF Downloads 454
8024 Muddle Effort for Organized Crime in India: Social Work Concern for Anti Human Trafficking Unit

Authors: Rajkamal Ajmeri, Leena Mehta

Abstract:

Growing magnitude of human trafficking is the indicatory symptom of ill society. Despite of many treaties, legislation and protocols control over human trafficking require additional attention. However, many Anti Human Trafficking Units (AHTU) are working throughout India but it is a fact that incidence pertaining to illegal human trade is not fully under control. Social work as discipline and practice base profession has a lot of concern about situation and the trafficked victims. United state put Indian in tier II watch list because they are not fully complying with the minimum standard of Trafficking Victims Protection laws but they are making a significant effort to bring themselves into compliance with those standards. In order to solve the issue, scientific research of experiences and opinions of government / non government machineries can play an effective role in raising the standard legislation for trafficked victims. Proper study can enhance understanding on various problems faced by government machineries. The study can help in developing the scientific model, which can effectively solve the problem in human trafficking field.

Keywords: human trafficking, legislations, victims, social work, government machinery

Procedia PDF Downloads 273