Search results for: in-group identification
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2854

Search results for: in-group identification

4 General Evaluation of a Three-Year Holistic Physical Activity Interventions Program in Qatar Campuses: Step into Health (SIH) in Campuses 2013- 2016

Authors: Daniela Salih Khidir, Mohamed G. Al Kuwari, Mercia V. Walt, Izzeldin J. Ibrahim

Abstract:

Background: University-based physical activity interventions aim to establish durable social patterns during the transition to adulthood. This study is a comprehensive evaluation of a 3-year intervention-based program to increase the culture of physical activity (PA) routine in Qatar campuses community, using a holistic approach. Methodology: General assessment methods: formative evaluation-SIH Campuses logic model design, stakeholders’ identification; process evaluation-members’ step counts analyze and qualitative Appreciative Inquiry session (4-D model); daily steps categorized as: ≤5,000, inactive; 5,000-7,499 low active; ≥7,500, physically active; outcome evaluation - records 3 years interventions. Holistic PA interventions methods: walking interventions - pedometers distributions and walking competitions for students and staff; educational interventions - in campuses implementation of bilingual educational materials, lectures, video related to PA in prevention of non-communicable diseases (NCD); articles published online; monthly emails and sms notifications for pedometer use; mass media campaign - radio advertising, yearly pre/post press releases; community stakeholders interventions-biyearly planning/reporting/achievements rewarding/ qualitative meetings; continuous follow-up communication, biweekly steps reports. Findings: Results formative evaluation - SIH in Campuses logic model identified the need of PA awareness and education within universities, resources, activities, health benefits, program continuity. Results process evaluation: walking interventions: Phase 1: 5 universities recruited, 2352 members, 3 months competition; Phase 2: 6 new universities recruited, 1328 members in addition, 4 months competition; Phase 3: 4 new universities recruited in addition, 1210 members, 6 months competition. Results phase 1 and 2: 1,299 members eligible for analyzes: 800 females (62%), 499 males (38%); 86% non-Qataris, 14% Qatari nationals, daily step count 5,681 steps, age groups 18–24 (n=841; 68%) students, 25–64; (n=458; 35.3%) staff; 38% - low active, 37% physically active and 25% inactive. The AI main themes engaging stakeholders: awareness/education - 5 points (100%); competition, multi levels of involvement in SIH, community-based program/motivation - 4 points each (80%). The AI points represent themes’ repetition within stakeholders’ discussions. Results education interventions: 2 videos implementation, 35 000 educational materials, 3 online articles, 11 walking benefits lectures, 40 emails and sms notifications. Results community stakeholders’ interventions: 6 stakeholders meetings, 3 rewarding gatherings, 1 focus meeting, 40 individual reports, 18 overall reports. Results mass media campaign: 1 radio campaign, 7 press releases, 52 campuses newsletters. Results outcome evaluation: overall 2013-2016, the study used: 1 logic model, 3 PA holistic interventions, partnerships 15 universities, registered 4890 students and staff (aged 18-64 years), engaged 30 campuses stakeholders and 14 internal stakeholders; Total registered population: 61.5% female (2999), 38.5% male (1891), 20.2% (988) Qatari nationals, 79.8% (3902) non-Qataris, 55.5% (2710) students aged 18 – 25 years, 44.5% (2180) staff aged 26 - 64 years. Overall campaign 1,558 members eligible for analyzes: daily step count 7,923; 37% - low active, 43% physically active and 20% inactive. Conclusion: The study outcomes confirm program effectiveness and engagement of young campuses community, specifically female, in PA. The authors recommend implementations of 'holistic PA intervention program approach in Qatar' aiming to impact the community at national level for PA guidelines achievement in support of NCD prevention.

Keywords: campuses, evaluation, Qatar, step-count

Procedia PDF Downloads 279
3 Identification of the Antimicrobial Property of Double Metal Oxide/Bioactive Glass Nanocomposite Against Multi Drug Resistant Staphylococcus aureus Causing Implant Infections

Authors: M. H. Pazandeh, M. Doudi, S. Barahimi, L. Rahimzadeh Torabi

Abstract:

The use of antibiotics is essential in reducing the occurrence of adverse effects and inhibiting the emergence of antibiotic resistance in microbial populations. The necessity for a novel methodology concerning local administration of antibiotics has arisen, with particular focus on dealing with localized infections prompted by bacterial colonization of medical devices or implant materials. Bioactive glasses (BG) are extensively employed in the field of regenerative medicine, encompassing a diverse range of materials utilized for drug delivery systems. In the present investigation, various drug carriers for imipenem and tetracycline, namely single systems BG/SnO2, BG/NiO with varying proportions of metal oxide, and nanocomposite BG/SnO2/NiO, were synthesized through the sol-gel technique. The antibacterial efficacy of the synthesized samples was assessed through the utilization of the disk diffusion method with the aim of neutralizing Staphylococcus aureus as the bacterial model. The current study involved the examination of the bioactivity of two samples, namely BG10SnO2/10NiO and BG20SnO2, which were chosen based on their heightened bacterial inactivation properties. This evaluation entailed the employment of two techniques: the measurement of the pH of simulated body fluid (SBF) solution and the analysis of the sample tablets through X-ray diffraction (XRD), scanning electron microscopy (SEM), and Fourier transform infrared (FTIR) spectroscopy. The sample tablets were submerged in SBF for varying durations of 7, 14, and 28 days. The bioactivity of the composite bioactive glass sample was assessed through characterization of alterations in its surface morphology, structure, and chemical composition. This evaluation was performed using scanning electron microscopy (SEM), Fourier-transform infrared (FTIR) spectroscopy, and X-ray diffraction spectroscopy. Subsequently, the sample was immersed in simulated liquids to simulate its behavior in biological environments. The specific body fat percentage (SBF) was assessed over a 28-day period. The confirmation of the formation of a hydroxyapatite surface layer serves as a distinct indicator of bioactivity. The infusion of antibiotics into the composite bioactive glass specimen was done separately, and then the release kinetics of tetracycline and imipenem were tested in simulated body fluid (SBF). Antimicrobial effectiveness against various bacterial strains have been proven in numerous instances using both melt and sol-gel techniques to create multiple bioactive glass compositions. An elevated concentration of calcium ions within a solution has been observed to cause an increase in the pH level. In aqueous suspensions, bioactive glass particles manifest a significant antimicrobial impact. The composite bioactive glass specimen exhibits a gradual and uninterrupted release, which is highly desirable for a drug delivery system over a span of 72 hours. The reduction in absorption, which signals the loss of a portion of the antibiotic during the loading process from the initial phosphate-buffered saline solution, indicates the successful bonding of the two antibiotics to the surfaces of the bioactive glass samples. The sample denoted as BG/10SnO2/10NiO exhibits a higher loading of particles compared to the sample designated as BG/20SnO2 in the context of bioactive glass. The enriched sample demonstrates a heightened bactericidal impact on the bacteria under investigation while concurrently preserving its antibacterial characteristics. Tailored bioactive glass that incorporates hydroxyapatite, with a regulated and efficient release of drugs targeting bacterial infections, holds promise as a potential framework for bone implant scaffolds following rigorous clinical evaluation, thereby establishing potential future biomedical uses. During the modification process, the introduction of metal oxides into bioactive glass resulted in improved antibacterial characteristics, particularly in the composite bioactive glass sample that displayed the highest level of efficiency.

Keywords: antibacterial, bioactive glasses, implant infections, multi drug resistant

Procedia PDF Downloads 57
2 Impacts of Transformational Leadership: Petronas Stations in Sabah, Malaysia

Authors: Lizinis Cassendra Frederick Dony, Jirom Jeremy Frederick Dony, Cyril Supain Christopher

Abstract:

The purpose of this paper is to improve the devotion to leadership through HR practices implementation at the PETRONAS stations. This emphasize the importance of personal grooming and Customer Care hospitality training for their front line working individuals and teams’ at PETRONAS stations in Sabah. Based on Thomas Edison, International Leadership Journal, theory, research, education and development practice and application to all organizational phenomena may affect or be affected by leadership. FINDINGS – PETRONAS in short called Petroliam Nasional Berhad is a Malaysian oil and gas company that was founded on August 17, 1974. Wholly owned by the Government of Malaysia, the corporation is vested with the entire oil and gas resources in Malaysia and is entrusted with the responsibility of developing and adding value to these resources. Fortune ranks PETRONAS as the 68th largest company in the world in 2012. It also ranks PETRONAS as the 12th most profitable company in the world and the most profitable in Asia. As of the end of March 2005, the PETRONAS Group comprised 103 wholly owned subsidiaries, 19 partly owned outfits and 57 associated companies. The group is engaged in a wide spectrum of petroleum activities, including upstream exploration and production of oil and gas to downstream oil refining, marketing and distribution of petroleum products, trading, gas processing and liquefaction, gas transmission pipeline network operations, marketing of liquefied natural gas; petrochemical manufacturing and marketing; shipping; automotive engineering and property investment. PETRONAS has growing their marketing channel in a competitive market. They have combined their resources to pursue common goals. PETRONAS provides opportunity to carry out Industrial Training Job Placement to the University students in Malaysia for 6-8 months. The effects of the Industrial Training have exposed them to the real working environment experience acting representing on behalf of General Manager for almost one year. Thus, the management education and reward incentives schemes have aspire the working teams transformed to gain their good leadership. Furthermore, knowledge and experiences are very important in the human capital development transformation. SPSS extends the accurate analysis PETRONAS achievement through 280 questionnaires and 81 questionnaires through excel calculation distributed to interview face to face with the customers, PETRONAS dealers and front desk staffs stations in the 17 stations in Kota Kinabalu, Sabah. Hence, this research study will improve its service quality innovation and business sustainability performance optimization. ORIGINALITY / VALUE – The impact of Transformational Leadership practices have influenced the working team’s behaviour as a Brand Ambassadors of PETRONAS. Finally, the findings correlation indicated that PETRONAS stations needs more HR resources practices to deploy more customer care retention resources in mitigating the business challenges in oil and gas industry. Therefore, as the business established at stiff competition globally (Cooper, 2006; Marques and Simon, 2006), it is crucial for the team management should be capable to minimize noises risk, financial risk and mitigating any other risks as a whole at the optimum level. CONCLUSION- As to conclude this research found that both transformational and transactional contingent reward leadership4 were positively correlated with ratings of platoon potency and ratings of leadership for the platoon leader and sergeant were moderately inter correlated. Due to this identification, we recommended that PETRONAS management should offers quality team management in PETRONAS stations in a broader variety of leadership training specialization in the operation efficiency at the front desk Customer Care hospitality. By having the reliability and validity of job experiences, it leverages diversity teamwork and cross collaboration. Other than leveraging factor, PETRONAS also will strengthen the interpersonal front liners effectiveness and enhance quality of interaction through effective communication. Finally, through numerous CSR correlation studies regression PETRONAS performance on Corporate Social Performance and several control variables.1 CSR model activities can be mis-specified if it is not controllable under R & D which evident in various feedbacks collected from the local communities and younger generation is inclined to higher financial expectation from PETRONAS. But, however, it created a huge impact on the nation building as part of its social adaptability overreaching their business stakeholders’ satisfaction in Sabah.

Keywords: human resources practices implementation (hrpi), source of competitive advantage in people’s development (socaipd), corporate social responsibility (csr), service quality at front desk stations (sqafd), impacts of petronas leadership (iopl)

Procedia PDF Downloads 319
1 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 47