Search results for: personal cyber risk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7965

Search results for: personal cyber risk

7695 Risk Assessment and Haloacetic Acids Exposure in Drinking Water in Tunja, Colombia

Authors: Bibiana Matilde Bernal Gómez, Manuel Salvador Rodríguez Susa, Mildred Fernanda Lemus Perez

Abstract:

In chlorinated drinking water, Haloacetic acids have been identified and are classified as disinfection byproducts originating from reaction between natural organic matter and/or bromide ions in water sources. These byproducts can be generated through a variety of chemical and pharmaceutical processes. The term ‘Total Haloacetic Acids’ (THAAs) is used to describe the cumulative concentration of dichloroacetic acid, trichloroacetic acid, monochloroacetic acid, monobromoacetic acid, and dibromoacetic acid in water samples, which are usually measured to evaluate water quality. Chronic presence of these acids in drinking water has a risk of cancer in humans. The detection of THAAs for the first time in 15 municipalities of Boyacá was accomplished in 2023. Aim is to describe the correlation between the levels of THAAs and digestive cancer in Tunja, a city in Colombia with higher rates of digestive cancer and to compare the risk across 15 towns, taking into account factors such as water quality. A research project was conducted with the aim of comparing water sources based on the geographical features of the town, describing the disinfection process in 15 municipalities, and exploring physical properties such as water temperature and pH level. The project also involved a study of contact time based on habits documented through a survey, and a comparison of socioeconomic factors and lifestyle, in order to assess the personal risk of exposure. Data on the levels of THAAs were obtained after characterizing the water quality in urban sectors in eight months of 2022. This, based on the protocol described in the Stage 2 DBP of the United States Environmental Protection Agency (USEPA) from 2006, which takes into account the size of the population being supplied. A cancer risk assessment was conducted to evaluate the likelihood of an individual developing cancer due to exposure to pollutants THAAs. The assessment considered exposure methods like oral ingestion, skin absorption, and inhalation. The chronic daily intake (CDI) for these exposure routes was calculated using specific equations. The lifetime cancer risk (LCR) was then determined by adding the cancer risks from the three exposure routes for each HAA. The risk assessment process involved four phases: exposure assessment, toxicity evaluation, data gathering and analysis, and risk definition and management. The results conclude that there is a cumulative higher risk of digestive cancer due to THAAs exposure in drinking water.

Keywords: haloacetic acids, drinking water, water quality, cancer risk assessment

Procedia PDF Downloads 29
7694 Survey of Intrusion Detection Systems and Their Assessment of the Internet of Things

Authors: James Kaweesa

Abstract:

The Internet of Things (IoT) has become a critical component of modern technology, enabling the connection of numerous devices to the internet. The interconnected nature of IoT devices, along with their heterogeneous and resource-constrained nature, makes them vulnerable to various types of attacks, such as malware, denial-of-service attacks, and network scanning. Intrusion Detection Systems (IDSs) are a key mechanism for protecting IoT networks and from attacks by identifying and alerting administrators to suspicious activities. In this review, the paper will discuss the different types of IDSs available for IoT systems and evaluate their effectiveness in detecting and preventing attacks. Also, examine the various evaluation methods used to assess the performance of IDSs and the challenges associated with evaluating them in IoT environments. The review will highlight the need for effective and efficient IDSs that can cope with the unique characteristics of IoT networks, including their heterogeneity, dynamic topology, and resource constraints. The paper will conclude by indicating where further research is needed to develop IDSs that can address these challenges and effectively protect IoT systems from cyber threats.

Keywords: cyber-threats, iot, intrusion detection system, networks

Procedia PDF Downloads 55
7693 Investigating the Impact of Individual Risk-Willingness and Group-Interaction Effects on Business Model Innovation Decisions

Authors: Sarah Müller-Sägebrecht

Abstract:

Today’s volatile environment challenges executives to make the right strategic decisions to gain sustainable success. Entrepreneurship scholars postulate mainly positive effects of environmental changes on entrepreneurship behavior, such as developing new business opportunities, promoting ingenuity, and the satisfaction of resource voids. A strategic solution approach to overcome threatening environmental changes and catch new business opportunities is business model innovation (BMI). Although this research stream has gained further importance in the last decade, BMI research is still insufficient. Especially BMI barriers, such as inefficient strategic decision-making processes, need to be identified. Strategic decisions strongly impact organizational future and are, therefore, usually made in groups. Although groups draw on a more extensive information base than single individuals, group-interaction effects can influence the decision-making process - in a favorable but also unfavorable way. Decisions are characterized by uncertainty and risk, whereby their intensity is perceived individually differently. Individual risk-willingness influences which option humans choose. The special nature of strategic decisions, such as in BMI processes, is that these decisions are not made individually but in groups due to their high organizational scope. These groups consist of different personalities whose individual risk-willingness can vary considerably. It is known from group decision theory that these individuals influence each other, observable in different group-interaction effects. The following research questions arise: i) Which impact has the individual risk-willingness on BMI decisions? And ii) how do group interaction effects impact BMI decisions? After conducting 26 in-depth interviews with executives from the manufacturing industry, the applied Gioia methodology reveals the following results: i) Risk-averse decision-makers have an increased need to be guided by facts. The more information available to them, the lower they perceive uncertainty and the more willing they are to pursue a specific decision option. However, the results also show that social interaction does not change the individual risk-willingness in the decision-making process. ii) Generally, it could be observed that during BMI decisions, group interaction is primarily beneficial to increase the group’s information base for making good decisions, less than for social interaction. Further, decision-makers mainly focus on information available to all decision-makers in the team but less on personal knowledge. This work contributes to strategic decision-making literature twofold. First, it gives insights into how group-interaction effects influence an organization’s strategic BMI decision-making. Second, it enriches risk-management research by highlighting how individual risk-willingness impacts organizational strategic decision-making. To date, it was known in BMI research that risk aversion would be an internal BMI barrier. However, with this study, it becomes clear that it is not risk aversion that inhibits BMI. Instead, the lack of information prevents risk-averse decision-makers from choosing a riskier option. Simultaneously, results show that risk-averse decision-makers are not easily carried away by the higher risk-willingness of their team members. Instead, they use social interaction to gather missing information. Therefore, executives need to provide sufficient information to all decision-makers to catch promising business opportunities.

Keywords: business model innovation, decision-making, group biases, group decisions, group-interaction effects, risk-willingness

Procedia PDF Downloads 70
7692 Risk of Type 2 Diabetes among Female College Students in Saudi Arabia

Authors: Noor A. Hakim

Abstract:

Several studies in the developed countries investigated the prevalence of diabetes and obesity among individuals from different socioeconomic levels and suggested lower rates among the higher socioeconomic groups. However, studies evaluating diabetes risk and prevalence of obesity among the population of middle- to high-income status in developing countries are limited. The aim of this study is to evaluate the risk of developing type-2 diabetes mellitus (T2DM) and the weight status of female students in private universities in Jeddah City, Saudi Arabia. This is a cross-sectional study of 121 female students aged ≤ 25 years old was conducted; participants were recruited from two private universities. Diabetes risk was evaluated using the Finnish Diabetes Risk Score. Anthropometric measurements were assessed, and body-mass-index (BMI) was calculated. Diabetes risk scores indicated that 35.5% of the female students had a slightly elevated risk, and 10.8% had a moderate to high risk to develop T2DM. One-third of the females (29.7%) were overweight or obese. The majority of the normal weight and underweight groups were classified to have a low risk of diabetes, 22.2% of the overweight participants were classified to have moderate to high risk, and over half of the obese participants (55.5%) were classified to be at the moderate to high-risk category. Conclusions: Given that diabetes risk is alarming among the population in Saudi Arabia, healthcare providers should utilize a simple screening tool to identify high-risk individuals and initiate diabetes preventive strategies to prevent, or delay, the onset of T2DM and improve the quality of life.

Keywords: risk of type 2 diabetes, weight status, college students, socioeconomic status

Procedia PDF Downloads 150
7691 A Relationship between Transformational Leadership, Internal Audit and Risk Management Implementation in the Indonesian Public Sector

Authors: Tio Novita Efriani

Abstract:

Public sector organizations work in a complex and risky environment. Since the beginning of 2000s, the public sector has paid attention to the need for an effective risk management. The Indonesian public sector has also concerned about this issue and in 2008 it enacted the Government Regulation that gives mandate for the implementation of risk management in government organizations. This paper investigates risk management implementation in the Indonesian public sector organizations and the role of transformational leadership and internal audit activities. Data was collected via survey. A total of 202 effective responses (30% response rate) from employees in 34 government ministries were statistically analyzed by using Partial least square structural equation modelling (PLS-SEM) and the software was SmartPLS 3.0. All the constructs were lower order, except for the risk management implementation construct, which was treated as a second-order construct. A two-stage approach was employed in the analysis of the higher order component. The findings revealed that transformational leadership positively influence risk management implementation. The findings also found that the core and legitimate roles of internal audit in risk management positively affect the implementation of risk management. The final finding showed that internal auditing mediates a relationship between transformational leadership and risk management implementation. These results suggest that the implementation of risk management in the Indonesian public sector was significantly supported by internal auditors and leadership. The findings confirm the importance of transformational leadership and internal audit in the public sector risk management strategies.

Keywords: Indonesian public sector, internal audit, risk management, transformational leadership

Procedia PDF Downloads 173
7690 Wearable System for Prolonged Cooling and Dehumidifying of PPE in Hot Environments

Authors: Lun Lou, Jintu Fan

Abstract:

While personal protective equipment (PPE) prevents the healthcare personnel from exposing to harmful surroundings, it creates a barrier to the dissipation of body heat and perspiration, leading to severe heat stress during prolonged exposure, especially in hot environments. It has been found that most of the existed personal cooling strategies have limitations in achieving effective cooling performance with long duration and lightweight. This work aimed to develop a lightweight (<1.0 kg) and less expensive wearable air cooling and dehumidifying system (WCDS) that can be applied underneath the protective clothing and provide 50W mean cooling power for more than 5 hours at 35°C environmental temperature without compromising the protection of PPE. For the WCDS, blowers will be used to activate an internal air circulation inside the clothing microclimate, which doesn't interfere with the protection of PPE. An air cooling and dehumidifying chamber (ACMR) with a specific design will be developed to reduce the air temperature and humidity inside the protective clothing. Then the cooled and dried air will be supplied to upper chest and back areas through a branching tubing system for personal cooling. A detachable ice cooling unit will be applied from the outside of the PPE to extract heat from the clothing microclimate. This combination allows for convenient replacement of the cooling unit to refresh the cooling effect, which can realize a continuous cooling function without taking off the PPE or adding too much weight. A preliminary thermal manikin test showed that the WCDS was able to reduce the microclimate temperature inside the PPE averagely by about 8°C for 60 minutes when the environmental temperature was 28.0 °C and 33.5 °C, respectively. Replacing the ice cooling unit every hour can maintain this cooling effect, while the longest operation duration is determined by the battery of the blowers, which can last for about 6 hours. This unique design is especially helpful for the PPE users, such as health care workers in infectious and hot environments when continuous cooling and dehumidifying are needed, but the change of protective clothing may increase the risk of infection. The new WCDS will not only improve the thermal comfort of PPE users but can also extend their safe working duration.

Keywords: personal thermal management, heat stress, ppe, health care workers, wearable device

Procedia PDF Downloads 58
7689 Youth Intelligent Personal Decision Aid

Authors: Norfiza Ibrahim, Norshuhada Shiratuddin, Siti Mahfuzah Sarif

Abstract:

Decision-making system is used to facilitate people in making the right choice for their important daily activities. For the youth, proper guidance in making important decisions is needed. Their skills in decision-making aid decisions will indirectly affect their future. For that reason, this study focuses on the intelligent aspects in the development of intelligent decision support application. The aid apparently integrates Personality Traits (PT) and Multiple Intelligence (MI) data in development of a computerized personal decision aid for youth named as Youth Personal Decision Aid (Youth PDA). This study is concerned with the aid’s helpfulness based on the hybrid intelligent process. There are four main items involved which are reliability, decision making effort, confidence, as well as decision process awareness. Survey method was applied to the actual user of this system, namely the school and the Institute of Higher Education (IPT)’s students. An establish instrument was used to evaluate the study. The results of the analysis and findings in the assessment indicates a high mean value of the four dimensions in helping Youth PDA to be accepted as a useful tool for the youth in decision-making.

Keywords: decision support, multiple intelligent, personality traits, youth personal decision aid

Procedia PDF Downloads 607
7688 When Messages Cause Distraction from Advertising: An Eye-Tracking Study

Authors: Nilamadhab Mohanty

Abstract:

It is essential to use message formats that make communication understandable and correct. It is because; the information format can influence consumer decision on the purchase of a product. This study combines information from qualitative inquiry, media trend analysis, eye tracking experiment, and questionnaire data to examine the impact of specific message format and consumer perceived risk on attention to the information and risk retention. We investigated the influence of message framing (goal framing, attribute framing, and mix framing) on consumer memory, study time, and decisional uncertainty while deciding on the purchase of drugs. Furthermore, we explored the impact of consumer perceived risk (associated with the use of the drug, i.e., RISK-AB and perceived risk associated with the non-use of the drug, i.e., RISK-EB) on message format preference. The study used eye-tracking methods to understand the differences in message processing. Findings of the study suggest that the message format influences information processing, and participants' risk perception impacts message format preference. Eye tracking can be used to understand the format differences and design effective advertisements.

Keywords: message framing, consumer perceived risk, advertising, eye tracking

Procedia PDF Downloads 96
7687 Classification of Health Risk Factors to Predict the Risk of Falling in Older Adults

Authors: L. Lindsay, S. A. Coleman, D. Kerr, B. J. Taylor, A. Moorhead

Abstract:

Cognitive decline and frailty is apparent in older adults leading to an increased likelihood of the risk of falling. Currently health care professionals have to make professional decisions regarding such risks, and hence make difficult decisions regarding the future welfare of the ageing population. This study uses health data from The Irish Longitudinal Study on Ageing (TILDA), focusing on adults over the age of 50 years, in order to analyse health risk factors and predict the likelihood of falls. This prediction is based on the use of machine learning algorithms whereby health risk factors are used as inputs to predict the likelihood of falling. Initial results show that health risk factors such as long-term health issues contribute to the number of falls. The identification of such health risk factors has the potential to inform health and social care professionals, older people and their family members in order to mitigate daily living risks.

Keywords: classification, falls, health risk factors, machine learning, older adults

Procedia PDF Downloads 119
7686 Risk-Realistic Decision Support Intervention for Women in the Workplace

Authors: Joshua Midha

Abstract:

This paper provides an evaluation of an intervention designed to promote a risk-realistic environment for women in the workplace and regulate their risk-related decision-making. In past research, women -specifically women of color- are highly risk-averse, and this may prove to be an innate obstacle in gender progress in corporations. By helping women see the risks and the benefits and increasing potential benefits, we can increase the chances of success in the workplace. Our intervention was a success and significantly increased comfort, trust, and frequency in the use of decision-making skills in the workplace. In this paper, we explore the intervention, the methods, the results, and the implications.

Keywords: behavioral economics, decision support, risk, gender equality

Procedia PDF Downloads 189
7685 Modification of the Risk for Incident Cancer with Changes in the Metabolic Syndrome Status: A Prospective Cohort Study in Taiwan

Authors: Yung-Feng Yen, Yun-Ju Lai

Abstract:

Background: Metabolic syndrome (MetS) is reversible; however, the effect of changes in MetS status on the risk of incident cancer has not been extensively studied. We aimed to investigate the effects of changes in MetS status on incident cancer risk. Methods: This prospective, longitudinal study used data from Taiwan’s MJ cohort of 157,915 adults recruited from 2002–2016 who had repeated MetS measurements 5.2 (±3.5) years apart and were followed up for the new onset of cancer over 8.2 (±4.5) years. A new diagnosis of incident cancer in study individuals was confirmed by their pathohistological reports. The participants’ MetS status included MetS-free (n=119,331), MetS-developed (n=14,272), MetS-recovered (n=7,914), and MetS-persistent (n=16,398). We used the Fine-Gray sub-distribution method, with death as the competing risk, to determine the association between MetS changes and the risk of incident cancer. Results: During the follow-up period, 7,486 individuals had new development of cancer. Compared with the MetS-free group, MetS-persistent individuals had a significantly higher risk of incident cancer (adjusted hazard ratio [aHR], 1.10; 95% confidence interval [CI], 1.03-1.18). Considering the effect of dynamic changes in MetS status on the risk of specific cancer types, MetS persistence was significantly associated with a higher risk of incident colon and rectum, kidney, pancreas, uterus, and thyroid cancer. The risk of kidney, uterus, and thyroid cancer in MetS-recovered individuals was higher than in those who remained MetS but lower than MetS-persistent individuals. Conclusions: Persistent MetS is associated with a higher risk of incident cancer, and recovery from MetS may reduce the risk. The findings of our study suggest that it is imperative for individuals with pre-existing MetS to seek treatment for this condition to reduce the cancer risk.

Keywords: metabolic syndrome change, cancer, risk factor, cohort study

Procedia PDF Downloads 49
7684 Risk Management in Healthcare Sector in Turkey: A Dental Hospital Case Study

Authors: Pırıl Tekin, Rızvan Erol

Abstract:

Risk management has become very important and popular in developing countries in recent years. Especially making patient and employee health and safety issues compulsory in the hospitals, raised the number of studies in Turkey. Also risk management become more important for hospital senior management from clinics to the laboratories. Because quality is really important to be chosen for both patients to consult and employees to prefer to work. And also risk management studies can lead to hospital management team about future works and methods. By this point of view, this study is the risk assessment carried out in the biggest dental hospital in the south part of Turkey. This study was conducted as a research case study, covering two different health care place; A Clinic and A Laboratory. It shows that the problems in this dental hospital and how it can solve all.

Keywords: risk management, healthcare, dental hospital, quality management

Procedia PDF Downloads 346
7683 The Sensitivity of Credit Defaults Swaps Premium to Global Risk Factor: Evidence from Emerging Markets

Authors: Oguzhan Cepni, Doruk Kucuksarac, M. Hasan Yilmaz

Abstract:

Changes in the global risk appetite cause co-movement in emerging market risk premiums. However, the sensitivity of the changes in risk premium to the global risk appetite may vary across emerging markets. In this study, how the global risk appetite affects Credit Default Swap (CDS) premiums in emerging markets are analyzed using Principal Component Analysis (PCA) and rolling regressions. The PCA results indicate that the first common component derived by the PCA accounts for almost 76 percent of the common variation in CDS premiums. Additionally, the explanatory power of the first factor seems to be high over the sample period. However, the sensitivity to the global risk factor tends to change over time and across countries. In this regard, fixed effects panel regressions are used to identify the macroeconomic factors driving the heterogeneity across emerging markets. The panel regression results point to the significance of government debt to GDP and international reserves to GDP in explaining sensitivity. Accordingly, countries with lower government debt and higher reserves tend to be less subject to the variations in the global risk appetite.

Keywords: credit default swaps, emerging markets, principal components analysis, sovereign risk

Procedia PDF Downloads 352
7682 Typhoon Disaster Risk Assessment of Mountain Village: A Case Study of Shanlin District in Kaohsiung

Authors: T. C. Hsu, H. L. Lin

Abstract:

Taiwan is mountainous country, 70% of land is covered with mountains. Because of extreme climate, the mountain villages with sensitive and fragile environment often get easily affected by inundation and debris flow from typhoon which brings huge rainfall. Due to inappropriate development, overuse and fewer access roads, occurrence of disaster becomes more frequent through downpour and rescue actions are postponed. However, risk map is generally established through administrative boundaries, the difference of urban and rural area is ignored. The neglect of mountain village characteristics eventually underestimates the importance of factors related to vulnerability and reduces the effectiveness. In disaster management, there are different strategies and actions at each stage. According to different tasks, there will be different risk indices and weights to analyze disaster risk for each stage and then it will contribute to confront threat and reduce impact appropriately on right time. Risk map is important in mitigation, but also in response stage because some factors such as road network will be changed by disaster. This study will use risk assessment to establish risk map of Shanlin District which is mountain village in Kaohsiung as a case study in mitigation and response stage through Analytic Hierarchy Process (AHP). AHP helps to recognize the composition and weights of risk factors in mountain village by experts’ opinions through survey design and is combined with present potential hazard map to produce risk map.

Keywords: risk assessment, mountain village, risk map, analytic hierarchy process

Procedia PDF Downloads 372
7681 Investigation of the Effect of Lecturers' Attributes on Students' Interest in Learning Statistic Ghanaian Tertiary Institutions

Authors: Samuel Asiedu-Addo, Jonathan Annan, Yarhands Dissou Arthur

Abstract:

The study aims to explore the relational effect of lecturers’ personal attribute on student’s interest in statistics. In this study personal attributes of lecturers’ such as lecturer’s dynamism, communication strategies and rapport in the classroom as well as applied knowledge during lecture were examined. Here, exploratory research design was used to establish the effect of lecturer’s personal attributes on student’s interest. Data were analyzed by means of confirmatory factor analysis and structural equation modeling (SEM) using the SmartPLS 3 program. The study recruited 376 students from the faculty of technical and vocational education of the University of Education Winneba Kumasi campus, and Ghana Technology University College as well as Kwame Nkrumah University of science and Technology. The results revealed that personal attributes of an effective lecturer were lecturer’s dynamism, rapport, communication and applied knowledge contribute (52.9%) in explaining students interest in statistics. Our regression analysis and structural equation modeling confirm that lecturers personal attribute contribute effectively by predicting student’s interest of 52.9% and 53.7% respectively. The paper concludes that the total effect of a lecturer’s attribute on student’s interest is moderate and significant. While a lecturer’s communication and dynamism were found to contribute positively to students’ interest, they were insignificant in predicting students’ interest. We further showed that a lecturer’s personal attributes such as applied knowledge and rapport have positive and significant effect on tertiary student’s interest in statistic, whilst lecturers’ communication and dynamism do not significantly affect student interest in statistics; though positively related.

Keywords: student interest, effective teacher, personal attributes, regression and SEM

Procedia PDF Downloads 335
7680 Contractual Risk Transfer in Islamic Home Financing: Analysis in Bank Malaysia

Authors: Ahmad Dahlan Salleh, Nik Abdul Rahim Nik Abdul Ghani, Muhamad Firdaus M. Hatta

Abstract:

Risk management has implications on pricing, governance arrangements, business practices and strategy. Nowadays, home financing contract offers more in the risk transfer form to increase bank profit. This is parallel with Islamic jurisprudence method al-Kharaj bi al-thaman (gain accompanies liability for loss) and al-ghurm bil ghunm (gain is justified with risk) that determine the matching between risk transfer and returns. Malaysian financing trend is to buy house. Besides, exists transparency lacking risk transfer issues to the clients because of not been informed clearly. Terms and conditions of each financing also do not reflect clearly that the risk has been transferred to the client, justifying a determination price been made. The assumption on risk occurrence is also inaccurate as each risk is different with the type of financing contract. This makes the Islamic Financial Services Act 2013 in providing standards that transparent and consistent can be used by Islamic financial institution less effective. This study examines how far the level of the risk and obligation incurred by bank and client under various Islamic home financing contract. This research is qualitative by using two methods, document analysis, and semi-structured interviews. Document analysis from literature review to identify profile, themes and risk transfer element in home financing from Islamic jurisprudence perspective. This study finds that need to create a risk transfer parameter by banks which are consistent with risk transfer theory according to Islamic jurisprudence. This study has potential to assist the authority in Islamic finance such as The Central Bank of Malaysia (Bank Negara Malaysia) in regulating Islamic banking industry so that the risk transfer valuation in home financing contract based on home financing good practice and determined risk limits.

Keywords: risk transfer, home financing contract, Sharia compliant, Malaysia

Procedia PDF Downloads 393
7679 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 457
7678 Causes and Effects of the 2012 Flood Disaster on Affected Communities in Nigeria

Authors: Abdulquadri Ade Bilau, Richard Ajayi Jimoh, Adejoh Amodu Adaji

Abstract:

The increasing exposures to natural hazards have continued to severely impair on the built environment causing huge fatalities, mass damage and destruction of housing and civil infrastructure while leaving psychosocial impacts on affected communities. The 2012 flood disaster in Nigeria which affected over 7 million inhabitants in 30 of the 36 states resulted in 363 recorded fatalities with about 600,000 houses and a number of civil infrastructure damaged or destroyed. In Kogi State, over 500 thousand people were displaced in 9 out of the 21 local government affected while Ibaji and Lokoja local governments were worst hit. This study identifies the causes and 2012 flood disasters and its effect on housing and livelihood. Personal observation and questionnaire survey were instruments used in carrying out the study and data collected were analysed using descriptive statistical tool. Findings show that the 2012 flood disaster was aided by the gap in hydrological data, sudden dam failure, and inadequate drainage capacity to reduce flood risk. The study recommends that communities residing along the river banks in Lokoja and Ibaji LGAs must be adequately educated on their exposure to flood hazard and mitigation and risk reduction measures such as construction of adequate drainage channel are constructed in affected communities.

Keywords: flood, hazards, housing, risk reduction, vulnerability

Procedia PDF Downloads 236
7677 Youth Involvement in Cybercrime in Nigeria: A Case Study of Ikeja Local Government Area

Authors: Niyi Adegoke, Saanumi Jimmy Omolou

Abstract:

The prevalence rate of youth involving in cybercrime is alarming, which calls for concern among the government, parents, NGO and religious bodies, hence this paper aims at examining youth involvement in cybercrime in Nigeria. Achievement motivation theory was used to explain the activities of cyber-criminals in Nigerian society. A descriptive survey method was adopted for the study. The sample for the study was one hundred and fifty (150) respondents randomly selected from the population of the study. A questionnaire was used to gather information and data from the respondents. Data collected through the questionnaire were analyzed using percentage tool for the respondents’ bio-data while chi-square was employed to test the hypotheses. Findings from the study have revealed that parental negligence, unemployment, peer influence, and quest for materialism were responsible for cyber-crimes in Nigeria. The study concludes with the following recommendations among which are: creating employment opportunities for the youths and ensure good governance and accountability among other things will go a long way to solve the problem of cybercrime in our society.

Keywords: cybercrime, youth, Nigeria, unemployment, information communication technology

Procedia PDF Downloads 191
7676 Digital Literacy Skills for Geologist in Public Sector

Authors: Angsumalin Puntho

Abstract:

Disruptive technology has had a great influence on our everyday lives and the existence of an organization. Geologists in the public sector need to keep up with digital technology and be able to work and collaborate in a more effective manner. The result from SWOT and 7S McKinsey analyses suggest that there are inadequate IT personnel, no individual digital literacy development plan, and a misunderstanding of management policies. The Office of Civil Service Commission develops digital literacy skills that civil servants and government officers should possess in order to work effectively; it consists of nine dimensions, including computer skills, internet skills, cyber security awareness, word processing, spreadsheets, presentation programs, online collaboration, graphics editors and cyber security practices; and six steps of digital literacy development including self-assessment, individual development plan, self-learning, certified test, learning reflection, and practices. Geologists can use digital literacy as a learning tool to develop themselves for better career opportunities.

Keywords: disruptive technology, digital technology, digital literacy, computer skills

Procedia PDF Downloads 75
7675 Research on the Risks of Railroad Receiving and Dispatching Trains Operators: Natural Language Processing Risk Text Mining

Authors: Yangze Lan, Ruihua Xv, Feng Zhou, Yijia Shan, Longhao Zhang, Qinghui Xv

Abstract:

Receiving and dispatching trains is an important part of railroad organization, and the risky evaluation of operating personnel is still reflected by scores, lacking further excavation of wrong answers and operating accidents. With natural language processing (NLP) technology, this study extracts the keywords and key phrases of 40 relevant risk events about receiving and dispatching trains and reclassifies the risk events into 8 categories, such as train approach and signal risks, dispatching command risks, and so on. Based on the historical risk data of personnel, the K-Means clustering method is used to classify the risk level of personnel. The result indicates that the high-risk operating personnel need to strengthen the training of train receiving and dispatching operations towards essential trains and abnormal situations.

Keywords: receiving and dispatching trains, natural language processing, risk evaluation, K-means clustering

Procedia PDF Downloads 46
7674 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 72
7673 The Study of Rapid Entire Body Assessment and Quick Exposure Check Correlation in an Engine Oil Company

Authors: Mohammadreza Ashouria, Majid Motamedzadeb

Abstract:

Rapid Entire Body Assessment (REBA) and Quick Exposure Check (QEC) are two general methods to assess the risk factors of work-related musculoskeletal disorders (WMSDs). This study aimed to compare ergonomic risk assessment outputs from QEC and REBA in terms of agreement in distribution of postural loading scores based on analysis of working postures. This cross-sectional study was conducted in an engine oil company in which 40 jobs were studied. A trained occupational health practitioner observed all jobs. Job information was collected to ensure the completion of ergonomic risk assessment tools, including QEC, and REBA. The result revealed that there was a significant correlation between final scores (r=0.731) and the action levels (r =0.893) of two applied methods. Comparison between the action levels and final scores of two methods showed that there was no significant difference among working departments. Most of the studied postures acquired low and moderate risk level in QEC assessment (low risk=20%, moderate risk=50% and High risk=30%) and in REBA assessment (low risk=15%, moderate risk=60% and high risk=25%).There is a significant correlation between two methods. They have a strong correlation in identifying risky jobs and determining the potential risk for incidence of WMSDs. Therefore, there is a possibility for researchers to apply interchangeably both methods, for postural risk assessment in appropriate working environments.

Keywords: observational method, QEC, REBA, musculoskeletal disorders

Procedia PDF Downloads 339
7672 Effect of Enterprise Risk Management Commitee on the Financial Performance of Listed Banks in Nigeria

Authors: Joseph Uche Azubike, Evelyn Ngozi Agbasi, M. I. Ogbonna

Abstract:

The audit committee of the board of directors could no longer handle the enterprise's risks. Therefore, a risk management committee was created to control them. Thus, this study examined how enterprise risk management committee characteristics affected Nigerian exchange-listed banks' financial performance from 2013 to 2022. The study's hypotheses and three objectives were to determine how enterprise risk management committee size, composition, and gender diversity affect Nigerian banks' performance. An ex-post facto study design collected secondary data from bank annual reports. We used descriptive statistics, correlation analysis, and Ordinary least square regression to analyze panel data. Enterprise risk management committee size and composition had both negative and no significant effect on bank financial performance in Nigeria, whereas enterprise risk committee gender diversity has a 10% favorable effect. The report advises that adding more women with relevant knowledge to the risk committee to boost performance and allowing women to be at the lead of such risk management could improve bank performance in Nigeria since they are noted to be thorough in their tasks.

Keywords: bank, committee, enterprise, management, performance, risk

Procedia PDF Downloads 15
7671 Qualitative Risk Assessment of Rift Valley Fever Vaccine Production

Authors: Mohammed E. Mansour, Tamador M. A. Elhassan, Nahid A. Ibrahim, Awatif A. Ahmed, Manal A. Abdalla

Abstract:

Rift valley fever (RVF) is mosquito-borne disease. RVF is transboundary zoonotic disease. It has socioeconomic and public health importance. This paper describes qualitative risk of the RVF vaccine production. RVF is endemic in the Sudan. It has been reported in Sudan due to abundance of Ades Eqytie. Thus, there is huge effort to control it. Vaccination practices had significant role to control and manage RVF. The risk assessment explains the likelihood of a risk as likely. Thus, insecticides and repellents synergize the effort of the vaccination.

Keywords: qualitative analysis, risk assessment, rift valley fever vaccine, quality control

Procedia PDF Downloads 480
7670 Adapting Cyber Physical Production Systems to Small and Mid-Size Manufacturing Companies

Authors: Yohannes Haile, Dipo Onipede, Jr., Omar Ashour

Abstract:

The main thrust of our research is to determine Industry 4.0 readiness of small and mid-size manufacturing companies in our region and assist them to implement Cyber Physical Production System (CPPS) capabilities. Adopting CPPS capabilities will help organizations realize improved quality, order delivery, throughput, new value creation, and reduced idle time of machines and work centers of their manufacturing operations. The key metrics for the assessment include the level of intelligence, internal and external connections, responsiveness to internal and external environmental changes, capabilities for customization of products with reference to cost, level of additive manufacturing, automation, and robotics integration, and capabilities to manufacture hybrid products in the near term, where near term is defined as 0 to 18 months. In our initial evaluation of several manufacturing firms which are profitable and successful in what they do, we found low level of Physical-Digital-Physical (PDP) loop in their manufacturing operations, whereas 100% of the firms included in this research have specialized manufacturing core competencies that have differentiated them from their competitors. The level of automation and robotics integration is low to medium range, where low is defined as less than 30%, and medium is defined as 30 to 70% of manufacturing operation to include automation and robotics. However, there is a significant drive to include these capabilities at the present time. As it pertains to intelligence and connection of manufacturing systems, it is observed to be low with significant variance in tying manufacturing operations management to Enterprise Resource Planning (ERP). Furthermore, it is observed that the integration of additive manufacturing in general, 3D printing, in particular, to be low, but with significant upside of integrating it in their manufacturing operations in the near future. To hasten the readiness of the local and regional manufacturing companies to Industry 4.0 and transitions towards CPPS capabilities, our working group (ADMAR Working Group) in partnership with our university have been engaged with the local and regional manufacturing companies. The goal is to increase awareness, share know-how and capabilities, initiate joint projects, and investigate the possibility of establishing the Center for Cyber Physical Production Systems Innovation (C2P2SI). The center is intended to support the local and regional university-industry research of implementing intelligent factories, enhance new value creation through disruptive innovations, the development of hybrid and data enhanced products, and the creation of digital manufacturing enterprises. All these efforts will enhance local and regional economic development and educate students that have well developed knowledge and applications of cyber physical manufacturing systems and Industry 4.0.

Keywords: automation, cyber-physical production system, digital manufacturing enterprises, disruptive innovation, new value creation, physical-digital-physical loop

Procedia PDF Downloads 113
7669 Objective and Subjective Preconditions for Entrepreneurship: From the Point of View of Enterprise Risk Management

Authors: Maria Luskova, Maria Hudakova, Katarina Buganova

Abstract:

Established objective and subjective preconditions for entrepreneurship, forming the business organically related whole, are the necessary condition of successful entrepreneurial activities. Objective preconditions for entrepreneurship are developed by the market economy that should stimulate entrepreneurship by allowing the use of economic opportunities for all those who want to do business in respective field while providing guarantees to all owners and creating a stable business environment for entrepreneurs. Subjective preconditions of entrepreneurship are formed primarily by personal characteristics of the entrepreneur. These are his properties, abilities, skills, physiological, and psychological preconditions which may be inherited, inborn or sequentially developed and obtained during his life on the basis of education and influences of surrounding environment. The paper is dealing with issues of objective and subjective preconditions for entrepreneurship and provides their analysis in view of the current situation in Slovakia. It presents risks of the business environment in Slovakia that the Slovak managers considered the most significant in 2014 and defines the dominant attributes of the entrepreneur in the current business environment in Slovakia.

Keywords: entrepreneurship, innovations, opportunity, risk, uncertainty

Procedia PDF Downloads 489
7668 Integrating Cyber-Physical System toward Advance Intelligent Industry: Features, Requirements and Challenges

Authors: V. Reyes, P. Ferreira

Abstract:

In response to high levels of competitiveness, industrial systems have evolved to improve productivity. As a consequence, a rapid increase in volume production and simultaneously, a customization process require lower costs, more variety, and accurate quality of products. Reducing time-cycle production, enabling customizability, and ensure continuous quality improvement are key features in advance intelligent industry. In this scenario, customers and producers will be able to participate in the ongoing production life cycle through real-time interaction. To achieve this vision, transparency, predictability, and adaptability are key features that provide the industrial systems the capability to adapt to customer demands modifying the manufacturing process through an autonomous response and acting preventively to avoid errors. The industrial system incorporates a diversified number of components that in advanced industry are expected to be decentralized, end to end communicating, and with the capability to make own decisions through feedback. The evolving process towards advanced intelligent industry defines a set of stages to empower components of intelligence and enhancing efficiency to achieve the decision-making stage. The integrated system follows an industrial cyber-physical system (CPS) architecture whose real-time integration, based on a set of enabler technologies, links the physical and virtual world generating the digital twin (DT). This instance allows incorporating sensor data from real to virtual world and the required transparency for real-time monitoring and control, contributing to address important features of the advanced intelligent industry and simultaneously improve sustainability. Assuming the industrial CPS as the core technology toward the latest advanced intelligent industry stage, this paper reviews and highlights the correlation and contributions of the enabler technologies for the operationalization of each stage in the path toward advanced intelligent industry. From this research, a real-time integration architecture for a cyber-physical system with applications to collaborative robotics is proposed. The required functionalities and issues to endow the industrial system of adaptability are identified.

Keywords: cyber-physical systems, digital twin, sensor data, system integration, virtual model

Procedia PDF Downloads 91
7667 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 318
7666 Co-integration for Soft Commodities with Non-Constant Volatility

Authors: E. Channol, O. Collet, N. Kostyuchyk, T. Mesbah, Quoc Hoang Long Nguyen

Abstract:

In this paper, a pricing model is proposed for co-integrated commodities extending Larsson model. The futures formulae have been derived and tests have been performed with non-constant volatility. The model has been applied to energy commodities (gas, CO2, energy) and soft commodities (corn, wheat). Results show that non-constant volatility leads to more accurate short term prices, which provides better evaluation of value-at-risk and more generally improve the risk management.

Keywords: co-integration, soft commodities, risk management, value-at-risk

Procedia PDF Downloads 527