Search results for: sterotype threat
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 982

Search results for: sterotype threat

892 A Review of How COVID-19 Has Created an Insider Fraud Pandemic and How to Stop It

Authors: Claire Norman-Maillet

Abstract:

Insider fraud, including its various synonyms such as occupational, employee or internal fraud, is a major financial crime threat whereby an employee defrauds (or attempts to defraud) their current, prospective, or past employer. ‘Employee’ covers anyone employed by the company, including contractors, directors, and part time staff; they may be a solo bad actor or working in collusion with others, whether internal or external. Insider fraud is even more of a concern given the impacts of the Coronavirus pandemic, which has generated multiple opportunities to commit insider fraud. Insider fraud is something that is not necessarily thought of as a significant financial crime threat; the focus of most academics and practitioners has historically been on that of ‘external fraud’ against businesses or entities where an individual or group has no professional ties. Without the face-to-face, ‘over the shoulder’ capabilities of staff being able to keep an eye on their employees, there is a heightened reliance on trust and transparency. With this, naturally, comes an increased risk of insider fraud perpetration. The objective of the research is to better understand how companies are impacted by insider fraud, and therefore how to stop it. This research will make both an original contribution and stimulate debate within the financial crime field. The financial crime landscape is never static – criminals are always creating new ways to perpetrate financial crime, and new legislation and regulations are implemented as attempts to strengthen controls, in addition to businesses doing what they can internally to detect and prevent it. By focusing on insider fraud specifically, the research will be more specific and will be of greater use to those in the field. To achieve the aims of the research, semi-structured interviews were conducted with 22 individuals who either work in financial services and deal with insider fraud or work within insider fraud perpetration in a recruitment or advisory capacity. This was to enable the sourcing of information from a wide range of individuals in a setting where they were able to elaborate on their answers. The principal recruitment strategy was engaging with the researcher’s network on LinkedIn. The interviews were then transcribed and analysed thematically. Main findings in the research suggest that insider fraud has been ignored owing to the denial of accepting the possibility that colleagues would defraud their employer. Whilst Coronavirus has led to a significant rise in insider fraud, this type of crime has been a major risk to businesses since their inception, however have never been given the financial or strategic backing required to be mitigated, until it's too late. Furthermore, Coronavirus should have led to companies tightening their access rights, controls and policies to mitigate the insider fraud risk. However, in most cases this has not happened. The research concludes that insider fraud needs to be given a platform upon which to be recognised as a threat to any company and given the same level of weighting and attention by Executive Committees and Boards as other types of economic crime.

Keywords: fraud, insider fraud, economic crime, coronavirus, Covid-19

Procedia PDF Downloads 37
891 Preserving Egypt's Cultural Heritage Amidst Urban Development: A Case Study of the Historic Cairo Cemetery

Authors: Ali Mahfouz

Abstract:

Egypt's cultural heritage and artistic riches find themselves at a complex intersection of preservation and urban development, where they face intricate challenges exacerbated by climate change, pollution, urbanization, and construction activities. In this research, it delves into the multifaceted dynamics involved in conserving Egypt's heritage within urban contexts, spotlighting the historic Cairo cemetery as a poignant and timely case study. The historic Cairo cemetery serves as a repository of priceless cultural assets, housing the final resting places of public figures, artists, historians, politicians, and other luminaries. These graves are adorned with magnificent artworks and rare tombstones, collectively representing an irreplaceable slice of Egypt's history and culture. Yet, the looming threat of demolition to make way for new infrastructure projects underscores the delicate equilibrium that preservation efforts must maintain in the face of urban development pressures. This paper illuminates the collaborative efforts of historians, intellectuals, and civil society organizations who are determined to forestall the destruction of this invaluable cultural heritage. Their initiatives, driven by a shared commitment to documenting and safeguarding the cemetery's treasures, underscore the urgent imperative of protecting Egypt's cultural legacy. Through this case study, It gain insights into how Egypt navigates the challenges of preserving its rich heritage amidst urban expansion and a changing climate, emphasizing the broader importance of heritage conservation in an evolving world.

Keywords: Egypt’s cultural heritage, urban development, historic Cairo cemetery, tombstone artworks, demolition threat, heritage conservation, civil society initiatives

Procedia PDF Downloads 45
890 Seismicity and Ground Response Analysis for MP Tourism Office in Indore, India

Authors: Deepshikha Shukla, C. H. Solanki, Mayank Desai

Abstract:

In the last few years, it has been observed that earthquake is proving a threat to the scientist across the world. With a large number of earthquakes occurring in day to day life, the threat to life and property has increased manifolds which call for an urgent attention of all the researchers globally to carry out the research in the field of Earthquake Engineering. Any hazard related to the earthquake and seismicity is considered to be seismic hazards. The common forms of seismic hazards are Ground Shaking, Structure Damage, Structural Hazards, Liquefaction, Landslides, Tsunami to name a few. Among all the natural hazards, the most devastating and damaging is the earthquake as all other hazards are triggered only after the occurrence of an earthquake. In order to quantify and estimate the seismicity and seismic hazards, many methods and approaches have been proposed in the past few years. Such approaches are Mathematical, Conventional and Computational. Convex Set Theory, Empirical Green’s Function are some of the Mathematical Approaches whereas the Deterministic and Probabilistic Approaches are the Conventional Approach for the estimation of the seismic Hazards. Ground response and Ground Shaking of a particular area or region plays an important role in the damage caused due to the earthquake. In this paper, seismic study using Deterministic Approach and 1 D Ground Response Analysis has been carried out for Madhya Pradesh Tourism Office in Indore Region in Madhya Pradesh in Central India. Indore lies in the seismic zone III (IS: 1893, 2002) in the Seismic Zoning map of India. There are various faults and lineament in this area and Narmada Some Fault and Gavilgadh fault are the active sources of earthquake in the study area. Deepsoil v6.1.7 has been used to perform the 1 D Linear Ground Response Analysis for the study area. The Peak Ground Acceleration (PGA) of the city ranges from 0.1g to 0.56g.

Keywords: seismicity, seismic hazards, deterministic, probabilistic methods, ground response analysis

Procedia PDF Downloads 135
889 Egyptian Soil Isolate Shows Promise as a Source of a New Broad-spectrum Antimicrobial Agent Against Multidrug-resistant Pathogens

Authors: Norhan H. Mahdally, Bathini Thissera Riham A. ElShiekh, Noha M. Elhosseiny, Mona T. Kashef, Ali M. El Halawany, Mostafa E. Rateb, Ahmed S. Attia

Abstract:

Multidrug-resistant (MDR) pathogens pose a global threat to healthcare settings. The exhaustion of the current antibiotic arsenal and the scarcity of new antimicrobials in the pipeline aggravate this threat and necessitate a prompt and effective response. This study focused on two major pathogens that can cause serious infections: carbapenem-resistant Acinetobacter baumannii (CRAB) and methicillin-resistant Staphylococcus aureus (MRSA). Multiple soil isolates were collected from several locations throughout Egypt and screened for their conventional and non-conventional antimicrobial activities against MDR pathogens. One isolate exhibited potent antimicrobial activity and was subjected to multiple rounds of fractionation. After fermentation and bio-guided fractionation, we identified pure microbial secondary metabolites with two scaffolds that exhibited promising effects against CRAB and MRSA. Scaling up and chemical synthesis of derivatives of the identified metabolite resulted in obtaining a more potent derivative, which we designated as 2HP. Cytotoxicity studies indicated that 2HP is well-tolerated by human cells. Ongoing work is focusing on formulating the new compound into a nano-formulation to enhance its delivery. Also, to have a better idea about how this compound works, a proteomic approach is currently underway. Our findings suggest that 2HP is a potential new broad-spectrum antimicrobial agent. Further studies are needed to confirm these findings and to develop 2HP into a safe and effective treatment for MDR infections.

Keywords: broad-spectrum antimicrobials, carbapenem-resistant acinetobacter baumannii, drug discovery, methicillin-resistant staphylococcus aureus, multidrug-resistant, natural products

Procedia PDF Downloads 46
888 Climate Change, Multiple Stressors, and Livelihoods: A Search for Communities Understanding, Vulnerability, and Adaptation in Zanzibar Islands

Authors: Thani R. Said

Abstract:

There is a wide concern on the academic literatures that the world is on course to experience “severe and pervasive” negative impacts from climate change unless it takes rapid action to slash its greenhouse gas emissions. The big threat however, is more belligerent in the third world countries, small islands states in particular. Most of the academic literatures claims that the livelihoods, economic and ecological landscapes of most of the coastal communities are into serious danger due to the peril of climate change. However, focusing the climate change alone and paying less intention to the surrounding stressors which sometimes are apparent then the climate change its self has now placed at the greater concern on academic debates. The recently studies have begun to question such narrowed assessment of climate change intervening programs from both its methodological and theoretical perspectives as related with livelihoods and the landscapes of the coastal communities. Looking climate as alone as an ostentatious threat doesn't yield the yield an appropriate mechanisms to address the problem in its totality and tend to provide the partially picture of the real problem striking the majority of the peoples living in the coastal areas of small islands states, Zanzibar in particular. By using the multiples human grounded knowledge approaches, the objective of this study is to go beyond the mere climate change by analyzing other multiples stressors that real challenging and treating the livelihoods, economic and ecological landscapes of the coastal communities through dialectic understanding, vulnerability and adaptive mechanisms at their own localities. To be more focus and to capture the full picture on this study special intention will be given to those areas were climate changes intervening programs have been onto place, the study will further compare and contrast between the two islands communities, Unguja and Pemba taking into account their respective diverse economic and geographical landscapes prevailed.

Keywords: climate change, multiple stressors, livelihoods, vulnerability-adaptation

Procedia PDF Downloads 369
887 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 43
886 Laboratory-Based Monitoring of Hepatitis B Virus Vaccination Status in North Central Nigeria

Authors: Nwadioha Samuel Iheanacho, Abah Paul, Odimayo Simidele Michael

Abstract:

Background: The World Health Assembly through the Global Health Sector Strategy on viral hepatitis calls for the elimination of viral hepatitis as a public health threat by 2030. All hands are on deck to actualize this goal through an effective and active vaccination and monitoring tool. Aim: To combine the Epidemiologic with Laboratory Hepatitis B Virus vaccination monitoring tools. Method: Laboratory results analysis of subjects recruited during the World Hepatitis week from July 2020 to July 2021 was done after obtaining their epidemiologic data on Hepatitis B virus risk factors, in the Medical Microbiology Laboratory of Benue State University Teaching Hospital, Nigeria. Result: A total of 500 subjects comprising males 60.0%(n=300/500) and females 40.0%(n=200/500) were recruited. A fifty-three percent majority was of the age range of 26 to 36 years. Serologic profiles were as follows, 15.0%(n=75/500) HBsAg; 7.0% (n=35/500) HBeAg; 8.0% (n=40/500) Anti-Hbe; 20.0% (n=100/500) Anti-HBc and 38.0% (n=190/500) Anti-HBs. Immune responses to vaccination were as follows, 47.0%(n=235/500) Immune naïve {no serologic marker + normal ALT}; 33%(n=165/500) Immunity by vaccination {Anti-HBs + normal ALT}; 5%(n=25/500) Immunity to previous infection {Anti-HBs, Anti-HBc, +/- Anti-HBe + normal ALT}; 8%(n=40/500) Carriers {HBsAg, Anti-HBc, Anti-HBe +normal ALT} and 7% (35/500) Anti-HBe serum- negative infections {HBsAg, HBeAg, Anti-HBc +elevated ALT}. Conclusion: The present 33.0% immunity by vaccination coverage in Central Nigeria was much lower than the 41.0% national peak in 2013, and a far cry from the global expectation of attainment of a Global Health Sector Strategy on the elimination of viral hepatitis as a public health threat by 2030. Therefore, more creative ideas and collective effort are needed to attain this goal of the World Health Assembly.

Keywords: Hepatitis B, vaccination status, laboratory tools, resource-limited settings

Procedia PDF Downloads 41
885 In Exile but Not at Peace: An Ethnography among Rwandan Army Deserters in South Africa

Authors: Florence Ncube

Abstract:

This paper examines the military and post-military experiences of soldiers who deserted from the Rwanda Defence Force (RDF) and tried to make a living in South Africa. Because they are deserters, they try to hide their military identity, yet it is simultaneously somewhat coercively ascribed to them by the Rwandan state and can put them in potential danger. The paper attends to the constructions, experiences, practices, and subjective understanding of the deserters’ being in exile to examine how, under circumstances of perceived threat, these men navigate real or perceived state-sponsored surveillance and threat in non-military settings in South Africa where they have become potential political and disciplinary targets. To make sense of the deserters’ experiences in these circumstances, the paper stitches together a number of useful theoretical concepts, including Bourdieu’s (1992) theory of practice and Vigh’s (2009; 2018) concept of social navigation because no single approach can coherently analyze the specificity of this study. Conventional post-military literature privileges an understanding of army desertion as a malignancy and somewhat problematic. Little is known about the military and post-military experiences of deserters who believe that army desertion is in fact a building block towards achieving subjective peace, even in the context of exile. The paper argues that the presence of Rwandan state agents in South Africa strips the context of the exile of its capacity to provide the deserters with peace, safety, and security. This paper recenters army desertion in analyses of militarism, soldiering, and transition in African contexts and complicates commonsense understandings of army desertion which assume that it is entirely problematic. This paper is drawn from an ethnography conducted among 30 junior-rank Rwandan army deserters exiled in Johannesburg and Cape Town. The researcher employed life histories, in-depth interviews, and deep hangouts to collect data.

Keywords: army deserter, military, identity, exile, peacebuilding, South Africa

Procedia PDF Downloads 43
884 A Comparative Human Rights Analysis of Expulsion as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

Where criminal law used to be the traditional response to cope with the terrorist threat, European governments are increasingly relying on administrative paths. The reliance on immigration law fits into this trend. Terrorism is seen as a civilization menace emanating from abroad. In this context, the expulsion of dangerous aliens, immigration law’s core task, is put forward as a key security tool. Governments all over Europe are focusing on removing dangerous individuals from their territory rather than bringing them to justice. This research reflects on the consequences for the expelled individuals’ fundamental rights. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, igniting the recourse to immigration law as a counterterrorism tool. Yet, they adopt a very different approach on this: the United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also 'securitized' its immigration policy after the recent terrorist hit in Stockholm, but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This paper addresses the situation in Belgium. In 2017, the Belgian parliament introduced several legislative changes by which it considerably expanded and facilitated the possibility to expel unwanted aliens. First, the expulsion measure was subjected to new and questionably definitions: a serious attack on the nation’s safety used to be required to expel certain categories of aliens. Presently, mere suspicions suffice to fulfil the new definition of a 'serious threat to national security'. A definition which fails to respond to the principle of legality; the law, nor the prepatory works clarify what is meant by 'a threat to national security'. This creates the risk of submitting this concept’s interpretation almost entirely to the discretion of the immigration authorities. Secondly, in name of intervening more quickly and efficiently, the automatic suspensive appeal for expulsions was abolished. The European Court of Human Rights nonetheless requires such an automatic suspensive appeal under Article 13 and 3 of the Convention. Whether this procedural reform will stand to endure, is thus questionable. This contribution also raises questions regarding expulsion’s efficacy as a key security tool. In a globalized and mobilized world, particularly in a European Union with no internal boundaries, questions can be raised about the usefulness of this measure. Even more so, by simply expelling a dangerous individual, States avoid their responsibility and shift the risk to another State. Criminal law might in these instances be more capable of providing a conclusive and long term response. This contribution explores the human rights consequences of expulsion as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counter-terrorism and human rights, expulsion, immigration law

Procedia PDF Downloads 96
883 Brown-Spot Needle Blight: An Emerging Threat Causing Loblolly Pine Needle Defoliation in Alabama, USA

Authors: Debit Datta, Jeffrey J. Coleman, Scott A. Enebak, Lori G. Eckhardt

Abstract:

Loblolly pine (Pinus taeda) is a leading productive timber species in the southeastern USA. Over the past three years, an emerging threat is expressed by successive needle defoliation followed by stunted growth and tree mortality in loblolly pine plantations. Considering economic significance, it has now become a rising concern among landowners, forest managers, and forest health state cooperators. However, the symptoms of the disease were perplexed somewhat with root disease(s) and recurrently attributed to invasive Phytophthora species due to the similarity of disease nature and devastation. Therefore, the study investigated the potential causal agent of this disease and characterized the fungi associated with loblolly pine needle defoliation in the southeastern USA. Besides, 70 trees were selected at seven long-term monitoring plots at Chatom, Alabama, to monitor and record the annual disease incidence and severity. Based on colony morphology and ITS-rDNA sequence data, a total of 28 species of fungi representing 17 families have been recovered from diseased loblolly pine needles. The native brown-spot pathogen, Lecanosticta acicola, was the species most frequently recovered from unhealthy loblolly pine needles in combination with some other common needle cast and rust pathogen(s). Identification was confirmed using morphological similarity and amplification of translation elongation factor 1-alpha gene region of interest. Tagged trees were consistently found chlorotic and defoliated from 2019 to 2020. The current emergence of the brown-spot pathogen causing loblolly pine mortality necessitates the investigation of the role of changing climatic conditions, which might be associated with increased pathogen pressure to loblolly pines in the southeastern USA.

Keywords: brown-spot needle blight, loblolly pine, needle defoliation, plantation forestry

Procedia PDF Downloads 109
882 The Georgians’ Discourses of National Identity in the Context of Europeanisation

Authors: Lia Tsuladze

Abstract:

The paper discusses the Georgians’ online discourses of national identity in the context of Europeanisation focusing on two periods - initialing of the EU-Georgia Association Agreement in November 2013 and signing it in June 2014. Discussing how the Georgians’ aspiration to integrate with the EU is combined with their perception of Europeanisation as a threat to the national identity, the author explores how the national sentiment is expressed in the above discourses while performed for the local vs. international audiences.

Keywords: Europeanisation, frontstage, backstage discourses, Georgia, national identity

Procedia PDF Downloads 473
881 A Risk-Based Comprehensive Framework for the Assessment of the Security of Multi-Modal Transport Systems

Authors: Mireille Elhajj, Washington Ochieng, Deeph Chana

Abstract:

The challenges of the rapid growth in the demand for transport has traditionally been seen within the context of the problems of congestion, air quality, climate change, safety, and affordability. However, there are increasing threats including those related to crime such as cyber-attacks that threaten the security of the transport of people and goods. To the best of the authors’ knowledge, this paper presents for the first time, a comprehensive framework for the assessment of the current and future security issues of multi-modal transport systems. The approach or method proposed is based on a structured framework starting with a detailed specification of the transport asset map (transport system architecture), followed by the identification of vulnerabilities. The asset map and vulnerabilities are used to identify the various approaches for exploitation of the vulnerabilities, leading to the creation of a set of threat scenarios. The threat scenarios are then transformed into risks and their categories, and include insights for their mitigation. The consideration of the mitigation space is holistic and includes the formulation of appropriate policies and tactics and/or technical interventions. The quality of the framework is ensured through a structured and logical process that identifies the stakeholders, reviews the relevant documents including policies and identifies gaps, incorporates targeted surveys to augment the reviews, and uses subject matter experts for validation. The approach to categorising security risks is an extension of the current methods that are typically employed. Specifically, the partitioning of risks into either physical or cyber categories is too limited for developing mitigation policies and tactics/interventions for transport systems where an interplay between physical and cyber processes is very often the norm. This interplay is rapidly taking on increasing significance for security as the emergence of cyber-physical technologies, are shaping the future of all transport modes. Examples include: Connected Autonomous Vehicles (CAVs) in road transport; the European Rail Traffic Management System (ERTMS) in rail transport; Automatic Identification System (AIS) in maritime transport; advanced Communications, Navigation and Surveillance (CNS) technologies in air transport; and the Internet of Things (IoT). The framework adopts a risk categorisation scheme that considers risks as falling within the following threat→impact relationships: Physical→Physical, Cyber→Cyber, Cyber→Physical, and Physical→Cyber). Thus the framework enables a more complete risk picture to be developed for today’s transport systems and, more importantly, is readily extendable to account for emerging trends in the sector that will define future transport systems. The framework facilitates the audit and retro-fitting of mitigations in current transport operations and the analysis of security management options for the next generation of Transport enabling strategic aspirations such as systems with security-by-design and co-design of safety and security to be achieved. An initial application of the framework to transport systems has shown that intra-modal consideration of security measures is sub-optimal and that a holistic and multi-modal approach that also addresses the intersections/transition points of such networks is required as their vulnerability is high. This is in-line with traveler-centric transport service provision, widely accepted as the future of mobility services. In summary, a risk-based framework is proposed for use by the stakeholders to comprehensively and holistically assess the security of transport systems. It requires a detailed understanding of the transport architecture to enable a detailed vulnerabilities analysis to be undertaken, creates threat scenarios and transforms them into risks which form the basis for the formulation of interventions.

Keywords: mitigations, risk, transport, security, vulnerabilities

Procedia PDF Downloads 131
880 A Model of Human Security: A Comparison of Vulnerabilities and Timespace

Authors: Anders Troedsson

Abstract:

For us humans, risks are intimately linked to human vulnerabilities - where there is vulnerability, there is potentially insecurity, and risk. Reducing vulnerability through compensatory measures means increasing security and decreasing risk. The paper suggests that a meaningful way to approach the study of risks (including threats, assaults, crisis etc.), is to understand the vulnerabilities these external phenomena evoke in humans. As is argued, the basis of risk evaluation, as well as responses, is the more or less subjective perception by the individual person, or a group of persons, exposed to the external event or phenomena in question. This will be determined primarily by the vulnerability or vulnerabilities that the external factor are perceived to evoke. In this way, risk perception is primarily an inward dynamic, rather than an outward one. Therefore, a route towards an understanding of the perception of risks, is a closer scrutiny of the vulnerabilities which they can evoke, thereby approaching an understanding of what in the paper is called the essence of risk (including threat, assault etc.), or that which a certain perceived risk means to an individual or group of individuals. As a necessary basis for gauging the wide spectrum of potential risks and their meaning, the paper proposes a model of human vulnerabilities, drawing from i.a. a long tradition of needs theory. In order to account for the subjectivity factor, which mediates between the innate vulnerabilities on the one hand, and the event or phenomenon out there on the other hand, an ensuing ontological discussion about the timespace characteristics of risk/threat/assault as perceived by humans leads to the positing of two dimensions. These two dimensions are applied on the vulnerabilities, resulting in a modelling effort featuring four realms of vulnerabilities which are related to each other and together represent a dynamic whole. In approaching the problem of risk perception, the paper thus defines the relevant realms of vulnerabilities, depicting them as a dynamic whole. With reference to a substantial body of literature and a growing international policy trend since the 1990s, this model is put in the language of human security - a concept relevant not only for international security studies and policy, but also for other academic disciplines and spheres of human endeavor.

Keywords: human security, timespace, vulnerabilities, risk perception

Procedia PDF Downloads 302
879 Microbial Load, Prevalence and Antibiotic Resistance of Microflora Isolated from the Ghanaian Paper Currency Note: A Potential Health Threat

Authors: Simon Nyarko

Abstract:

This study examined the microbial flora contamination of the Ghanaian paper currency notes and antibiotic resistance in Ejura Municipal, Ashanti Region, Ghana. This is a descriptive cross-sectional study designed to assess the profile of microflora contamination of the Ghanaian paper currency notes and antibiotic-resistant in the Ejura Municipality. The research was conducted in Ejura, a town in the Ejura Sekyeredumase Municipal of the Ashanti region of Ghana. 70 paper currency notes which were freshly collected from the bank, consisting of 15 pieces of GH ¢1, GH ¢2, and GH ¢5, 10 pieces of GH ¢10 and GH ¢20, and 5 pieces of GH ¢50, were randomly sampled from people by exchanging their money in usage with those freshly secured from the bank. The surfaces of each GH¢ note were gently swabbed and sent to the lab immediately in sterile Zip Bags and sealed, and tenfold serial dilution was inoculated on plate count agar (PCA), MacConkey agar (MCA), mannitol salt agar (MSA), and deoxycholate citrate agar (DCA). For bacterial identification, the study used appropriate laboratory and biochemical tests. The data was analyzed using SPSS-IBM version 20.0. It was found that 95.2 % of the 70 GH¢ notes tested positive for one or more bacterial isolates. On each GH¢ note, mean counts on PCA ranged from 3.0 cfu/ml ×105 to 4.8 cfu/ml ×105. Of 124 bacteria isolated. 36 (29.03 %), 32 (25.81%), 16 (12.90 %), 20 (16.13%), 13 (10.48 %), and 7 (5.66 %) were from GH¢1, GH¢2, GH¢10, GH¢5, GH¢20, and GH¢50, respectively. Bacterial isolates were Escherichia coli (25.81%), Staphylococcus aureus (18.55%), coagulase-negative Staphylococcus (15.32%), Klebsiella species (12.10%), Salmonella species (9.68%), Shigella species (8.06%), Pseudomonas aeruginosa (7.26%), and Proteus species (3.23%). Meat shops, commercial drivers, canteens, grocery stores, and vegetable shops contributed 25.81 %, 20.16 %, 19.35 %, 17.74 %, and 16.94 % of GH¢ notes, respectively. There was 100% resistance of the isolates to Erythromycin (ERY), and Cotrimoxazole (COT). Amikacin (AMK) was the most effective among the antibiotics as 75% of the isolates were susceptible to it. This study has demonstrated that the Ghanaian paper currency notes are heavily contaminated with potentially pathogenic bacteria that are highly resistant to the most widely used antibiotics and are a threat to public health.

Keywords: microflora, antibiotic resistance, staphylococcus aureus, culture media, multi-drug resistance

Procedia PDF Downloads 77
878 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 107
877 Chilled Books: Managing Defamatory Content in Non-fiction Trade Publishing

Authors: Katherine Day

Abstract:

Non-fiction genres (autobiographies and biographies, true stories and criticism, investigative journalism and narrative journalism) have enjoyed increasing sales in the English-language publishing territories over the last decade, but writing the tell-all or exposé is not without consequences: defamation laws cast a “chilling effect” by regarding reputation above publications with a public interest element. This is evident in the many publications that have been amended or pulped after publication. These communications, alterations and negotiations indicate that the threat of legal action forms part of the editorial decision-making around such publications, the presence of which could be attributed to strict defamation laws. In the UK and Australia, particularly, defamation law has proved notoriously biased in favour of plaintiffs. The legal obstacles have prompted law reform by way of section 4 of the UK Defamation Act, which allows for editorial assessment into whether the statement/s made are in the public interest; as of July 1st 2021, the NSW Government in Australia also implemented reforms to help steer the law towards more flexibility in the digital age – the most interesting of these developments for commercial publishing being the new ‘public interest’ defence (s 29A), which is modelled on the UK’s section 4 and which most states in Australia have now integrated into their respective state laws (Queensland, new South Wales, Victoria and South Australia, with the remaining states committing at a later date). This paper will outline and discuss the preliminary findings of a 1-year project that aims to explore how potentially litigious content is managed in unpublished non-fiction manuscripts in two countries identified as having strict defamation laws: Australia and the UK. Significantly, it expects to indicate the burden of current defamation laws on publishing practice and publishing outputs in these countries by interrogating in-house editorial processes and the likelihood of editorial management in a ‘post negotiation space’, where the activities and communication between authors and editors are reconstructed, if necessary, to correct the author/publisher power balance and affirm the business relationship. In doing so, the project asks: has the threat, explicit or implicit, of defamation action produced a significant chilling effect in trade non-fiction publishing in the UK and Australia?

Keywords: defamation, publishing, socio-legal, authorship, editing, literature

Procedia PDF Downloads 34
876 Protection of the Object of the Critical Infrastructure in the Czech Republic

Authors: Michaela Vašková

Abstract:

With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.

Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit

Procedia PDF Downloads 313
875 The Threat of International Terrorism and Its Impact on UK Migration Policy and Practice

Authors: Baljit Soroya

Abstract:

Transnational communities are as a consequence of greater mobility of people, globalization and digitization have had a major impact on international relations and diasporas in the context of external conflicts. To a significant extent conflicts are becoming deterritorialised and informed by both internal (state politics) and external (foreign policy) players such as in Iraq and Syria leading to forced migration of unprecedented levels within the last two decades. The situation of forced migrants has, it is suggested, worsened as a consequence of the neo-liberal policies and requirements of organizations such as the European Bank. A case example of this being that of Greece, and the exacerbation of insecurity for Greek nationals and the demonization of refugees seeking sanctuary. This has been as a consequence, in part, of the neoliberal dogma of the European Bank. The article analyses the complex intersection of the real and perceived threats of international terrorism and the manner in which UK migration policy and Practice is unfolding. The policy and practice developments are explored in the context of the shift in politics in both the UK and wider Europe to the far right and the drift of main stream political parties to the right. In many cases, the mainstream political groupings, have co-opted the fears as presented by far right organization for political their own political gains, such as in the UK and France In its analysis it will be argued that, whilst international terrorism is an issue of concern, however in the context of the UK it is not of the same scale as the effects of climate change or indeed domestic violence. Given that, the question has to be asked why the threat of international terrorism is having such an impact on UK migration policy and practice and, specifically refugees. Furthermore, it is argued that this policy and practice are being formulated within a narrative that portrays migrants as the problem both in relation to terrorism and the disenfranchisement of ‘ordinary white communities’. The intersectionality of social, economic inequalities, fear of international terrorism, increase in conflicts and the political climate have contributed to a lack of trust of political establishments that have in turn sought to impress the public with their anti-immigrant rhetoric and policy agendas. The article ends by suggesting that whilst politics and political affiliations have become fractured there are nevertheless spaces for collective action, particularly in relation to issues of refugees.

Keywords: international terrorism, migration policy, conflict, media, community, politics

Procedia PDF Downloads 304
874 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security

Authors: Yael Deutsch, Arieh Gavious

Abstract:

The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.

Keywords: game theory, profiling, security, nash equilibrium

Procedia PDF Downloads 79
873 Contingent Presences in Architecture: Vitruvian Theory as a Beginning

Authors: Zelal Çınar

Abstract:

This paper claims that architecture is a contingent discipline, despite the fact that its contingency has long been denied through a retreat to Vitruvian writing. It is evident that contingency is rejected not only by architecture but also by modernity as a whole. Vitruvius attempted to cover the entire field of architecture in a systematic form in order to bring the whole body of this great discipline to a complete order. The legacy of his theory hitherto lasted not only that it is the only major work on the architecture of Classical Antiquity to have survived, but also that its conformity with the project of modernity. In the scope of the paper, it will be argued that contingency should be taken into account rather than avoided as a potential threat.

Keywords: architecture, contingency, modernity, Vitruvius

Procedia PDF Downloads 257
872 From the Local to the Global: New Terrorism

Authors: Shamila Ahmed

Abstract:

The paper examines how the fluidity between the local level and the global level is an intrinsic feature of new terrorism. Through using cosmopolitanism, the narratives of the two opposing sides of ISIS and the ‘war on terrorism’ response are explored. It is demonstrated how the fluidity between these levels facilitates the radicalisation process through exploring how groups such as ISIS highlight the perceived injustices against Muslims locally and globally and therefore exploit the globalisation process which has reduced the space between these levels. Similarly, it is argued that the ‘war on terror’ involves the intersection of fear, security, threat, risk and social control as features of both the international ‘war on terror’ and intra state policies.

Keywords: terrorism, war on terror, cosmopolitanism, global level terrorism

Procedia PDF Downloads 552
871 A Saturation Attack Simulation on a Navy Warship Based on Discrete-Event Simulation Models

Authors: Yawei Liang

Abstract:

Threat from cruise missiles is among the most dangerous considerations to a warship in the modern era: anti-ship cruise missiles are fast, accurate, and extremely destructive. In this paper, the goal was to use an object-orientated environment to program a simulation to model a scenario in which a lone frigate is attacked by a wave of missiles fired at given intervals. The parameters of the simulation are modified to examine the relationships between different variables in the situation, and an analysis is performed on various aspects of the defending ship’s equipment. Finally, the results are presented, along with a brief discussion.

Keywords: discrete event simulation, Monte Carlo simulation, naval resource management, weapon-target allocation/assignment

Procedia PDF Downloads 61
870 DOS and DDOS Attacks

Authors: Amin Hamrahi, Niloofar Moghaddam

Abstract:

Denial of Service is for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. Denial of Service (DoS) attacks have become a major threat to current computer networks. Many recent DoS attacks were launched via a large number of distributed attacking hosts in the Internet. These attacks are called distributed denial of service (DDoS) attacks. To have a better understanding on DoS attacks, this article provides an overview on existing DoS and DDoS attacks and major defense technologies in the Internet.

Keywords: denial of service, distributed denial of service, traffic, flooding

Procedia PDF Downloads 362
869 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 404
868 Records of Lepidopteron Borers (Lepidoptera) on Stored Seeds of Indian Himalayan Conifers

Authors: Pawan Kumar, Pitamber Singh Negi

Abstract:

Many of the regeneration failures in conifers are often being attributed to heavy insect attack and pathogens during the period of seed formation and under storage conditions. Conifer berries and seed insects occur throughout the known range of the hosts and also limit the production of seed for nursery stock. On occasion, even entire seed crops are lost due to insect attacks. The berry and seeds of both the species have been found to be infected with insects. Recently, heavy damage to the berry and seeds of Juniper and Chilgoza Pine was observed in the field as well as in stored conditions, leading to reduction in the viability of seeds to germinate. Both the species are under great threat and regeneration of the species is very low. Due to lack of adequate literature, the study on the damage potential of seed insects was urgently required to know the exact status of the insect-pests attacking seeds/berries of both the pine species so as to develop pest management practices against the insect pests attack. As both the species are also under threat and are fighting for survival, so the study is important to develop management practices for the insect-pests of seeds/berries of Juniper and Chilgoza pine so as to evaluate in the nursery, as these species form major vegetation of their distribution zones. A six-year study on the management of insect pests of seeds of Chilgoza revealed that seeds of this species are prone to insect pests mainly borers. During present investigations, it was recorded that cones of are heavily attacked only by Dioryctria abietella (Lepidoptera: Pyralidae) in natural conditions, but seeds which are economically important are heavily infected, (sometimes up to 100% damage was also recorded) by insect borer, Plodia interpunctella (Lepidoptera: Pyralidae) and is recorded for the first time ‘to author’s best knowledge’ infesting the stored Chilgoza seeds. Similarly, Juniper berries and seeds were heavily attacked only by a single borer, Homaloxestis cholopis (Lepidoptera: Lecithoceridae) recorded as a new report in natural habitat as well as in stored conditions. During the present investigation details of insect pest attack on Juniper and Chilgoza pine seeds and berries was observed and suitable management practices were also developed to contain the insect-pests attack.

Keywords: borer, chilgozapine, cones, conifer, Lepidoptera, juniper, management, seed

Procedia PDF Downloads 116
867 The Introduction of Modern Diagnostic Techniques and It Impact on Local Garages

Authors: Mustapha Majid

Abstract:

Gone were the days when technicians/mechanics will have to spend too much time trying to identify a mechanical fault and rectify the problem. Now the emphasis is on the use of Automobile diagnosing Equipment through the use of computers and special software. An investigation conducted at Tamale Metropolis and Accra in the Northern and Greater Accra regions of Ghana, respectively. Methodology for data gathering were; questionnaires, physical observation, interviews, and newspaper. The study revealed that majority of mechanics lack computer skills which can enable them use diagnosis tools such as Exhaust Gas Analyzer, Scan Tools, Electronic Wheel Balancing machine, etc.

Keywords: diagnosing, local garages and modern garages, lack of knowledge of diagnosing posing an existential threat, training of local mechanics

Procedia PDF Downloads 121
866 Fuzzy Expert Approach for Risk Mitigation on Functional Urban Areas Affected by Anthropogenic Ground Movements

Authors: Agnieszka A. Malinowska, R. Hejmanowski

Abstract:

A number of European cities are strongly affected by ground movements caused by anthropogenic activities or post-anthropogenic metamorphosis. Those are mainly water pumping, current mining operation, the collapse of post-mining underground voids or mining-induced earthquakes. These activities lead to large and small-scale ground displacements and a ground ruptures. The ground movements occurring in urban areas could considerably affect stability and safety of structures and infrastructures. The complexity of the ground deformation phenomenon in relation to the structures and infrastructures vulnerability leads to considerable constraints in assessing the threat of those objects. However, the increase of access to the free software and satellite data could pave the way for developing new methods and strategies for environmental risk mitigation and management. Open source geographical information systems (OS GIS), may support data integration, management, and risk analysis. Lately, developed methods based on fuzzy logic and experts methods for buildings and infrastructure damage risk assessment could be integrated into OS GIS. Those methods were verified base on back analysis proving their accuracy. Moreover, those methods could be supported by ground displacement observation. Based on freely available data from European Space Agency and free software, ground deformation could be estimated. The main innovation presented in the paper is the application of open source software (OS GIS) for integration developed models and assessment of the threat of urban areas. Those approaches will be reinforced by analysis of ground movement based on free satellite data. Those data would support the verification of ground movement prediction models. Moreover, satellite data will enable our mapping of ground deformation in urbanized areas. Developed models and methods have been implemented in one of the urban areas hazarded by underground mining activity. Vulnerability maps supported by satellite ground movement observation would mitigate the hazards of land displacements in urban areas close to mines.

Keywords: fuzzy logic, open source geographic information science (OS GIS), risk assessment on urbanized areas, satellite interferometry (InSAR)

Procedia PDF Downloads 127
865 Understanding the Accumulation of Microplastics in Riverbeds and Soils

Authors: Gopala Krishna Darbha

Abstract:

Microplastics (MPs) are secondary fragments of large-sized plastic debris released into the environment and fall in the size range of less than 5 mm. Though reports indicate the abundance of MPs in both riverine and soil environments, their fate is still not completely understood due to the complexity of natural conditions. Mineral particles are ubiquitous in the rivers and may play a vital role in accumulating MPs to the riverbed, thus affecting the benthic life and posing a threat to the river's health. Apart, the chemistry (pH, ionic strength, humics) at the interface can be very prominent. The MPs can also act as potential vectors to transport other contaminants in the environment causing secondary water pollution. The present study focuses on understanding the interaction of MPs with weathering sequence of minerals (feldspar, kaolinite and gibbsite) under batch mode under relevant environmental and natural conditions. Simultaneously, we performed stability studies and transport (column) experiments to understand the mobility of MPs under varying soil solutions (SS) chemistry and the influence of contaminants (CuO nanoparticles). Results showed that the charge and morphology of the gibbsite played an significant role in sorption of NPs (108.1 mg/g) compared to feldspar (7.7 mg/g) and kaolinite (11.9 mg/g). The Fourier transform infrared spectroscopy data supports the complexation of NPs with gibbsite particles via hydrogen bonding. In case of feldspar and kaolinite, a weak interaction with NPs was observed which can be due to electrostatic repulsions and low surface area to volume ration of the mineral particles. The study highlights the enhanced mobility in presence of feldspar and kaolinite while gibbsite rich zones can cause entrapment of NPs accumulating in the riverbeds. In the case of soils, in the absence of MPs, a very high aggregation of CuO NPs observed in SS extracted from black, lateritic, and red soils, which can be correlated with ionic strength (IS) and type of ionic species. The sedimentation rate (Ksed(1/h)) for CuO NPs was >0.5 h−1 in the case of these SS. Interestingly, the stability and sedimentation behavior of CuO NPs varied significantly in the presence of MPs. The Ksed for CuO NPs decreased to half and found <0.25 h−1 in the presence of MPs in all SS. C/C0 values in breakthrough curves increased drastically (black < alluvial < laterite < red) in the presence of MPs. Results suggest that the release of MPs in the terrestrial ecosystem is a potential threat leading to increased mobility of metal nanoparticles in the environment.

Keywords: microplastics, minerals, sorption, soils

Procedia PDF Downloads 61
864 Illicit Arms and the Emergence of Armed Groups in Nigeria

Authors: Halilu Babaji, Adamu Buba

Abstract:

Illicit arms and the emergence of armed groups have witnessed unprecedented situations of political uncertainties in Nigeria, and the twenty-first century globalisation has established the process that has benefited a good number of militia groups and thereby boosting both illicit arms movement and the thriving of terrorist groups, which are largely responsible for the longstanding threat to the national security and stability of the country. This has unleashed unforeseen consequences on the entire Sub-region, following an inflow of weapons and armed fighter which are motivated by weak governance, insecurity and poverty. The social, economic and political environments make it a fertile breeding ground for the penetration and development of terrorist groups in Sub-Saharan Africa.

Keywords: arms, emergence, insecurity, groups

Procedia PDF Downloads 229
863 The Effect of Air Entraining Agents on Compressive Strength

Authors: Demet Yavuz

Abstract:

Freeze-thaw cycles are one of the greatest threats to concrete durability. Lately, protection against this threat excites scientists’ attention. Air-entraining admixtures have been widely used to produce freeze-thaw resistant at concretes. The use of air-entraining agents (AEAs) enhances not only freeze-thaw endurance but also the properties of fresh concrete such as segregation, bleeding and flow ability. This paper examines the effects of air-entraining on compressive strength of concrete. Air-entraining is used between 0.05% and 0.4% by weight of cement. One control and four fiber reinforced concrete mixes are prepared and three specimens are tested for each mix. It is concluded from the test results that when air entraining is increased the compressive strength of concrete reduces for all mixes with AEAs.

Keywords: concrete, air-entraining, compressive strength, mechanical properties

Procedia PDF Downloads 244