Search results for: student at risk
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8035

Search results for: student at risk

7615 Bayesian Value at Risk Forecast Using Realized Conditional Autoregressive Expectiel Mdodel with an Application of Cryptocurrency

Authors: Niya Chen, Jennifer Chan

Abstract:

In the financial market, risk management helps to minimize potential loss and maximize profit. There are two ways to assess risks; the first way is to calculate the risk directly based on the volatility. The most common risk measurements are Value at Risk (VaR), sharp ratio, and beta. Alternatively, we could look at the quantile of the return to assess the risk. Popular return models such as GARCH and stochastic volatility (SV) focus on modeling the mean of the return distribution via capturing the volatility dynamics; however, the quantile/expectile method will give us an idea of the distribution with the extreme return value. It will allow us to forecast VaR using return which is direct information. The advantage of using these non-parametric methods is that it is not bounded by the distribution assumptions from the parametric method. But the difference between them is that expectile uses a second-order loss function while quantile regression uses a first-order loss function. We consider several quantile functions, different volatility measures, and estimates from some volatility models. To estimate the expectile of the model, we use Realized Conditional Autoregressive Expectile (CARE) model with the bayesian method to achieve this. We would like to see if our proposed models outperform existing models in cryptocurrency, and we will test it by using Bitcoin mainly as well as Ethereum.

Keywords: expectile, CARE Model, CARR Model, quantile, cryptocurrency, Value at Risk

Procedia PDF Downloads 85
7614 Awareness and Recognition: A Legitimate-Geographic Model for Analyzing the Determinants of Corporate Perceptions of Climate Change Risk

Authors: Seyedmohammad Mousavian, Hanlu Fan, Quingliang Tang

Abstract:

Climate change is emerging as a severe threat to our society, so businesses are expected to take actions to mitigate carbon emissions. However, the actions to be taken depend on managers’ perceptions of climate change risks. Yet, there is scant research on this issue, and understanding of the determinants of corporate perceptions of climate change is extremely limited. The purpose of this study is to close this gap by examining the relationship between perceptions of climate risk and firm-level and country-level factors. In this study, climate change risk captures physical, regulatory, and other risks, and we use data from European companies that participated in CDP from 2010 to 2017. This study reveals those perceptions of climate change risk are significantly positively associated with the environmental, social, and governance score, firm size, and membership in a carbon-intensive sector. In addition, we find that managers in firms operating in a geographic area that is sensitive to the consequences of global warming are more likely to perceive and formally recognize carbon-related risks in their CDP reports.

Keywords: carbon actions, CDP, climate change risk, risk perception

Procedia PDF Downloads 253
7613 Factors Constraining the Utilization of Risk Management Strategies in the Execution of Public Construction Projects in North East Nigeria

Authors: S. U. Kunya, S. A. Mohammad

Abstract:

Construction projects in Nigeria are characterized with risks emanating from delays and accompanying cost-overruns. The aim of the study was to identify and assess factors constraining the utilization of risk management strategies in the execution of public construction project in North-East Nigeria. Data was collected with the aid of a well-structured questionnaire administered to three identified projects in the North-east. Data collected were analysed using the severity index. Findings revealed political involvement, selection of inexperienced contractors and lack of coordinated public sector strategy as the most severe factors constraining the utilization of risk management strategies. The study recommended that: formulation of laws to prevent negative political meddling in construction projects; selection of experienced, risk-informed contractors; and comprehensive risk assessment and planning on all public construction projects.

Keywords: factors, Nigeria, north-east, public projects, risk management, strategies, utilization

Procedia PDF Downloads 488
7612 An Ecological Approach to Understanding Student Absenteeism in a Suburban, Kansas School

Authors: Andrew Kipp

Abstract:

Student absenteeism is harmful to both the school and the absentee student. One approach to improving student absenteeism is targeting contextual factors within the students’ learning environment. However, contemporary literature has not taken an ecological agency approach to understanding student absenteeism. Ecological agency is a theoretical framework that magnifies the interplay between the environment and the actions of people within the environment. To elaborate, the person’s personal history and aspirations and the environmental conditions provide potential outlets or restrictions to their intended action. The framework provides the unique perspective of understanding absentee students’ decision-making through the affordances and constraints found in their learning environment. To that effect, the study was guided by the question, “Why do absentee students decide to engage in absenteeism in a suburban Kansas school?” A case study methodology was used to answer the research question. Four suburban, Kansas high school absentee students in the 2020-2021 school year were selected for the study. The fall 2020 semester was in a remote learning setting, and the spring 2021 semester was in an in-person learning setting. The study captured their decision-making with respect to school attendance throughsemi-structured interviews, prolonged observations, drawings, and concept maps. The data was analyzed through thematic analysis. The findings revealed that peer socialization opportunities, methods of instruction, shifts in cultural beliefs due to COVID-19, manifestations of anxiety and lack of space to escape their anxiety, social media bullying, and the inability to receive academic tutoring motivated the participants’ daily decision to either attend or miss school. The findings provided a basis to improve several institutional and classroom practices. These practices included more student-led instruction and less teacher-led instruction in both in-person and remote learning environments, promoting socialization through classroom collaboration and clubs based on emerging student interests, reducing instances of bullying through prosocial education, safe spaces for students to escape the classroom to manage their anxiety, and more opportunities for one-on-one tutoring to improve grades. The study provides an example of using the ecological agency approach to better understand the personal and environmental factors that lead to absenteeism. The study also informs educational policies and classroom practices to better promote student attendance. Further research should investigate other school contexts using the ecological agency theoretical framework to better understand the influence of the school environment on student absenteeism.

Keywords: student absenteeism, ecological agency, classroom practices, educational policy, student decision-making

Procedia PDF Downloads 120
7611 Impact of Construction Risk Factors into Actual Construction Price in PPP Projects

Authors: Saleh Alzahrani, Halim Boussabaine

Abstract:

The majority of Public Private Partnership (PPP) are developed based on the rationale that the design, construction, operation, and financing of a public project is to be awarded to a private party within a single contractual framework. PPP project risks normally include the development and construction of a new asset as well as its operation for decades. Undoubtedly the most serious consequences of risks during the construction period are price and time overruns. These events are amongst the most broadly used scenarios in value for money analysis risks. The sources of risk change over the life cycle of a PPP project. In traditional procurement, the public sector normally has to cover all price distress from these risks. At least there is plenty evidence to suggest that price distress is a norm in some of the projects that are delivered under traditional procurement. This paper will find the impact of construction risk factors into actual construction price into PPP projects. The paper will present a brief literature review on PPP risk pricing strategies, and then using system dynamics (SD) to analyses of the risks associated with the estimated project price. Based on the finding from these analyses a risk pricing association model is presented and discussed. The paper concludes with thoughts for future research.

Keywords: Public Private Partnership (PPP), Risk, Risk Pricing, System Dynamics (SD), construction price

Procedia PDF Downloads 536
7610 Prevention of Student Radicalism in School through Civic Education

Authors: Triyanto

Abstract:

Radicalism poses a real threat to Indonesia's future. The target of radicalism is the youth of Indonesia. This is proven by the majority of terrorists are young people. Radicalization is not only a repressive act but also requires educational action. One of the educational efforts is civic education. This study discusses the prevention of radicalism for students through civic education and its constraints. This is qualitative research. Data were collected through literature studies, observations and in-depth interviews. Data were validated by triangulation. The sample of this research is 30 high school students in Surakarta. Data were analyzed by the interactive model of analysis from Miles & Huberman. The results show that (1) civic education can be a way of preventing student radicalism in schools in the form of cultivating the values of education through learning in the classroom and outside the classroom; (2) The obstacles encountered include the lack of learning facilities, the limited ability of teachers and the low attention of students to the civic education.

Keywords: prevention, radicalism, senior high school student, civic education

Procedia PDF Downloads 202
7609 Analysis of Initial Entry-Level Technology Course Impacts on STEM Major Selection

Authors: Ethan Shafer, Timothy Graziano

Abstract:

This research seeks to answer whether first-year courses at institutions of higher learning can impact STEM major selection. Unlike many universities, an entry-level technology course (often referred to as CS0) is required for all United States Military Academy (USMA) students–regardless of major–in their first year of attendance. Students at the academy choose their major at the end of their first year of studies. Through student responses to a multi-semester survey, this paper identifies a number of factors that potentially influence STEM major selection. Student demographic data, pre-existing exposure and access to technology, perceptions of STEM subjects, and initial desire for a STEM major are captured before and after taking a CS0 course. An analysis of factors that contribute to student perception of STEM and major selection are presented. This work provides recommendations and suggestions for institutions currently providing or looking to provide CS0-like courses to their students.

Keywords: education, STEM, pedagogy, digital literacy

Procedia PDF Downloads 87
7608 Risk Propagation in Electricity Markets: Measuring the Asymmetric Transmission of Downside and Upside Risks in Energy Prices

Authors: Montserrat Guillen, Stephania Mosquera-Lopez, Jorge Uribe

Abstract:

An empirical study of market risk transmission between electricity prices in the Nord Pool interconnected market is done. Crucially, it is differentiated between risk propagation in the two tails of the price variation distribution. Thus, the downside risk from upside risk spillovers is distinguished. The results found document an asymmetric nature of risk and risk propagation in the two tails of the electricity price log variations. Risk spillovers following price increments in the market are transmitted to a larger extent than those after price reductions. Also, asymmetries related to both, the size of the transaction area and related to whether a given area behaves as a net-exporter or net-importer of electricity, are documented. For instance, on the one hand, the bigger the area of the transaction, the smaller the size of the volatility shocks that it receives. On the other hand, exporters of electricity, alongside countries with a significant dependence on renewable sources, tend to be net-transmitters of volatility to the rest of the system. Additionally, insights on the predictive power of positive and negative semivariances for future market volatility are provided. It is shown that depending on the forecasting horizon, downside and upside shocks to the market are featured by a distinctive persistence, and that upside volatility impacts more on net-importers of electricity, while the opposite holds for net-exporters.

Keywords: electricity prices, realized volatility, semivariances, volatility spillovers

Procedia PDF Downloads 150
7607 Credit Risk and Financial Stability

Authors: Zidane Abderrezzaq

Abstract:

In contrast to recent successful developments in macro monetary policies, the modelling, measurement and management of systemic financial stability has remained problematical. Indeed, the focus of most effort has been on improving individual, rather than systemic, bank risk management; the Basel II objective has been to bring regulatory bank capital into line with the (sophisticated) banks’ assessment of their own economic capital. Even at the individual bank level there are concerns over appropriate diversification allowances, differing objectives of banks and regulators, the need for a buffer over regulatory minima, and the distinction between expected and unexpected losses (EL and UL). At the systemic level the quite complex and prescriptive content of Basel II raises dangers of ‘endogenous risk’ and procyclicality. Simulations suggest that this latter could be a serious problem. In an extension to the main analysis we study how liquidity effects interact with banking structure to produce a greater chance of systemic breakdown. We finally consider how the risk of contagion might depend on the degree of asymmetry (tiering) inherent in the structure of the banking system. A number of our results have important implications for public policy, which this paper also draws out.

Keywords: systemic stability, financial regulation, credit risk, systemic risk

Procedia PDF Downloads 349
7606 The Role of the Basel Accords in Mitigating Systemic Risk

Authors: Wassamon Kun-Amornpong

Abstract:

When a financial crisis occurs, there will be a law and regulatory reform in order to manage the turmoil and prevent a future crisis. One of the most important regulatory efforts to help cope with systemic risk and a financial crisis is the third version of the Basel Accord. Basel III has introduced some measures and tools (e.g., systemic risk buffer, countercyclical buffer, capital conservation buffer and liquidity risk) in order to mitigate systemic risk. Nevertheless, the effectiveness of these measures in Basel III in adequately addressing the problem of contagious runs that can quickly spread throughout the financial system is questionable. This paper seeks to contribute to the knowledge regarding the role of the Basel Accords in mitigating systemic risk. The research question is to what extent the Basel Accords can help control systemic risk in the financial markets? The paper tackles this question by analysing the concept of systemic risk. It will then examine the weaknesses of the Basel Accords before and after the Global financial crisis in 2008. Finally, it will suggest some possible solutions in order to improve the Basel Accord. The rationale of the study is the fact that academic works on systemic risk and financial crises are largely studied from economic or financial perspective. There is comparatively little research from the legal and regulatory perspective. The finding of the paper is that there are some problems in all of the three pillars of the Basel Accords. With regards to Pillar I, the risk model is excessively complex while the benefits of its complexity are doubtful. Concerning Pillar II, the effectiveness of the risk-based supervision in preventing systemic risk still depends largely upon its design and implementation. Factors such as organizational culture of the regulator and the political context within which the risk-based supervision operates might be a barrier against the success of Pillar II. Meanwhile, Pillar III could not provide adequate market discipline as market participants do not always act in a rational way. In addition, the too-big-to-fail perception reduced the incentives of the market participants to monitor risks. There has been some development in resolution measure (e.g. TLAC and MREL) which might potentially help strengthen the incentive of the market participants to monitor risks. However, those measures have some weaknesses. The paper argues that if the weaknesses in the three pillars are resolved, it can be expected that the Basel Accord could contribute to the mitigation of systemic risk in a more significant way in the future.

Keywords: Basel accords, financial regulation, risk-based supervision, systemic risk

Procedia PDF Downloads 103
7605 The Entrepreneurial Journey of Students: An Identity Perspective

Authors: J. Marchand

Abstract:

While university dropout entrepreneurs are celebrated in the practitioner literature, students’ intentions of becoming entrepreneurs have increasingly been the focus of student entrepreneur studies. However, students who are already running a business have rarely been examined. The experience of these students is a phenomenon that requires further research. Entrepreneurial identity represents a gap in the organisational studies literature. This paper utilises studentpreneurs’ self-narratives of their entrepreneurial journey. More specifically, the aim is to answer the following question: what are the types of identity work that individuals go through to build their entrepreneurial identity during that journey? Through long interviews, this paper studies the lived experience of 14 studentpreneurs who have achieved $54,000 in income and who participated publicly in entrepreneurial competitions. A general inductive analysis is performed on their narrative. With its focus on the journey, this paper makes a contribution to the literature on identity work and the entrepreneurial journey. A key contribution is the study of identity work on the journey to becoming an (established) entrepreneur in contrast to routine identity work.

Keywords: entrepreneurial identity, student entrepreneur, identity work, student entrepreneurship

Procedia PDF Downloads 636
7604 Using ePortfolios to Mapping Social Work Graduate Competencies

Authors: Cindy Davis

Abstract:

Higher education is changing globally and there is increasing pressure from professional social work accreditation bodies for academic programs to demonstrate how students have successfully met mandatory graduate competencies. As professional accreditation organizations increase their demand for evidence of graduate competencies, strategies to document and recording learning outcomes becomes increasingly challenging for academics and students. Studies in higher education have found support for the pedagogical value of ePortfolios, a flexible personal learning space that is owned by the student and include opportunity for assessment, feedback and reflection as well as a virtual space to store evidence of demonstration of professional competencies and graduate attributes. Examples of institutional uses of ePortfolios include e-administration of a diverse student population, assessment of student learning, and the demonstration of graduate attributes attained and future student career preparation. The current paper presents a case study on the introduction of ePortfolios for social work graduates in Australia as part of an institutional approach to technology-enhanced learning and e-learning. Social work graduates were required to submit an ePortfolio hosted on PebblePad. The PebblePad platform was selected because it places the student at the center of their learning whilst providing powerful tools for staff to structure, guide and assess that learning. The ePortofolio included documentation and evidence of how the student met each graduate competency as set out by the social work accreditation body in Australia (AASW). This digital resource played a key role in the process of external professional accreditation by clearly documenting and evidencing how students met required graduate competencies. In addition, student feedback revealed a positive outcome on how this resource provided them with a consolidation of their learning experiences and assisted them in obtaining employment post-graduation. There were also significant institutional factors that were key to successful implementation such as investment in the digital technology, capacity building amongst academics, and technical support for staff and students.

Keywords: accreditation, social work, teaching, technology

Procedia PDF Downloads 120
7603 Prevalence, Level and Health Risk Assessment of Mycotoxins in the Fried Poultry Eggs from Jordan

Authors: Sharaf S. Omar

Abstract:

In the current study, level and prevalence of deoxynivalenol (DON), aflatoxin B1 AFB1), zearalenone (ZEN), and ochratoxin A (OTA) in fried poultry eggs in Jordan was investigated. Poultry egg samples (n = 250) were collected. The level of DON, AFB1, ZEN and OTA in the white and yolk of poultry eggs was measured using LC-MS-MS. The health risk assessment was calculated using Margin of Exposures (MOEs) for AFB1 and OTA and hazard index (HI) for ZEN and DON. The highest prevalence in yolk and white of eggs was related to ZEN (96.56%) and OTA (97.44%), respectively. Also, the highest level in white and yolk was related to DON (1.07µg/kg) and DON (1.65 µg/kg), respectively. Level of DON in the yolk of eggs was significantly higher than white of eggs (P-value < 0.05). Risk assessment indicated that exposed population are at high risk of AFB1 (MOEs < 10,000) in fried poultry eggs.

Keywords: mycotoxins 2, aflatoxin b1, risk assessment, poultry egg

Procedia PDF Downloads 74
7602 Risk and Vulnerability Assessment of Agriculture on Climate Change: Bangnampriao District, Thailand

Authors: Charuvan Kasemsap

Abstract:

This research was studied in Bangnampriao District, Chachernsao Province, Thailand. The primary data relating to flooding, drought, and saline intrusion problem on agriculture were collected by surveying, focus group, and in-depth interview with agricultural officers, technical officers of irrigation department, and local government leader of Bangnampriao District. The likelihood and consequence of risk were determined the risk index by risk assessment matrix. In addition, the risk index and the total coping capacity scores were investigated the vulnerability index by vulnerability matrix. It was found that the high-risk drought and saline intrusion was dramatically along Bang Pakong River owing to the end destination of Chao Phraya Irrigation system of Central Thailand. This leads yearly the damage of rice paddy, mango tree, orchard, and fish pond. Therefore, some agriculture avoids rice growing during January to May, and also pumps fresh water from a canal into individual storage pond. However, Bangnampriao District will be strongly affected by the impacts of climate change. Monthly precipitations are expected to decrease in number; dry seasons are expected to be more in number and longer in duration. Thus, the risk and vulnerability of agriculture are also increasing. Adaptation strategies need to be put in place in order to enhance the resilience of the agriculture.

Keywords: agriculture, bangnampriao, climate change, risk assessment

Procedia PDF Downloads 397
7601 A Transformer-Based Question Answering Framework for Software Contract Risk Assessment

Authors: Qisheng Hu, Jianglei Han, Yue Yang, My Hoa Ha

Abstract:

When a company is considering purchasing software for commercial use, contract risk assessment is critical to identify risks to mitigate the potential adverse business impact, e.g., security, financial and regulatory risks. Contract risk assessment requires reviewers with specialized knowledge and time to evaluate the legal documents manually. Specifically, validating contracts for a software vendor requires the following steps: manual screening, interpreting legal documents, and extracting risk-prone segments. To automate the process, we proposed a framework to assist legal contract document risk identification, leveraging pre-trained deep learning models and natural language processing techniques. Given a set of pre-defined risk evaluation problems, our framework utilizes the pre-trained transformer-based models for question-answering to identify risk-prone sections in a contract. Furthermore, the question-answering model encodes the concatenated question-contract text and predicts the start and end position for clause extraction. Due to the limited labelled dataset for training, we leveraged transfer learning by fine-tuning the models with the CUAD dataset to enhance the model. On a dataset comprising 287 contract documents and 2000 labelled samples, our best model achieved an F1 score of 0.687.

Keywords: contract risk assessment, NLP, transfer learning, question answering

Procedia PDF Downloads 102
7600 Nonparametric Estimation of Risk-Neutral Densities via Empirical Esscher Transform

Authors: Manoel Pereira, Alvaro Veiga, Camila Epprecht, Renato Costa

Abstract:

This paper introduces an empirical version of the Esscher transform for risk-neutral option pricing. Traditional parametric methods require the formulation of an explicit risk-neutral model and are operational only for a few probability distributions for the returns of the underlying. In our proposal, we make only mild assumptions on the pricing kernel and there is no need for the formulation of the risk-neutral model for the returns. First, we simulate sample paths for the returns under the physical distribution. Then, based on the empirical Esscher transform, the sample is reweighted, giving rise to a risk-neutralized sample from which derivative prices can be obtained by a weighted sum of the options pay-offs in each path. We compare our proposal with some traditional parametric pricing methods in four experiments with artificial and real data.

Keywords: esscher transform, generalized autoregressive Conditional Heteroscedastic (GARCH), nonparametric option pricing

Procedia PDF Downloads 460
7599 Portfolio Restructuring of Banks: The Impact on Performance and Risk

Authors: Hannes Koester

Abstract:

Driven by difficult market conditions and increasing regulations, many banks are making the strategic decision to restructure their portfolio by divesting several business segments. Using a unique dataset of 727 portfolio restructuring announcements by 161 international listed banks over the period 1999 to 2015, we investigate the impact of restructuring measurements on the stock performance as well as on the banks’ profitability and risk. Employing the event study methodology, we detect positive stock market reactions on the announcement of restructuring measurements. These positive stock market reactions indicate that shareholders reward banks’ specialization activities. However, the results of the system GMM regressions show a negative relation between restructuring measurements and banks’ return on assets and a positive relation towards the individual and systemic risk of banks. These empirical results indicate that there is no guarantee that portfolio restructurings will result in a more profitable and less risky institution.

Keywords: bank performance, bank risk, divestiture, restructuring, systemic risk

Procedia PDF Downloads 288
7598 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 121
7597 iCCS: Development of a Mobile Web-Based Student Integrated Information System using Hill Climbing Algorithm

Authors: Maria Cecilia G. Cantos, Lorena W. Rabago, Bartolome T. Tanguilig III

Abstract:

This paper describes a conducive and structured information exchange environment for the students of the College of Computer Studies in Manuel S. Enverga University Foundation in. The system was developed to help the students to check their academic result, manage profile, make self-enlistment and assist the students to manage their academic status that can be viewed also in mobile phones. Developing class schedules in a traditional way is a long process that involves making many numbers of choices. With Hill Climbing Algorithm, however, the process of class scheduling, particularly with regards to courses to be taken by the student aligned with the curriculum, can perform these processes and end up with an optimum solution. The proponent used Rapid Application Development (RAD) for the system development method. The proponent also used the PHP as the programming language and MySQL as the database.

Keywords: hill climbing algorithm, integrated system, mobile web-based, student information system

Procedia PDF Downloads 363
7596 Comparison between Deterministic and Probabilistic Stability Analysis, Featuring Consequent Risk Assessment

Authors: Isabela Moreira Queiroz

Abstract:

Slope stability analyses are largely carried out by deterministic methods and evaluated through a single security factor. Although it is known that the geotechnical parameters can present great dispersal, such analyses are considered fixed and known. The probabilistic methods, in turn, incorporate the variability of input key parameters (random variables), resulting in a range of values of safety factors, thus enabling the determination of the probability of failure, which is an essential parameter in the calculation of the risk (probability multiplied by the consequence of the event). Among the probabilistic methods, there are three frequently used methods in geotechnical society: FOSM (First-Order, Second-Moment), Rosenblueth (Point Estimates) and Monte Carlo. This paper presents a comparison between the results from deterministic and probabilistic analyses (FOSM method, Monte Carlo and Rosenblueth) applied to a hypothetical slope. The end was held to evaluate the behavior of the slope and consequent risk analysis, which is used to calculate the risk and analyze their mitigation and control solutions. It can be observed that the results obtained by the three probabilistic methods were quite close. It should be noticed that the calculation of the risk makes it possible to list the priority to the implementation of mitigation measures. Therefore, it is recommended to do a good assessment of the geological-geotechnical model incorporating the uncertainty in viability, design, construction, operation and closure by means of risk management. 

Keywords: probabilistic methods, risk assessment, risk management, slope stability

Procedia PDF Downloads 347
7595 Happiness Determinants in MBA Student Life

Authors: Vivek Nair

Abstract:

The objective of this research is to find out happiness determinants in MBA student life. To figure out the factors influencing happiness in life is sorted by their personal profiles. This paper used survey method to collect data. The survey was mainly conducted among Management Students and is based on three hypothesis viz. Family relationship, Friendship and God as a source of happiness, and whether happiness is manageable and controllable. The statistics used for interpreting the results included the frequencies, percentages, and z test analysis. The findings revealed that family relationships and friendship have the same effect on individual happiness.

Keywords: happiness, family, MBA students, friends

Procedia PDF Downloads 283
7594 Assessing the Risk of Condensation and Moisture Accumulation in Solid Walls: Comparing Different Internal Wall Insulation Options

Authors: David Glew, Felix Thomas, Matthew Brooke-Peat

Abstract:

Improving the thermal performance of homes is seen as an essential step in achieving climate change, fuel security, fuel poverty targets. One of the most effective thermal retrofits is to insulate solid walls. However, it has been observed that applying insulation to the internal face of solid walls reduces the surface temperature of the inner wall leaf, which may introduce condensation risk and may interrupt seasonal moisture accumulation and dissipation. This research quantifies the extent to which the risk of condensation and moisture accumulation in the wall increases (which can increase the risk of timber rot) following the installation of six different types of internal wall insulation. In so doing, it compares how risk is affected by both the thermal resistance, thickness, and breathability of the insulation. Thermal bridging, surface temperatures, condensation risk, and moisture accumulation are evaluated using hygrothermal simulation software before and after the thermal upgrades. The research finds that installing internal wall insulation will always introduce some risk of condensation and moisture. However, it identifies that risks were present prior to insulation and that breathable materials and insulation with lower resistance have lower risks than alternative insulation options. The implications of this may be that building standards that encourage the enhanced thermal performance of solid walls may be introducing moisture risks into homes.

Keywords: condensation risk, hygrothermal simulation, internal wall insulation, thermal bridging

Procedia PDF Downloads 134
7593 Risk Assessment and Management Using Machine Learning Models

Authors: Lagnajeet Mohanty, Mohnish Mishra, Pratham Tapdiya, Himanshu Sekhar Nayak, Swetapadma Singh

Abstract:

In the era of global interconnectedness, effective risk assessment and management are critical for organizational resilience. This review explores the integration of machine learning (ML) into risk processes, examining its transformative potential and the challenges it presents. The literature reveals ML's success in sectors like consumer credit, demonstrating enhanced predictive accuracy, adaptability, and potential cost savings. However, ethical considerations, interpretability issues, and the demand for skilled practitioners pose limitations. Looking forward, the study identifies future research scopes, including refining ethical frameworks, advancing interpretability techniques, and fostering interdisciplinary collaborations. The synthesis of limitations and future directions highlights the dynamic landscape of ML in risk management, urging stakeholders to navigate challenges innovatively. This abstract encapsulates the evolving discourse on ML's role in shaping proactive and effective risk management strategies in our interconnected and unpredictable global landscape.

Keywords: machine learning, risk assessment, ethical considerations, financial inclusion

Procedia PDF Downloads 33
7592 'You Block Yourself from the Emotion': A Qualitative Inquiry into Teacher's Use of Discordant Emotional Labor Strategies in Student Aggression

Authors: Michal Levy

Abstract:

Despite the emotional impact students' misbehavior and aggression has on teacher's emotional wellbeing, teachers frequently use suppressive strategies in the classroom, which maintain a discordance between felt and expressed emotions. The current study sought to gain a deeper insight into teachers' utilization of discordant emotional labor strategies (i.e., expressive suppression, surface acting and emotional dissonance) and their motives to using these strategies in student aggression. A qualitative study was conducted on 16 special education Jewish Israeli teachers. Thematic analysis of the in-depth semi-structured interviews revealed novice teachers were inclined to use expressive suppression, while experienced teachers used emotional dissonance. The teacher's motives for using discordant emotional labor strategies included both instrumental and hedonic goals. Implications for policymakers and professionals in practice are discussed to improve teachers' emotional wellbeing.

Keywords: discordant strategies, emotional labor, student aggression, teachers

Procedia PDF Downloads 215
7591 Determination of the Bank's Customer Risk Profile: Data Mining Applications

Authors: Taner Ersoz, Filiz Ersoz, Seyma Ozbilge

Abstract:

In this study, the clients who applied to a bank branch for loan were analyzed through data mining. The study was composed of the information such as amounts of loans received by personal and SME clients working with the bank branch, installment numbers, number of delays in loan installments, payments available in other banks and number of banks to which they are in debt between 2010 and 2013. The client risk profile was examined through Classification and Regression Tree (CART) analysis, one of the decision tree classification methods. At the end of the study, 5 different types of customers have been determined on the decision tree. The classification of these types of customers has been created with the rating of those posing a risk for the bank branch and the customers have been classified according to the risk ratings.

Keywords: client classification, loan suitability, risk rating, CART analysis

Procedia PDF Downloads 317
7590 Hidden Critical Risk in the Construction Industry’s Technological Adoption: Cybercrime

Authors: Nuruddeen Usman, Usman Mohammed Gidado, Muhammad Ahmad Ibrahim

Abstract:

Construction industry is one of the sectors that are eyeing adoption of ICT for its development due to the advancement in technology. Though, many manufacturing sectors had been using it, but construction industry was left behind, especially in the developing nation like Nigeria. On account of that, the objective of this study is to conceptually and quantitatively synthesise whether the slow adoption of ICT by the construction industries can be attributable to cybercrime threats. The result of the investigation found that, the risk of cybercrime, and lack of adequate cyber security policies that can enforce and punish defaulters are among the things that hinder ICT adoption of the Nigerian construction industries. Therefore, there is need for the nations to educate their citizens on cybercrime risk, and to establish cybercrime police units that can be monitoring and controlling all online communications.

Keywords: construction industry, cybercrime, information and communication technology adoption, risk

Procedia PDF Downloads 476
7589 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 266
7588 Role of Desire in Risk-Perception: A Case Study of Syrian Refugees’ Migration towards Europe

Authors: Lejla Sunagic

Abstract:

The aim of the manuscript is to further the understanding of risky decision-making in the context of forced and irregular migration. The empirical evidence is collected through interviews with Syrian refugees who arrived in Europe via irregular pathways. Analytically, it has been approached through the juxtaposition between risk perception and the notion of desire. As different frameworks have been developed to address differences in risk perception, the common thread was the understanding that individual risk-taking has been addressed in terms of benefits outweighing risks. However, this framework cannot explain a big risk an individual takes because of an underprivileged position and due to a lack of positive alternatives, termed as risk-taking from vulnerability. The accounts of the field members of this study that crossed the sea in rubber boats to arrive in Europe make an empirical fit to such a postulate by reporting that the risk they have taken was not the choice but the only coping strategy. However, the vulnerability argument falls short of explaining why the interviewees, thinking retrospectively, find the risky journey they have taken to be worth it, while they would strongly advise others to restrain from taking such a huge risk. This inconsistency has been addressed by adding the notion of desire to migrate to the elements of risk perception. Desire, as a subjective experience, was what made the risk appear smaller in cost-benefit analysis at the time of decision-making of those who have realized migration. However, when they reflect on others in the context of potential migration via the same pathway, the interviewees addressed the others’ lack of capacity to avoid the same obstacles that they themselves were able to circumvent while omitting to reflect on others’ desire to migrate. Thus, in the risk-benefit analysis performed for others, the risk remains unblurred and tips over the benefits, given the inability to take into account the desire of others. If desire, as the transformative potential of migration, is taken out of the cost-benefit analysis of irregular migration, refugees might not have taken the risky journey. By casting the theoretical argument in the language of configuration, the study is filling in the gap of knowledge on the combination of migration drivers and the way they interact and produce migration outcomes.

Keywords: refugees, risk perception, desire, irregular migration

Procedia PDF Downloads 65
7587 Risk Assessment of Heavy Rainfall and Development of Damage Prediction Function for Gyeonggi-Do Province

Authors: Jongsung Kim, Daegun Han, Myungjin Lee, Soojun Kim, Hung Soo Kim

Abstract:

Recently, the frequency and magnitude of natural disasters are gradually increasing due to climate change. Especially in Korea, large-scale damage caused by heavy rainfall frequently occurs due to rapid urbanization. Therefore, this study proposed a Heavy rain Damage Risk Index (HDRI) using PSR (Pressure – State - Response) structure for heavy rain risk assessment. We constructed pressure index, state index, and response index for the risk assessment of each local government in Gyeonggi-do province, and the evaluation indices were determined by principal component analysis. The indices were standardized using the Z-score method then HDRIs were obtained for 31 local governments in the province. The HDRI is categorized into three classes, say, the safest class is 1st class. As the results, the local governments of the 1st class were 15, 2nd class 7, and 3rd class 9. From the study, we were able to identify the risk class due to the heavy rainfall for each local government. It will be useful to develop the heavy rainfall prediction function by risk class, and this was performed in this issue. Also, this risk class could be used for the decision making for efficient disaster management. Acknowledgements: This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (2017R1A2B3005695).

Keywords: natural disaster, heavy rain risk assessment, HDRI, PSR

Procedia PDF Downloads 165
7586 Unhealthy Food Consumption Behavior in Suan Sunandha Rajabhat Universities

Authors: Narumon Piaseu

Abstract:

This survey research was aimed to describe and compare consumption behavior of health risk food among students in Suan Sunandha Rajabhat University. Sample included 400 undergraduate students enrolled in the first semester of 2008 academic year. Data were collected by using self reported questionnaire developed by the researcher. Data were then analyzed by descriptive statistics including frequency, percentage, mean, standard deviation, and inferential statistics including independent t-test, and Oneway ANOVA. Results revealed that most of the sample were women (67%), enrolled in social related programs (74%). Approximately half of them (45.5%) stayed in dormitory. The mean of monthly income was 5,164 Baht and daily food expenditure was 114.55 Baht. Majority of them (83%) had ready-to-eat food. A major factor influencing their food selection was their parents (61%). A main reason for their food selection was food that looks good (70.75%). Almost half of them (46.25%) had heavy exercise less than 3 times per week. Regarding knowledge on health risk food, 43.5% of the sample had good knowledge. The followings were moderate (41%) and poor (41%). Most of the sample (60.75%) had consumption behavior at low risk. The following was at moderate risk (37.25%). Only 2% were at high risk. Among the sample, consumption behavior of health risk food were significantly different in years of study (F = 3.168, p = .024), daily food expenditure (F = 8.950, p <.001), and knowledge on health risk food (F = 37.856, p <.001), while no significant difference in consumption behavior of health risk food was found in those with a difference in gender, program of study, living place, and monthly income. Results indicate the importance of providing knowledge regarding health risk food for students and their parents in order to promote appropriate food consumption behavior among the students.

Keywords: food consumption, risky behavior, Suan Sunandha Rajabhat University, health risk

Procedia PDF Downloads 450