{"title":"Detecting Unconventional and Malicious Windows Authentication Activities Through Statistical Rarity Assessment","authors":"Tarek Radah, Habiba Chaoui, Chaimae Saadi","doi":"10.18280/ijsse.130501","DOIUrl":"https://doi.org/10.18280/ijsse.130501","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"113 47","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determine the Most Important Construction Risks and Know the Degree of Their Impact on Construction Projects in Iraq","authors":"Haneen Z. Faeq, Tareq A. Khaleel","doi":"10.18280/ijsse.130517","DOIUrl":"https://doi.org/10.18280/ijsse.130517","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"115 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The work presented was aimed primarily at contributing to the control of risks relating to an industrial installation by means of a safety instrumented system (SIS), through a global approach defined by the IEC 61508 standard which goes from risk analysis to the evaluation of SIS. The IEC 61508 approach consists of industrial risk analysis which is a process used to identify the risks inherent in an industrial system and estimate the levels of these risks using several methods, tools and software. Then, the reduction of risks deemed unacceptable in the risk analysis phase to an acceptable level using SIS. The extent of the reduction to be achieved determines the level of performance that the SIS must have to achieve this reduction assigned to it (required SIL). The real performance of SIS (real SIL) must meet the corresponding requirements. Otherwise, technical modifications must be made to the SIS. The application of the IEC 61508 approach addresses the risk analysis of butane product overflow stored in a tank and the verification of the ability of an SIS installed at this tank to control this risk. And if necessary, propose technical modifications to optimize the performance of the SIS. Risk analysis conducted using the HAZOP (HAZard and OPerability) method to identify critical accident scenarios, PHAST (Process Hazard Analysis Software Tool) software and risk matrix to estimate risk level of a given accident. Verification of the ability of an SIS installed at the tank to control the risk deemed unacceptable in the risk analysis phase is carried out by The LOPA (Layer Of Protection Analysis) method for the allocation of the required SIL for the SIS and SIL module of the GRIF (GRaphical Interface for reliability Forecasting) software to calculated real SIL of SIS. Depending on the results obtained (required SIL > real SIL), recommendations likely to strengthen the reliability of SIS are proposed (modification of the test policy and the architecture of the constituent elements of the SIS) in order to achieve the required SIL. And thus secure our system.
{"title":"Evaluation of Safety Instrumented System in a Natural Gas Facility According to IEC 61508 Standard","authors":"Nabil Boudjoghra, Fares Innal","doi":"10.18280/ijsse.130504","DOIUrl":"https://doi.org/10.18280/ijsse.130504","url":null,"abstract":"The work presented was aimed primarily at contributing to the control of risks relating to an industrial installation by means of a safety instrumented system (SIS), through a global approach defined by the IEC 61508 standard which goes from risk analysis to the evaluation of SIS. The IEC 61508 approach consists of industrial risk analysis which is a process used to identify the risks inherent in an industrial system and estimate the levels of these risks using several methods, tools and software. Then, the reduction of risks deemed unacceptable in the risk analysis phase to an acceptable level using SIS. The extent of the reduction to be achieved determines the level of performance that the SIS must have to achieve this reduction assigned to it (required SIL). The real performance of SIS (real SIL) must meet the corresponding requirements. Otherwise, technical modifications must be made to the SIS. The application of the IEC 61508 approach addresses the risk analysis of butane product overflow stored in a tank and the verification of the ability of an SIS installed at this tank to control this risk. And if necessary, propose technical modifications to optimize the performance of the SIS. Risk analysis conducted using the HAZOP (HAZard and OPerability) method to identify critical accident scenarios, PHAST (Process Hazard Analysis Software Tool) software and risk matrix to estimate risk level of a given accident. Verification of the ability of an SIS installed at the tank to control the risk deemed unacceptable in the risk analysis phase is carried out by The LOPA (Layer Of Protection Analysis) method for the allocation of the required SIL for the SIS and SIL module of the GRIF (GRaphical Interface for reliability Forecasting) software to calculated real SIL of SIS. Depending on the results obtained (required SIL > real SIL), recommendations likely to strengthen the reliability of SIS are proposed (modification of the test policy and the architecture of the constituent elements of the SIS) in order to achieve the required SIL. And thus secure our system.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"113 27","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ellectrananda Anugerah Ash-Shidiqqi, Aidul Fitriciada Azhari, Kelik Wardiono, Wardah Yuspin
Severe damage and large losses will be the result of the earthquake. Thus, pre-disaster activities to reduce the impact of carried out by various parties such as the central and local governments, relevant agencies and society is very important. Therefore, the central government will make a design “action against earthquakes” as a master plan for dealing with disasters earthquakes, including pre-disaster measures, emergency response, and post-disaster stages. To measure the impact of these disaster risk reduction efforts, the central government will set one goal that can be measured quantitatively for a certain period of time. Observations of the achievements of these efforts will be continued on a regular basis. Moreover, participation and coordination with local government is very important to achieve this goal, so the local government concerned must take responsibility for responsible for developing regional goals that are in line with the coping strategy national disaster.
{"title":"The Urgency of Establishing a Natural Disaster Management Agency in Indonesia","authors":"Ellectrananda Anugerah Ash-Shidiqqi, Aidul Fitriciada Azhari, Kelik Wardiono, Wardah Yuspin","doi":"10.18280/ijsse.130518","DOIUrl":"https://doi.org/10.18280/ijsse.130518","url":null,"abstract":"Severe damage and large losses will be the result of the earthquake. Thus, pre-disaster activities to reduce the impact of carried out by various parties such as the central and local governments, relevant agencies and society is very important. Therefore, the central government will make a design “action against earthquakes” as a master plan for dealing with disasters earthquakes, including pre-disaster measures, emergency response, and post-disaster stages. To measure the impact of these disaster risk reduction efforts, the central government will set one goal that can be measured quantitatively for a certain period of time. Observations of the achievements of these efforts will be continued on a regular basis. Moreover, participation and coordination with local government is very important to achieve this goal, so the local government concerned must take responsibility for responsible for developing regional goals that are in line with the coping strategy national disaster.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"114 45","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the incidence of indoor health concerns escalates, the prioritization of healthy interior design techniques in workplaces emerges as a critical strategy to enhance worker productivity and efficiency. Extensive research has highlighted the profound impact of lighting on employee physical and mental health, designating it as a key determinant of wellbeing in the workplace. The WELL Building Standard (WELLv2) constitutes a comprehensive and rigorous framework addressing the multifaceted origins of these concerns. It engenders lighting conditions that bolster mental, visual, and psychological health, and in professional settings, these conditions are demonstrated to improve mood and productivity. The research problem identified herein is the pervasive lack of awareness of interior design elements, such as lighting, and their misapplication in alignment with international standards. This lapse engenders environments that are detrimental to health. In this investigation, the extent to which architectural designers integrate WELLv2 lighting indicators in working environments is scrutinized in relation to healthy interior design. A descriptive-analytical method is employed to probe the research topic. Three buildings are evaluated against WELL lighting indicators. Moreover, the Wellness Score metric is utilized to assess the indoor lighting of the selected buildings, determining their eligibility for WELL certification. The primary objective of this study is to identify the key design needs of architectural designers for promoting healthy indoor lighting. The fulfillment of this objective is pursued through the use of WELL lighting indicators and standards.
{"title":"The Role of Interior Design in Achieving Healthy Workplaces According to Lighting Indicators of “WELL Standard”","authors":"Atyab Ali Naser, Hamzah S. Al-Mamoori","doi":"10.18280/ijsse.130519","DOIUrl":"https://doi.org/10.18280/ijsse.130519","url":null,"abstract":"As the incidence of indoor health concerns escalates, the prioritization of healthy interior design techniques in workplaces emerges as a critical strategy to enhance worker productivity and efficiency. Extensive research has highlighted the profound impact of lighting on employee physical and mental health, designating it as a key determinant of wellbeing in the workplace. The WELL Building Standard (WELLv2) constitutes a comprehensive and rigorous framework addressing the multifaceted origins of these concerns. It engenders lighting conditions that bolster mental, visual, and psychological health, and in professional settings, these conditions are demonstrated to improve mood and productivity. The research problem identified herein is the pervasive lack of awareness of interior design elements, such as lighting, and their misapplication in alignment with international standards. This lapse engenders environments that are detrimental to health. In this investigation, the extent to which architectural designers integrate WELLv2 lighting indicators in working environments is scrutinized in relation to healthy interior design. A descriptive-analytical method is employed to probe the research topic. Three buildings are evaluated against WELL lighting indicators. Moreover, the Wellness Score metric is utilized to assess the indoor lighting of the selected buildings, determining their eligibility for WELL certification. The primary objective of this study is to identify the key design needs of architectural designers for promoting healthy indoor lighting. The fulfillment of this objective is pursued through the use of WELL lighting indicators and standards.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"112 33","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136932","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing Occupational Risk: A Classification of Harmful Factors in the Production Environment and Labor Process","authors":"Sholpan Abikenova, Gulnara Issamadiyeva, Elmira Kulmagambetova, Gulzhan Daumova, Nazgul Abdrakhmanova","doi":"10.18280/ijsse.130511","DOIUrl":"https://doi.org/10.18280/ijsse.130511","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"113 39","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Role of Digitalization in Ensuring the Financial and Economic Security of Trading Enterprises Under the Conditions of External Shocks","authors":"Maksym Dubyna, Liudmyla Verbivska, Olha Kalchenko, Veronika Dmytrovska, Dmytro Pilevych, Іhor Lysohor","doi":"10.18280/ijsse.130506","DOIUrl":"https://doi.org/10.18280/ijsse.130506","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"113 25","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Progression of the Protection Networking System Depending on International Virtual Private Network","authors":"Bashar H. Hameed, Zina A. Saleh","doi":"10.18280/ijsse.130510","DOIUrl":"https://doi.org/10.18280/ijsse.130510","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"113 13","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135137092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The authentication method for unlocking screens is an essential security feature of smartphones to avoid unauthorized access. Various mechanisms have been integrated into smartphones to authenticate users to reduce privacy infringement. Contextual awareness is now a key requirement for mobile computing to make intelligent decisions and provide an adaptable and convenient authentication model. Therefore, in this paper, a context-aware authentication system based on a machine learning technique is proposed. The proposed system takes the user’s body postures, location, SMS contents, and ambient environmental conditions as context. To enhance privacy protection, these context factors are selected to guide the authentication process and enable the authentication system to understand users and their surrounding environment. However, to provide the most appropriate authentication method, a machine learning model is designed. The model is trained and tested with the user’s context datasets. An appropriate dataset for the machine learning model is generated, and features that affect end-user interaction during the authentication process are identified. A total of 25 responses from smartphone owners were collected to evaluate the proposed system. After conducting a sentiment analysis, we found that 72 percent of users have a positive sentiment regarding the proposed system, which means that context-aware technology helps improve authentication adaptability and provides a convenient authentication method. The performance of the model was tested, and the results show that the proposed model effectively achieves a Mean Absolute Error (MAE) of 1.299, a Root Mean Square Error (RMSE) of 1.437, and an R Square of 76.78. Therefore, the system can improve the reliability and adaptability of the authentication process.
{"title":"An Adaptive Context-Aware Authentication System on Smartphones Using Machine Learning","authors":"Aiman M. Ayyal Awwad","doi":"10.18280/ijsse.130514","DOIUrl":"https://doi.org/10.18280/ijsse.130514","url":null,"abstract":"The authentication method for unlocking screens is an essential security feature of smartphones to avoid unauthorized access. Various mechanisms have been integrated into smartphones to authenticate users to reduce privacy infringement. Contextual awareness is now a key requirement for mobile computing to make intelligent decisions and provide an adaptable and convenient authentication model. Therefore, in this paper, a context-aware authentication system based on a machine learning technique is proposed. The proposed system takes the user’s body postures, location, SMS contents, and ambient environmental conditions as context. To enhance privacy protection, these context factors are selected to guide the authentication process and enable the authentication system to understand users and their surrounding environment. However, to provide the most appropriate authentication method, a machine learning model is designed. The model is trained and tested with the user’s context datasets. An appropriate dataset for the machine learning model is generated, and features that affect end-user interaction during the authentication process are identified. A total of 25 responses from smartphone owners were collected to evaluate the proposed system. After conducting a sentiment analysis, we found that 72 percent of users have a positive sentiment regarding the proposed system, which means that context-aware technology helps improve authentication adaptability and provides a convenient authentication method. The performance of the model was tested, and the results show that the proposed model effectively achieves a Mean Absolute Error (MAE) of 1.299, a Root Mean Square Error (RMSE) of 1.437, and an R Square of 76.78. Therefore, the system can improve the reliability and adaptability of the authentication process.","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":"112 28","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Saravanan Parthasarathy, Arun Raj Lakshminarayanan, A. Abdul Azeez Khan, K. Javubar Sathick, Vaishnavi Jayaraman
ABSTRACT
{"title":"Detection of Health Insurance Fraud using Bayesian Optimized XGBoost","authors":"Saravanan Parthasarathy, Arun Raj Lakshminarayanan, A. Abdul Azeez Khan, K. Javubar Sathick, Vaishnavi Jayaraman","doi":"10.18280/ijsse.130509","DOIUrl":"https://doi.org/10.18280/ijsse.130509","url":null,"abstract":"ABSTRACT","PeriodicalId":37802,"journal":{"name":"International Journal of Safety and Security Engineering","volume":" 1279","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135186711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}