321 research outputs found

    A Privacy-Preserving, Context-Aware, Insider Threat prevention and prediction model (PPCAITPP)

    Get PDF
    The insider threat problem is extremely challenging to address, as it is committed by insiders who are trusted and authorized to access the information resources of the organization. The problem is further complicated by the multifaceted nature of insiders, as human beings have various motivations and fluctuating behaviours. Additionally, typical monitoring systems may violate the privacy of insiders. Consequently, there is a need to consider a comprehensive approach to mitigate insider threats. This research presents a novel insider threat prevention and prediction model, combining several approaches, techniques and tools from the fields of computer science and criminology. The model is a Privacy- Preserving, Context-Aware, Insider Threat Prevention and Prediction model (PPCAITPP). The model is predicated on the Fraud Diamond (a theory from Criminology) which assumes there must be four elements present in order for a criminal to commit maleficence. The basic elements are pressure (i.e. motive), opportunity, ability (i.e. capability) and rationalization. According to the Fraud Diamond, malicious employees need to have a motive, opportunity and the capability to commit fraud. Additionally, criminals tend to rationalize their malicious actions in order for them to ease their cognitive dissonance towards maleficence. In order to mitigate the insider threat comprehensively, there is a need to consider all the elements of the Fraud Diamond because insider threat crime is also related to elements of the Fraud Diamond similar to crimes committed within the physical landscape. The model intends to act within context, which implies that when the model offers predictions about threats, it also reacts to prevent the threat from becoming a future threat instantaneously. To collect information about insiders for the purposes of prediction, there is a need to collect current information, as the motives and behaviours of humans are transient. Context-aware systems are used in the model to collect current information about insiders related to motive and ability as well as to determine whether insiders exploit any opportunity to commit a crime (i.e. entrapment). Furthermore, they are used to neutralize any rationalizations the insider may have via neutralization mitigation, thus preventing the insider from committing a future crime. However, the model collects private information and involves entrapment that will be deemed unethical. A model that does not preserve the privacy of insiders may cause them to feel they are not trusted, which in turn may affect their productivity in the workplace negatively. Hence, this thesis argues that an insider prediction model must be privacy-preserving in order to prevent further cybercrime. The model is not intended to be punitive but rather a strategy to prevent current insiders from being tempted to commit a crime in future. The model involves four major components: context awareness, opportunity facilitation, neutralization mitigation and privacy preservation. The model implements a context analyser to collect information related to an insider who may be motivated to commit a crime and his or her ability to implement an attack plan. The context analyser only collects meta-data such as search behaviour, file access, logins, use of keystrokes and linguistic features, excluding the content to preserve the privacy of insiders. The model also employs keystroke and linguistic features based on typing patterns to collect information about any change in an insiderโ€™s emotional and stress levels. This is indirectly related to the motivation to commit a cybercrime. Research demonstrates that most of the insiders who have committed a crime have experienced a negative emotion/pressure resulting from dissatisfaction with employment measures such as terminations, transfers without their consent or denial of a wage increase. However, there may also be personal problems such as a divorce. The typing pattern analyser and other resource usage behaviours aid in identifying an insider who may be motivated to commit a cybercrime based on his or her stress levels and emotions as well as the change in resource usage behaviour. The model does not identify the motive itself, but rather identifies those individuals who may be motivated to commit a crime by reviewing their computer-based actions. The model also assesses the capability of insiders to commit a planned attack based on their usage of computer applications and measuring their sophistication in terms of the range of knowledge, depth of knowledge and skill as well as assessing the number of systems errors and warnings generated while using the applications. The model will facilitate an opportunity to commit a crime by using honeypots to determine whether a motivated and capable insider will exploit any opportunity in the organization involving a criminal act. Based on the insiderโ€™s reaction to the opportunity presented via a honeypot, the model will deploy an implementation strategy based on neutralization mitigation. Neutralization mitigation is the process of nullifying the rationalizations that the insider may have had for committing the crime. All information about insiders will be anonymized to remove any identifiers for the purpose of preserving the privacy of insiders. The model also intends to identify any new behaviour that may result during the course of implementation. This research contributes to existing scientific knowledge in the insider threat domain and can be used as a point of departure for future researchers in the area. Organizations could use the model as a framework to design and develop a comprehensive security solution for insider threat problems. The model concept can also be integrated into existing information security systems that address the insider threat problemInformation ScienceD. Phil. (Information Systems

    ์—ํ‹ฐ์˜คํ”ผ์•„ ๊ณ ์ถ”์˜ ์œ ์ „์  ๋‹ค์–‘์„ฑ ๋ถ„์„ ๋ฐ ๊ณ ์ถ”์—์„œ์˜ Up ์œ ์ „์ž ์—ฐ๊ด€ ์œ ์ „์ž์ง€๋„ ์ž‘์„ฑ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :๋†์—…์ƒ๋ช…๊ณผํ•™๋Œ€ํ•™ ์›์˜ˆํ•™๊ณผ,2020. 2. Kang, Byoung Cheorl .์—ํ‹ฐ์˜คํ”ผ์•„ ์œ ์ „์ž ์€ํ–‰์— ๋ณด์กด๋œ ๊ณ ์ถ” ์œ ์ „์ž์›์˜ ๋‹ค์–‘์„ฑ ์—ฐ๊ตฌ์™€ ๊ณ ์ถ” ๊ณผ์‹ค์˜ ๊ธฐ์›์„ ์กฐ์ ˆํ•˜๋Š” ์œ ์ „์  ์š”์ธ๋“ค์„ ์ดํ•ดํ•˜๋Š” ๊ฒƒ์€ ์œก์ข…์— ์ค‘์š”ํ•œ ์ •๋ณด๋ฅผ ์ œ๊ณตํ•  ์ˆ˜ ์žˆ๋‹ค. ์ž‘๋ฌผ ์œ ์ „์ž์›์˜ ๋‹ค์–‘์„ฑ์˜ ๊ตฌ์กฐ์™€ ๊นŠ์ด๋ฅผ ์—ฐ๊ตฌํ•˜๋Š” ๊ฒƒ์€ ์ด์šฉ๊ฐ€๋Šฅ ํ•œ ์œ ์ „์  ์ž์›์˜ ์‹ค์šฉํ™”์™€ ๋ณด์กด์— ๋งค์šฐ ํ•„์ˆ˜์ ์ด๋‹ค. ์—ํ‹ฐ์˜คํ”ผ์•„์—์„œ ๊ณ ์ถ”๋Š” ๋งค์šฐ ๊ฒฝ์ œ์ ์ด๊ณ  ์‚ฌํšŒ์  ์ค‘์š”์„ฑ์„ ๊ฐ€์ง„ ์ž‘๋ฌผ์ž„์—๋„ ๋ถˆ๊ตฌํ•˜๊ณ , ๋‹จ์ผ์—ผ๊ธฐ๋‹คํ˜•์„ฑ(SNP) ๋งˆ์ปค๋ฅผ ์ด์šฉํ•œ ์œ ์ „์  ๋‹ค์–‘์„ฑ์— ๊ด€๋ จํ•œ ์ž์„ธํ•œ ์—ฐ๊ตฌ๋Š” ์ œํ•œ์ ์ด๋‹ค. ๋”ฐ๋ผ์„œ, ์—ํ‹ฐ์˜คํ”ผ์•„ ๊ณ ์ถ” ์œ ์ „์ž์›์˜ ๋‹ค์–‘์„ฑ๊ณผ ์œ ์ „์  ๊ตฌ์กฐ๋ฅผ ์กฐ์‚ฌํ•˜๊ธฐ ์œ„ํ•ด, ์—ํ‹ฐ์˜คํ”ผ์•„ ์ƒ๋ฌผ๋‹ค์–‘์„ฑ ์—ฐ๊ตฌ์†Œ์—์„œ ์ˆ˜์ง‘ํ•˜๊ณ  ์œ ์ง€๋œ ์ด 142 ์ข…์— ๋Œ€ํ•˜์—ฌ ํ‰๊ฐ€ํ•˜์˜€๋‹ค. ์šฐ๋ฆฌ๋Š” 53,284 genome wide SNP ๋ถ„์ž๋งˆ์ปค๋ฅผ genotyping-by-sequencing (GBS)๋ฅผ ์ด์šฉํ•˜์—ฌ ๋ฐœ๊ฒฌํ•˜์—ฌ ๊ฒ€์ฆํ•˜์˜€๋‹ค. ์šฐ๋ฆฌ๋Š” ๋ชจ๋ธ ๊ธฐ๋ฐ˜์˜ ์ง‘๋‹จ ๊ตฌ์กฐ, ๊ณ„ํ†ต๋„, ์ฃผ์„ฑ๋ถ„ ๋ถ„์„์„ ์‚ฌ์šฉํ•˜์—ฌ C. annuum ๊ณผ C. frutescens๋ฅผ ๊ฐ๊ฐ 132์ข…๊ณผ 9์ข…์˜ ๋‘ ๊ฐœ์˜ ๋šœ๋ ทํ•œ ์ง‘๋‹จ์œผ๋กœ ํ™•์ธํ•˜์˜€๋‹ค. ์ด ๋ฐ–์—๋„, ์ „์žฅ์œ ์ „์ฒด ์—ฐ๊ด€ ๋ถ„์„ (GWAS) ๊ฒฐ๊ณผ๋กœ ๊ณผ์‹ค, ์ค„๊ธฐ, ์žŽ ๊ด€๋ จ ํŠน์„ฑ๊ณผ ํฌ๊ฒŒ ์—ฐ๊ด€๋œ 509๊ฐœ์˜ SNP ๋งˆ์ปค๋ฅผ ๋ฐœ๊ฒฌํ•˜์˜€๋‹ค. ์ „๋ฐ˜์ ์œผ๋กœ, ์ด ์—ฐ๊ตฌ๋Š” ๋ณด์กด๊ณผ ์œก์ข…์ด๋ผ๋Š” ๊ด€์ ์—์„œ ์—ํ‹ฐ์˜คํ”ผ์•„ ๊ณ ์ถ” ์ข…์— ์กด์žฌํ•˜๋Š” ์œ ์ „์  ๋‹ค์–‘์„ฑ์„ ์ดํ•ดํ•˜๋Š”๋ฐ ์œ ์šฉํ•  ๊ฒƒ์ด๋‹ค. ๊ณ ์ถ”์˜ ๊ณผ์‹ค๋ฐฉํ–ฅ์—์„œ ๋‘๊ฐœ์˜ ์ฃผ์š”ํ•œ ์‹œ์žฅ์œผ๋กœ, pendant์™€ upright๊ฐ€ ์žˆ๋‹ค. ๊ณผ์‹ค์˜ Pendant ์™€ upright ๋ฐฉํ–ฅ ๊ทธ๋ฆฌ๊ณ  ๋“œ๋ฌผ๊ฒŒ ๋ฐœ์ƒํ•˜๋Š” ์ค‘๊ฐ„ํ˜•์€ ์ง‘๋‹จ์˜ ๊ตฌ์กฐ์— ๋”ฐ๋ผ ๊ณผ์‹ค์ด ๋‹ฌ๋ฆฌ๊ธฐ ์ „๊ณผ ํ›„์— ์‰ฝ๊ฒŒ ๊ตฌ๋ณ„๋˜์–ด์ง€๋Š” ํ˜•ํƒœํ•™์  ๊ฐ€๋ณ€์„ฑ์„ ํŒ๋ณ„ํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ๊ณ ์ถ” ํ•ต์‹ฌ ์ง‘๋‹จ (core collection)์—์„œ GWAS ๋ถ„์„์„ ํ†ตํ•œ highly significant SNP์™€ 3๊ฐœ์˜ ์–‘์นœํ˜• ์ง‘๋‹จ (bi-parental population)์œผ๋กœ๋ถ€ํ„ฐ ์œ ์ „์ž๋ฅผ ๋ฐœ๊ฒฌํ•˜๋Š” ๊ฒƒ์€ ์—ผ์ƒ‰์ฒด 7๋ฒˆ์— ์กด์žฌํ•˜๋Š” ๊ณผ์‹ค์˜ ๋ฐฉํ–ฅ์„ฑ์„ ์กฐ์ ˆํ•˜๋Š” ์œ ์ „์ž์ขŒ์˜ ๋งตํ•‘ ๊ตฌ์—ญ์„ ์ขํ˜€๊ฐ€๋Š” ๊ฒƒ์„ ๊ฐ€๋Šฅํ•˜๊ฒŒ ํ•œ๋‹ค. ์ถ”๊ฐ€๋กœ ๋ถ„์ž ๋งˆ์ปค๋ฅผ ๊ฐœ๋ฐœํ•˜๊ณ , ๊ณผ์‹ค ๋ฐฉํ–ฅ์— ๊ธฐ์ดˆํ•˜๋Š” ํ›„๋ณด ์œ ์ „์ž๋ฅผ ๋ถ„๋ฆฌํ•˜๊ธฐ ์œ„ํ•ด, Capsicum annuum LA F2 mapping population ์„ ์‚ฌ์šฉํ•˜์—ฌ fine mapping์„ ์ˆ˜ํ–‰ํ•˜์˜€๋‹ค. 450 individuals๋กœ ๊ตฌ์„ฑ๋œ LA F2 mapping population์€ ์–‘์นœํ˜• ๋ผ์ธ์ธ C. annuum LP97 and A79์˜ ๊ต๋ฐฐ๋ฅผ ํ†ตํ•ด ๊ฐœ๋ฐœ๋˜์—ˆ๋‹ค. ์œ ์ „์ž ๋ถ„์„ ๊ฒฐ๊ณผ ์ƒํ–ฅ ๊ณผ์‹ค ๋ฐฉํ–ฅ์˜ ํฌํ˜„ํ˜•์€ ๋‹จ์ผ ์—ด์„ฑ ์œ ์ „์ž Up์— ์˜ํ•˜์—ฌ ์กฐ์ ˆ๋จ์„ ๋‚˜ํƒ€๋ƒˆ๋‹ค. Up ์œ ์ „์ž์ขŒ์˜ fine mapping์„ ์œ„ํ•ด 150๊ฐœ์˜ SNP ๋ถ„์ž๋งˆ์ปค๊ฐ€ ์‚ฌ์šฉ๋˜์—ˆ๋‹ค. ์œ ์ „์ž ๋ถ„์„ ๊ฒฐ๊ณผ ์ƒํ–ฅ ๊ณผ์‹ค ๋ฐฉํ–ฅ์˜ ํฌํ˜„ํ˜•์€ ๋‹จ์ผ ์—ด์„ฑ ์œ ์ „์ž Up์— ์˜ํ•˜์—ฌ ์กฐ์ ˆ๋จ์„ ๋‚˜ํƒ€๋ƒˆ๋‹ค. Up ์œ ์ „์ž์ขŒ์˜ fine mapping์„ ์œ„ํ•ด 150๊ฐœ์˜ SNP ๋ถ„์ž๋งˆ์ปค๊ฐ€ ์‚ฌ์šฉ๋˜์—ˆ๋‹ค. ์ด ๋‘๊ฐœ์˜ ๋งˆ์ปค ์„œ์—ด์€CM334 ์œ ์ „์ฒด์— ์ •๋ ฌ๋˜์—ˆ์œผ๋ฉฐ, Up ์œ ์ „์ž์ขŒ๋Š” 101kb genomic region์œผ๋กœ ๊ตฌ๋ถ„๋˜์—ˆ๋‹ค. ๋Œ€์ƒ ์ง€์—ญ์—์„œ 13๊ฐœ์˜ ํ›„๋ณด์œ ์ „์ž๊ฐ€ ์˜ˆ์ธก๋˜์—ˆ๋‹ค. ํ›„๋ณด์œ ์ „์ž์˜ CDS ์˜์—ญ์ธ Zinc finger MYM-type protein 1-like๋Š” 66๊ณผ 75 ์œ„์น˜์˜ ๋‘ ๊ฐœ์˜ ๋น„ ๋™์˜ ์—ผ๊ธฐ์น˜ํ™˜๊ณผ, ์ฒซ๋ฒˆ์งธ ๋‰ดํด๋ ˆ์˜คํƒ€์ด๋“œ์˜ 104bp ์—์„œ 104b์—์„œ ํ•œ ๊ฐœ์˜ ์—ผ๊ธฐ ๊ฒฐ์‹ค์„ ๋‚˜ํƒ€๋‚ด์—ˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋Œ์—ฐ๋ณ€์ด๋Š” 12๊ฐœ์˜ parental line๊ณผ 5๊ฐœ์˜ ์ข…์—์„œ ์ผ๊ด€๋˜๊ฒŒ ๊ด€์ฐฐ๋˜์—ˆ๋‹ค. ๋”ฐ๋ผ์„œ ์ด ์œ ์ „์ž๋Š” Up ์œ ์ „์ž์ขŒ์— ๋งค์šฐ ์œ ๋ ฅํ•œ ํ›„๋ณด์œ ์ „์ž์˜€๋‹ค. ์ด ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ์–ป์€ ์ •๋ณด๋Š” ๋ถ„์žํ‘œ์ง€ ๊ธฐ๋ฐ˜ ์„ ๋ฐœ์„ ํ†ตํ•˜์—ฌ ์กฐ๊ธฐ ๊ณผ์‹ค ๋ฐฉํ–ฅ ๊ฒฐ์ •์œผ๋กœ ๊ณ ์ถ” ํ’ˆ์ข…์˜ ํŠน์„ฑ๊ณผ ์œก์ข…์— ๋Œ€ํ•œ ์ถ”๊ฐ€ ์—ฐ๊ตฌ๋ฅผ ์ด‰์ง„ํ•  ๊ฒƒ์ด๋‹ค.Diversity study of Capsicum germplasms preserved in the Ethiopian Gene bank and understanding genetic factors that controls the fruit orientation in pepper can provide important information for breeding. Investigating the extent and structure of crop germplasm diversity is essential for the conservation and utilization of the available genetic resources. Despite the great economic and social importance of pepper in Ethiopia, detailed studies of the genetic diversity using single nucleotide polymorphism (SNP) markers is limited. Thus, with the objective of investigating the variability and genetic structure of Ethiopian pepper germplasms, a total of 142 accessions which were collected and maintained by the Ethiopian Biodiversity Institute were evaluated. We identified and validated 53,284 genome wide SNP molecular markers using genotyping-by-sequencing (GBS). Employing model based population structure, phylogenetic tree and principal coordinate analysis, we identified C. annuum and C. frutescens as two distinct genetic populations with 132 and 9 accessions, respectively. Besides this, genome wide association (GWAS) analysis detected 509 SNP markers that were significantly associated with fruit, stem and leaf-related traits. Overall, this report is useful to understand the genetic variability existed in Ethiopian Capsicum species, for its conservation and breeding. There are specific known markets for the two major fruit orientation in pepper, i.e. pendant and upright. Pendant and upright position with rare occurrence of intermediate orientation of pepper fruit is a distinguishing morphological variability that can be easily recognized before or after the fruit is set, depending on the population types. Identification of genes from three different bi-parental populations and highly significant SNP positions from GWAS analysis of Capsicum core collection enable us to narrow down the mapping region of fruit orientation controlling the locus in chromosome 12. To further develop molecular markers and isolate the candidate gene underlying fruit orientation, fine mapping was performed using Capsicum annuum LA F2 mapping population. The LA F2 mapping population consisting of 450 individuals was developed from the cross between parental lines C. annuum LP97 and A79. Genetic analysis revealed that the phenotype of the up fruit orientation was controlled by a single recessive gene, Up. One hundred fifty SNP markers were used for fine mapping of the Up locus. High-resolution genetic mapping of these markers in Karia F2 mapping population placed Redu0119 and SAR201-1386 at genetic distances of 0.8 and 0.6 cM, respectively, on either side of the Up locus. These two marker sequences were aligned to the CM334 genome and the Up locus was delimited to a 101 kb genomic region. Fifteen candidate genes were predicted in the target region. Overall, there were a total of 31 conservative amino acid substitutions, due to 18 non-synonymous and 13 synonymous nucleotide switches. The first CDS region of the candidate gene, Zinc finger MYM-type protein 1-like has displayed one non-synonymous nucleotide substitution at 106 bp and one nucleotide deletion at 104 bp. Therefore, Zinc finger MYM-type protein 1-like was the most likely candidate gene for the Up locus. The information obtained here will facilitate further research on the trait and breeding of pepper varieties with the early determination of fruit orientation through marker-assisted selection.GENERAL INTRODUCTION 1 CHAPTER I Genetic Diversity of Ethiopian Capsicum spp 12 ABSTRACT 13 INTRODUCTION 15 MATERIALS AND METHODS 20 Plant materials 20 Morphological characterization and statistical analysis 23 DNA extraction and library construction for genotyping by sequencing 24 HRM-PCR amplification and data analysis 25 Sequencing data analysis, SNP identification and genome-wide association analysis 28 Genetic diversity and population structure analysis 29 Phylogenetic and principal-coordinate analyses 30 RESULTS 31 Species identification based on HRM genotyping 31 Qualitative and quantitative morphological characterization 33 GBS and single-nucleotide polymorphisms 41 Genetic diversity 44 Analysis of molecular variance 46 Population structure 48 Molecular phylogenetic and principal-coordinate analysis 50 GWAS for selected traits 52 DISCUSSION 61 REFERENCES 67 CHAPTER II Fine mapping of the Up gene controlling fruit orientation in pepper (Capsicum spp.) 76 ABSTRACT 77 INTRODUCTION 79 MATERIALS AND METHODS 82 Plant materials 82 Growing conditions and phenotyping 82 Light microscopic observation 83 Genomic DNA extraction 83 Genotyping-by-sequencing 84 Development of SNP markers and linkage analysis of molecular markers 84 PCR amplification and localization of the Up gene 86 Gene cloning and sequencing 87 RESULTS 89 Fruit orientation in pepper and its temporal change 89 Pedicel morphology in segregation population and its correlation with other related traits 90 Inheritance analysis of fruit position 91 Localization of the target region for Up locus 100 Fine-mapping of Up locus and validation of markers 107 Confirmation of sequence variations in candidate genes 113 Phylogenic analysis 122 DISCUSSION 124 REFERENCES 130 ABSTRACT IN KOREAN 137Docto

    Gastrointestinal helminths and their predisposing factors in different poultry management systems; Haromaya, Ethiopia

    Get PDF
    Among several diseases, gastrointestinal parasites affect poultry production through retarded growth and reduced productivity. The severity varies according to management system and associated predisposing factors. Epidemiology of chicken gastrointestinal helminths were studied using coprological and necropsy examination, with the objectives to estimate the prevalence, identify species of helminths and associated predisposing factors in Haromaya town from November 2011 to April 2012. Fecal samples from selected chicken were collected from both intensive and extensive farms. Coprological examination on 384 chicken and 24 post mortem examinations were conducted. Out of 384 samples examined, 51.8% were positive of which a high prevalence of 110(28.6%) Ascaridia galli followed by 33(8.6%) of Heterakis gallinarum, 11(2.8%) of Raillietina species and 44(11.5%) mixed infection were recovered. Factors for the occurrence of GIT helminths were investigated using logistic regression models; where each assumed predisposing factor analyzed using uni-variable and followed by multi-variable logistic regression to determine the interaction and power of influence among factors. Accordingly, statistically significant difference (p<0.05) was observed when prevalence of helminths compared with breed, sex, age and management system separately using univariable logistic regression; whereas, when all predisposing factors subjected together using multi-variable backward stepwise analysis, it showed that the odds of local, Fayoumi and White Leghorn breeds had odds of (OR= 6.4, 50.8 and 6.9) more likely to be affected than Bovan Brown breed with significant difference (p<0.05). Male birds were 1.9 times more likely to be affected than female birds and birds in extensive management system were 2.8 times more likely to be affected than intensive farming system. The study indicated that ย gastrointestinal (GIT) helminths were more prevalent in extensive management system than in intensive management system, the finding was associated with poor management system or due to poor bio-security. Therefore, there is a need to improve hygienic situation, especially in area where extensive management system prevails.Keywords: Gastrointestinal; Haromaya; Helminths; Poultry; Production system

    The nominal group technique for participating communities in analyzing rural town water and sanitation situation

    Get PDF
    Abstract: To explore sanitation problems and their causes, a series of independent group discussions was conducted with residents of a rural town stratified into seven social levels using the Nominal Group [Discussion] Technique (NGT). Indiscriminate open field defecation and garbage disposal were the two most mentioned and ranked problem items followed by unsanitary food and drink services. The top identified cause items were absence of public latrines, failure of the municipality to control town sanitation and absence of solid waste disposal facilities. A Combined group gave the highest Median Agreement Score (MAS) of 10. The smallest median agreement was scored by Youth and Health workers' groups (MAS=6.5) for mentioned, and by youth and Ordinary residents'groups (MAS=4.5) for ranked problem items. Health workers' group (group 7) ranked MAS of 5. The MAS for causes of sanitation problems of the Combined group was 8 for mentioned, and MAS of 4 for ranked items. Development workers ought to give due recognition to communal stratification when making need assessment for better realignment of diverse view points and interests during project development. Modifying and validating NGT for a broader use in assessing community health problems and needs is suggested. [Ethiop. J. Health Dev. 1997;11(1):37-42
    • โ€ฆ
    corecore