Search results for: Threats
443 Pivoting to Fortify our Digital Self: Revealing the Need for Personal Cyber Insurance
Authors: Richard McGregor, Carmen Reaiche, Stephen Boyle
Abstract:
Cyber threats are a relatively recent phenomenon and offer cyber insurers a dynamic and intelligent peril. As individuals en mass become increasingly digitally dependent, Personal Cyber Insurance (PCI) offers an attractive option to mitigate cyber risk at a personal level. This abstract proposes a literature review that conceptualises a framework for siting Personal Cyber Insurance (PCI) within the context of cyberspace. The lack of empirical research within this domain demonstrates an immediate need to define the scope of PCI to allow cyber insurers to understand personal cyber risk threats and vectors, customer awareness, capabilities, and their associated needs. Additionally, this will allow cyber insurers to conceptualise appropriate frameworks allowing effective management and distribution of PCI products and services within a landscape often in-congruent with risk attributes commonly associated with traditional personal line insurance products. Cyberspace has provided significant improvement to the quality of social connectivity and productivity during past decades and allowed enormous capability uplift of information sharing and communication between people and communities. Conversely, personal digital dependency furnish ample opportunities for adverse cyber events such as data breaches and cyber-attacksthus introducing a continuous and insidious threat of omnipresent cyber risk–particularly since the advent of the COVID-19 pandemic and wide-spread adoption of ‘work-from-home’ practices. Recognition of escalating inter-dependencies, vulnerabilities and inadequate personal cyber behaviours have prompted efforts by businesses and individuals alike to investigate strategies and tactics to mitigate cyber risk – of which cyber insurance is a viable, cost-effective option. It is argued that, ceteris parabus, the nature of cyberspace intrinsically provides characteristic peculiarities that pose significant and bespoke challenges to cyber insurers, often in-congruent with risk attributes commonly associated with traditional personal line insurance products. These challenges include (inter alia) a paucity of historical claim/loss data for underwriting and pricing purposes, interdependencies of cyber architecture promoting high correlation of cyber risk, difficulties in evaluating cyber risk, intangibility of risk assets (such as data, reputation), lack of standardisation across the industry, high and undetermined tail risks, and moral hazard among others. This study proposes a thematic overview of the literature deemed necessary to conceptualise the challenges to issuing personal cyber coverage. There is an evident absence of empirical research appertaining to PCI and the design of operational business models for this business domain, especially qualitative initiatives that (1) attempt to define the scope of the peril, (2) secure an understanding of the needs of both cyber insurer and customer, and (3) to identify elements pivotal to effective management and profitable distribution of PCI - leading to an argument proposed by the author that postulates that the traditional general insurance customer journey and business model are ill-suited for the lineaments of cyberspace. The findings of the review confirm significant gaps in contemporary research within the domain of personal cyber insurance.Keywords: cyberspace, personal cyber risk, personal cyber insurance, customer journey, business model
Procedia PDF Downloads 103442 The Indigenous Forced Migration in Mato Grosso in Pedro Casaldaliga's Poetic
Authors: Eliziane Navarro
Abstract:
It is intended, in this study, from some poems from the work of the poet and Bishop of Sao Felix do Araguaia-MT Brazil Dom Pedro Casaldaliga, to analyze his poetics from the perspective of the environmental law. In his work, Casaldaliga made a considerable manifest against the oppression experienced especially by Xavante people inside the countryside of the state of Mato Grosso when some government programs benefited a large number of landowners in instead of that minority as a power and control self-affirmation process. The attention which Casaldaliga dismissed to the cause of indigenous eviction of their land called Maraiwatsede resulted in numerous death threats against the poet who was not silenced in the face of the landowners’ grievances. His voice contributed significantly to the process of land returning to the indigenous people. Because of the international pressure, the Italian company AGIP, owner of the land, tried to return it to the hands of the indigenous, unfortunately, in the middle of the process, the land was occupied by politicians and big landowners of the region. Another objective of this research is to check the connection of his testimonial literature with the actual legal context of the state in the 50s and also to analyze his poetry as a complaint that led the cause of the state's indigenous to the Eco 92 discussion in Rio de Janeiro.Keywords: law and literature, indigenous migration, Mato Grosso, Pedro Casaldaliga
Procedia PDF Downloads 243441 Aquatic and Marshy Flora from Fresh Water Wetlands on Quartz Sands in Pinar Del Río, Cuba
Authors: Vidal Pérez Hernández, Enrique González Pendás
Abstract:
The most of the aquatic and marshy flora in Cuba, is located on quartzitic sands ecosystems and they are represented by a wide variety of freshwater wetlands, which are spread in the whole south and south-western plain of Pinar del Río. The survey carried out in these ecosystems offers an updated inventory of these species, showing up their biological type, habit, distribution, and the threat grade to which are subjected, taking into account categories granted by UICN. A remarkable decrease is evidenced, in the total of these species respect to this area; due to deposit processes and deforestation, which are taken place by the human activity and the climatic change. It is linked to others threats like, limitless use of their water reserves for irrigating groves, the cattle raising and intensive fishing. Added to it, its sand with 99% pure crystal quartz, are used for the mining. The combination of all factors has a negative influence on a flora that stores more than 250 species, most of them herbaceous and hydrophytes. In these particular ecosystems were found a 40% endemism from total flora, and more than 80%, are evaluated inside the most sensitive threat categories, and already some of them have been declared as extinct.Keywords: aquatic flora, marshy flora, quartzitic sands, wetlands
Procedia PDF Downloads 228440 Authorship Profiling of Unidentified Corpora in Saudi Social Media
Authors: Abdulaziz Fageeh
Abstract:
In the bustling digital landscape of Saudi Arabia, a chilling wave of cybercrime has swept across the nation. Among the most nefarious acts are financial blackmail schemes, perpetrated by anonymous actors lurking within the shadows of social media platforms. This chilling reality necessitates the utilization of forensic linguistic techniques to unravel the identities of these virtual villains. This research delves into the complex world of authorship profiling, investigating the effectiveness of various linguistic features in identifying the perpetrators of malicious messages within the Saudi social media environment. By meticulously analyzing patterns of language, vocabulary choice, and stylistic nuances, the study endeavors to uncover the hidden characteristics of the individuals responsible for these heinous acts. Through this linguistic detective work, the research aims to provide valuable insights to investigators and policymakers in the ongoing battle against cybercrime and to shed light on the evolution of malicious online behavior within the Saudi context.Keywords: authorship profiling, arabic linguistics, saudi social media, cybercrime, financial blackmail, linguistic features, forensic linguistics, online threats
Procedia PDF Downloads 12439 Protecting the Privacy and Trust of VIP Users on Social Network Sites
Authors: Nidal F. Shilbayeh, Sameh T. Khuffash, Mohammad H. Allymoun, Reem Al-Saidi
Abstract:
There is a real threat on the VIPs personal pages on the Social Network Sites (SNS). The real threats to these pages is violation of privacy and theft of identity through creating fake pages that exploit their names and pictures to attract the victims and spread of lies. In this paper, we propose a new secure architecture that improves the trusting and finds an effective solution to reduce fake pages and possibility of recognizing VIP pages on SNS. The proposed architecture works as a third party that is added to Facebook to provide the trust service to personal pages for VIPs. Through this mechanism, it works to ensure the real identity of the applicant through the electronic authentication of personal information by storing this information within content of their website. As a result, the significance of the proposed architecture is that it secures and provides trust to the VIPs personal pages. Furthermore, it can help to discover fake page, protect the privacy, reduce crimes of personality-theft, and increase the sense of trust and satisfaction by friends and admirers in interacting with SNS.Keywords: social network sites, online social network, privacy, trust, security and authentication
Procedia PDF Downloads 381438 Heavy Metals Concentration in Sediments Along the Ports, Samoa
Authors: T. Imo, F. Latū, S. Aloi, J. Leung-Wai, V. Vaurasi, P. Amosa, M. A. Sheikh
Abstract:
Contamination of heavy metals in coral reefs and coastal areas is a serious ecotoxicological and environmental problem due to direct runoff from anthropogenic wastes, commercial vessels, and discharge from industrial effluents. In Samoa, the information on the ecotoxicological impact of heavy metals on sediments is limited. This study presents baseline data on the concentration and distribution of heavy metals in sediments collected along the commercial and fishing ports in Samoa. Surface sediment samples were collected within the months of August-October 2013 from the 5 sites along the 2 ports. Sieved sample fractions were used for the evaluation of sediment physicochemical parameters namely pH, conductivity, organic matter, and bicarbonates of calcium. Heavy metal (Cu, Pb) analysis was achieved by flame atomic absorption spectrometry. Two heavy metals (Cu, Pb) were detected from each port with some concentration below the WHO permissible maximum concentration of environment quality standard. The results obtained from this study advocate for further studies regarding emerging threats of heavy metals on the vital marine resources which have significant importance to the livelihood of coastal societies, particularly Small Island States including Samoa.Keywords: coastal environment, heavy metals, pollution, sediments
Procedia PDF Downloads 329437 SWOT Analysis on the Prospects of Carob Use in Human Nutrition: Crete, Greece
Authors: Georgios A. Fragkiadakis, Antonia Psaroudaki, Theodora Mouratidou, Eirini Sfakianaki
Abstract:
Research: Within the project "Actions for the optimal utilization of the potential of carob in the Region of Crete" which is financed-supervised by the Region, with collaboration of Crete University and Hellenic Mediterranean University, a SWOT (strengths, weaknesses, opportunities, threats) survey was carried out, to evaluate the prospects of carob in human nutrition, in Crete. Results and conclusions: 1). Strengths: There exists a local production of carob for human consumption, based on international reports, and local-product reports. The data on products in the market (over 100 brands of carob food), indicates a sufficiency of carob materials offered in Crete. The variety of carob food products retailed in Crete indicates a strong demand-production-consumption trend. There is a stable number (core) of businesses that invest significantly (Creta carob, Cretan mills, etc.). The great majority of the relevant food stores (bakery, confectionary etc.) do offer carob products. The presence of carob products produced in Crete is strong on the internet (over 20 main professionally designed websites). The promotion of the carob food-products is based on their variety and on a few historical elements connected with the Cretan diet. 2). Weaknesses: The international prices for carob seed affect the sector; the seed had an international price of €20 per kg in 2021-22 and fell to €8 in 2022, causing losses to carob traders. The local producers do not sort the carobs they deliver for processing, causing 30-40% losses of the product in the industry. The occasional high price triggers the collection of degraded raw material; large losses may emerge due to the action of insects. There are many carob trees whose fruits are not collected, e.g. in Apokoronas, Chania. The nutritional and commercial value of the wild carob fruits is very low. Carob trees-production is recorded by Greek statistical services as "other cultures" in combination with prickly pear i.e., creating difficulties in retrieving data. The percentage of carob used for human nutrition, in contrast to animal feeding, is not known. The exact imports of carob are not closely monitored. We have no data on the recycling of carob by-products in Crete. 3). Opportunities: The development of a culture of respect for carob trade may improve professional relations in the sector. Monitoring carob market and connecting production with retailing-industry needs may allow better market-stability. Raw material evaluation procedures may be implemented to maintain carob value-chain. The state agricultural services may be further involved in carob-health protection. The education of farmers on carob cultivation/management, can improve the quality of the product. The selection of local productive varieties, may improve the sustainability of the culture. Connecting the consumption of carob with health-food products, may create added value in the sector. The presence and extent of wild carob threes in Crete, represents, potentially, a target for grafting. 4). Threats: The annual fluctuation of carob yield challenges the programming of local food industry activities. Carob is a forest species also - there is danger of wrong classification of crops as forest areas, where land ownership is not clear.Keywords: human nutrition, carob food, SWOT analysis, crete, greece
Procedia PDF Downloads 92436 Interspecific Hybridization in Natural Sturgeon Populations of the Eastern Black Sea: The Consequence of Drastic Population Decline
Authors: Tamar Beridze, Elisa Boscari, Fleur Scheele, Tamari Edisherashvili, Cort Anderson, Leonardo Congiu
Abstract:
The eastern part of the Black Sea and its tributaries are suitable habitats for several sturgeon species, among which Acipenser gueldenstaedtii, A. stellatus, A. nudiventris, A. persicus, A. sturio, and H. huso are well documented. However, different threats have led these species to a dramatic decline; all of them are currently listed as Critically Endangered and some Locally Extinct in that area. We tested 94 wild sturgeon samples from the Black Sea and Rioni River by analyzing the mitochondrial Control Region and nuclear markers for hybrid identification. The data analyses (1) assessed mitochondrial diversity among samples, (2) identified their species, as well as (3) indicated instances of hybridization. The data collected, besides confirming a sharp decrease of catches of Beluga and Stellate sturgeon in recent years, also revealed four juvenile hybrids between Russian and Stellate sturgeon, providing the first evidence of natural interspecific hybridization in the Rioni. The present communication raises concerns about the status of sturgeon species in this area and underlines the urgent need for conservation programs to restore self-sustaining populations.Keywords: black sea, sturgeon, Rioni river, interspecific hybridization
Procedia PDF Downloads 136435 Small and Medium-Sized Enterprises in West African Semi-Arid Lands Facing Climate Change
Authors: Mamadou Diop, Florence Crick, Momadou Sow, Kate Elizabeth Gannon
Abstract:
Understanding SME leaders’ responses to climate is essential to cope with ongoing changes in temperature and rainfall. This study analyzes the response of SME leaders to the adverse effects of climate change in semi-arid lands (SAL) in Senegal. Based on surveys administrated to 161 SME leaders, this research shows that 91% of economic units are affected by climatic conditions, although 70% do not have a plan to deal with climate risks. Economic actors have striven to take measures to adapt. However, their efforts are limited by various obstacles accentuated by a lack of support from public authorities. In doing so, substantial political, institutional and financial efforts at national and local levels are needed to promote an enabling environment for economic actors to adapt. This will focus on information and training about the threats and opportunities related to global warming, the creation of an adaptation support fund to support local initiatives and the improvement of the institutional, regulatory and political framework.Keywords: small and medium-sized enterprises, climate change, adaptation, semi-arid lands
Procedia PDF Downloads 208434 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques
Authors: John Onyima, Ikechukwu Ezepue
Abstract:
Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection
Procedia PDF Downloads 307433 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Authors: Jean Rosemond Dora, Karol Nemoga
Abstract:
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model
Procedia PDF Downloads 172432 Opportunities for Effective Conflict Management Caused by Global Crises
Authors: Marine Kobalava
Abstract:
The article analyzes current global crises in the world, explains the causes of crises, substantiates that in the main cases the process accompanying the crisis are conflict situations. The paper argues that crises can become predictable if threats are identified and addressed by a company, organization, corporation, and others. Accordingly, mechanisms for the neutralization of conflict potential are proposed, the need to develop a communication strategy and create and redistribute information flows is justified. Conflict situations are assessed according to the types of crisis and it is considered that the conflict can become a prerequisite for the crisis. The paper substantiates the need to differentiate theories of crises and conflicts. Based on the evaluative judgment, conflict management measures are proposed taking into account institutionalization, conflict resolution norms and rules. The paper identifies the potential for conflicts created in the context of global crises and suggests local ways and mechanisms for their effective management. The involvement of the company's Public relations (PR) and relevant communication from the qualified staff is considered important. Conclusions are drawn on the problems of effective conflict management caused by global crises and recommendations for conflict resolution have been proposed.Keywords: global crises, conflict situations, conflict identification, conflict management, conflict potential
Procedia PDF Downloads 140431 Design Standardization in Aramco: Strategic Analysis
Authors: Mujahid S. Alharbi
Abstract:
The construction of process plants in oil and gas-producing countries, such as Saudi Arabia, necessitates substantial investment in design and building. Each new plant, while unique, includes common building types, suggesting an opportunity for design standardization. This study investigates the adoption of standardized Issue For Construction (IFC) packages for non-process buildings in Saudi Aramco. A SWOT analysis presents the strengths, weaknesses, opportunities, and threats of this approach. The approach's benefits are illustrated using the Hawiyah Unayzah Gas Reservoir Storage Program (HUGRSP) as a case study. Standardization not only offers significant cost savings and operational efficiencies but also expedites project timelines, reduces the potential for change orders, and fosters local economic growth by allocating building tasks to local contractors. Standardization also improves project management by easing interface constraints between different contractors and promoting adaptability to future industry changes. This research underscores the standardization of non-process buildings as a powerful strategy for cost optimization, efficiency enhancement, and local economic development in process plant construction within the oil and gas sector.Keywords: building, construction, management, project, standardization
Procedia PDF Downloads 64430 Numerical Simulation of Air Flow, Exhaust and Their Mixture in a Helicopter Exhaust Injective Cooler
Authors: Mateusz Paszko, Konrad Pietrykowski, Krzysztof Skiba
Abstract:
Due to low-altitude and relatively low flight speed, today’s combat assets like missile weapons equipped with infrared guidance systems are one of the most important threats to the helicopters performing combat missions. Especially meaningful in helicopter aviation is infrared emission by exhaust gases, regressed to the surroundings. Due to high temperature, exhaust gases are a major factor in detectability of a helicopter performing air combat operations. This study presents the results of simulating the flow of the mixture of exhaust and air in the flow duct of an injective exhaust cooler, adapted to cooperate with the PZL 10W turbine engine. The simulation was performed using a numerical model and the ANSYS Fluent software. Simulation computations were conducted for set flight conditions of the PZL W-3 Falcon helicopter. The conclusions resulting from the conducted numerical computations should allow for optimisation of the flow duct geometry in the cooler, in order to achieve the greatest possible temperature reduction of exhaust exiting into the surroundings. It is expected that the obtained results should be useful for further works related to the development of the final version of exhaust cooler for the PZL W-3 Falcon helicopter.Keywords: exhaust cooler, helicopter, numerical simulation, stealth
Procedia PDF Downloads 150429 Stabilizing a Failed Slope in Islamabad, Pakistan
Authors: Muhammad Umer Zubair, Kamran Akhtar, Muhammad Arsalan Khan
Abstract:
This paper is based on a research carried out on a failed slope in Defence Housing Authority (DHA) Phase I, Islamabad. The research included determination of Soil parameters, Site Surveying and Cost Estimation. Apart from these, the use of three dimensional (3D) slope stability analysis in conjunction with two dimensional (2D) analysis was used determination of slope conditions. In addition collection of soil reports, a detailed survey was carried out to create a 3D model in Surfer 8 software. 2D cross-sections that needed to be analyzed for stability were generated from 3D model. Slope stability softwares, Rocscience Slide 6.0 and Clara-W were employed for 2D and 3D Analyses respectively which have the ability to solve complex mathematical functions. Results of the analyses were used to confirm site conditions and the threats were identified to recommend suitable remedies.The most effective remedy was suggested for slope stability after analyzing all remedies in software Slide 6 and its feasibility was determined through cost benefit analysis. This paper should be helpful to Geotechnical engineers, design engineers and the organizations working with slope stability.Keywords: slope stability, Rocscience, Clara W., 2d analysis, 3D analysis, sensitivity analysis
Procedia PDF Downloads 525428 First Report of Asiatic Black Bear: Evidence of Illegal Hunting and Trading from Manglawar Mountain, Swat, Pakistan
Authors: Waheed Akhtar
Abstract:
Bears in Asia facing multiple threats and challenges such as hunting, illegal trading, habitat loss, and human conflicts. According to IUCN Red List, the Asiatic black bear (Ursus thibetanus) is listed as Vulnerable since 1990, population declining by 49% during the last 30 years. The present study was conducted in Manglawar (DwaSaro Mountain) from April-August 2021, to collect all the information on Asiatic black bear observation, illegal hunting, and cub poaching. According to the response of the local community, very intensive illegal hunting and cub poaching were observed. Hunters usually installed many traps in the routes of black bears and when they move in the winter season the cubs get trapped and they collect them and kept in a specialized wooden box that is mainly helpful for further transportation. These cubs are then brought to the concerned Market where they sell them to many dealers. One of the potential observers of the illegal trading responds towards the Market price of the cubs, “The average price of the black bear cub is ranging from 45000-50000 Pakistani Rupees”. Apart from cubs' poaching, the black bear is also hunted for its skin, claws, and teeth.Keywords: first report, illegal hunting, cub poaching, parts trading, Ursus thibetanus
Procedia PDF Downloads 63427 Study on the OTP Authentication Method and Security for User Mobility in the Cloud
Authors: Jong-Won Lee
Abstract:
Since Cloud environment has appeared as the most powerful keyword in the computing industry, the growth in VDI (Virtual Desktop Infrastructure) became remarkable in domestic market. In recent years, with the trend that mobile devices such as smartphones and pads spread so rapidly, the strengths of VDI that allows people to access and perform business on the move along with companies' office needs expedite more rapid spread of VDI. However, although this enhanced accessibility and mobility can bring the enhanced productivity, it sometimes conflicts with the security, so there should be more detailed security solution, which is user authentication. In this paper, mobile OTP (One-Time Password) authentication method is proposed to secure mobile device portability through rapid and secure authentication using mobile devices such as mobile phones or pads, which does not require additional purchase or possession of OTP tokens of users. However, in order to use the service continuously and reliably in the cloud environment, both service provider and user have to prepare for security awareness and security threats, and continuously study the conflicting aspect between the improving user convenience and the security and supplement so that cloud service can provide opportunities to develop as a new growth industry in the future and create a new market in IT industry.Keywords: cloud, OTP, mobility, security, authentication
Procedia PDF Downloads 350426 Role of Community Forestry to Address Climate Change in Nepal
Authors: Laxmi Prasad Bhattarai
Abstract:
Climate change is regarded as one of the most fundamental threats to sustainable livelihood and global development. There is a growing global concern in linking community-managed forests as potential climate change mitigation projects. This study was conducted to explore local people’s perception on climate change and the role of community forestry (CF) to combat climate change impacts. Two active community forest user groups (CFUGs) from Kaski and Syangja Districts in Nepal were selected as study sites, and various participatory tools were applied to collect primary data. Although most of the respondents were unaware about the words “Climate Change” in study sites, they were quite familiar with the irregularities in rainfall season and other weather extremities. 60% of the respondents had the idea that, due to increase in precipitation, there is a frequent occurrence of erosion, floods, and landslide. Around 85% of the people agreed that community forests help in stabilizing soil, reducing the natural hazards like erosion, landslide. Biogas as an alternative source of cooking energy, and changes in crops and their varieties are the common adaptation measures that local people start practicing in both CFUGs in Nepal.Keywords: community forestry, climate change, global warming, adaptation, Nepal
Procedia PDF Downloads 305425 System Survivability in Networks
Authors: Asma Ben Yaghlane, Mohamed Naceur Azaiez
Abstract:
We consider the problem of attacks on networks. We define the concept of system survivability in networks in the presence of intelligent threats. Our setting of the problem assumes a flow to be sent from one source node to a destination node. The attacker attempts to disable the network by preventing the flow to reach its destination while the defender attempts to identify the best path-set to use to maximize the chance of arrival of the flow to the destination node. Our concept is shown to be different from the classical concept of network reliability. We distinguish two types of network survivability related to the defender and to the attacker of the network, respectively. We prove that the defender-based-network survivability plays the role of a lower bound while the attacker-based-network survivability plays the role of an upper bound of network reliability. We also prove that both concepts almost never agree nor coincide with network reliability. Moreover, we use the shortest-path problem to determine the defender-based-network survivability and the min-cut problem to determine the attacker-based-network survivability. We extend the problem to a variety of models including the minimum-spanning-tree problem and the multiple source-/destination-network problems.Keywords: defense/attack strategies, information, networks, reliability, survivability
Procedia PDF Downloads 392424 The Politics of Renewable Energy Generation and Its Challenges: A Case Study of Iran
Authors: Naresh Kumar Verma
Abstract:
Nuclear energy being adapted as a renewable energy source and its production by developing countries has turned into a major strategic concern and politics by the developed world. The West seem to be the sole proprietor of such energy source and any country opting for such energy production either face significant hurdles or geopolitical challenges in developing such energy source. History of West Asia is full of interference by external powers which has been integral in the incessant conflict in the region. Whether it was the creation of Israel, the Gulf war of 1991, or the invasion of Iraq in 2003, and more recently the Iranian nuclear conundrum, the soil of West Asia has always been a witness to the play of extra regional powers game. Iran, being a theocratic state has been facing such threats and challenges, regarding its intentions and its capability in such energy production. The paper will try to assess the following issues: -Politics of Renewable Energy Generation. -Geographical and strategic significance of Iran’s nuclear programme. -Challenges in the path of Iran developing nuclear energy as a RE source. -The interests of the regional and extra-regional actors in challenging Iranian Nuclear Programme.Keywords: developing countries, geopolitics, Iran, nuclear energy, renewable energy
Procedia PDF Downloads 635423 A Research for Determining Consumers' Tendency to Prefer Eco-Friendly Products within the Scope of Green Marketing Activities
Authors: Haci Halil Baser, Nurullah Ekmekci, Muammer Zerenler
Abstract:
In the age of environmental concerns increasingly becoming more important, consumer attitudes towards environmentally sensitive products attract attention. Threats to the health and the environment are important factors for consumers to tend to eco-friendly practices and products. In this regard, it is seen positive increases in the tendency to consume organic food and recyclable products. Choosing products, selecting manufacturers and sellers have gained more importance because of increasing consumers' environmental concerns. In this case, it is very important for businesses to act eco-friendly approach in marketing. Green marketing has gained importance and became a concept that manufacturers' agenda by environmental understanding. Although the green marketing activities are common worldwide, studies on consumer perceptions and preferences are unsatisfactory in the literature. In this regard, this study aims to investigate the tendency of consumers to prefer eco-friendly products under the green marketing activities. In the frame of this information and the purpose of the study described above, the survey method has been used in the study. The obtained data have been analyzed through SPSS 20.0 software package, hypothesizes have been tested and suggestions have been made.Keywords: eco-friendly product, environmental concerns, green consumption, green marketing
Procedia PDF Downloads 295422 Beyond the Economics of Food: Household Food Strategies in Clusters of the Umkhanyakude District Municipality
Authors: Mduduzi Nhlozi
Abstract:
Food insecurity continues to persist in rural areas of South Africa today. A number of factors can be attributed to this including declining rural economies, rising unemployment, natural disasters such as drought as well as shifting cultural norms, values, traditions and beliefs. This paper explores mechanisms used by rural households to achieve food security in the midst of various threats and risks to their livelihoods. The study used semi-structured questionnaire to collect information on lived experiences of households in their quest to access and ensure availability of food. The paper finds that households use a number of food strategies namely economy-related, culture-related and rite-of-passage related strategies to achieve food security. The thrust of argument in the paper is that there is a need for food security studies to move beyond the orthodox, economic analytic framework, towards new institutional economics, focusing on local governance and socio-cultural systems supporting households to achieve food security. It advocates for localised food security plans to be developed by local municipalities to improve food security status for rural households.Keywords: household, food insecurity, food strategies, new institutional economics, umkhanyakude
Procedia PDF Downloads 121421 South Asia’s Political Landscape: Precipitating Terrorism
Authors: Saroj Kumar Rath
Abstract:
India's Muslims represent 15 percent of the nation's population, the world's third largest group in any nation after Indonesia and Pakistan. Extremist groups like the Islamic State, Al Qaeda, the Taliban and the Haqqani network increasingly view India as a target. Several trends explain the rise: Terrorism threats in South Asia are linked and mobile - if one source is batted down, jihadists relocate to find another Islamic cause. As NATO withdraws from Afghanistan, some jihadists will eye India. Pakistan regards India as a top enemy and some officials even encourage terrorists to target areas like Kashmir or Mumbai. Meanwhile, a stream of Wahhabi preachers have visited India, offering hard-line messages; extremist groups like Al Qaeda and the Islamic State compete for influence, and militants even pay jihadists. Muslims as a minority population in India could offer fertile ground for the extremist recruiters. This paper argues that there is an urgent need for the Indian government to profile militants and examine social media sites to attack Wahhabi indoctrination while supporting education and entrepreneurship for all of India's citizens.Keywords: Al Qaeda, terrorism, Islamic state, India, haqqani network, Pakistan, Taliban
Procedia PDF Downloads 617420 Cybercrimes in Nigeria: Its Causes, Effects and Solutions
Authors: Uzoma Igboji
Abstract:
Cybercrimes involves crimes committed on the internet using the computer as a tool or targeted victim. In Nigeria today, there are many varieties of crimes that are committed on the internet daily, some are directed to the computers while the others are directed to the computer users. Cyber terrorism, identity theft, internet chat room, piracy and hacking are identified as types of cyber crimes. Usually, these crimes are perpetrated in forms of like sending of fraudulent and bogus financial proposals from cyber crimes to innocent internet users. The increasing rates of cyber crimes have become strong threats to the society, organizations and country’s reputation, E-commerce growth, denial of innocent Nigerian opportunity abroad and reduced productivity. This study identified some of the causes of cybercrimes to include urbanization, high rate of unemployment, corruption, easy accessibility to internet and weak implementation of cyber crimes in Nigeria. Therefore, internet users should inculcate the habit of continuously updating their knowledge about the ever changing ICTs through this, they can be well informed about the current trends in cybercrimes and how the cybercrimes carryout their dubious activities. Thus, how they can devise means of protecting their information from cyber criminals. Internet users should be security conscious at all times .Recommendations were proposed on how these crimes can be minimized if not completely eradicated.Keywords: cyber-crimes, cyber-terrorism, cyber-criminals, Nigeria
Procedia PDF Downloads 538419 Implementation of the Outputs of Computer Simulation to Support Decision-Making Processes
Authors: Jiri Barta
Abstract:
At the present time, awareness, education, computer simulation and information systems protection are very serious and relevant topics. The article deals with perspectives and possibilities of implementation of emergence or natural hazard threats into the system which is developed for communication among members of crisis management staffs. The Czech Hydro-Meteorological Institute with its System of Integrated Warning Service resents the largest usable base of information. National information systems are connected to foreign systems, especially to flooding emergency systems of neighboring countries, systems of European Union and international organizations where the Czech Republic is a member. Use of outputs of particular information systems and computer simulations on a single communication interface of information system for communication among members of crisis management staff and setting the site interoperability in the net will lead to time savings in decision-making processes in solving extraordinary events and crisis situations. Faster managing of an extraordinary event or a crisis situation will bring positive effects and minimize the impact of negative effects on the environment.Keywords: computer simulation, communication, continuity, critical infrastructure, information systems, safety
Procedia PDF Downloads 333418 Improving Cryptographically Generated Address Algorithm in IPv6 Secure Neighbor Discovery Protocol through Trust Management
Authors: M. Moslehpour, S. Khorsandi
Abstract:
As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.Keywords: CGA, ICMPv6, IPv6, malicious node, modifier, NDP, overall load, SEND, trust management
Procedia PDF Downloads 184417 Managing Children with Autism Spectrum Disorder in Corona Age
Authors: Raju Singh, Shikha Singh
Abstract:
This article is note for managing Autistic Child during the Corona time line. It becomes very critical for the primary caregiver as corona pandemic poses new challenges and completely variety of threats to line of treatment, growth, socialization, mental health for children with autism spectrum disorder (ASD), and, so for the family of the children. It is a highly distressful situation, where the line of treatment has shrunken, physical contact has reduced and therapies footprints reduced in several parts of the world. As children with ASD already face socialization challenges, isolation rules imposed by individuals (or social groups), government agencies have only made the situation worse for the children with ASD and their family. This note will try to touch the basics on understanding the ASD and related development disorders, challenges, impact, and suggest approaches to deal with such situation. This document also covers data analysis, deep dive into the increasing impact of ASD on children. This document can also act as a baseline for many researchers, psychiatrists, psychologists, therapists to view the problem statement and measure its impact.Keywords: autism spectrum disorder, mental health, applied behavior therapy, occupational therapy, social anxiety
Procedia PDF Downloads 148416 Management and Conservation of Crop Biodiversity in Karnali Mountains of Nepal
Authors: Chhabi Paudel
Abstract:
The food and nutrition security of the people of the mountain of Karnali province of Nepal is dependent on traditional crop biodiversity. The altitude range of the study area is 1800 meters to 2700 meters above sea level. The climate is temperate to alpine. Farmers are adopting subsistent oriented diversified farming systems and selected crop species, cultivars, and local production systems by their own long adaptation mechanism. The major crop species are finger millet, proso millet, foxtail millet, potato, barley, wheat, mountain rice, buckwheat, Amaranths, medicinal plants, and many vegetable species. The genetic and varietal diversity of those underutilized indigenous crops is also very high, which has sustained farming even in uneven climatic events. Biodiversity provides production synergy, inputs, and other agro-ecological services for self-sustainability. But increase in human population and urban accessibility are seen as threats to biodiversity conservation. So integrated conservation measures are suggested, including agro-tourism and other monetary benefits to the farmers who conserve the local biodiversity.Keywords: crop biodiversity, climate change, in-situ conservation, resilience, sustainability, agrotourism
Procedia PDF Downloads 97415 Vulnerability Analysis for Risk Zones Boundary Definition to Support a Decision Making Process at CBRNE Operations
Authors: Aliaksei Patsekha, Michael Hohenberger, Harald Raupenstrauch
Abstract:
An effective emergency response to accidents with chemical, biological, radiological, nuclear, or explosive materials (CBRNE) that represent highly dynamic situations needs immediate actions within limited time, information and resources. The aim of the study is to provide the foundation for division of unsafe area into risk zones according to the impact of hazardous parameters (heat radiation, thermal dose, overpressure, chemical concentrations). A decision on the boundary values for three risk zones is based on the vulnerability analysis that covered a variety of accident scenarios containing the release of a toxic or flammable substance which either evaporates, ignites and/or explodes. Critical values are selected for the boundary definition of the Red, Orange and Yellow risk zones upon the examination of harmful effects that are likely to cause injuries of varying severity to people and different levels of damage to structures. The obtained results provide the basis for creating a comprehensive real-time risk map for a decision support at CBRNE operations.Keywords: boundary values, CBRNE threats, decision making process, hazardous effects, vulnerability analysis, risk zones
Procedia PDF Downloads 209414 Ethno-Religious Conflicts In Nigeria; Implications for National Security
Authors: Samuel Onyekachi Chidi
Abstract:
Nigeria today faces more internal threats stemming from ethnic and religious conflicts than external sources. This article seeks to examine the ethno-religious conflicts in Nigeria from 2015 to 2021 and their impact on national security. The research was guided by six objectives. The theoretical framework adopted for this study is Structural Conflict Theory, which provides an adequate explanation, a predictive rationale for the frequent occurrence of ethno-religious conflicts and a tendency to provide the necessary insight for their resolution. The results of the study revealed that there is a strong relationship between ethnicity, religion, conflict and national security and that the ethno-religious conflicts experienced in Nigeria have gross implications for national security. The study recommends that the secularity of the Nigerian state be restored and preserved and that the state of origin be removed and replaced by the state of residence in all our national documents, as this will reduce ethnic identity, which is in opposition to nationalism. Religious leaders, traditional rulers, the media and other stakeholders should support the government in its fight to reduce ethno-religious conflict by sensitizing its youth, preaching unity and peaceful coexistence, and discouraging the use of violence as a means of settling disputes between groups and individuals.Keywords: ethnicity, religion, conflict, national security
Procedia PDF Downloads 76