Search results for: regional security and economic strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13742

Search results for: regional security and economic strategy

13472 Homogeneity among Diversity

Authors: Yu Guang

Abstract:

“Case studies are the preferred strategy when ‘how’ or ‘why’ questions are being posed.” Therefore, the study is based on two cases: strategy performed in JingNan War and by NIKE. The two samples are chosen as they are of comparability. Data are gathered and PEST and SWOT are used as analysis models to examine their strategic employment in order that the answer to brilliant strategies in variety is found. The niche strategy has been used in the past and present, in the battle fields and business. The homogeneity among diversity is the skill of performing strategies.

Keywords: challenger, homogeneity, managing diversity, niche strategy

Procedia PDF Downloads 527
13471 Marketing Strategy Implementation in Developing Sharia Tourism in Indonesia

Authors: Santi Mutiara Asih, Sinta Kemala Asih

Abstract:

Along with the development of tourism in Indonesia, which is increasingly a lot of domestic and foreign public interest in sharia tourism, the Indonesian government is currently developing the program. It was seen that this program would have a good impact, especially for Indonesian tourism. So it is necessary to develop appropriate marketing strategies. Then to develop tourism prospects sharia government could use such a marketing strategy, for instance, marketing mix and Segmenting, Targeting, and Positioning (STP). The marketing mix is a set of marketing tools used by a state or a company to continue achieving its marketing objectives in target market. STP is the most important initial step in identifying customer value. In such away, it is expected from the use of this strategy could make sharia tourism as a market leader in the field of tourism in Indonesia, it also could attract more tourists to visit and increase economic returns.

Keywords: STP, marketing mix, market leader, sharia tourism

Procedia PDF Downloads 776
13470 Security Features for Remote Healthcare System: A Feasibility Study

Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin

Abstract:

Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.

Keywords: remote healthcare, IT security, security features, wireless sensor application

Procedia PDF Downloads 311
13469 Reassembling a Fragmented Border Landscape at Crossroads: Indigenous Rights, Rural Sustainability, Regional Integration and Post-Colonial Justice in Hong Kong

Authors: Chiu-Yin Leung

Abstract:

This research investigates a complex assemblage among indigenous identities, socio-political organization and national apparatus in the border landscape of post-colonial Hong Kong. This former British colony had designated a transient mode of governance in its New Territories and particularly the northernmost borderland in 1951-2012. With a discriminated system of land provisions for the indigenous villagers, the place has been inherited with distinctive village-based culture, historic monuments and agrarian practices until its sovereignty return into the People’s Republic of China. In its latest development imperatives by the national strategic planning, the frontier area of Hong Kong has been identified as a strategy site for regional economic integration in South China, with cross-border projects of innovation and technology zones, mega-transport infrastructure and inter-jurisdictional arrangement. Contemporary literature theorizes borders as the material and discursive production of territoriality, which manifest in state apparatus and the daily lives of its citizens and condense in the contested articulations of power, security and citizenship. Drawing on the concept of assemblage, this paper attempts to tract how the border regime and infrastructure in Hong Kong as a city are deeply ingrained in the everyday lived spaces of the local communities but also the changing urban and regional strategies across different longitudinal moments. Through an intensive ethnographic fieldwork among the borderland villages since 2008 and the extensive analysis of colonial archives, new development plans and spatial planning frameworks, the author navigates the genealogy of the border landscape in Ta Kwu Ling frontier area and its implications as the milieu for new state space, covering heterogeneous fields particularly in indigenous rights, heritage preservation, rural sustainability and regional economy. Empirical evidence suggests an apparent bias towards indigenous power and colonial representation in classifying landscape values and conserving historical monuments. Squatter and farm tenants are often deprived of property rights, statutory participation and livelihood option in the planning process. The postcolonial bureaucracies have great difficulties in mobilizing resources to catch up with the swift, political-first approach of the mainland counterparts. Meanwhile, the cultural heritage, lineage network and memory landscape are not protected altogether with any holistic view or collaborative effort across the border. The enactment of land resumption and compensation scheme is furthermore disturbed by lineage-based customary law, technocratic bureaucracy, intra-community conflicts and multi-scalar political mobilization. As many traces of colonial misfortune and tyranny have been whitewashed without proper management, the author argues that postcolonial justice is yet reconciled in this fragmented border landscape. The assemblage of border in mainstream representation has tended to oversimplify local struggles as a collective mist and setup a wider production of schizophrenia experiences in the discussion of further economic integration among Hong Kong and other mainland cities in the Pearl River Delta Region. The research is expected to shed new light on the theorizing of border regions and postcolonialism beyond Eurocentric perspectives. In reassembling the borderland experiences with other arrays in state governance, village organization and indigenous identities, the author also suggests an alternative epistemology in reconciling socio-spatial differences and opening up imaginaries for positive interventions.

Keywords: heritage conservation, indigenous communities, post-colonial borderland, regional development, rural sustainability

Procedia PDF Downloads 212
13468 Labor Welfare and Social Security

Authors: Shoaib Alvi

Abstract:

Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.

Keywords: labor welfare, internal social responsibility, social security, international conventions

Procedia PDF Downloads 579
13467 The Roles of ECOWAS Parliament on Regional Integration of the West African Sub-Region

Authors: Sani Shehu, Mohd Afandi Salleh

Abstract:

Parliament is a law making body which provided at national, state, province and territorial level playing a parliamentary role of representing people, law making, peace, and conflict resolution, ratifying and incorporating international convention into municipal law. Parliaments are created globally to give solid legitimacy to good governance under democratic system of government, and the representatives must be elected by the people, so the ECOWAS parliament is entitled to have this legitimacy, where members must be elected by adult people among the citizens of ECOWAS member states. This paper will discuss on the roles that ECOWAS parliament plays for the achievement of regional integration and economic goals of development and cooperation in the sub-region.

Keywords: ECOWAS parliament, composition, competence, power

Procedia PDF Downloads 485
13466 A Comparative Analysis of the Enforceability of Social and Economic Rights: Nigeria and South Africa as Case Studies

Authors: Foluke Abimbola

Abstract:

There are two separate groups of a recognised body of human rights. These are known as Civil and Political Rights, and Economic and Social Rights. There is however an impression that civil and political rights are enforceable in courts while socio-economic rights are not. Nigeria is an example of one of such countries whose constitution has social, economic and cultural rights’ provisions as well as civil and political rights. However, the socio-economic rights provided in the Nigerian constitution are not justiciable or are unenforceable in a court of law. On the other hand, a comparative examination of the socio-economic right provisions in the South African constitution and judgments of the constitutional court of South Africa reveals that socio-economic rights may be enforceable. This position may ensure the protection of the socio-economic rights of the poor and vulnerable groups. These rights include the rights to food, adequate shelter, health, and education. Moreover, the African Charter on Human and Peoples’ Rights (African Charter) which incorporates similar socio-economic right provisions, has been recognized as a domestic law in Nigeria and its provisions are enforceable by the domestic courts by virtue of the African Charter on Human and People’s Rights (Ratification and Enforcement) Act Cap A9 Laws of the Federation of Nigeria 2004. It is not only a regional treaty signed and adopted by Nigeria but has been passed into law by the National Assembly and can be enforced like any other local law. This paper will propose that in view of the provisions of the African Charter and mechanisms for implementation as well as other international conventions and national constitutional provisions on human rights, domestic courts may be able to assess state responsibilities in the light of socio-economic rights. Cases decided by South African courts and other jurisdictions will be discussed in order to lend weight to the notion that socio-economic rights can be enforced in jurisdictions such as Nigeria even though the constitution provides otherwise.

Keywords: african charter, constitutional court of south africa, nigerian constitution, socio-economic rights, south african constitution

Procedia PDF Downloads 155
13465 The Role of Non-Native Plant Species in Enhancing Food Security in Sub-Saharan Africa

Authors: Thabiso Michael Mokotjomela, Jasper Knight

Abstract:

Intensification of agricultural food production in sub-Saharan Africa is of paramount importance as a means of increasing the food security of communities that are already experiencing a range of environmental and socio-economic stresses. However, achieving this aim faces several challenges including ongoing climate change, increased resistance of diseases and pests, extreme environmental degradation partly due to biological invasions, land tenure and management practices, socio-economic developments of rural populations, and national population growth. In particular, non-native plant species tend to display greater adaptation capacity to environmental stress than native species that form important food resource base for human beings, thus suggesting a potential for usage to shift accordingly. Based on review of the historical benefits of non-native plant species in food production in sub-Saharan Africa, we propose that use of non-invasive, non-native plant species and/or the genetic modification of native species might be viable options for future agricultural sustainability in this region. Coupled with strategic foresight planning (e.g. use of biological control agents that suppress plant species’ invasions), the consumptive use of already-introduced non-native species might help in containment and control of possible negative environmental impacts of non-native species on native species, ecosystems and biodiversity, and soil fertility and hydrology. Use of non-native species in food production should be accompanied by low cost agroecology practices (e.g. conservation agriculture and agrobiodiversity) that may promote the gradual recovery of natural capital, ecosystem services, and promote conservation of the natural environment as well as enhance food security.

Keywords: food security, invasive species, agroecology, agrobiodiversity, socio-economic stresses

Procedia PDF Downloads 375
13464 An enhanced Framework for Regional Tourism Sustainable Adaptation to Climate Change

Authors: Joseph M. Njoroge

Abstract:

The need for urgent adaptation have triggered tourism stakeholders and research community to develop generic adaptation framework(s) for national, regional and or local tourism desti-nations. Such frameworks have been proposed to guide the tourism industry in the adaptation process with an aim of reducing tourism industry’s vulnerability and to enhance their ability to cope to climate associated externalities. However research show that current approaches are far from sustainability since the adaptation options sought are usually closely associated with development needs-‘business as usual’-where the implication of adaptation to social justice and environmental integrity are often neglected. Based on this view there is a need to look at adaptation beyond addressing vulnerability and resilience to include the need for adaptation to enhance social justice and environmental integrity. This paper reviews the existing adaptation frameworks/models and evaluates their suitability in enhancing sustainable adaptation for regional tourist destinations. It is noted that existing frameworks contradicts the basic ‘principles of sustainable adaptation’. Further attempts are made to propose a Sustainable Regional Tourism Adaptation Framework (SRTAF) to assist regional tourism stakeholders in the achieving sustainable adaptation.

Keywords: sustainable adaptation, sustainability principles, sustainability portfolio, Regional Tourism

Procedia PDF Downloads 405
13463 The Ancient Oasis Architecture of Ghadames

Authors: Amer Rghei

Abstract:

The Sahara region potentially is one of the most attractive heritage areas in the world. Yet presently, the heritage of the Sahara is currently facing serious planning challenges of underdeveloped and neglected economic and physical potentials. Deterioration of heritage resources has been observed by the author during his several field tours for historic sites has discovered special heritage values such as in Ghadames which combines historic oasis, natural environment along with its exceptional urban fabric and architectural character. Despite the richness of Ghadames with historic significance, it is found that at the present time, Ghadames city, the UNESCO World Heritage site, is facing serious challenges including the abandonment by its tenants and inclusive negligence by its officials. The author believes that Ghadames can illustrate an excellent heritage example in North Africa with cultural pride and socio-economic opportunities that can contribute to overall economic development in the Sahara region. However, the paper deals with the case of Ghadames ‘The World Heritage Site’ in Libya and discusses the current challenges and possible planning for its heritage conservation strategy. The momentous resources in Ghadames with their historical, environmental, economic, social, cultural, and aesthetic values would benefit from a careful heritage planning and management program for its significant values. In this paper an attempt is made to investigate this issue seriously towards building a model of a strategy for heritage conservation planning for Ghadames is proposed.

Keywords: Ghadames, Oasis architecture, Sahara region, heritage environment

Procedia PDF Downloads 303
13462 Financial Audit Planning: Its Importance in Kosovo Entrepreneurship

Authors: Shpetim Rezniqi

Abstract:

Over the years has increased, and increasingly has become necessary to make audit of financial statements. An auditor to perform an audit, should plan its audit in order to provide a high-quality audit and to be performed in an economic, efficient, effective and timely. This phase of the audit is also important stages of reach to the final goal of an audit to be professional and based in Kosovo and International Standards on Auditing. Always considering Kosovo as a new state and once out of war, where everything in its entrepreneurship started from the lowest stage of economic development and aim at development and regional and European integration, planning and performing audit becomes even more important.

Keywords: control, accounting, planning, analysis

Procedia PDF Downloads 515
13461 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 495
13460 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 337
13459 Economic Growth After an Earthquake: A Synthetic Control Approach

Authors: Diego Diaz H., Cristian Larroulet

Abstract:

Although a large earthquake has clear and immediate consequences such as deaths, destruction of infrastructure and displacement (at least temporary) of part of the population, scientific research about the impact of a geological disaster in economic activity is inconclusive, especially when looking beyond the very short term. Estimating the economic impact years after a disaster strike is non-trivial since there is an unavoidable difficulty in attributing the observed effect to the disaster and not to other economic shocks. Case studies are performed that determine the impact of earthquakes in Chile, Japan, and New Zealand at a regional level by applying the synthetic control method, using the natural disaster as treatment. This consisted in constructing a counterfactual from every region in the same country that is not affected (or is slightly affected) by the earthquake. The results show that the economies of Canterbury and Tohoku achieved greater levels of GDP per capita in the years after the disaster than they would have in the absence of the disaster. For the case of Chile, however, the region of Maule experiences a decline in GDP per capita because of the earthquake. All the results are robust according to the placebo tests. Also, the results suggest that national institutional quality improve the growth process after the disaster.

Keywords: earthquake, economic growth, institutional quality, synthetic control

Procedia PDF Downloads 228
13458 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 146
13457 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 188
13456 Sustainable Development Variables to Assess Transport Infrastructure in Remote Destinations

Authors: Dimitrios J. Dimitriou, Maria F. Sartzetaki

Abstract:

The assessment variables of the accessibility and the sustainability of access infrastructure for remote regions may vary significant by location and a wide range of factors may affect the decision process. In this paper, the environmental disturbance implications of transportation system to key demand and supply variables impact the economic system in remote destination are descripted. According to a systemic approach, the key sustainability variables deals with decision making process that have to be included in strategic plan for the critical transport infrastructure development and their relationship to regional socioeconomic system are presented. The application deals with the development of railway in remote destinations, where the traditional CBA not include the external cost generated by the environmental impacts that may have a range of diverse impacts on transport infrastructure and services. The analysis output provides key messages to decision and policy makers towards sustainable development of transport infrastructure, especially for remote destinations where accessibility is a key factor of regional economic development and social stability. The key conclusion could be essential useful for relevant applications in remote regions in the same latitude.

Keywords: sustainable development in remote regions, transport infrastructure, strategic planning, sustainability variables

Procedia PDF Downloads 360
13455 Nuclear Materials and Nuclear Security in India: A Brief Overview

Authors: Debalina Ghoshal

Abstract:

Nuclear security is the ‘prevention and detection of, and response to unauthorised removal, sabotage, unauthorised access, illegal transfer or other malicious acts involving nuclear or radiological material or their associated facilities.’ Ever since the end of Cold War, nuclear materials security has remained a concern for global security. However, with the increase in terrorist attacks not just in India especially, security of nuclear materials remains a priority. Therefore, India has made continued efforts to tighten its security on nuclear materials to prevent nuclear theft and radiological terrorism. Nuclear security is different from nuclear safety. Physical security is also a serious concern and India had been careful of the physical security of its nuclear materials. This is more so important since India is expanding its nuclear power capability to generate electricity for economic development. As India targets 60,000 MW of electricity production by 2030, it has a range of reactors to help it achieve its goal. These include indigenous Pressurised Heavy Water Reactors, now standardized at 700 MW per reactor Light Water Reactors, and the indigenous Fast Breeder Reactors that can generate more fuel for the future and enable the country to utilise its abundant thorium resource. Nuclear materials security can be enhanced through two important ways. One is through proliferation resistant technologies and diplomatic efforts to take non proliferation initiatives. The other is by developing technical means to prevent any leakage in nuclear materials in the hands of asymmetric organisations. New Delhi has already implemented IAEA Safeguards on their civilian nuclear installations. Moreover, the IAEA Additional Protocol has also been ratified by India in order to enhance its transparency of nuclear material and strengthen nuclear security. India is a party to the IAEA Conventions on Nuclear Safety and Security, and in particular the 1980 Convention on the Physical Protection of Nuclear Material and its amendment in 2005, Code of Conduct in Safety and Security of Radioactive Sources, 2006 which enables the country to provide for the highest international standards on nuclear and radiological safety and security. India's nuclear security approach is driven by five key components: Governance, Nuclear Security Practice and Culture, Institutions, Technology and International Cooperation. However, there is still scope for further improvements to strengthen nuclear materials and nuclear security. The NTI Report, ‘India’s improvement reflects its first contribution to the IAEA Nuclear Security Fund etc. in the future, India’s nuclear materials security conditions could be further improved by strengthening its laws and regulations for security and control of materials, particularly for control and accounting of materials, mitigating the insider threat, and for the physical security of materials during transport. India’s nuclear materials security conditions also remain adversely affected due to its continued increase in its quantities of nuclear material, and high levels of corruption among public officials.’ This paper would study briefly the progress made by India in nuclear and nuclear material security and the step ahead for India to further strengthen this.

Keywords: India, nuclear security, nuclear materials, non proliferation

Procedia PDF Downloads 357
13454 Study on the Situation between France and the South China Sea from the Perspective of Balance of Power Theory

Authors: Zhenyi Chen

Abstract:

With the rise of China and the escalation of tension between China and the United States, European countries led by Great Britain, France, and Germany pay increasing attention to the regional situation in the Asia-Pacific (now known as "Indo-Pacific"). Among them, the South China Sea (SCS) is one of the main areas disputed by China, the United States, Southeast Asian countries and some European countries. Western countries are worried that the rise of China's military power will break the stability of the situation in SCS and alter the balance of power among major powers. Therefore, they tried to balance China's rise through alliance. In France's Indo-Pacific strategy, France aims to build a regional order with the alliance of France, India and Australia as the core, and regularly carry out military exercises targeting SCS with the United States, Japan and Southeast Asian countries. For China, the instability of the situation in SCS could also threaten the security of the southeast coastal areas and Taiwan, affect China's peaceful development process, and pose a threat to China's territorial sovereignty. This paper aims to study the activities and motivation of France in the South China Sea, and put the situation in SCS under the perspective of Balance of Power Theory, focusing on China, America and France. To be more specific, this paper will first briefly introduce Balance of Power Theory, then describe the new trends of France in recent years, followed with the analysis on the motivation of the increasing trend of France's involvement in SCS, and finally analyze the situation in SCS from the perspective of "balance of power" theory. It will be argued that great powers are carefully maintaining the balance of military power in SCS, and it is highly possible that this trend would still last in the middle and long term, particularly via military deployment and strategic alliances.

Keywords: South China Sea, France, China, balance of power theory, Indo-Pacific

Procedia PDF Downloads 179
13453 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments

Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka

Abstract:

Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.

Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance

Procedia PDF Downloads 58
13452 Pure and Mixed Nash Equilibria Domain of a Discrete Game Model with Dichotomous Strategy Space

Authors: A. S. Mousa, F. Shoman

Abstract:

We present a discrete game theoretical model with homogeneous individuals who make simultaneous decisions. In this model the strategy space of all individuals is a discrete and dichotomous set which consists of two strategies. We fully characterize the coherent, split and mixed strategies that form Nash equilibria and we determine the corresponding Nash domains for all individuals. We find all strategic thresholds in which individuals can change their mind if small perturbations in the parameters of the model occurs.

Keywords: coherent strategy, split strategy, pure strategy, mixed strategy, Nash equilibrium, game theory

Procedia PDF Downloads 152
13451 Design a Network for Implementation a Hospital Information System

Authors: Abdulqader Rasool Feqi Mohammed, Ergun Erçelebi̇

Abstract:

A large number of hospitals from developed countries are adopting hospital information system to bring efficiency in hospital information system. The purpose of this project is to research on new network security techniques in order to enhance the current network security structure of save a hospital information system (HIS). This is very important because, it will avoid the system from suffering any attack. Security architecture was optimized but there are need to keep researching on best means to protect the network from future attacks. In this final project research, security techniques were uncovered to produce best network security results when implemented in an integrated framework.

Keywords: hospital information system, HIS, network security techniques, internet protocol, IP, network

Procedia PDF Downloads 444
13450 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 410
13449 An Architectural Model for APT Detection

Authors: Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung

Abstract:

Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future.

Keywords: advanced persistent threat, anomaly detection, data mining

Procedia PDF Downloads 532
13448 Requirements Engineering via Controlling Actors Definition for the Organizations of European Critical Infrastructure

Authors: Jiri F. Urbanek, Jiri Barta, Oldrich Svoboda, Jiri J. Urbanek

Abstract:

The organizations of European and Czech critical infrastructure have specific position, mission, characteristics and behaviour in European Union and Czech state/ business environments, regarding specific requirements for regional and global security environments. They must respect policy of national security and global rules, requirements and standards in all their inherent and outer processes of supply-customer chains and networks. A controlling is generalized capability to have control over situational policy. This paper aims and purposes are to introduce the controlling as quite new necessary process attribute providing for critical infrastructure is environment the capability and profit to achieve its commitment regarding to the effectiveness of the quality management system in meeting customer/ user requirements and also the continual improvement of critical infrastructure organization’s processes overall performance and efficiency, as well as its societal security via continual planning improvement via DYVELOP modelling.

Keywords: added value, DYVELOP, controlling, environments, process approach

Procedia PDF Downloads 416
13447 Weighted Data Replication Strategy for Data Grid Considering Economic Approach

Authors: N. Mansouri, A. Asadi

Abstract:

Data Grid is a geographically distributed environment that deals with data intensive application in scientific and enterprise computing. Data replication is a common method used to achieve efficient and fault-tolerant data access in Grids. In this paper, a dynamic data replication strategy, called Enhanced Latest Access Largest Weight (ELALW) is proposed. This strategy is an enhanced version of Latest Access Largest Weight strategy. However, replication should be used wisely because the storage capacity of each Grid site is limited. Thus, it is important to design an effective strategy for the replication replacement task. ELALW replaces replicas based on the number of requests in future, the size of the replica, and the number of copies of the file. It also improves access latency by selecting the best replica when various sites hold replicas. The proposed replica selection selects the best replica location from among the many replicas based on response time that can be determined by considering the data transfer time, the storage access latency, the replica requests that waiting in the storage queue and the distance between nodes. Simulation results utilizing the OptorSim show our replication strategy achieve better performance overall than other strategies in terms of job execution time, effective network usage and storage resource usage.

Keywords: data grid, data replication, simulation, replica selection, replica placement

Procedia PDF Downloads 263
13446 Managed Aquifer Recharge (MAR) for the Management of Stormwater on the Cape Flats, Cape Town

Authors: Benjamin Mauck, Kevin Winter

Abstract:

The city of Cape Town in South Africa, has shown consistent economic and population growth in the last few decades and that growth is expected to continue to increase into the future. These projected economic and population growth rates are set to place additional pressure on the city’s already strained water supply system. Thus, given Cape Town’s water scarcity, increasing water demands and stressed water supply system, coupled with global awareness around the issues of sustainable development, environmental protection and climate change, alternative water management strategies are required to ensure water is sustainably managed. Water Sensitive Urban Design (WSUD) is an approach to sustainable urban water management that attempts to assign a resource value to all forms of water in the urban context, viz. stormwater, wastewater, potable water and groundwater. WSUD employs a wide range of strategies to improve the sustainable management of urban water such as the water reuse, developing alternative available supply sources, sustainable stormwater management and enhancing the aesthetic and recreational value of urban water. Managed Aquifer Recharge (MAR) is one WSUD strategy which has proven to be a successful reuse strategy in a number of places around the world. MAR is the process where an aquifer is intentionally or artificially recharged, which provides a valuable means of water storage while enhancing the aquifers supply potential. This paper investigates the feasibility of implementing MAR in the sandy, unconfined Cape Flats Aquifer (CFA) in Cape Town. The main objective of the study is to assess if MAR is a viable strategy for stormwater management on the Cape Flats, aiding the prevention or mitigation of the seasonal flooding that occurs on the Cape Flats, while also improving the supply potential of the aquifer. This involves the infiltration of stormwater into the CFA during the wet winter months and in turn, abstracting from the CFA during the dry summer months for fit-for-purpose uses in order to optimise the recharge and storage capacity of the CFA. The fully-integrated MIKE SHE model is used in this study to simulate both surface water and groundwater hydrology. This modelling approach enables the testing of various potential recharge and abstraction scenarios required for implementation of MAR on the Cape Flats. Further MIKE SHE scenario analysis under projected future climate scenarios provides insight into the performance of MAR as a stormwater management strategy under climate change conditions. The scenario analysis using an integrated model such as MIKE SHE is a valuable tool for evaluating the feasibility of the MAR as a stormwater management strategy and its potential to contribute towards improving Cape Town’s water security into the future.

Keywords: managed aquifer recharge, stormwater management, cape flats aquifer, MIKE SHE

Procedia PDF Downloads 250
13445 Strategy of Balancing in Russian Energy Diplomacy toward Middle East

Authors: Davood Karimipour

Abstract:

Since long ago, Russia has been one of the most influential actors in regional equations in South West Asia. The geographic affinity of its vital interests with Western Asia has caused Moscow to have a high sensitivity to the balance of power in the Middle East, as its role in the Syrian crisis clearly demonstrated the importance. In recent years, Moscow has tried to use the energy diplomacy tool in maintaining the balance of power between the major powers in the region. The paper, based on the qualitative case study method, investigates how Russia’s energy diplomacy plays a role in the balance of regional forces in the Middle East, studying the country’s conduct towards Iran, Saudi Arabia, Turkey, and Israel. The hypothesis presented that Russia, using energy tools, is trying to push the regional powers toward cooperation in order to increase the influence in the region, increase power in global markets, and controlling the US to restore power balance in the region. Its cooperation in the Iranian gas industry, the country’s relations with Saudis in the framework of OPEC, cooperation with the Turkish Kurds and the presence in the Israeli gas industry are an example of these Russian energy diplomacy initiatives in West Asia, which is the common point of the Moscow approach to South West Asia.

Keywords: Russia, balance of power, energy diplomacy, Middle East

Procedia PDF Downloads 170
13444 The Analysis of Spatial Development: Malekan City

Authors: Rahim Sarvar, Bahram Azadbakht, Samira Safaee

Abstract:

The leading goal of all planning is to attain sustainable development, regional balance, suitable distribution of activities, and maximum use of environmental capabilities in the process of development of regions. Intensive concentration of population and activities in one or some limited geographical locality is of main characteristics of most developing countries, especially Iran. Not considering the long-term programs and relying on temporary and superficial plans by people in charge of decision-making to attain their own objectives causes obstacles, resulting in unbalance development. The basic reason for these problems is to establish the development planning while economic aspects are merely considered and any attentions are not paid to social and regional feedbacks, what have been ending up to social and economic inequality, unbalanced distribution of development among the regions as well. In addition to study of special planning and structure of the county of Malekan, this research tries to achieve some other aims, i.e. recognition and introduction of approaches in order to utilize resources optimally, to distribute the population, activities, and facilities in optimum fashion, and to investigate and identify the spatial development potentials of the County. Based on documentary, descriptive, analytical, and field studies, this research employs maps to analyze the data, investigates the variables, and applies SPSS, Auto CAD, and Arc View software. The results show that the natural factors have a significant influence on spatial layout of settlements; distribution of facilities and functions are not equal among the rural districts of the county; and there is a spatial equivalence in the region area between population and number of settlements.

Keywords: development, entropy index, Malekan City, planning, regional equilibrium

Procedia PDF Downloads 441
13443 Establishment of Gene Pools for Yield Within the Ghanaian Sweetpotato Parental Germplasm

Authors: John Saaka

Abstract:

The increasing world population poses a threat to food security. To meet current and future food demands, sweetpotato stand a good chance because of its recent food security roles. Concerted efforts are needed for both regional and local level varietal development. Heterosis exploiting breeding scheme (HEBS) is one of the options used to improve yield in some crop species and could be a good approach for sweetpotato improvement in Ghana by establishing heterotic gene pools within a population. To achieve this, 22 parental lines were collected from different sources and put in a full diallel arrangement. A total of 149 families, 20 individual cuttings per family, were taken to the field, including ‘checks’ and parental lines for experimentation in a 1m X 0.3m planting order according to the Westcott design. Results from this study led to the characterization of the selected parents into three main heterotic gene pools based on their suitability for use as male, female or both, respectively. This study serves as a baseline for further characterization of the rest of the germplasm in the Ghanaian sweetpotato breeding program.

Keywords: sweetpotato, heterosis, germplasm, food security

Procedia PDF Downloads 81