Search results for: Islamic social security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12025

Search results for: Islamic social security

11725 Sirhindi Family's Islamic Movements in Sindh, Pakistan

Authors: Nasurullah Qureshi

Abstract:

Shaikh Ahmad Sirhindi Mujadid Alif Thani (1564-1624) and his philosophy had influenced sub-continent as the whole; its rulers and nation. In his reign, he convinced the rulers toward Islamic way of life and succeed in his goal. After his death in 1624, his family consecutively produced prominent scholars to present. Some of them moved to Afghanistan and Pakistan's cities i.e., Jalalabad, Qandhar, Peshawar, Queta, Shikarpur, Hyderabad, and Sehwan. They played a vital role in their areas and transmitted spiritual and legal Islamic teachings to people. This research is aimed to elaborate efforts of the family's Sindh settled branch from 1898-present in fields of politics and Islamic education. Their link with Shaikh Ahmad Sirhindi will be provided in the introduction. After that, the work will explain their scholarly published work briefly in different fields of Islamic studies such as Quran exegeses and its translation in Sindhi language, Hadith and its sciences, Islamic Jurisprudence, Sufism and etc. In addition, their political role will be briefly discussed in the research throughout the period, especially their noticeable role in the separate homeland for Muslims in the subcontinent. Furthermore, the impact of their scholarly work, political influence and spirituality will be enlightened. Lastly, the research will present the critical viewpoint on their struggle.

Keywords: Shaikh Ahmad Sirhindi, Sirhindi scholars, Sindh, Sufism

Procedia PDF Downloads 234
11724 Mechanisms and Process of an Effective Public Policy Formulation in Islamic Economic System

Authors: Md Abu Saieed

Abstract:

Crafting and implementing public policy is one of the indispensable works in any form of state and government. But the policy objectives, methods of formulation and tools of implementation might be different based on the ideological nature, historical legacy, structure and capacity of administration and management and other push and factors. Public policy in Islamic economic system needs to be based on the key guidelines of divine scriptures along with other sources of sharia’h. As a representative of Allah (SWT), the governor and other apparatus of the state will formulate and implement public policies which will enable to establish a true welfare state based on justice, equity and equality. The whole life of Prophet Muhammad (pbuh) and his policy in operating state of affairs in Madina is the practical guidelines for the policy actors and professionals in Islamic system of economics. Moreover, policy makers need to be more meticulous in formulating Islamic public policy which meets the needs and demands of contemporary worlds as well.

Keywords: formulation, Islam, public policy, policy factors, Sharia’h

Procedia PDF Downloads 331
11723 Recent Volatility in Islamic Banking Sector of Bangladesh: Nexus Between Economy, Religion and Politics

Authors: Abdul Kader

Abstract:

This paper attempts to investigate several contributory factors to recent volatility in the Islamic Banking sector of Bangladesh. In particular, the study explores corporate governance, credit management, credit regulations, inept board of directors, using religious sentiment as a means to deceive general people, and the degree of political interference as potential contributory factors. To find the correlation among different variables, semi-structured questionnaires were distributed among the clients, bank managers, some Banking scholars and ex-members of the board of directors of three Islamic Banks in Bangladesh. Later, ten interviews were collected from key informants to gain in-depth information about the present mismanagement of Islamic Banks in Bangladesh. After then, data were analyzed using statistical software and substantiated by secondary sources like newspapers, reports and investigative reports aired in screen media. The paper found a correlation between almost all contributory factors and recent unstable conditions in the Islamic banking sector. After performing regression analysis, this paper found a more significant relationship between some of the contributory factors with Banking volatility than others. For instance, credit management, inept board of directors, depriving customers of proving no profit in the name of business—no interest-- and political interference have a strong significant positive correlation with the present poor condition of Islamic Banking. This paper concludes that while internal management is important in recovering the losses, the government needs to ensure framing better policy for the Islamic Banking system, Central Bank needs to supervise and monitor all Islamic banks meticulously and loan receivers must go through the impartial evaluation and approved by the representatives of the Central Shariah Board. This paper also recommends that there is a need to strengthen the auditing system and improve regulatory oversight of the Islamic Banks in Bangladesh. Policy recommendations that this paper put forward could provide an outline for dealing with the existing challenging condition of Islamic Banks and these could be applied to similar problems in other countries where the Islamic Banking model exists.

Keywords: Islamic bank, volatility in banking sector, shariah law, credit management, political interference

Procedia PDF Downloads 67
11722 Students’ Perceptions of the Use of Social Media in Higher Education in Saudi Arabia

Authors: Omar Alshehri, Vic Lally

Abstract:

This paper examined the attitudes of using social media tools to support learning at a university in Saudi Arabia. Moreover, it investigated the students’ current usage of these tools and examined the barriers they could face during the use of social media tools in the education process. Participants in this study were 42 university students. A web-based survey was used to collect data for this study. The results indicate that all of the students were familiar with social media and had used at least one type of social media for learning. It was found out that all students had very positive attitudes towards the use of social media and welcomed using these tools as a supplementary to the curriculum. However, the results indicated that the major barriers to using these tools in learning were distraction, opposing Islamic religious teachings, privacy issues, and cyberbullying. The study recommended that this study could be replicated at other Saudi universities to investigate factors and barriers that might affect Saudi students’ attitudes toward using social media to support learning.

Keywords: barriers to social media use, benefits of social media use, higher education, Saudi Arabia, social media

Procedia PDF Downloads 154
11721 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 509
11720 Strengthening Islamic Banking Customer Behavioral Intention through Value and Commitment

Authors: Mornay Roberts-Lombard

Abstract:

Consumers’ perceptions of value are crucial to ensuring their future commitment and behavioral intentions. As a result, service providers, such as Islamic banks, must provide their customers with products and services that are regarded as valuable, stimulating, collaborative, and competent. Therefore, the value provided to customers must meet or surpass their expectations, which can drive customers’ commitment (affective and calculative) and eventually favorably impact their future behavioral intentions. Consequently, Islamic banks in South Africa, as a growing African market, need to obtain a better understanding of the variables that impact Islamic banking customers’ value perceptions and how these impact their future behavioral intentions. Furthermore, it is necessary to investigate how customers’ perceived value perceptions impact their affective and calculative commitment and how the latter impact their future behavioral intentions. The purpose of this study is to bridge these gaps in knowledge, as the competitiveness of the Islamic banking industry in South Africa requires a deeper understanding of the aforementioned relationships. The study was exploratory and quantitative in nature, and data was collected from 250 Islamic banking customers using self-administered questionnaires. These banking customers resided in the Gauteng province of South Africa. Exploratory factor analysis, Pearson’s coefficient analysis, and multiple regression analysis were applied to measure the proposed hypotheses developed for the study. This research will aid Islamic banks in the country in potentially strengthening customers’ future commitment (affective and calculative) and positively impact their future behavioral intentions. The findings of the study established that service quality has a significant and positive impact on perceived value. Moreover, it was determined that perceived value has a favorable and considerable impact on affective and calculative commitment, while calculative commitment has a beneficial impact on behavioral intention. The research informs Islamic banks of the importance of service engagement in driving customer perceived value, which stimulates the future affective and calculative commitment of Islamic bank customers in an emerging market context. Finally, the study proposes guidelines for Islamic banks to develop an enhanced understanding of the factors that impact the perceived value-commitment-behavioral intention link in a competitive Islamic banking market in South Africa.

Keywords: perceived value, affective commitment, calculative commitment, behavioural intention

Procedia PDF Downloads 61
11719 A Framework Based Blockchain for the Development of a Social Economy Platform

Authors: Hasna Elalaoui Elabdallaoui, Abdelaziz Elfazziki, Mohamed Sadgal

Abstract:

Outlines: The social economy is a moral approach to solidarity applied to the projects’ development. To reconcile economic activity and social equity, crowdfunding is as an alternative means of financing social projects. Several collaborative blockchain platforms exist. It eliminates the need for a central authority or an inconsiderate middleman. Also, the costs for a successful crowdfunding campaign are reduced, since there is no commission to be paid to the intermediary. It improves the transparency of record keeping and delegates authority to authorities who may be prone to corruption. Objectives: The objectives are: to define a software infrastructure for projects’ participatory financing within a social and solidarity economy, allowing transparent, secure, and fair management and to have a financial mechanism that improves financial inclusion. Methodology: The proposed methodology is: crowdfunding platforms literature review, financing mechanisms literature review, requirements analysis and project definition, a business plan, Platform development process and implementation technology, and testing an MVP. Contributions: The solution consists of proposing a new approach to crowdfunding based on Islamic financing, which is the principle of Mousharaka inspired by Islamic financing, which presents a financial innovation that integrates ethics and the social dimension into contemporary banking practices. Conclusion: Crowdfunding platforms need to secure projects and allow only quality projects but also offer a wide range of options to funders. Thus, a framework based on blockchain technology and Islamic financing is proposed to manage this arbitration between quality and quantity of options. The proposed financing system, "Musharaka", is a mode of financing that prohibits interests and uncertainties. The implementation is offered on the secure Ethereum platform as investors sign and initiate transactions for contributions using their digital signature wallet managed by a cryptography algorithm and smart contracts. Our proposal is illustrated by a crop irrigation project in the Marrakech region.

Keywords: social economy, Musharaka, blockchain, smart contract, crowdfunding

Procedia PDF Downloads 65
11718 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 405
11717 The Misuse of Social Media in Order to Exploit "Generation Y"; The Tactics of IS

Authors: Ali Riza Perçin, Eser Bingül

Abstract:

Internet technologies have created opportunities with which people share their ideologies, thoughts and products. This virtual world, named social media has given the chance of gathering individual users and people from the world's remote locations and establishing an interaction between them. However, to an increasingly higher degree terrorist organizations today use the internet and most notably social-network media to create the effects they desire through a series of on-line activities. These activities, designed to support their activities, include information collection (intelligence), target selection, propaganda, fundraising and recruitment to name a few. Meanwhile, these have been used as the most important tool for recruitment especially from the different region of the world, especially disenfranchised youth, in the West in order to mobilize support and recruit “foreign fighters.” The recruits have obtained the statue, which is not accessible in their society and have preferred the style of life that is offered by the terrorist organizations instead of their current life. Like other terrorist groups, for a while now the terrorist organization Islamic State (IS) in Iraq and Syria has employed a social-media strategy in order to advance their strategic objectives. At the moment, however, IS seems to be more successful in their on-line activities than other similar organizations. IS uses social media strategically as part of its armed activities and for the sustainability of their military presence in Syria and Iraq. In this context, “Generation Y”, which could exist at the critical position and undertake active role, has been examined. Additionally, the explained characteristics of “Generation Y” have been put forward and the duties of families and society have been stated as well.

Keywords: social media, "generation Y", terrorist organization, islamic state IS

Procedia PDF Downloads 417
11716 Food Security of Migrants in a Regional Area of Australia: A Qualitative Study

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Rosa McManamey

Abstract:

Food security indicates the ability of individuals, households and communities to acquire food that is healthy, sustainable, affordable, appropriate and accessible. Despite Australia’s current ability to produce enough food to feed a population larger than its current population, there has been substantial evidence over the last decades to demonstrate many Australians struggle to feed themselves, including those from a cultural and linguistically diverse (CALD) background. The study aimed to investigate migrants’ perceptions and experiences on food security in Tasmania. Semi-structured interviews were conducted with 33 migrants residing in North, South and North West Tasmania, who were recruited through purposive sampling. Thematic analysis was employed to analyse the interview data. Four main themes were identified from the interview data: (1) Understanding of food security; (2) Experiences with the food security in Tasmania; (3) Factors that influence migrants’ food security in Tasmania; and (4) Acculturation strategies. Various sub-themes have emerged under each of these four major themes. Though the findings indicate participants are satisfied with their current food security in Tasmania, they still encounter some challenges in food availability, accessibility, and affordability in Tasmania. Factors that influence migrants’ food security were educational background, language barrier, socioeconomic status, geographical isolation, and cultural background. By using different acculturation strategies, migrants managed to adapt to the new food culture. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. The findings indicate migrants residing in Tasmania face different challenges on food security. They use different strategies for food security while acculturating into a new environment. The findings may provide useful information for migrants in Australia and various private organisations or relevant government departments that address food security for migrants.

Keywords: experiences, food security, migrants, perceptions

Procedia PDF Downloads 413
11715 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 110
11714 Liability of AI in Workplace: A Comparative Approach Between Shari’ah and Common Law

Authors: Barakat Adebisi Raji

Abstract:

In the workplace, Artificial Intelligence has, in recent years, emerged as a transformative technology that revolutionizes how organizations operate and perform tasks. It is a technology that has a significant impact on transportation, manufacturing, education, cyber security, robotics, agriculture, healthcare, and so many other organizations. By harnessing AI technology, workplaces can enhance productivity, streamline processes, and make more informed decisions. Given the potential of AI to change the way we work and its impact on the labor market in years to come, employers understand that it entails legal challenges and risks despite the advantages inherent in it. Therefore, as AI continues to integrate into various aspects of the workplace, understanding the legal and ethical implications becomes paramount. Also central to this study is the question of who is held liable where AI makes any defaults; the person (company) who created the AI, the person who programmed the AI algorithm or the person who uses the AI? Thus, the aim of this paper is to provide a detailed overview of how AI-related liabilities are addressed under each legal tradition and shed light on potential areas of accord and divergence between the two legal cultures. The objectives of this paper are to (i) examine the ability of Common law and Islamic law to accommodate the issues and damage caused by AI in the workplace and the legality of compensation for such injury sustained; (ii) to discuss the extent to which AI can be described as a legal personality to bear responsibility: (iii) examine the similarities and disparities between Common Law and Islamic Jurisprudence on the liability of AI in the workplace. The methodology adopted in this work was qualitative, and the method was purely a doctrinal research method where information is gathered from the primary and secondary sources of law, such as comprehensive materials found in journal articles, expert-authored books and online news sources. Comparative legal method was also used to juxtapose the approach of Islam and Common Law. The paper concludes that since AI, in its current legal state, is not recognized as a legal entity, operators or manufacturers of AI should be held liable for any damage that arises, and the determination of who bears the responsibility should be dependent on the circumstances surrounding each scenario. The study recommends the granting of legal personality to AI systems, the establishment of legal rights and liabilities for AI, the establishment of a holistic Islamic virtue-based AI ethics framework, and the consideration of Islamic ethics.

Keywords: AI, health- care, agriculture, cyber security, common law, Shari'ah

Procedia PDF Downloads 22
11713 Investigation of Anatomical Components of Mosques with the Approach of Attention to Islamic Wisdom

Authors: Farshad Negintaji, Hamid Reza Zeraat Pisheh, Mahshid Ghanea, Zahra Khalifeh, Mohammad Bagher Rahami

Abstract:

This study has been examined the anatomical components of mosques with the approach of attending to Islamic wisdom and investigated the distinction between the anatomical design of mosques (traditional and modern) by considering the category of perception in Islamic architecture. To this end, this article by reviewing the theoretical and empirical literature of mosques' anatomy and the role of anatomy on the architectural design of Iranian mosques by examining the quantitative and qualitative indicators and in order to understand and identify the anatomy of mosques, indicators such as: entrance, portico, minarets, domes, bedchamber and pool have been used. The aim of this study has been to investigate materials, the functional properties, technology, sizes and fitness of (traditional and modern) mosques. For this purpose, a questionnaire was prepared in which the anatomical and spiritual elements of the mosque shape have been questioned. Research is related to field and is of descriptive, analytical and inferential type and quantitative and qualitative indicators have been examined.

Keywords: Islamic wisdom, Islamic architecture, mosque anatomy, the minaret, dome, bedchamber, entrance, pool, perception

Procedia PDF Downloads 410
11712 Rival Conceptions of Sovereignty in Modern South Asian Political Thought: An Analysis Through the Writings of Maulana Syed Abul Ala Maududi and Maulana Hifzurrahman Seoharvi

Authors: Mohammad Saif

Abstract:

In the post-Westphalianworld order, the concept of sovereignty has been a fundamental area of inquiry in Political Science, International Relations, and International Law. Modern Islamic political thought has also dedicated a fair share of debate on the subject. The debate fundamentally revolves around the ‘ontological differentiation’ between western and Islamic political thought. While the centrality of the individual in western political thought regards the individual as the center of universe, Islamic Political thought provides that space to God. The modern liberal democratic principles suggest sovereignty as one of the major attributes of modern nation state; Islamists regard sovereignty as an attribute of God. However, the position regarding God’ssovereignty in Islamic political thought is not coherent in conception. Some scholars regard such a position as ‘the political interpretation of Islam’. This paper is an attempt to first analyze the fundamental discord between two rival political ideologies (western and Islamic), and then forward a debate on the subject of sovereignty in South Asian Islamic Political thought, particularly between Syed Abul Ala Maududi (ideological father of modern islamist movements) andHifzurrahmanSeoharvi (lesser known in Academia but highly influential in shaping Deobandi position of principles related to political nature of Islamic theology). Maududi regardssovereignty as an attribute of God and the rulers as subservient to Gods will, Seoharvi suggests that God's sovereignty does not entail that the caliph or amir cannot be a ruler or hakim, nor can his command or hukum be an order. Certain references have also been made to contemporary scholars like Sayidd Qutub, Rashid al Ghanouchi, who in one way or the other have contributed to the debate on ‘sovereignty in Islamic thought’.

Keywords: nation state, sovereigty, sovereignty of God (Hakimmiyah), deoband

Procedia PDF Downloads 167
11711 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 526
11710 Linguistic Analysis of Holy Scriptures: A Comparative Study of Islamic Jurisprudence and the Western Hermeneutical Tradition

Authors: Sana Ammad

Abstract:

The tradition of linguistic analysis in Islam and Christianity has developed independently of each other in lieu of the social developments specific to their historical context. However, recently increasing number of Muslim academics educated in the West have tried to apply the Western tradition of linguistic interpretation to the Qur’anic text while completely disregarding the Islamic linguistic tradition used and developed by the traditional scholars over the centuries. The aim of the paper is to outline the linguistic tools and methods used by the traditional Islamic scholars for the purpose of interpretating the Holy Qur’an and shed light on how they contribute towards a better understanding of the text compared to their Western counterparts. This paper carries out a descriptive-comparative study of the linguistic tools developed and perfected by the traditional scholars in Islam for the purpose of textual analysis of the Qur’an as they have been described in the authentic works of Usul Al Fiqh (Jurisprudence) and the principles of textual analysis employed by the Western hermeneutical tradition for the study of the Bible. First, it briefly outlines the independent historical development of the two traditions emphasizing the final normative shape that they have taken. Then it draws a comparison of the two traditions highlighting the similarities and the differences existing between them. In the end, the paper demonstrates the level of academic excellence achieved by the traditional linguistic scholars in their efforts to develop appropriate tools of textual interpretation and how these tools are more suitable for interpreting the Qur’an compared to the Western principles. Since the aim of interpreters of both the traditions is to try and attain an objective understanding of the Scriptures, the emphasis of the paper shall be to highlight how well the Islamic method of linguistic interpretation contributes to an objective understanding of the Qur’anic text. The paper concludes with the following findings: The Western hermeneutical tradition of linguistic analysis developed within the Western historical context. However, the Islamic method of linguistic analysis is much more highly developed and complex and serves better the purpose of objective understanding of the Holy text.

Keywords: Islamic jurisprudence, linguistic analysis, textual interpretation, western hermeneutics

Procedia PDF Downloads 313
11709 Factors Influencing the Profitability of the Conventional and Islamic Banks in Four Asian Countries

Authors: Vijay Kumar, Ron Bird

Abstract:

The study investigates the effect of bank-specific, industry-specific and macroeconomic variables on the profitability of conventional and Islamic banks. Our sample comprises 1,781 bank-year observations of 205 banks from four countries in the Asian region for the period 2004-2014. Our results suggest that credit quality, cost management and bank size are the keys factors that contribute positively to bank profitability in Asia. The banks with high non-performing loans and high cost-to-income ratio are more likely to be exposed to losses. The impacts of the bank-specific variables are stronger than are the industry-specific and macroeconomic variables. We find that Malaysian banks are the least profitable compared to the banks in Bangladesh, Indonesia and Pakistan. There is strong evidence to suggest that conventional banks are more profitable than Islamic banks. Our results suggest that the impact of capital adequacy ratio and bank size and loan to deposit ratio vary across Islamic and conventional banks and across different subsamples.

Keywords: capital adequacy ratio, Islamic banks, non-performing loan ratio, ownership

Procedia PDF Downloads 148
11708 Logic and Arabic Grammar Debates at Medieval Ages: A Quest for Muslim Contributions to Philosophical Development

Authors: Umar Sheikh Tahir

Abstract:

This paper focuses on the historiography of the relationship between Logic and Arabic grammar in the Muslim Medieval Ages (a period between 750 and 1100/ 150 and 500 Ah). This sensation appears in the famous debate among many others between grammarians represented by abū Sa'id al-Sairafī and logicians represented by abū Bishr Mattā on Logic and its validity. This incident took place in Baghdad around 932 AD. However, this study singlehandedly samples these debates as the base for the contributions of Islamic philosophers to philosophy of language as well as Epistemology. The question that shapes this research is: What is the intellectual development for Muslim thinkers to philosophy of language in regards to this debate? The current research addresses the Arabic grammar and logical debates by conducting historiography to emphasize on Islamic philosophers’ concerns about this issue. Consequently, this debate generates philosophical phenomena and resolutions in deep-thinking. In addition, these dialogues create a language impression for Philosophy in Islamic world from the period under study. Thereupon, Islamic philosophers’ discourse on this phenomenon serves as contribution to the Philosophy of Language.

Keywords: debates, epistemology, grammar and grammarians, Islamic philosophy, philosophy language, logic

Procedia PDF Downloads 209
11707 An Introduction to the Current Epistemology of Ethical Philosophy of Islamic Banking

Authors: Mohd Iqbal Malik

Abstract:

Ethical philosophy of Quran pinnacled virtue and economics as the part and parcel of human life. Human beings are to be imagined by the sign of morals. Soul and morality are both among the essences of human personality. Islam lays the foundation of ethics by installation of making a momentous variance between virtue and vice. It suggests for the distribution of wealth in-order to terminate accumulation of economic resources. Quran claims for the ambiguous pavement to attain virtue by saying, ‘Never will you attain the good (reward) until you spend (in the way of Allah) from that which you love. And whatever you spend indeed, Allah knows of it.’ The essence of Quran is to eliminate all the deep-seated approaches through which the wealth of nations is being accumulated within few hands. The paper will study the Quranic Philosophy Of Islamic Economic System. In recent times, to get out of the human resource development mystery of Muslims, Ismail Al-Raji Faruqi led the way in the so-called ‘Islamization’ of knowledge. Rahman and Faruqi formed opposite opinions on this project. Al-Faruqi thought of the Islamization of knowledge in terms of introducing Western learning into received Islamic values and vice versa. This proved to be a mere peripheral treatment of Islamic values in relation to Western knowledge. It is true that out of the programme of Islamization of knowledge arose Islamic universities in many Muslim countries. Yet the academic programmes of these universities were not founded upon a substantive understanding and application of the tawhidi epistemology.

Keywords: ethical philosophy, modern Islamic finance, knowledge of finance, Islamic banking

Procedia PDF Downloads 291
11706 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 531
11705 Dynamic Correlations and Portfolio Optimization between Islamic and Conventional Equity Indexes: A Vine Copula-Based Approach

Authors: Imen Dhaou

Abstract:

This study examines conditional Value at Risk by applying the GJR-EVT-Copula model, and finds the optimal portfolio for eight Dow Jones Islamic-conventional pairs. Our methodology consists of modeling the data by a bivariate GJR-GARCH model in which we extract the filtered residuals and then apply the Peak over threshold model (POT) to fit the residual tails in order to model marginal distributions. After that, we use pair-copula to find the optimal portfolio risk dependence structure. Finally, with Monte Carlo simulations, we estimate the Value at Risk (VaR) and the conditional Value at Risk (CVaR). The empirical results show the VaR and CVaR values for an equally weighted portfolio of Dow Jones Islamic-conventional pairs. In sum, we found that the optimal investment focuses on Islamic-conventional US Market index pairs because of high investment proportion; however, all other index pairs have low investment proportion. These results deliver some real repercussions for portfolio managers and policymakers concerning to optimal asset allocations, portfolio risk management and the diversification advantages of these markets.

Keywords: CVaR, Dow Jones Islamic index, GJR-GARCH-EVT-pair copula, portfolio optimization

Procedia PDF Downloads 247
11704 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 419
11703 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 488
11702 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 292
11701 Measuring Social Dimension of Sustainable Development in New Zealand Cities

Authors: Taimaz Larimian

Abstract:

During recent years, sustainable development has increasingly influenced urban policy, housing and planning in cities all over the world. Debates about sustainability no longer consider it solely as an environmental concern, but also incorporate social and economic dimensions. However, while a social dimension of sustainability is extensively accepted, the exact definition of the concept is still vague and unclear. This study is addressing this lack of specificity through a detailed exploration of social sustainability as the least studied pillar of sustainable development and sheds light on the debate over the definition of social sustainability through developing a measurement model of the constitutive dimensions of the concept. With this aim, a conceptual framework is developed based on the existing literature, determining seven main dimensions of the social sustainability concept namely: social interaction, safety and security, social equity, social participation, neighborhood satisfaction, housing satisfaction and sense of place. The validity and reliability of the model is then tested using exploratory and confirmatory factor analysis. In order to do so, five case study neighborhoods from Dunedin city with a range of urban forms and characters are investigated, to define social sustainability concept and its consisting dimensions from people’s perspective. The findings of this study present a clear definition of social sustainability at neighborhood scale and highlight all different dimensions of the concept in the context of New Zealand cities. According to the results, among the investigated dimensions, neighborhood satisfaction and safety and security had the most influence on people’s feeling of social sustainability in their neighborhood.

Keywords: social sustainability, factor analysis, neighborhood level, New Zealand cities

Procedia PDF Downloads 284
11700 Human Security as a Tool of Protecting International Human Rights Law

Authors: Arenca Trashani

Abstract:

20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.

Keywords: human security, international human rights law, development, Albania, international law

Procedia PDF Downloads 747
11699 A Critical Discourse Analysis: Embedded Inequalities in the UK Disability Social Security System

Authors: Cara Williams

Abstract:

In 2006, the UK Labour government published a Green Paper introducing Employment and Support Allowance (ESA) as a replacement for Incapacity Benefit (IB), as well as a new Work Capability Assessment (WCA); signalling a controversial political and economic shift in disability welfare policy. In 2016, the Conservative government published Improving Lives: The Work, Health, and Disability Green Paper, as part of their social reform agenda, evidently to address the ‘injustice’ of the ‘disability employment gap’. This paper contextualises ESA in the wider ideology and rhetoric of ‘welfare to work’, ‘dependency’ and ‘responsibility’. Using the British ‘social model of disability’ as a theoretical framework, the study engages in a critical discourse analysis of these two Green Papers. By uncovering the medicalised conceptions embedded in the texts, the analysis has revealed ESA is linked with late capitalisms concern with the ‘disability category’.

Keywords: disability, employment, social security, welfare

Procedia PDF Downloads 157
11698 Determining Factors Influencing the Total Funding in Islamic Banking of Indonesia

Authors: Euphrasia Susy Suhendra, Lies Handrijaningsih

Abstract:

The banking sector as an intermediary party or intermediaries occupies a very important position in bridging the needs of working capital investment in the real sector with funds owner. This will certainly make money more effectively to improve the economic value added. As an intermediary, Islamic banks raise funds from the public and then distribute in the form of financing. In practice, the distribution of funding that is run by Islamic Banking is not as easy as, in theory, because, in fact, there are many financing problems; some are caused by lacking the assessment and supervision of banks to customers. This study aims to analyze the influence of the Third Party Funds, Return on Assets (ROA), Non Performing Financing (NPF), and Financing Deposit Ratio (FDR) to Total Financing provided to the Community by Islamic Banks in Indonesia. The data used is monthly data released by Bank of Indonesia in Islamic Banking Statistics in the time period of January 2009 - December 2013. This study uses cointegration test to see the long-term relationship, and use error correction models to examine the relationship of short-term. The results of this study indicate that the Third Party Fund has a short-term effect on total funding, Return on Assets has a long term effect on the total financing, Non Performing Financing has long-term effects of total financing, and Financing deposit ratio has the effect of short-term and long-term of the total financing provided by Islamic Banks in Indonesia.

Keywords: Islamic banking, third party fund, return on asset, non-performing financing, financing deposit ratio

Procedia PDF Downloads 451
11697 ISIS Resurgence in the Era of COVID-19

Authors: Stacey Pollard, Henry Baraket, Girish Ganesan, Natalie Kim

Abstract:

One year after U.S.-led coalition operations liberated ISIS-held territories in Iraq and Syria and killed ISIS core leader Abu Bakr al-Baghdadi, ISIS is resurging. Taking a page from its old playbook, the organization is capitalizing on social unrest and a rapidly deteriorating security environment—exacerbated by the COVID-19 pandemic—to reconstitute in permissive areas of Iraq and Syria. This Short examines ISIS’s pandemic-era ground and information operations through the lens of its state- and nation-making efforts to help analysts and decisionmakers better understand the imminence and scope of the threat. ISIS is rapidly overcoming U.S.-supported counterterrorism gains and, without direct pressure to reverse these advances, is poised for recovery.

Keywords: Terrorism, COVID-19, Islamic State, Instability, Iraq, Syria, Global, Resurgence

Procedia PDF Downloads 58
11696 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 219