Search results for: information security governance
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13699

Search results for: information security governance

13399 Integrating Blockchain and Internet of Things Platforms: An Empirical Study on Immunization Cold Chain

Authors: Fawzia Abujalala, Asma Elmangoush, Majdi Ashibani

Abstract:

The adoption of Blockchain technology introduces the possibility to decentralize cold chain systems. This adaptation enhances them to be more efficient, accessible, verifiable, and data security. Additionally, the Internet of Things (IoT) concept is considered as an added-value to various application domains. Cargo tracking and cold chain are a few to name. However, the security of the IoT transactions and integrated devices remains one of the key challenges to the IoT application’s success. Consequently, Blockchain technology and its consensus protocols have been used to solve many information security problems. In this paper, the researchers discussed the advantages of integrating Blockchain technology into IoT platform to improve security and provide an overview of existing literature on integrating Blockchain and IoT platforms. Then, presented the immunization cold chain solution as a use-case that could apply to any critical goods based on integrating hyperledger fabric platform and IoT platform.

Keywords: blockchain, hyperledger fabric, internet of things, security, traceability

Procedia PDF Downloads 149
13398 GIS Data Governance: GIS Data Submission Process for Build-in Project, Replacement Project at Oman electricity Transmission Company

Authors: Rahma Saleh Hussein Al Balushi

Abstract:

Oman Electricity Transmission Company's (OETC) vision is to be a renowned world-class transmission grid by 2025, and one of the indications of achieving the vision is obtaining Asset Management ISO55001 certification, which required setting out a documented Standard Operating Procedures (SOP). Hence, documented SOP for the Geographical information system data process has been established. Also, to effectively manage and improve OETC power transmission, asset data and information need to be governed as such by Asset Information & GIS department. This paper will describe in detail the current GIS data submission process and the journey for developing it. The methodology used to develop the process is based on three main pillars, which are system and end-user requirements, Risk evaluation, data availability, and accuracy. The output of this paper shows the dramatic change in the used process, which results subsequently in more efficient, accurate, and updated data. Furthermore, due to this process, GIS has been and is ready to be integrated with other systems as well as the source of data for all OETC users. Some decisions related to issuing No objection certificates (NOC) for excavation permits and scheduling asset maintenance plans in Computerized Maintenance Management System (CMMS) have been made consequently upon GIS data availability. On the Other hand, defining agreed and documented procedures for data collection, data systems update, data release/reporting and data alterations has also contributed to reducing the missing attributes and enhance data quality index of GIS transmission data. A considerable difference in Geodatabase (GDB) completeness percentage was observed between the years 2017 and year 2022. Overall, concluding that by governance, asset information & GIS department can control the GIS data process; collect, properly record, and manage asset data and information within the OETC network. This control extends to other applications and systems integrated with/related to GIS systems.

Keywords: asset management ISO55001, standard procedures process, governance, CMMS

Procedia PDF Downloads 125
13397 Addressing Urban Security Challenges in Nigeria through Neighborhood Renewal: A Reflection of Mokola World Bank Slum Upgrading Pilot Project

Authors: Tabiti S. Tabiti, A. M. Jinadu, Daramola Japheth

Abstract:

Urban insecurity is among the challenges militating against sustainable urban governance; in the first place it distorts the peace of urban areas making them unsafe. On the other hand it hinders the effective performance of urban functions. Urban security challenges manifest in different forms such as, street violence, theft and robbery, accidents of different types kidnapping, killings etc.. Efforts to address urban security challenges in Nigeria have been concentrated in legislative, law enforcement and the use of community vigilante groups. However in this study, the place of physical planning strategy through effective neighbourhood renewal as practiced in Mokola is presented as an effective complementary approach for addressing urban insecurity. On this backdrop, the paper recommends the need for gradual rehabilitation of urban slum neighborhoods by the state government in collaboration with World Bank and other development financiers. The local governments should be made autonomy in Nigeria so as to make them more responsible to the people. Other recommendations suggested in the paper include creating enabling environment that will promote economic empowerment and public enlightment on personal and community sanitation. It is certain that if these recommendations are adopted the challenge of urban insecurity will reduce significantly in Nigerian cities.

Keywords: neighbourhood renewal, pilot project, slum upgrading, urban security

Procedia PDF Downloads 437
13396 The Investigate Relationship between Moral Hazard and Corporate Governance with Earning Forecast Quality in the Tehran Stock Exchange

Authors: Fatemeh Rouhi, Hadi Nassiri

Abstract:

Earning forecast is a key element in economic decisions but there are some situations, such as conflicts of interest in financial reporting, complexity and lack of direct access to information has led to the phenomenon of information asymmetry among individuals within the organization and external investors and creditors that appear. The adverse selection and moral hazard in the investor's decision and allows direct assessment of the difficulties associated with data by users makes. In this regard, the role of trustees in corporate governance disclosure is crystallized that includes controls and procedures to ensure the lack of movement in the interests of the company's management and move in the direction of maximizing shareholder and company value. Therefore, the earning forecast of companies in the capital market and the need to identify factors influencing this study was an attempt to make relationship between moral hazard and corporate governance with earning forecast quality companies operating in the capital market and its impact on Earnings Forecasts quality by the company to be established. Getting inspiring from the theoretical basis of research, two main hypotheses and sub-hypotheses are presented in this study, which have been examined on the basis of available models, and with the use of Panel-Data method, and at the end, the conclusion has been made at the assurance level of 95% according to the meaningfulness of the model and each independent variable. In examining the models, firstly, Chow Test was used to specify either Panel Data method should be used or Pooled method. Following that Housman Test was applied to make use of Random Effects or Fixed Effects. Findings of the study show because most of the variables are positively associated with moral hazard with earnings forecasts quality, with increasing moral hazard, earning forecast quality companies listed on the Tehran Stock Exchange is increasing. Among the variables related to corporate governance, board independence variables have a significant relationship with earnings forecast accuracy and earnings forecast bias but the relationship between board size and earnings forecast quality is not statistically significant.

Keywords: corporate governance, earning forecast quality, moral hazard, financial sciences

Procedia PDF Downloads 322
13395 Systems and Procedures in Indonesian Administrative Law

Authors: Andhika Danesjvara

Abstract:

Governance of the Republic of Indonesia should be based on the principle of sovereignty and the rule of law. Based on these principles, all forms of decisions and/or actions of government administration should be based on the sovereignty of the people and the law. Decisions and/or actions for citizens should be based on the provisions of the legislation and the general principles of good governance. Control of the decisions and/or actions is a part of administrative review and also judicial control. The control is part of the administrative justice system, which is intended for people affected by the decisions or administrative actions. This control is the duty and authority of the government or independent administrative court. Therefore, systems and procedures for the implementation of the task of governance and development must be regulated by law. Systems and procedures of governance is a subject studied in administrative law, therefore, the research also includes a review of the principles of law in administrative law. The administrative law procedure is important for the government to make decisions, the question is whether the procedures are part of the justice system itself.

Keywords: administrative court, administrative justice, administrative law, administrative procedures

Procedia PDF Downloads 285
13394 Assessment Methodology of E-government Projects for the Regions of Georgia

Authors: Tina Melkoshvili

Abstract:

Drastic development of information and communication technologies in Georgia has led to the necessity of launching conceptually new, effective, flexible, transparent and society oriented form of government that is e-government. Through applying information technologies, the electronic system enables to raise the efficacy of state governance and increase citizens’ participation in the process. Focusing on the topic of e-government allows us to analyze success stories, attributed benefits and, at the same time, observes challenges hampering the government development process. There are number of methodologies elaborated to study the conditions in the field of electronic governance. They enable us to find out if the government is ready to apply broad opportunities of information and communication technologies and if the government is apt to improve the accessibility and quality of delivering mainly social services. This article seeks to provide comparative analysis of widely spread methodologies used for Electronic government projects’ assessment. It has been concluded that applying current methods of assessment in Georgia is related to difficulties due to inaccessible data and the necessity of involving number of experts. The article presents new indicators for e-government development assessment that reflect efficacy of e-government conception realization in the regions of Georgia and enables to provide quantitative evaluation of regional e-government projects including all significant aspects of development.

Keywords: development methodology, e-government in Georgia, information and communication technologies, regional government

Procedia PDF Downloads 276
13393 Controlling Youths Participation in Politics in Sokoto State: A Constructive Inclusiveness for Good Governance in Nigeria

Authors: Umar Ubandawaki

Abstract:

Political participation involves voluntary and deliberate efforts by the members of a political system to determine the kinds of political institution and individuals that will govern them and equally influence the mobilization and allocation of the available societal resources. Over the years, youths in Nigeria participated actively in political party rallies and voting to elect their leaders and representatives in governance. This paper examines categories and nature of participation in politics as well as factors that derived youths into politics in Sokoto State. Through the use of qualitative and quantitative data generated from focus group discussions, interviews and questionnaire, the paper find out that youth, in Sokoto State, have been induced in participatory activities that encourage political thuggery and manipulation of electoral outcomes. Moreover, they are neglected in the mobilization and allocation of the available resources of the society i.e they are denied dividends of good governance. The paper recommends that youths should be engaged into positive participatory activities for ensuring inclusiveness and promotion of good governance in Nigeria. It is hoped that this will enlighten youth and policy implementers on the constructive strategies in controlling youth’s participation in politics in Nigeria.

Keywords: democracy, governance, inclusivenes, participation and politic

Procedia PDF Downloads 351
13392 Citizen Participation in Smart Cities: Singapore and Tokyo

Authors: Thomas Benson

Abstract:

Smart cities have been heralded as multi-faceted entities which utilise information and communication technologies to enhance citizen participation. The purpose of this paper is to outline authoritative definitions of smart cities and citizen participation and investigate smart city citizen-centrism rhetoric by examining urban governance and citizen participation processes. Drawing on extant literature and official city government documents and websites, Singapore (Singapore) and Tokyo (Japan) are chosen as comparable smart city case studies. For the smart city to be truly realised, this paper concludes that smart cities must do more to incorporate genuine citizen participation mechanisms.

Keywords: citizen participation, smart cities, urban governance, Singapore, Tokyo

Procedia PDF Downloads 153
13391 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 491
13390 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 334
13389 Free, Fair, and Credible Election and Democratic Governance in Bangladesh

Authors: Md. Awal Hossain Mollah

Abstract:

The aim of this study was to evaluate the relation between the free, fair and credible election in ensuring democratic governance in Bangladesh. The paper is a case (Bangladesh) study and qualitative in nature and based on secondary sources of materials. For doing this study, conceptual clarification has been done first and identified few elements of free, fair and credible elections. Then, how far these elements have been ensured in Bangladeshi elections has been evaluated by analyzing all the national elections held since independence. Apart from these, major factors and challenges of holding a free, fair and credible election in Bangladesh have been examined through using the following research questions: 1. Does role of election commission matter for free, fair and credible elections to form a democratic government? 2. Does role of political parties matter for democratic governance? 3. Do role of government matter for conducting the free, fair and credible election in ensuring democratic governance? 4. Does non-party caretaker government matter for conducting a free, fair and credible election? 5. Does democratic governance depend on multi-dimensional factors and actors? Major findings of this study are: Since the independence of Bangladesh, 10 national elections held in various regimes. 4 out of 10 national elections have been found free, fair and credible which have been conducted by the non-party caretaker government. Rests of the elections are not out of controversy and full of manipulation held under elected government. However, the caretaker government has already been abolished by the AL government through 15th amendment of the constitution. The present AL government is elected by the 10th parliamentary election under incumbent (AL) government, but a major opposition allies (20 parties) lead by BNP boycotted this election and 154 of the total 300 seats being uncontested. As a result, AL again came to the power without a competitive election and most of the national and International election observers including media world consider this election as unfair and the government is suffering from lack of legitimacy. Therefore, the governance of present Bangladesh is not democratic at all and it is to be considered as one party (14 parties’ allies lead by AL) authoritarian governance in the shade of parliamentary governance. Both the position and opposition of the parliament is belonging in 14 parties’ alliances lead by AL.

Keywords: democracy, governance, free, fair and credible elections, Bangladesh

Procedia PDF Downloads 326
13388 Strategic Development of Urban Environmental Management Base on Good Governance - Case study of (Waste Management of Tehran)

Authors: A. Farhad Sadri, B. Ali Farhadi, C. Nasim Shalamzari

Abstract:

Waste management is a principle of urban and environmental governance. Waste management in Tehran metropolitan requires good strategies for better governance. Using of good urban governance principles together with eight main indexes can be an appropriate base for this aim. One of the reasonable tools in this field is usage of SWOT methods which provides possibility of comparing the opportunities, threats, weaknesses, and strengths by using IFE and EFE matrixes. The results of the above matrixes, respectively 2.533 and 2.403, show that management system of Tehran metropolitan wastes has performed weak regarding to internal factors and has not have good performance regarding using the opportunities and dealing with threats. In this research, prioritizing and describing the real value of each 24 strategies in waste management in Tehran metropolitan have been surveyed considering good governance derived from Quantitative Strategic Planning Management (QSPM) by using Kolomogrof-Smirnoff by 1.549 and significance level of 0.073 in order to define normalization of final values and all of the strategies utilities and Variance Analysis of ANOVA has been calculated for all SWOT strategies. Duncan’s test results regarding four WT, ST, WO, and SO strategies show no significant difference. In addition to mean comparison by Duncan method in this research, LSD (Lowest Significant Difference test) has been used by probability of 5% and finally, 7 strategies and final model of Tehran metropolitan waste management strategy have been defined. Increasing the confidence of people with transparency of budget, developing and improving the legal structure (rule-oriented and law governance, more responsibility about requirements of private sectors, increasing recycling rates and real effective participation of people and NGOs to improve waste management (contribution) and etc, are main available strategies which have been achieved based on good urban governance management principles.

Keywords: waste, strategy, environmental management, urban good governance, SWOT

Procedia PDF Downloads 322
13387 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 143
13386 The Critical Success Factors for Effective ICT Governance in Malaysian Public Sector: A Delphi Study

Authors: Rosida A. Razak, Mohamad Shanudin Zakaria

Abstract:

The fundamental issues in ICT Governance (ICTG) implementation for Malaysian Public Sector (MPS) is how ICT be applied to support improvements in productivity, management effectiveness and the quality of services offered to its citizens. Our main concern is to develop and adopt a common definition and framework to illustrate how ICTG can be used to better align ICT with government’s operations and strategic focus. In particular, we want to identify and categorize factors that drive a successful ICTG process. This paper presents the results of an exploratory study to identify, validate and refine such Critical Success Factors (CSFs) and confirmed seven CSFs and nineteen sub-factors as influential factors that fit MPS after further validated and refined. The Delphi method applied in validation and refining process before being endorsed as appropriate for MPS. The identified CSFs reflect the focus areas that need to be considered strategically to strengthen ICT Governance implementation and ensure business success.

Keywords: IT governance, critical success factors, productivity, CSFs

Procedia PDF Downloads 280
13385 The Role of Law in Promoting Democratic Governance

Authors: Mozamil Mohamed Ali

Abstract:

Understanding the relationship between law and democratic governance, this research, titled “The Role of Law in Enhancing Democratic Governance: A Comparative Study of Political Systems in Developing Countries,” focuses on examining the impact of legal frameworks on strengthening democratic practices within developing nations. Democratic governance requires transparency and institutional accountability to meet citizens’ needs, which necessitates legal frameworks that ensure compliance with governance standards. These frameworks hold greater significance in developing countries, where challenges such as corruption, weak public institutions, and socio-political conflicts affect their ability to achieve sustainable democratic governance. In this context, the research explores how laws influence these aspects. The study compares various developing countries that have experienced different levels of success and difficulty in enhancing democratic governance, focusing on the legal frameworks and public policies each country has implemented to improve transparency, accountability, and strengthen the role of public institutions. This comparative analysis aims to reveal the effectiveness of legal systems in supporting democratic governance and to identify the factors that lead to the success or failure of these legal frameworks in different contexts. For example, the study includes cases from countries in Asia, Africa, and Latin America, analyzing the legal and institutional policies and their roles in achieving justice and reducing corruption. It examines the impact of legislation that promotes freedom of the press, human rights, and judicial independence as fundamental elements for transparent and democratic governance. Additionally, the research discusses how anti-corruption policies and laws governing electoral competition contribute to improving government responsiveness to public demands. The hypothesis of the research centers on the idea that developing transparent and fair laws contributes to achieving sustainable democratic governance. The analyses show that applying laws equally and impartially strengthens citizens’ trust in public institutions and encourages political participation. At the same time, the research highlights the importance of local adaptation to global legal frameworks, as it may be necessary to consider local socio-political and economic contexts to ensure the success of these frameworks. In conclusion, this research underscores the importance of legal frameworks as a pivotal factor in the success of democratic governance. It provides recommendations related to enhancing judicial independence, enforcing anti-corruption laws, and improving access to information as essential steps for strengthening democratic governance in developing countries. The findings suggest that laws respected and carefully implemented can form a solid foundation for building more transparent and effective government institutions, contributing to sustainable development and social justice in these nations.

Keywords: impact of legislation, role of institutions in controlling power, community participation, role of the judiciary

Procedia PDF Downloads 22
13384 Symmetric Key Encryption Algorithm Using Indian Traditional Musical Scale for Information Security

Authors: Aishwarya Talapuru, Sri Silpa Padmanabhuni, B. Jyoshna

Abstract:

Cryptography helps in preventing threats to information security by providing various algorithms. This study introduces a new symmetric key encryption algorithm for information security which is linked with the "raagas" which means Indian traditional scale and pattern of music notes. This algorithm takes the plain text as input and starts its encryption process. The algorithm then randomly selects a raaga from the list of raagas that is assumed to be present with both sender and the receiver. The plain text is associated with the thus selected raaga and an intermediate cipher-text is formed as the algorithm converts the plain text characters into other characters, depending upon the rules of the algorithm. This intermediate code or cipher text is arranged in various patterns in three different rounds of encryption performed. The total number of rounds in the algorithm is equal to the multiples of 3. To be more specific, the outcome or output of the sequence of first three rounds is again passed as the input to this sequence of rounds recursively, till the total number of rounds of encryption is performed. The raaga selected by the algorithm and the number of rounds performed will be specified at an arbitrary location in the key, in addition to important information regarding the rounds of encryption, embedded in the key which is known by the sender and interpreted only by the receiver, thereby making the algorithm hack proof. The key can be constructed of any number of bits without any restriction to the size. A software application is also developed to demonstrate this process of encryption, which dynamically takes the plain text as input and readily generates the cipher text as output. Therefore, this algorithm stands as one of the strongest tools for information security.

Keywords: cipher text, cryptography, plaintext, raaga

Procedia PDF Downloads 289
13383 Some Tips for Increasing Online Services Safety

Authors: Mohsen Rezaee

Abstract:

Although robust security softwares, including anti-viruses, anti-spywares, anti-spam and firewalls are amalgamated with new technologies such as safe zone, hybrid cloud, sand box and etc., and although it can be said that they have managed to prepare highest level of security against viruses, spywares and other malwares in 2012, in fact, hacker attacks to websites are increasingly becoming more and more complicated. Because of security matters developments it can be said it was expected to happen so. Here in this work we try to point out some functional and vital notes to enhance security on the web, enabling the user to browse safely in unlimited web world and to use virtual space securely.

Keywords: firewalls, security, web services, computer science

Procedia PDF Downloads 405
13382 An Architectural Model for APT Detection

Authors: Nam-Uk Kim, Sung-Hwan Kim, Tai-Myoung Chung

Abstract:

Typical security management systems are not suitable for detecting APT attack, because they cannot draw the big picture from trivial events of security solutions. Although SIEM solutions have security analysis engine for that, their security analysis mechanisms need to be verified in academic field. Although this paper proposes merely an architectural model for APT detection, we will keep studying on correlation analysis mechanism in the future.

Keywords: advanced persistent threat, anomaly detection, data mining

Procedia PDF Downloads 528
13381 Water Governance Perspectives on the Urmia Lake Restoration Process: Challenges and Achievements

Authors: Jalil Salimi, Mandana Asadi, Naser Fathi

Abstract:

Urmia Lake (UL) has undergone a significant decline in water levels, resulting in severe environmental, socioeconomic, and health-related challenges. This paper examines the restoration process of UL from a water governance perspective. By applying a water governance model, the study evaluates the process based on six selected principles: stakeholder engagement, transparency and accountability, effectiveness, equitable water use, adaptation capacity, and water usage efficiency. The dominance of structural and physicalist approaches to water governance has led to a weak understanding of social and environmental issues, contributing to social crises. Urgent efforts are required to address the water crisis and reform water governance in the country, making water-related issues a top national priority. The UL restoration process has achieved significant milestones, including stakeholder consensus, scientific and participatory planning, environmental vision, intergenerational justice considerations, improved institutional environment for NGOs, investments in water infrastructure, transparency promotion, environmental effectiveness, and local issue resolutions. However, challenges remain, such as power distribution imbalances, bureaucratic administration, weak conflict resolution mechanisms, financial constraints, accountability issues, limited attention to social concerns, overreliance on structural solutions, legislative shortcomings, program inflexibility, and uncertainty management weaknesses. Addressing these weaknesses and challenges is crucial for the successful restoration and sustainable governance of UL.

Keywords: evaluation, restoration process, Urmia Lake, water governance, water resource management

Procedia PDF Downloads 67
13380 A Study of the British Security Disembedding Mechanism from a Comparative Political Perspective: Centering on the Bosnia War and the Russian-Ukrainian War

Authors: Yuhong Li, Luyu Mao

Abstract:

Globalization has led to an increasingly interconnected international community and transmitted risks to every corner of the world through the chain of globalization. Security risks arising from international conflicts seem inescapable. Some countries have begun to build their capacity to deal with the globalization of security risks. They establish disembedding security mechanisms that transcend spatial or temporal boundaries and promote security cooperation with countries or regions that are not geographically close. This paper proposes four hypotheses of the phenomenon of "risks and security disembedding" in the post-Cold War international society and uses them to explain The United Kingdom’s behavior in the Bosnian War and the Russo-Ukrainian War. In the Bosnian War, confident in its own security and focused on maintaining European stability, The UK has therefore chosen to be cautious in its use of force in international frameworks such as the EU and to maintain a very limited intervention in Bosnia and Herzegovina's affairs. In contrast, the failure of the EU and NATO’s security mechanism in the Russo-Ukrainian war heightened Britain's anxiety, and the volatile international situation led it to show a strong tendency towards security disembedding, choosing to conclude security communities with extra-territorial states. Analysis suggests that security mechanisms are also the starting point of conflict and that countries will rely more on disembedding mechanisms to counteract the global security risks. The current mechanism of security disembedding occurs as a result of the global proliferation of security perceptions as a symbolic token and the recognition of an expert system of security mechanisms formed by states with similar security perceptions.

Keywords: disembedding mechanism, bosnia war, the russian-ukrainian war, british security strategy

Procedia PDF Downloads 87
13379 Public Debt Shocks and Public Goods Provisioning in Nigeria: Implication for National Development

Authors: Amenawo I. Offiong, Hodo B. Riman

Abstract:

Public debt profile of Nigeria has continuously been on the increase over the years. The drop in international crude oil prices has further worsened revenue position of the country, thus, necessitating further acquisition of public debt to bridge the gap in revenue deficit. Yet, when we look back at the increasing public sector spending, there are concerns that the government spending do not amount to increase in public goods provided for the country. Using data from 1980 to 2014 the study therefore seeks to investigate the factors responsible for the poor provision of public goods in the face of increasing public debt profile. Using the unrestricted VAR model Governance and Tax revenue were introduced into the model as structural variables. The result suggested that governance and tax revenue were structural determinants of the effectiveness of public goods provisioning in Nigeria. The study therefore identified weak governance as the major reason for the non-provision of public goods in Nigeria. While tax revenue exerted positive influence on the provisions of public goods, weak/poor governance was observed to crowd the benefits from increase tax revenue. The study therefore recommends reappraisal of the governance system in Nigeria. Elected officers in governance should be more transparent and accountable to the electorates they represent. Furthermore, the study advocates for an annual auditing of all government MDAs accounts by external auditors to ensure (a) accountability of public debts utilization, (b) transparent in implementation of program support funds, (c) integrity of agencies responsible for program management, and (d) measuring program effectiveness with amount of funds expended.

Keywords: impulse response function, public debt shocks, governance, public goods, tax revenue, vector auto-regression

Procedia PDF Downloads 273
13378 Status of Participative Governance Practices in Higher Education: Implications for Stakeholders' Transformative Role-Assumption

Authors: Endalew Fufa Kufi

Abstract:

The research investigated the role of stakeholders such as students, teachers and administrators in the practices of good governance in higher education by looking into the special contributions of top-officials, teachers and students in ensuring workable ties and productive interchanges in Adama Science and Technology University. Attention was given to participation, fairness and exemplariness as key indicators of good governance. The target university was chosen for its familiarity for the researcher to get dependable data, access to respondent and management of the processing of data. Descriptive survey design was used for the purpose of describing concerned roles the stakeholders in the university governance in order to reflect on the nature of participation of the practices. Centres of the research were administration where supportive groups such as central administrators and underlying service-givers had parts and academia where teachers and students were target. Generally, 60 teachers, 40 students and 15 administrative officers were referents. Data were collected in the form of self-report through open-ended questionnaires. The findings indicated that, while vertical interchanges in terms of academic and administrative routines were had normal flow on top-down basis, planned practices of stakeholders in decision-making and reasonably communicating roles and changes in decisions with top-officials were not efficiently practiced. Moreover, the practices of good modelling were not witnessed to have existed to the fullest extent. Rather, existence of a very wide gap between the academic and administrative staffs was witnessed as was reflected the case between teachers and students. The implication was such that for shortage in participative atmosphere and weaning of fairness in governance, routine practices have been there as the vicious circles of governance.

Keywords: governance, participative, stakeholders, transformative, role-assumption

Procedia PDF Downloads 398
13377 The Voluntary Review Decision of Quarterly Consolidated Financial Statements in Emerging Market: Evidence from Taiwan

Authors: Shuofen Hsu, Ya-Yi Chao, Chao-Wei Li

Abstract:

This paper investigates the factors of whether firms’ quarterly consolidated financial statements to be voluntary reviewed by auditor. To promote the information transparency, the Financial Supervisory Commission of Executive Yuan in Taiwan ruled the Taiwanese listed companies should announce the first and third quarterly consolidated financial statements since 2008 to 2012, while the Commission didn’t require the consolidated financial statements should be reviewed by auditors. This is a very special practice in emerging market, especially in Taiwan. The valuable data of this period is suitable for us to research the determinants of firms’ voluntary review decision in emerging markets. We collected the auditors' report of each company and each year of Taiwanese listed companies since 2008 to 2012 for our research samples. We use probit model to test and analyze the determinants of voluntary review decision of the first and third quarterly consolidated financial statements. Our empirical result shows that the firms whose first and third quarterly consolidated financial statements are voluntary to be reviewed by auditors have better ranking of information transparency, higher audit quality, and better corporate governance, suggesting that voluntary review is a good signal to firms’ better information and corporate governance quality.

Keywords: voluntary review, information transparency, audit quality, quarterly consolidated financial statements

Procedia PDF Downloads 253
13376 Bring Your Own Device Security Model in a Financial Institution of South Africa

Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren

Abstract:

This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.

Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis

Procedia PDF Downloads 32
13375 The Effectiveness of a Hybrid Diffie-Hellman-RSA-Advanced Encryption Standard Model

Authors: Abdellahi Cheikh

Abstract:

With the emergence of quantum computers with very powerful capabilities, the security of the exchange of shared keys between two interlocutors poses a big problem in terms of the rapid development of technologies such as computing power and computing speed. Therefore, the Diffie-Hellmann (DH) algorithm is more vulnerable than ever. No mechanism guarantees the security of the key exchange, so if an intermediary manages to intercept it, it is easy to intercept. In this regard, several studies have been conducted to improve the security of key exchange between two interlocutors, which has led to interesting results. The modification made on our model Diffie-Hellman-RSA-AES (DRA), which encrypts the information exchanged between two users using the three-encryption algorithms DH, RSA and AES, by using stenographic photos to hide the contents of the p, g and ClesAES values that are sent in an unencrypted state at the level of DRA model to calculate each user's public key. This work includes a comparative study between the DRA model and all existing solutions, as well as the modification made to this model, with an emphasis on the aspect of reliability in terms of security. This study presents a simulation to demonstrate the effectiveness of the modification made to the DRA model. The obtained results show that our model has a security advantage over the existing solution, so we made these changes to reinforce the security of the DRA model.

Keywords: Diffie-Hellmann, DRA, RSA, advanced encryption standard

Procedia PDF Downloads 93
13374 The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit

Authors: Yllka Hysaj, Ylberina Hysaj Arifi

Abstract:

Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security.

Keywords: migration, self-initiated expatriates, Brexit, job security

Procedia PDF Downloads 170
13373 Integrated Imaging Management System: An Approach in the Collaborative Coastal Resource Management of Bagac, Bataan

Authors: Aljon Pangan

Abstract:

The Philippines being an archipelagic country, is surrounded by coastlines (36,289 km), coastal waters (226,000 km²), oceanic waters (1.93 million km²) and territorial waters (2.2 million km²). Studies show that the Philippine coastal ecosystems are the most productive and biologically diverse in the world, however, plagued by degradation problems due to over-exploitation and illegal activities. The existence of coastal degradation issues in the country led to the emergence of Coastal Resource Management (CRM) as an approach to both national and local government in providing solutions for sustainable coastal resource utilization. CRM applies the idea of planning, implementing and monitoring through the lens of collaborative governance. It utilizes collective action and decision-making to achieve sustainable use of coastal resources. The Municipality of Bagac in Bataan is one of the coastal municipalities in the country who crafts its own CRM Program as a solution to coastal resource degradation and problems. Information and Communications Technology (ICT), particularly Integrated Imaging Management System (IIMS) is one approach that can be applied in the formula of collaborative governance which entails the Government, Private Sector, and Civil Society. IIMS can help policymakers, managers, and citizens in managing coastal resources through analyzed spatial data describing the physical, biological, and socioeconomic characteristics of the coastal areas. Moreover, this study will apply the qualitative approach in deciphering possible impacts of the application of IIMS in the Coastal Resource Management policy making and implementation of the Municipality of Bagac.

Keywords: coastal resource management, collaborative governance, integrated imaging management system, information and communication technology

Procedia PDF Downloads 397
13372 Impact of Board Characteristics on Financial Performance: A Study of Manufacturing Sector of Pakistan

Authors: Saad Bin Nasir

Abstract:

The research will examine the role of corporate governance (CG) practices on firm’s financial performance. Population of this research will be manufacture sector of Pakistan. For the purposes of measurement of impact of corporate governance practices such as board size, board independence, ceo/chairman duality, will take as independent variables and for the measurement of firm’s performance return on assets and return on equity will take as dependent variables. Panel data regression model will be used to estimate the impact of CG on firm performance.

Keywords: corporate governance, board size, board independence, leadership

Procedia PDF Downloads 525
13371 The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure

Authors: Michaela Vašková

Abstract:

The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic.

Keywords: crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event

Procedia PDF Downloads 431
13370 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 396