Search results for: regional security and economic strategy
13442 Managing Networks and Systems in the Modern Security Landscape: An Integrated Approach to Infrastructure Resilience
Authors: Oussama Yadine, Abdellah Jamali
Abstract:
The rapid evolution of today's technology ecosystem, marked by the fusion of cloud computing, IoT, and distributed systems, has introduced complex security challenges in network and systems administration. Our research develops a framework that seamlessly merges contemporary systems administration with advanced security engineering methodologies, particularly focusing on DevSecOps implementation and zero-trust architectural principles. Comprehensive testing and analysis across diverse organizational environments reveal that this unified approach achieves remarkable results: a 47% decrease in security-related incidents while consistently maintaining 99.9% system uptime. The framework delivers actionable guidelines for deploying secure infrastructure architectures, automating compliance oversight, and implementing dynamic security protocols. This integration effectively eliminates the historical divide between systems administration and security engineering, fostering an environment where operational efficiency and security resilience coexist harmoniously.Keywords: network security, systems administration, security engineering, infrastructure resilience
Procedia PDF Downloads 713441 Climate Change, Agriculture and Food Security in Sub-Saharan Africa: What Effects and What Answers?
Authors: Abdoulahad Allamine
Abstract:
The objective of this study is to assess the impact of climate variability on agriculture and food security in 43 countries of sub-Saharan Africa. We use for this purpose the data from BADC bases, UNCTAD, and WDI FAOSTAT to estimate a VAR model on panel data. The sample is divided into three (03) agro-climatic zones, more explicitly the equatorial zone, the Sahel region and the semi-arid zone. This allows to highlight the differential impacts sustained by countries and appropriate responses to each group of countries. The results show that the sharp fluctuations in the volume of rainfall negatively affect agriculture and food security of countries in the equatorial zone, with heavy rainfall and high temperatures in the Sahel region. However, countries with low temperatures and low rainfall are the least affected. The hedging policies against the risks of climate variability must be more active in the first two groups of countries. On this basis and in general, we recommend integration of agricultural policies between countries is done to reduce the effects of climate variability on agriculture and food security. It would be logical to encourage regional and international closer collaboration on the development and dissemination of improved varieties, ecological intensification, and management of biotic and abiotic stresses facing these climate variability to sustainably increase food production. Small farmers also need training in agricultural risk hedging techniques related to climate variations; this requires an increase in state budgets allocated to agriculture.Keywords: agro-climatic zones, climate variability, food security, Sub-Saharan Africa, VAR on panel data
Procedia PDF Downloads 39413440 The Impact of Human Resources Management on the Job Security of Self-Initiated Expatriates after the Brexit
Authors: Yllka Hysaj, Ylberina Hysaj Arifi
Abstract:
Recently, with BREXIT taking place, organizations and employees have been affected in the way of job and employment security. Career-oriented human resources management (HRM) practices are likely to facilitate self-initiated expatriates’ adjustment to the host country. This was related to the career security (job security and employment security), which were missing in their home country and seemed to be important elements to adjust to the host country. The aim of this study is to assess whether the perception of career security by Frances self-initiated expatriates (SIEs) have changed in the wake of the referendum result. Quantitative research method will be used, and the data will be collected through electronic questionnaires. Data will be analyzed through Statistical Package for the Social Sciences (SPSS). The study variables will include an adjustment to the host country, HRM practices, employability, and job security. Predicted results consist that career-oriented HRM practices are positively related to the adjustment to the host country, employability, and job security. However, with Brexit, there might be a negative relationship between career-oriented HRM practices and job security.Keywords: migration, self-initiated expatriates, Brexit, job security
Procedia PDF Downloads 17313439 Economic Evaluation of Varying Scenarios to Fulfill the Regional Electricity Demand in Pakistan
Authors: Muhammad Shahid, Kafait Ullah, Kashif Imran, Arshad Mahmood, Maarten Arentsen
Abstract:
Poor planning and governance in the power sector of Pakistan have generated several issues ranging from gradual reliance on thermal-based expensive energy mix, supply shortages, unrestricted demand, subsidization, inefficiencies at different levels of the value chain and resultantly, the circular debt. This situation in the power sector has also hampered the growth of allied economic sectors. This study uses the Long-range Energy Alternative Planning (LEAP) system for electricity modelling of Pakistan from the period of 2016 to 2040. The study has first time in Pakistan forecasted the electricity demand at the provincial level. At the supply side, five scenarios Business as Usual Scenario (BAUS), Coal Scenario (CS), Gas Scenario (GS), Nuclear Scenario (NS) and Renewable Scenario (RS) have been analyzed based on the techno-economic and environmental parameters. The study has also included environmental externality costs for evaluating the actual costs and benefits of different scenarios. Contrary to the expectations, RS has a lower output than even BAUS. The study has concluded that the generation from RS has five times lesser costs than BAUS, CS, and GS. NS can also be an alternative for the sustainable future of Pakistan. Generation from imported coal is not a good option, however, indigenous coal with clean coal technologies should be promoted. This paper proposes energy planners of the country to devise incentives for the utilization of indigenous energy resources including renewables on priority and then clean coal to reduce the energy crises of Pakistan.Keywords: economic evaluation, externality cost, penetration of renewable energy, regional electricity supply-demand planning
Procedia PDF Downloads 11913438 The Application of the Security Audit Method on the Selected Objects of Critical Infrastructure
Authors: Michaela Vašková
Abstract:
The paper is focused on the application of the security audit method on the selected objects of the critical infrastructure. The emphasis is put on security audit method to find gaps in the critical infrastructure security. The theoretical part describes objects of the critical infrastructure. The practical part describes using the security audit method. The main emphasis was put on the protection of the critical infrastructure in the Czech Republic.Keywords: crisis management, critical infrastructure, object of critical infrastructure, security audit, extraordinary event
Procedia PDF Downloads 43513437 Redefining State Security Using Gender: Case Study of the United States of America Post-Cold War
Authors: E. K. Linsenmayer
Abstract:
Traditional international relations theorists define state security, the principal national interest, as a state’s military force. However, many political theorists argue the current definition of security is not comprehensive and therefore, problematic. This paper argues that women’s physical security is not only linked but also necessary to achieve state security. In today’s unipolar political international system, the United States continues to accredit national security to its military. However, in one of the most militarized countries, women remain insecure. Through a case study method of the United States, this paper illuminates a necessary political prescription: the empowerment of women through an inside-out, feminist theoretical approach that makes state security attainable. The research through empirical testing, drawing from several databases, shows the positive effects of women’s physical security on state security. Women’s physical security is defined in terms of equal legal practices, health, education, and female representation in the government. State security is measured by the relative peace of a state, its involvement in conflict and a state’s relations with neighboring states. This paper shows that empowering women, 50% of the world’s population, is necessary for ending the current vicious circle of militarization, war, and insecurity. Without undoing gender power dynamics at the individual and societal level, security at all levels remains unattainable.Keywords: gender inequality, politics, state security, women's security
Procedia PDF Downloads 21013436 Development of Electronic Governance as an Element of Reforming State Governance According to the Adjarian Example
Authors: Irakli Manvelidze, Genadi Iashvili, Giga Phartenadze, Giorgi Katamadze
Abstract:
Establishment of electronic governance in the region is facing serious problems. Organizational, technical, social and methodological problems have been identified after the research. These problems currently create serious barriers and prevent the development of effective e-governance. Lack of human resources, difference in program targets of the centre and the region, lack of citizens’ awareness about the project of electronic governance are other issues that should be mentioned. In spite of positive changes the overall situation concerning development of modern information-communication technologies in Adjara is not satisfactory. The information systems in the region can be described as transforming in a democratic way which needs serious reforms. Current situation shows that unsystematic, uncoordinated actions were made which overall represents more chaotic rather than coordinated systematic process. Therefore, a strategic document ‘Adjarian Electronic Government’ should be created which will ensure systematic development of electronic governance in the region. The implementation of the strategy of ‘Adjarian Electronic Government’ should be based on not only conceptual and instrumental but also legal basics. A legal normative basis should be created which will include formation of electronic government’s instrumental basis as well as creation of united regional system of electronic document management. Meanwhile types of documents which would be used in inter institutional relations should be defined under a legal norm. Creation of regional united system of e-filing will regulate regional public institutions, relations between local self-government and public organizations as well as it will ensure coordinated work of all regional public institutions.Keywords: e-government, information society, public administration, reforming state governance, public institutions
Procedia PDF Downloads 28713435 Representing a Methodology for Refinement of Strategic Objectives in Strategy Map Establishment: Combining Quality Function Deployment and Fuzzy Screening
Authors: Bijan Nahavandi, Navid Jafarinejad, Somayeh Mehrafzad
Abstract:
Strategy maps represent the way of value creation in in each organization. Nowadays, implementation of strategy is the main concern for all organizations. Strategy map establishment is the start-up point of strategy implementation and this shows the critical importance of this concept. After some years past since emergence of strategy map, there are some shortcomings in its methodology that frequently quoted by many of researchers. One of these shortcomings is the shortage of a mechanism for refinement of objectives candidate for entrance to map. Organizations in practice have obsession and avidity to determine more number of objectives in strategy map. This study wants to represent a step by step approach to help obviate this problem using quality function deployment (QFD) as a helpful tool and fuzzy screening method. Finally, represented approach applies in a practical case and conclusions have been explained.Keywords: balanced scorecard, fuzzy screening, house of strategic objectives (HoSO), quality function deployment, strategy map
Procedia PDF Downloads 35613434 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks
Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas
Abstract:
Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model
Procedia PDF Downloads 6713433 On the Effectiveness of Electricity Market Development Strategies: A Target Model for a Developing Country
Authors: Ezgi Avci-Surucu, Doganbey Akgul
Abstract:
Turkey’s energy reforms has achieved energy security through a variety of interlinked measures including electricity, gas, renewable energy and energy efficiency legislation; the establishment of an energy sector regulatory authority; energy price reform; the creation of a functional electricity market; restructuring of state-owned energy enterprises; and private sector participation through privatization and new investment. However, current strategies, namely; “Electricity Sector Reform and Privatization Strategy” and “Electricity Market and Supply Security Strategy” has been criticized for various aspects. The present paper analyzes the implementation of the aforementioned strategies in the framework of generation scheduling, transmission constraints, bidding structure and general aspects; and argues the deficiencies of current strategies which decelerates power investments and creates uncertainties. We conclude by policy suggestions to eliminate these deficiencies in terms of price and risk management, infrastructure, customer focused regulations and systematic market development.Keywords: electricity markets, risk management, regulations, balancing and settlement, bilateral trading, generation scheduling, bidding structure
Procedia PDF Downloads 55713432 Power System Cyber Security Risk in the Era of Digital Transformation
Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim
Abstract:
Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.Keywords: supply chain, cybersecurity, maturity model, risk, smart grid
Procedia PDF Downloads 12113431 The Curse of Oil: Unpacking the Challenges to Food Security in the Nigeria's Niger Delta
Authors: Abosede Omowumi Babatunde
Abstract:
While the Niger Delta region satisfies the global thirst for oil, the inhabitants have not been adequately compensated for the use of their ancestral land. Besides, the ruthless exploitation and destruction of the natural environment upon which the inhabitants of the Niger Delta depend for their livelihood and sustenance by the activities of oil multinationals, pose major threats to food security in the region and by implication, Nigeria in general, Africa, and the world, given the present global emphasis on food security. This paper examines the effect of oil exploitation on household food security, identify key gaps in measures put in place to address the changes to livelihoods and food security and explore what should be done to improve the local people access to sufficient, safe and culturally acceptable food in the Niger Delta. Data is derived through interviews with key informants and Focus Group Discussions (FGDs) conducted with respondents in the local communities in the Niger Delta states of Delta, Bayelsa and Rivers as well as relevant extant studies. The threat to food security is one important aspect of the human security challenges in the Niger Delta which has received limited scholarly attention. In addition, successive Nigerian governments have not meaningfully addressed the negative impacts of oil-induced environmental degradation on traditional livelihoods given the significant linkages between environmental sustainability, livelihood security, and food security. The destructive impact of oil pollution on the farmlands, crops, economic trees, creeks, lakes, and fishing equipment is so devastating that the people can no longer engage in productive farming and fishing. Also important is the limited access to modern agricultural methods for fishing and subsistence farming as fishing and farming are done using mostly crude implements and traditional methods. It is imperative and urgent to take stock of the negative implications of the activities of oil multinationals for environmental and livelihood sustainability, and household food security in the Niger Delta.Keywords: challenges, food security, Nigeria's Niger delta, oil
Procedia PDF Downloads 25313430 English Title Adaptive Comparison of Outdoor and Indoor Social Security in Damaged Area and New Residential Complex with Two-Way Anova Case Study: Qasr-Al-Dasht and Moalem District in Shiraz
Authors: Homa Parmoon, Narges Hamzeh
Abstract:
Since today's urban spaces are disposed towards behavioral disorders and lack of security, both qualitative and quantitative aspects of security especially social and physical security are considered as basic necessities in urban planning. This research focused on the variable of place of living, examined social security in the old and new textures, and investigated the amount of residents’ social security in Shiraz including safety, financial, emotional and moral security. To this end, two neighborhoods in region 1 of Shiraz- Qasr-Al-Dasht (old texture) and Moalem (new texture)- were examined through a comparative study of 60 samples lived in two neighborhoods. Data were gathered through two-way ANOVA between the variables of residential context and internal and external security. This analysis represents the significance or insignificance of the model as well as the individual effects of each independent variable on the dependent variable. It was tested by ANCOVA and F-test. Research findings indicated place of living has a significant effect on families’ social security. The safety, financial, emotional, and moral security also represented a great impact on social security. As a result, it can be concluded that social security changes with the changing in place of living.Keywords: social security, damaged area, two-way ANOVA, Shiraz
Procedia PDF Downloads 14513429 Regional Competitiveness and Innovation in the Tourism Sector: A Systematic Review and Bibliometric Analysis
Authors: Sérgio J. Teixeira, João J. Ferreira
Abstract:
Tourism frequently gets identified as one of the sectors with the greatest potential for expansion on a global scale and hence conveying the importance of attempting to better understand the regional factors of competitiveness prevailing in this sector. This study’s objective essentially strives to provide a mapping of the scientific publications and the intellectual knowledge therein contained while conveying past research trends and identifying potential future lines of research in the fields of regional competitiveness and tourism innovation. This correspondingly deploys a systematic review of the literature in keeping with the bibliometric approach based upon VOSviewer software, with a particular focus on drafting maps for visualising the underlying intellectual structure. This type of analysis encapsulates the number of articles published and their annual number of citations for the period between 1900 and 2016 as registered by the Web of Science database. The results demonstrate how the intellectual structure on regional competitiveness divides essentially into three major categories: regional competitiveness, tourism innovation, and tourism clusters. Thus, the main contribution of this study arises out of identifying the main research trends in this field and the respective shortcomings and specific needs for future scientific research in the field of regional competitiveness and innovation in tourism.Keywords: regional competitiveness, tourism cluster, bibliometric studies, tourism innovation, systematic review
Procedia PDF Downloads 23513428 Reform of the Law Relating to Personal Property Security
Authors: Ji Lian Yap
Abstract:
This paper will critically consider developments in 2014 in relation to the law relating to security over personal property in Hong Kong. The rules governing the registration of charges under the Hong Kong Companies Ordinance will be examined. Case law relating to personal property security will also be discussed. The transplantation of the floating charge into China’s Property Law will also be considered.Keywords: personal property, security law, reform of the law, law
Procedia PDF Downloads 42913427 Rural Tourism Entrepreneurship as Strategy for Economic Development in Nigeria
Authors: Salami Ayobami Taofeek, Ajayi Adeola
Abstract:
Rural tourism entrepreurship is a tourist industry which revolutionizes businesses and prompting economic development across the globe. It encompasses huge range activities, natural or man-made attractions, amenities and facilities, transportation, marketing and information systems. It is also an important export for 83% of the developing countries and the main export for one third of them. In 2000, developing countries recorded 142.6 million international arrivals an increase of 95% compared to the figures of 1990. However, only developing countries with effective natural and man-made tourism supporting and enhancing infrastructure have been able to develop their tourism sector and seize the attendance advantages. Rural areas of Nigeria possess some distinctive peculiarities which can be transformed into attractive tourist centers. In spite of all these, rural tourism areas are still faced with myriad problems which include poor finance inadequate awareness and education, lack of progress in developing the rural of progress in developing the rural tourism potentials inadequate legislation, insecurity, entrepreneurial inertness, over-dependent on oil among others. This paper focuses on the impact and challenges of rural tourism entrepreneurship as strategy for economic development in Nigeria. It reviews literature rural tourism, tourism entrepreneurship potentials and classifications of Nigerians tourism potential’s destinations. The paper concludes that Nigeria Government should encourage rural based tourism entrepreneurship development by addressing the challenges facing rural tourism entrepreneurship in the country.Keywords: entrepreneurship, economic development, rural tourism, tourism destinations tourism potentials
Procedia PDF Downloads 43713426 Safety-Security Co-Engineering of Control Systems
Authors: Elena A. Troubitsyna
Abstract:
Designers of modern safety-critical control systems are increasingly relying on networking to provide the systems with advanced functionality and satisfy customer’s needs. However, networking nature of modern control systems also brings new technological challenges associated with ensuring system safety in the presence of openness and hence, potential security threats. In this paper, we propose a methodology that relies on systems-theoretic analysis to enable an integrated analysis of safety and security requirements of controlling software. We demonstrate how to create a safety case – a structured argument about system safety – with explicit representation of both safety and security goals. Our approach provides the designers with a systematic approach to analysing safety and security interdependencies while designing safety-critical control systems.Keywords: controlling software, integrated analysis, security, safety-security co-engineering
Procedia PDF Downloads 50413425 The Role of the New Silk Road (One Belt, One Road Initiative) in Connecting the Free Zones of Iran and Turkey: A Case Study of the Free Zones of Sarakhs and Maku to Anatolia and Europe
Authors: Morteza Ghourchi, Meraj Jafari, Atena Soheilazizi
Abstract:
Today, with the globalization of communications and the connection of countries within the framework of the global economy, free zones play the most important role as the engine of global economic development and globalization of countries. In this regard, corridors have a fundamental role in linking countries and free zones physically with each other. One of these corridors is the New Silk Road corridor (One Belt, One Road initiative), which is being built by China to connect with European countries. In connecting this corridor to European countries, Iran and Turkey are among the countries that play an important role in linking China to European countries through this corridor. The New Silk Road corridor, by connecting Iran’s free zones (Sarakhs and Maku) and Turkey’s free zones (Anatolia and Europe), can provide the best opportunity for expanding economic cooperation and regional development between Iran and Turkey. It can also provide economic links between Iran and Turkey with Central Asian countries and especially the port of Khorgos. On the other hand, it can expand Iran-Turkey economic relations more than ever before with Europe in a vast economic network. The research method was descriptive-analytical, using library resources, documents of Iranian free zones, and the Internet. In an interview with Fars News Agency, Mohammad Reza Kalaei, CEO of Sarakhs Free Zone, said that the main goal of Sarakhs Special Economic Zone is to connect Iran with the Middle East and create a transit corridor towards East Asian countries, including Turkey. Also, according to an interview with Hussein Gharousi, CEO of Maku Free Zone, the importance of this region is due to the fact that Maku Free Zone, due to its geographical location and its position on the China-Europe trade route, the East-West corridor, which is the closest point to the European Union through railway and transit routes, and also due to its proximity to Eurasian countries, is an ideal opportunity for industrial and technological companies. Creating a transit corridor towards East Asian countries, including Turkey, is one of the goals of this project Free zones between Iran and Turkey can sign an agreement within the framework of the New Silk Road to expand joint investments and economic cooperation towards regional convergence. The purpose of this research is to develop economic links between Iranian and Turkish free zones along the New Silk Road, which will lead to the expansion and development of regional cooperation between the two countries within the framework of neighboring policies. The findings of this research include the development of economic diplomacy between the Secretariat of the Supreme Council of Free Zones of Iran and the General Directorate of Free Zones of Turkey, the agreement to expand cooperation between the free zones of Sarakhs, Maku, Anatolia, and Europe, holding biennial conferences between Iranian free zones along the New Silk Road with Turkish free zones, creating a joint investment fund between Iran and Turkey in the field of developing free zones along the Silk Road, helping to attract tourism between Iranian and Turkish free zones located along the New Silk Road, improving transit infrastructure and transportation to better connect Iranian free zones to Turkish free zones, communicating with China, and creating joint collaborations between China’s dry ports and its free zones with Iranian and Turkish free zones.Keywords: network economy, new silk road (one belt, one road initiative), free zones (Sarakhs, Maku, Anatolia, Europe), regional development, neighborhood policies
Procedia PDF Downloads 7413424 China's New "Pivots" in the Indian Ocean: Towards "String of Pearls" Strategy 2.0
Authors: Mike Chia-Yu Huang
Abstract:
China’s port facility construction projects in the Indian Ocean (IO) region, Gwadar Port and Djibouti Port projects in particular, have led to a heated debate among both Chinese and Western strategists over whether the country has literally been carrying out its “string of pearls” strategy, an alleged Chinese plan to challenge America’s military predominance in South Asia. Even though the Chinese government repeatedly denied the existence of such a strategy and highlighted the civilian/commercial nature of its port projects, it has significantly enhanced its strategic cooperation with littoral countries in the IO region since the “One Belt One Road” initiative was introduced by Chinese President Xi Jinping in 2013. Whether China does have a plan to expand its sphere of military influence westward concerns the balance of power in the IO region. If the answer is positive, the security environment there will be changed drastically. This paper argues that rather than simply copying the U.S. model of developing overseas military bases along the IO periphery, Beijing has been deliberating a more sophisticated plan for its physical presence there: creating a new set of “overseas strategic pivots.” These “pivots,” semi-military and semi-commercial in nature, are designed to help Beijing sustain its anti-piracy operations in the Gulf of Aden and serve as forward stations for the transportation of China’s imported energy and merchandise. They can support the Chinese Navy’s operations overseas but are not supposed to undertake face-to-face combat missions. This upgraded Chinese scheme can be identified as “string of pearls” strategy 2.0. Moreover, it is expected to help China deepen its roots in the IO region, implying that Beijing has to a large extent scratched its old diplomatic philosophy which highlighted the merits of non-interference and nonalignment. While a full-scale maritime confrontation between China and the U.S.-India security alliance is unlikely to be witnessed in the near future, an ambitious Chinese plan to step into the global maritime domain has been evidently shown.Keywords: Chinese navy, Djibouti, Gwadar, Indian Ocean, string of pearls strategy
Procedia PDF Downloads 33513423 A Regional Innovation System Model Based on the Systems Thinking Approach
Authors: Samara E., Kilintzis P., Katsoras E., Martinidis G.
Abstract:
Regions play an important role in the global economy by driving research and innovation policies through a major tool, the Regional Innovation System (RIS). RIS is a social system that encompasses the systematic interaction of the various organizations that comprise it in order to improve local knowledge and innovation. This article describes the methodological framework for developing and validating a RIS model utilizing system dynamics. This model focuses on the functional structure of the RIS, separating it in six diverse, interacting sub-systems.Keywords: innovations, regional development, systems thinking, social system
Procedia PDF Downloads 7713422 Resource Allocation Modeling and Simulation in Border Security Application
Authors: Kai Jin, Hua Li, Qing Song
Abstract:
Homeland security and border safety is an issue for any country. This paper takes the border security of US as an example to discuss the usage and efficiency of simulation tools in the homeland security application. In this study, available resources and different illegal infiltration parameters are defined, including their individual behavior and objective, in order to develop a model that describes border patrol system. A simulation model is created in Arena. This simulation model is used to study the dynamic activities in the border security. Possible factors that may affect the effectiveness of the border patrol system are proposed. Individual and factorial analysis of these factors is conducted and some suggestions are made.Keywords: resource optimization, simulation, modeling, border security
Procedia PDF Downloads 52013421 Human Rights Impact on Citizens Evolution
Authors: Joseph Marzouk Gerais Abdelmalak
Abstract:
The interface between development and human rights has long been the subject of academic debate. Therefore, to understand the dynamics between the two concepts, a number of principles have been adopted, ranging from the right to development to a human rights-based approach to development. Despite these attempts, the exact connection between development and human rights is not yet fully understood. However, the inherent interdependence between these two concepts and the idea that development efforts should be undertaken with respect for human rights guarantees have gained momentum in recent years. It will then be examined whether the right to sustainable development is recognized.The article therefore concludes that the principles of sustainable development are recognized, directly or indirectly, in various human rights instruments, which represents a positive answer to the question posed above. Therefore, this work discusses international and regional human rights instruments as well as case law and interpretative guidelines from human rights bodies to demonstrate this hypothesis.Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security
Procedia PDF Downloads 7913420 E-government Status and Impact on Development in the Arab Region
Authors: Sukaina Al-Nasrawi, Maysoun Ibrahim
Abstract:
Information and communication technologies (ICT) have affected recent public administration and governance. Electronic Government (e-government) services were developed to simplify government procedures and improve interaction with citizens on one hand and to create new governance models to empower citizens and involve them in the decision-making process while increasing transparency on another hand. It is worth noting that efficient governance models enable sustainable development at the social and economic levels. Currently, the status of e-government national strategies and implementation programs vary from one country to another. This variance in the development levels of e-government initiatives and applications noted the digital divide between countries of the same region, thereby highlighting the difficulty to reach regional integration. Many Arab countries realized the need for a well-articulated e-government strategy and launched national e-government initiatives. In selected Arab countries, the focus of e-government initiatives and programs shifted from the provision of services to advanced concepts such as open data initiatives. This paper aims at over viewing the e-government achievements of Arab countries and areas for enhancement, and share best practices in the area.of the best e-government programmes from the Arab region the world. It will also shed the light on the impact of the information society in general and e-government, in specific, on the social and economic development in the Arab region.Keywords: Information and Communication Technologies (ICT), services, e-government, development, Arab region, digital divide, citizens
Procedia PDF Downloads 29413419 Reading Strategy Awareness of English Major Students
Authors: Hsin-Yi Lien
Abstract:
The study explored the role of metacognition in foreign language anxiety on a sample of 411 Taiwanese students of English as a Foreign Language. The reading strategy inventory was employed to evaluate the tertiary learners’ level of metacognitive awareness and a semi-structured background questionnaire was also used to examine the learners’ perceptions of their English proficiency and satisfaction of their current English learning. In addition, gender and academic level differences in employment of reading strategies were investigated. The results showed the frequency of reading strategy use increase slightly along with academic years and males and females actually employ different reading strategies. The EFL tertiary learners in the present study utilized cognitive strategies more frequently than metacognitive strategies or support strategies. Male students use metacognitive strategy more often while female students use cognitive and support strategy more frequently.Keywords: cognitive strategy, gender differences, metacognitive strategy, support strategy
Procedia PDF Downloads 42013418 Convergence or Divergence of Economic Growth within the ASEAN Community: Challenges for the AEC
Authors: Philippe Gugler
Abstract:
This contribution reflects some important questions regarding inter alia the economic development occurring in the light of the ASEAN’s goal of creating the ASEAN Economic Community (AEC) by 2015. We observe a continuing economic growth of GDP per capita over recent years despite the negative effects of the world economic crisis. IMF forecasts indicate that this trend will continue. The paper focuses on the analysis and comparison of economic growth trends of ASEAN countries.Keywords: ASEAN, convergence, divergence, economic growth, globalization, integration
Procedia PDF Downloads 52113417 Modelling Strategy Planning in Multi Business Companies
Authors: Gelareh Changizi, Mahsa Khajavi, Ladan Shahhosseini
Abstract:
Corporate-level strategy, or simply ‘parent strategy’, is a topic that has received much attention since the very early days of the strategic planning field. Since the multi level enterprises have different sub enterprises which deal with different business environments, we cannot define the same strategic perspective for all of them. Therefore, the determination of a perspective to manage and deal with affiliates of such enterprises is the main challenge. The parent strategy in mother enterprises' level has been analyzed in this research. A case study has been carried to comprehensively describe the proposed model.Keywords: parent strategy, multi-business companies, performance evaluation, lifecycle
Procedia PDF Downloads 37513416 Turkey’s Ideological and Identity Politics towards Iran in the Arab Uprising: The Case of Syrian Civil War
Authors: Cangul Altundas Akcay
Abstract:
With the beginning of the mass movement called as the Arab Uprising, Middle Eastern politics has demonstrated an influential shift which has been threatening the existence of the ruling regimes. In this environment, in particular, regional powers have desired to control regional politics, and to expand their regional influence. Bearing that in mind, Turkey and Iran, two significant regional powers, have engaged in competition so as to affect the shifted regional geopolitics. In this context, this paper aims to investigate how regional powers, especially non-Arab ones, have viewed each other in the Arab Uprising, whereby focusing on Turkish perspectives towards Iran. In other words, it will shed light on how Turkey has conducted foreign policy towards Iran during the Arab Uprising. To analyse this, Turkey’s ideological and identity politics towards Iran will be examined as one of its foreign policy approaches. The question is thus that how ideological and identity politics have determined Turkish foreign policy towards Iran in the Arab Uprising. To answer that, the Syrian civil war will be analysed as the case study in this qualitative study, hypothesising that Turkey, which has both Turkish identity and Sunni sect, has competed with Iran, which has both Farsi identity and Shia sect, over the Syrian civil war.Keywords: Arab uprising, ideological and identity politics, Iran, Turkey, Syrian civil war
Procedia PDF Downloads 31313415 The First Tendency in Foreign Policy: Theories, Motives, and Effects
Authors: Djehich Mohamed Yousri
Abstract:
In this paper, we explore the extent to which states seek to promote regional foreign policy. More specifically, the analytical feasibility is to find out exactly what countries seek to export, and how they have used their relations and foreign policies to enhance cooperation with other countries. The first part discusses the development of regional interests and theoretical approaches that attempted to explain the push for regionalism in the field of foreign policy. The second part of the paper presents the motives and mechanisms through which states spread the idea of regionalism in making foreign policy. Finally, we assess the implications of regionalism for the nature and practice of foreign policy, particularly with regard to the gains or constraints to which various actors are exposed in their regional endeavors. We conclude with some considerations that indicate that strengthening regionalism has become an additional and real program in the field of foreign policy analysis.Keywords: foreign policy, collective foreign policy, regionalization and foreign policy, regional foreign policy, foreign affairs
Procedia PDF Downloads 25113414 Entrepreneurial Creativity in Socio-Economic Context
Authors: Anna Czarczynska
Abstract:
Creativity is taken as a requirement for a personal anti-fragile career path in the context of regional competitive advantage in the terms of socio-economics creative environment. At the personal level, the competence and value-based approach to creativity are proposed, is an elaboration of the resource-based view of the group of individuals selected from given country. Entrepreneurial creativity competence (measured by the Schein anchor questionnaire) is based on an independent way of thinking and empowerment presents one aspect of creative capability, however quickly verified by the market, that’s why we treat this as a basic exemplification of average creative attitude combine with the entrepreneurial attitude. This introductory instrument enables further scientific research based on the same group in the context of multi-cultural external creative or the non-creative environment.Keywords: creativity, value-based approach, entrepreneurship, regional culture
Procedia PDF Downloads 20513413 SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud
Authors: Somayeh Sobati Moghadam
Abstract:
Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.Keywords: BPMN, security threats, cloud computing, business processes outsourcing, privacy
Procedia PDF Downloads 275