Search results for: security and growth for all in the region
12773 Demographic Factors Influence on Awareness of Islamic Financing among Micro, Small and Medium Enterprises Entrepreneurs in the North East Region of Nigeria
Authors: Bashir Ahmad, Daneji, Hamidu Aminu, Ahmad, Aliyu Mukhtar, Daneji, Haruna Mohammed
Abstract:
It has been established and universally agreed that vibrant Micro, Small and Medium Enterprises (MSMEs) play significant roles in economic growth and development. In Nigeria, MSMEs are not playing the expected roles. Notable among the plethora of reasons is lack of prompt and sufficient finance. Government and other stakeholders attempted in several ways at different times to provide the required finance to MSMEs but the results were not encouraging and consequently, many failed. In recent past, Islamic financing emerged world over as promising alternative source of financing. However, its awareness among MSMEs entrepreneurs in north east region of Nigeria stands to be questioned. This study explored the 'Demographic Factors Influence on Awareness of Islamic Financing among MSMEs entrepreneurs in the North East Region of Nigeria'. The primary data used in this study were collected through questionnaire. In analyzing the collected data, the study used frequency, percentages, Pearson correlation, ANOVA and test of homogeneity test (Levene’s test) parameters generated from SPSS (version 15). The findings of the study revealed that entrepreneurs’ age, state of origin, religion and educational level influence their MSMEs awareness of Islamic Financing in the north east region of Nigeria. The study recommended that Islamic Financing institutions, government and relevant agencies should do more to enhance the awareness of Islamic financing among MSMEs entrepreneurs in the north east region of Nigeria.Keywords: awareness, demographic factors, entrepreneurs, Islamic financing
Procedia PDF Downloads 36412772 Differentials of Motor Fitness Components among the School Children of Rural and Urban Areas of the Jammu Region
Authors: Sukhdev Singh, Baljinder Singh Bal, Amandeep Singh, Kanchan Thappa
Abstract:
A nation's future almost certainly rests on the future of its children, and a nation's wellbeing can be greatly improved by providing for the right upbringing of its children. Participating in physical education and sports programmes is crucial for reaching one's full potential. As we are all aware, sports have recently become incredibly popular on a global scale. Sports are continually becoming more and more popular, and this positive trend is probably going to last for some time to come. Motor abilities will provide more accurate information on the developmental process of children. Motor fitness is a component of physical fitness that includes strength, speed, flexibility, and agility, and is related to enhanced performance and the development of motor skills. In recent years, there has been increased interest in the differences in child growth between urban and rural environments. Differences in student growth, body dimensions, body composition, and fitness levels due to urban and rural environmental disparities have come into focus in recent years. The main aim of this study is to know the differentials of motor fitness components among the school children of rural and urban areas of the Jammu region. Material and Methods: In total, sixty male subjects (mean ± SD; age, 16.475 ± 1.0124 yrs.; height, 172.8 ± 2.0153 cm; Weight, 59.75 ± 3.628 kg) from the Jammu region took part in the study. A minimum sample size of 40 subjects was obtained and was derived from Rural (N1=20) and Urban (N2=20) school-going children. Statistical Applications: The Statistical Package for the Social Sciences (SPSS) version 14.0 was used for all analyses. The differences in the mean of each group for the selected variable were tested for the significance of difference by an independent samples t-test. For testing the hypotheses, the level of significance was set at 0.05. Results: Results revealed that there were significant differences of leg explosive strength (p=0.0040*), dynamic balance (p=0.0056*), and Agility (p=0.0176*) among the School Children of the rural and urban areas of the Jammu region. However, Results further revealed that there were not significant differences of cardio respiratory endurance (p=0.8612), speed (p=0.2231), Low Back/Hamstring Flexibility (p=0.6478), and Two Hand Coordination. (p= 0.0953) among the School Children of the rural and urban areas of the Jammu region. Conclusion: The results of study showed that there is significance difference between Rural and Urban School children of the Jammu region with regards to a variable," leg explosive strength, dynamic balance, Agility” and the there is no significance difference between Rural and Urban School children of the Jammu region with regards variable “cardio-respiratory endurance, speed, Low Back/Hamstring Flexibility, Two Hand Coordination”.Keywords: motor fitness, rural areas, school children, urban areas
Procedia PDF Downloads 7512771 The Effectiveness of Foreign Aid in Different Political Regimes of Pakistan
Authors: Umar Hayat, Shahid Ali, Lala Rukh
Abstract:
Foreign aid is one of the critical variables that promote economic growth. This paper is an attempt to examine the long-run relationship between foreign aid and economic growth for Pakistan over the period of 1972 to 2021. This study uses Johnson's co-integration technique to investigate the long-run relationship among the variables in the model. For short-run dynamics, we utilized the Error Correction Mechanism (ECM). The results strongly support the conventional view about aid-led growth. The analysis of the impact of aid on growth both at the micro and the macro levels generally gives different results. The result shows that in the short run inference of foreign aid under the nondemocratic form of government is significant negatively, while foreign aid does not affect economic growth in the case of democratic government.Keywords: foreign aid, economic growth, political regimes, developing economy
Procedia PDF Downloads 4212770 The Effects of Irregular Immigration Originating from Syria on Turkey's Security Issues
Authors: Muzaffer Topgul, Hasan Atac
Abstract:
After the September 11 attacks, fight against terrorism has risen to higher levels in security concepts of the countries. The following reactions of some nation states have led to the formation of unstable areas in different parts of the World. Especially, in Iraq and Syria, the influences of radical groups have risen with the weakening of the central governments. Turkey (with the geographical proximity to the current crisis) has become a stop on the movement of people who were displaced because of terrorism. In the process, the policies of the Syrian regime resulted in a civil war which is still going on since 2011, and remain as an unresolved crisis. With the extension of the problem, changes occurred in foreign policies of the World Powers; moreover, the ongoing effects of the riots, conflicts of interests of foreign powers, conflicts in the region because of the activities of radical groups increased instability within the country. This case continues to affect the security of Turkey, particularly illegal immigration. It has exceeded the number of two million Syrians who took refuge in Turkey due to the civil war, while continuing uncertainty about the legal status of asylum seekers, besides the security problems of asylum-seekers themselves, there are problems in education, health and communication (language) as well. In this study, we will evaluate the term of immigration through the eyes of national and international law, place the disorganized and illegal immigration in security sphere, and define the elements/components of irregular migration within the changing security concept. Ultimately, this article will assess the effects of the Syrian refuges to Turkey’s short-term, mid-term, and long-term security in the light of the national and international data flows and solutions will be presented to the ongoing problem. While explaining the security problems the data and the donnees obtained from the nation and international corporations will be examined thorough the human security dimensions such as living conditions of the immigrants, the ratio of the genders, especially birth rate occasions, the education circumstances of the immigrant children, the effects of the illegal passing on the public order. In addition, the demographic change caused by the immigrants will be analyzed, the changing economical conditions where the immigrants mostly accumulate, and their participation in public life will be worked on and the economical obstacles sourcing due to irregular immigration will be clarified. By the entire datum gathered from the educational, cultural, social, economic, demographical extents, the regional factors affecting the migration and the role of irregular migration in Turkey’s future security will be revealed by implication to current knowledge sources.Keywords: displaced people, human security, irregular migration, refugees
Procedia PDF Downloads 30812769 Economic Integration vs. Conflicts in Northeast Asia
Authors: Heeho Kim, Byeong-Hae Sohn
Abstract:
This study has examined the culture commonality of Northeast Asian countries based on Confucian values, and their relations to institutional economic integration. This study demonstrates that Confucian values inherent in the Northeast Asian countries have served as the cultural ethos for the rapid economic growth of this region since the 1960s and will be able to form the foundation of Northeast Asian values in the future. This paper re-appreciates these cultural values as a necessary condition for regional integration to catalyze the stagnated discussions about economic integration and extends its inter-weaving connection role for intra-regional transaction among China, Japan and Korea.Keywords: Confucianism, Northeast Asia, economic integration, economic growth, regional conflicts
Procedia PDF Downloads 44612768 Improving the Security of Internet of Things Using Encryption Algorithms
Authors: Amirhossein Safi
Abstract:
Internet of things (IOT) is a kind of advanced information technology which has drawn societies’ attention. Sensors and stimulators are usually recognized as smart devices of our environment. Simultaneously, IOT security brings up new issues. Internet connection and possibility of interaction with smart devices cause those devices to involve more in human life. Therefore, safety is a fundamental requirement in designing IOT. IOT has three remarkable features: overall perception, reliable transmission, and intelligent processing. Because of IOT span, security of conveying data is an essential factor for system security. Hybrid encryption technique is a new model that can be used in IOT. This type of encryption generates strong security and low computation. In this paper, we have proposed a hybrid encryption algorithm which has been conducted in order to reduce safety risks and enhancing encryption's speed and less computational complexity. The purpose of this hybrid algorithm is information integrity, confidentiality, non-repudiation in data exchange for IOT. Eventually, the suggested encryption algorithm has been simulated by MATLAB software, and its speed and safety efficiency were evaluated in comparison with conventional encryption algorithm.Keywords: internet of things, security, hybrid algorithm, privacy
Procedia PDF Downloads 46612767 Environmental Impacts and Ecological Utilization of Water Hyacinth (Eichhornia crassipes) in the Niger Delta Fresh Ecosystem
Authors: Seiyaboh E. I.
Abstract:
Water Hyacinth (Eichhornia crassipes) was introduced into many parts of the world, including Africa, as an ornamental garden pond plant because of its beauty. However, it is considered a dangerous pest today because when not controlled, water hyacinth will cover rivers, lakes and ponds entirely; this dramatically impacts water flow, blocks sunlight from reaching native aquatic plants, and starves the water of oxygen, often killing fish and other aquatic organisms. In the Niger Delta region, water hyacinth is considered a nuisance because of its very obvious devastating environmental impacts in the region. However, water hyacinth (Eichhornia crassipes) constitutes a very important part of an aquatic ecosystem. It possesses specialized growth habits, physiological characteristics and reproductive strategies that allow for rapid growth and spread in freshwater environments and this explains its very rapid spread in the Niger Delta freshwater ecosystem. This paper therefore focuses on the environmental consequences of the proliferation of water hyacinth (Eichhornia crassipes) in the Niger Delta freshwater ecosystem, extent of impact, and options available for its ecological utilization which will help mitigate proliferation, restore effective freshwater ecosystem utilization and balance. It concludes by recommending sustainable practices outlining the beneficial uses of water hyacinth (Eichhornia crassipes) rather than control.Keywords: environmental impacts, ecological utilization, Niger Delta, water hyacinth, Eichhornia crassipes
Procedia PDF Downloads 27112766 Post-Covid 19 Pandemic Economy: Corporate Governance and Performance of Private Security Firms in Kenya
Authors: Sewe Silvanus Odhiambo
Abstract:
Globally, many governments have publicly recognized private security firms as essential services providers. The private security firms face a lot of challenges, but the COVID-19 situation also has exacerbated them to another level. This paper locates its relevance in the post-coronavirus era. The COVID-19 pandemic has redefined the world operation, which shows a higher impact on the security field. Accordingly, the purpose of the study was to examine the role of corporate governance on the performance of private security firms in a post-covid pandemic era in Kenya. The study employed a descriptive research design, which included a quantitative approach and secondary data. The study was carried in the month of July 2021 from the registered private security firms. After targeting all private security firms, only 54 firms had disclosed their annual report by the time of conducting the study. The results depicted that pandemic has affected the performance of private security firms measures unfavorably. Further, boards of directors show a positive association with security firm performance. The study recommends that there is need board of directors to enhance management’s risk assessments in the midst of COVID-19; ensure that there are business continuity plans; there is organizational resilience; there is need for the development of new digital strategies; enabling the digital workforce in the firms and have effective communication plans with both internal and external stakeholders to deal with uncertainties and develop more post-COVID practices for boards of directors to improve performance of private security firms in Kenya. The practical implications of the study are that the research outcomes might assist regulatory bodies, investors, policymakers, and the security sector in general in their formulation of public and corporate governance strategies concerning future emergency preparedness and responses. This study also provides a unique contribution to the literature of COVID-19 and security firm performance in emerging economies context.Keywords: COVID-19, corporate governance, firm performance, private security firms
Procedia PDF Downloads 16012765 Enhancing Code Security with AI-Powered Vulnerability Detection
Authors: Zzibu Mark Brian
Abstract:
As software systems become increasingly complex, ensuring code security is a growing concern. Traditional vulnerability detection methods often rely on manual code reviews or static analysis tools, which can be time-consuming and prone to errors. This paper presents a distinct approach to enhancing code security by leveraging artificial intelligence (AI) and machine learning (ML) techniques. Our proposed system utilizes a combination of natural language processing (NLP) and deep learning algorithms to identify and classify vulnerabilities in real-world codebases. By analyzing vast amounts of open-source code data, our AI-powered tool learns to recognize patterns and anomalies indicative of security weaknesses. We evaluated our system on a dataset of over 10,000 open-source projects, achieving an accuracy rate of 92% in detecting known vulnerabilities. Furthermore, our tool identified previously unknown vulnerabilities in popular libraries and frameworks, demonstrating its potential for improving software security.Keywords: AI, machine language, cord security, machine leaning
Procedia PDF Downloads 3512764 Saudi State Arabia’s Struggle for a Post-Rentier Regional Order
Authors: Omair Anas
Abstract:
The Persian Gulf has been in turmoil for a long time since the colonial administration has handed over the role to the small and weak kings and emirs who were assured of protection in return of many economic and security promises to them. The regional order, Saudi Arabia evolved was a rentier regional order secured by an expansion of rentier economy and taking responsibility for much of the expenses of the regional order on behalf of relatively poor countries. The two oil booms helped the Saudi state to expand the 'rentier order' driven stability and bring the countries like Egypt, Jordan, Syria, and Palestine under its tutelage. The disruptive misadventure, however, came with Iran's proclamation of the Islamic Revolution in 1979 which it wanted to be exported to its 'un-Islamic and American puppet' Arab neighbours. For Saudi Arabia, even the challenge presented by the socialist-nationalist Arab dictators like Gamal Abdul Nasser and Hafez Al-Assad was not that much threatening to the Saudi Arabia’s then-defensive realism. In the Arab uprisings, the Gulf monarchies saw a wave of insecurity and Iran found it an opportune time to complete the revolutionary process it could not complete after 1979. An alliance of convenience and ideology between Iran and Islamist groups had the real potential to challenge both Saudi Arabia’s own security and its leadership in the region. The disruptive threat appeared at a time when the Saudi state had already sensed an impending crisis originating from the shifts in the energy markets. Low energy prices, declining global demands, and huge investments in alternative energy resources required Saudi Arabia to rationalize its economy according to changing the global political economy. The domestic Saudi reforms remained gradual until the death of King Abdullah in 2015. What is happening now in the region, the Qatar crisis, the Lebanon crisis and the Saudi-Iranian proxy war in Iraq, Syria, and Yemen has combined three immediate objectives, rationalising Saudi economy and most importantly, the resetting the Saudi royal power for Saudi Arabia’s longest-serving future King Mohammad bin Salman. The Saudi King perhaps has no time to wait and watch the power vacuum appearing because of Iran’s expansionist foreign policy. The Saudis appear to be employing an offensive realism by advancing a pro-active regional policy to counter Iran’s threatening influence amid disappearing Western security from the region. As the Syrian civil war is coming to a compromised end with ceding much ground to Iran-controlled militias, Hezbollah and Al-Hashad, the Saudi state has lost much ground in these years and the threat from Iranian proxies is more than a reality, more clearly in Bahrain, Iraq, Syria, and Yemen. This paper attempts to analyse the changing Saudi behaviour in the region, which, the author understands, is shaped by an offensive-realist approach towards finding a favourable security environment for the Saudi-led regional order, a post-rentier order perhaps.Keywords: terrorism, Saudi Arabia, Rentier State, gulf crisis
Procedia PDF Downloads 13512763 An Econometric Analysis of the Impacts of Inflation on the Economic Growth of South Africa
Authors: Gisele Mah, Paul Saah
Abstract:
The rising rates of inflation are hindering economic growth in developing nations. Hence, this study investigated the effects of inflation rates on the economic growth of South Africa using the secondary time series data from 1987 to 2022. The main objectives of this study were to investigate the long run relationship between inflation and economic growth, and also to determine the causality direction between these two variables. The study utilized the Autoregressive Distributed Lag (ARDL) bounds test of co-integration to investigate whether there is a long-run relationship between inflation and economic growth. The Pairwise Granger causality approach was employed to determine the second objective, which is the direction of causality. The study discovered only one co-integration relationship between our variables and it was between inflation and economic growth. The results showed that there is a negative and significant relationship between inflation and economic growth. There appeared to be a positive and significant relationship between economic growth and exchange rate. The interest rates have shown to be negative and insignificant in explaining economic growth. The study also established that inflation does Granger cause economic growth which is given as GDP. Similarly, the study discovered that inflation Granger causes exchange rates. Therefore, the study recommends that inflation should be decreased in South Africa, in order for economic growth to increase. Contrary, this study recommends that South Africa should increase its exchange rates, in order for economic growth to also increase.Keywords: inflation rate, economic growth, South Africa, autoregressive distributed lag model
Procedia PDF Downloads 4612762 Enhancing Cybersecurity Protective Behaviour: Role of Information Security Competencies and Procedural Information Security Countermeasure Awareness
Authors: Norshima Humaidi, Saif Hussein Abdallah Alghazo
Abstract:
Cybersecurity threat have become a serious issue recently, and one of the cause is because human error, which is usually constituted by carelessness, ignorance, and failure to practice cybersecurity behaviour adequately. Using a data from a quantitative survey, Partial Least Squares-Structural Equation Modelling (PLS-SEM) analysis was used to determine the factors that affect cybersecurity protective behaviour (CPB). This study adapts cybersecurity protective behaviour model by focusing on two constructs that can enhance CPB: manager’s information security competencies (MISI) and procedural information security countermeasure (PCM) awareness. Theory of leadership competencies were adapted to measure user’s perception towards competencies among security managers/leader in the organization. Confirmatory factor analysis (CFA) testing shows that all the measurement items of each constructs were adequate in their validity individually based on their factor loading value. Moreover, each constructs are valid based on their parameter estimates and statistical significance. The quantitative research findings show that PCM awareness strongly influences CPB compared to MISI. Meanwhile, MISI was significantlyPCM awarenss. This study believes that the research findings can contribute to human behaviour in IS studies and are particularly beneficial to policy makers in improving organizations’ strategic plans in information security, especially in this new era. Most organizations spend time and resources to provide and establish strategic plans of information security; however, if employees are not willing to comply and practice information security behaviour appropriately, then these efforts are in vain.Keywords: cybersecurity, protection behaviour, information security, information security competencies, countermeasure awareness
Procedia PDF Downloads 9512761 Best Practices to Enhance Patient Security and Confidentiality When Using E-Health in South Africa
Authors: Lethola Tshikose, Munyaradzi Katurura
Abstract:
Information and Communication Technology (ICT) plays a critical role in improving daily healthcare processes. The South African healthcare organizations have adopted Information Systems to integrate their patient records. This has made it much easier for healthcare organizations because patient information can now be accessible at any time. The primary purpose of this research study was to investigate the best practices that can be applied to enhance patient security and confidentiality when using e-health systems in South Africa. Security and confidentiality are critical in healthcare organizations as they ensure safety in EHRs. The research study used an inductive research approach that included a thorough literature review; therefore, no data was collected. The research paper’s scope included patient data and possible security threats associated with healthcare systems. According to the study, South African healthcare organizations discovered various patient data security and confidentiality issues. The study also revealed that when it comes to handling patient data, health professionals sometimes make mistakes. Some may not be computer literate, which posed issues and caused data to be tempered with. The research paper recommends that healthcare organizations ensure that security measures are adequately supported and promoted by their IT department. This will ensure that adequate resources are distributed to keep patient data secure and confidential. Healthcare organizations must correctly use standards set up by IT specialists to solve patient data security and confidentiality issues. Healthcare organizations must make sure that their organizational structures are adaptable to improve security and confidentiality.Keywords: E-health, EHR, security, confidentiality, healthcare
Procedia PDF Downloads 5512760 An Analysis of Privacy and Security for Internet of Things Applications
Authors: Dhananjay Singh, M. Abdullah-Al-Wadud
Abstract:
The Internet of Things is a concept of a large scale ecosystem of wireless actuators. The actuators are defined as things in the IoT, those which contribute or produces some data to the ecosystem. However, ubiquitous data collection, data security, privacy preserving, large volume data processing, and intelligent analytics are some of the key challenges into the IoT technologies. In order to solve the security requirements, challenges and threats in the IoT, we have discussed a message authentication mechanism for IoT applications. Finally, we have discussed data encryption mechanism for messages authentication before propagating into IoT networks.Keywords: Internet of Things (IoT), message authentication, privacy, security
Procedia PDF Downloads 38112759 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey
Authors: Maleh Yassine, Ezzati Abdellah
Abstract:
Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS
Procedia PDF Downloads 38212758 Energy Security and Sustainable Development: Challenges and Prospects
Authors: Abhimanyu Behera
Abstract:
Over the past few years, energy security and sustainable development have moved rapidly into the global agenda. There are two main reasons: first, the impact of high and often volatile energy prices; second, concerns over environmental sustainability particularly about the global climate. Both issues are critically important in which impressive economic growth has boosted the demand for energy and put corresponding strains on the environment. Energy security is a broad concept that focuses on energy availability and pricing. Specifically, it refers to the ability of the energy supply system i.e. suppliers, transporters, distributors and regulatory, financial and R&D institutions to deliver the amount of competitively priced energy that customers demand, within accepted standards of reliability, timeliness, quality, safety. Traditionally, energy security has been defined in the context of the geopolitical risks to external oil supplies but today it is encompassing all energy forms, all the external and internal links bringing the energy to the final consumer, and all the many ways energy supplies can be disrupted including equipment malfunctions, system design flaws, operator errors, malicious computer activities, deficient market and regulatory frameworks, corporate financial problems, labour actions, severe weather and natural events, aggressive acts (e.g. war, terrorism and sabotage), and geopolitical disruptions. In practice, the most challenging disruptions are those linked to: 1) extreme weather events; 2) mismatched electricity supply and demand; 3) regulatory failures; and 4) concentration of oil and gas resources in certain regions of the world. However, insecure energy supplies inhibit development by raising energy costs and imposing expensive cuts in services when disruptions actually occur. The energy supply sector can best advance sustainable development by producing and delivering secure and environmentally-friendly sources of energy and by increasing the efficiency of energy use. With this objective, this paper seeks to highlight the significance of energy security and sustainable development in today’s world. Moreover, it critically overhauls the major challenges towards sustainability of energy security and what are the major policies are taken to overcome these challenges by Government is lucidly explicated in this paper.Keywords: energy, policies, security, sustainability
Procedia PDF Downloads 38712757 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys
Authors: Chalee Thammarat
Abstract:
Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security
Procedia PDF Downloads 42812756 Drivers of Deforestation in the Colombian Amazon: An Empirical Causal Loop Diagram of Food Security and Land-Use Change
Authors: Jesica López, Deniz Koca, Asaf Tzachor
Abstract:
In 2016 the historic peace accord between the Colombian government and the Revolutionary Armed Forces of Colombia (FARC) had no strong mechanism for managing changes to land use and the environment. Since the end of a 60-year conflict in Colombia, large areas of forest in the Amazon region have been rapidly converted to agricultural uses, most recently by cattle ranching. This suggests that the peace agreement presents a threat to the conservation of the country's rainforest. We analyze the effects of cattle ranching as a driver and accelerator of deforestation from a systemic perspective, focusing on two key leverage points the legal and illegal activities involved in the cattle ranching practices. We map and understand the inherent dynamic complexity of deforestation, including factors such as land policy instruments, national strategy to tackle deforestation, land use nexus with Amazonian food systems, and loss of biodiversity. Our results show that deforestation inside Colombian Protected Areas (PAs) in the Amazon region and the surrounding buffer areas has accelerated with the onset of peace. By using a systems analysis approach, we contextualized the competition of land between cattle ranching and the need to protect tropical forests and their biodiversity loss. We elaborate on future recommendations for land use management decisions making suggest the inclusion of an Amazonian food system, interconnecting and visualizing the synergies between sustainable development goals, climate action (SDG 13) and life on land (SDG 15).Keywords: tropical rainforest, deforestation, sustainable land use, food security, Colombian Amazon
Procedia PDF Downloads 9512755 Banking Sector Development and Economic Growth: Evidence from the State of Qatar
Authors: Fekri Shawtari
Abstract:
The banking sector plays a very crucial role in the economic development of the country. As a financial intermediary, it has assigned a great role in the economic growth and stability. This paper aims to examine the empirically the relationship between banking industry and economic growth in state of Qatar. We adopt the VAR vector error correction model (VECM) along with Granger causality to address the issue over the long-run and short-run between the banking sector and economic growth. It is expected that the results will give policy directions to the policymakers to make strategies that are conducive toward boosting development to achieve the targeted economic growth in current situation.Keywords: economic growth, banking sector, Qatar, vector error correction model, VECM
Procedia PDF Downloads 16812754 Convergence or Divergence of Economic Growth within the ASEAN Community: Challenges for the AEC
Authors: Philippe Gugler
Abstract:
This contribution reflects some important questions regarding inter alia the economic development occurring in the light of the ASEAN’s goal of creating the ASEAN Economic Community (AEC) by 2015. We observe a continuing economic growth of GDP per capita over recent years despite the negative effects of the world economic crisis. IMF forecasts indicate that this trend will continue. The paper focuses on the analysis and comparison of economic growth trends of ASEAN countries.Keywords: ASEAN, convergence, divergence, economic growth, globalization, integration
Procedia PDF Downloads 51612753 Evaluation of Nutrition Supplement on Body Composition during Catch-Up Growth, in a Pre-Clinical Model of Growth Restriction
Authors: Bindya Jacob
Abstract:
The aim of the present study was to assess the quality of catchup growth induced by Oral Nutrition Supplement (ONS), in animal model of growth restriction due to under nutrition. Quality of catch-up growth was assessed by proportion of lean body mass (LBM) and fat mass (FM). Young SD rats were food restricted at 70% of normal caloric intake for 4 weeks; and re-fed at 120% of normal caloric intake for 4 weeks. Refeeding diet had 50% calories from animal diet and 50% from ONS formulated for optimal growth. After refeeding, the quantity and quality of catch-up growth were measured including weight, length, LBM and FM. During nutrient restriction, body weight and length of animals was reduced compared to healthy controls. Both LBM and FM were significantly lower than healthy controls (p < 0.001). Refeeding with ONS resulted in increase of weight and length, with significant catch-up growth compared to baseline (p < 0.001). Detailed examination of body composition showed that the catch-up in body weight was due to proportionate increase of LBM and FM, resulting in a final body composition similar to healthy controls. This data supports the use of well-designed ONS for recovery from growth restriction due to under nutrition, and return to normal growth trajectory characterized by normal ratio of lean and fat mass.Keywords: catch up growth, body composition, nutrient restriction, healthy growth
Procedia PDF Downloads 43612752 Climate Change and Food Security: The Legal Aspects with Special Focus on the European Union
Authors: M. Adamczak-Retecka, O. Hołub-Śniadach
Abstract:
Dangerous of climate change is now global problem and as such has a strategic priority also for the European Union. Europe and European citizens try to do their best to cut greenhouse gas emissions, moreover they substantially encourage other nations and regions to follow the same way. The European Commission and a number of Member States have developed adaptation strategies in order to help strengthen EU's resilience to the inevitable impacts of climate change. The EU has long been a driving force in international negotiations on climate change and was instrumental in the development of the UN Framework Convention on Climate Change. As the world's leading donor of development aid, the EU also provides substantial funding to help developing countries tackle climate change problem. Global warming influences human health, biodiversity, ecosystems but also many social and economic sectors. The aim of this paper is to focus on impact of claimant change on for food security. Food security challenges are directly related to globalization, climate change. It means that current and future food policy is exposed to all cross-cutting and that must be linked with environmental and climate targets, which supposed to be achieved. In the 7th EAP —The new general Union Environment Action Program to 2020, called “Living well, within the limits of our planet” EU has agreed to step up its efforts to protect natural capital, stimulate resource efficient, low carbon growth and innovation, and safeguard people’s health and wellbeing– while respecting the Earth’s natural limits.Keywords: climate change, food security, sustainable food consumption, climate governance
Procedia PDF Downloads 17812751 Assessment of the Relationship between Energy Price Dynamics and Green Growth in the Sub-Sharan Africa
Authors: Christopher I. Ifeacho, Adeleke Omolade
Abstract:
The paper examines the relationship between energy price dynamics and green growth in Sub Sahara African Countries. The quest for adopting green energy in order to improve green growth that can engender sustainability and stability has received more attention from researchers in recent times. This study uses a panel autoregressive distributed lag approach to investigate this relationship. Findings from the result showed that energy price dynamics and exchange rates have more short-run significant impacts on green growth in individual countries rather than the pooled result. Furthermore, the long-run result confirmed that inflation and capital have a significant long-run relationship with green growth. The causality test result revealed the existence of a bi-directional relationship between green growth and energy price dynamics. The study recommends caution in a currency devaluation and improvement in renewable energy production in the Sub Sahara Africa in order to achieve sustainable green growth.Keywords: green growth, energy price dynamics, Sub Saharan Africa, relationship
Procedia PDF Downloads 9612750 The Legal Personality of The Security Council
Authors: Helyeh Doutaghi
Abstract:
The United Nations Security Council (UNSC) is one of the six principal organs of the United Nations. Under the Charter of the United Nations (UN Charter), the UNSC’s primary responsibility is maintaining international peace and security, which it does through establishing and adopting a Security Council resolution. United Nations resolutions are formal expressions of the opinion or will of United Nations organs. However, there have been times when powerful politicians (or governments with great political power) had the first say in situations where the UNSC should have had jurisdiction based on the principle of rule of law, which is the notion that people are governed by the law rather than by officials. This paper will assess the effectiveness of the UNSC by analyzing its actions during the Iran-Iraq war for it has been found that one of the major reasons for the prolongation of the war was a result of the one-sided positions taken by the UNSC and many nations. The UNSC’s success in achieving its primary goal during the war will be discussed, including an examination of the duties and structure of the UNSC by reviewing the articles in the UN Charter; this will include examples of the UNSC’s role in other international disputes as well.Keywords: UN Security Council, Iran, Iraq, charter, international law
Procedia PDF Downloads 45812749 Effects of Hypoxic Duration at Different Growth Stages on Yield Potential of Waxy Corn (Zea mays L.)
Authors: S. Boonlertnirun, R. Suvannasara, K. Boonlertnirun
Abstract:
Hypoxia has negative effects on growth and crop yield, its severity is so varied depending on crop growth stages, duration of hypoxia and crop species. The objective was to evaluate the sensitive growth stage and the duration of hypoxia negatively affecting growth and yield of waxy corn. Pot experiment was conducted using a split plot in randomized complete block with 3 growth stages: V3 (3-4 true leaves), V7 (7-8 true leaves), and R1 (silking stage), and three hypoxic durations: 6, 9, and 12 days, in an open–ended outdoor greenhouse during January to March 2013. The results revealed that different growth stages had significantly (p < 0.5) different responses to hypoxia, seeing that the sensitive growth stage affecting plant height, yield and yield components was mostly detected in V7 growth stage whereas leaf greenness and days to silking were sensitive to hypoxia at R1 growth stage. Different hypoxic durations significantly affected the yield and yield components, hypoxic duration of twelve days showed the most negative effect greater than the others. In this present study, it can be concluded that waxy corn plants were waterlogged at V7 growth stage for twelve days had the most negative effect on yield and yield components.Keywords: hypoxia duration, waxy corn, growth stage, Zea mays L.
Procedia PDF Downloads 39312748 Bring Your Own Device Security Model in a Financial Institution of South Africa
Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren
Abstract:
This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis
Procedia PDF Downloads 2812747 Adult Education for Transformation and Security Challenges in Nigeria
Authors: Asmau Zarma Gogaram
Abstract:
The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education.Keywords: adult education, transformation and security challenges, Nigeria, education and human development
Procedia PDF Downloads 52012746 Rejuvenation of Peanut Seedling from Collar Rot Disease by Azotobacter sp. RA2
Authors: Ravi R. Patel, Vasudev R. Thakkar
Abstract:
Use of plant growth-promoting rhizobacteria (PGPR) to increase the production and decrees disease occurrence is a recent method in agriculture. An RA2 rhizospheric culture was isolated from peanut rhizosphere from Junagadh region of Gujarat, India and showed different direct and indirect plant growth promoting activity like indole acetic acid, gibberellic acid, siderophore, hydrogen cyanide, Ammonia and (1-Aminocyclopropane-1-Carboxylate) deaminase production, N2 fixation, phosphate and potassium solubilization in vitro. RA2 was able to protect peanut germinating seedling from A. niger infection and reduce collar rot disease incidence 60-35% to 72-41% and increase germination percentage from 70-82% to 75-97% in two varieties GG20 and GG2 of peanut. RA2 was found to induce resistance in A. hypogaea L. seedlings via induction of different defense-related enzymes like phenylalanine ammonia lyase, peroxidase, polyphenol oxidase, lipoxygenase and pathogenesis related protein like chitinase, ß – 1,3- glucanase. Jasmonic acid one of the major signaling molecules of inducing systemic resistance was also found to induced due to RA2 treatments. RA2 bacterium was also promoting peanut growth and reduce A. niger infection in pot studies. 16S rDNA sequence of RA2 showed 99 % homology to Azotobacter species.Keywords: plant growth promoting rhizobacteria, peanut, aspergillus niger, induce systemic resistance
Procedia PDF Downloads 24012745 The Determinants of Trade Flow and Potential between Ethiopia and Group of Twenty
Authors: Terefe Alemu
Abstract:
This study is intended to examine Ethiopia’s trade flow determinants and trade potential with G20 countries whether it was overtraded or there is/are trade potential by using trade gravity model. The sources of panel data used were IMF, WDI, United Nations population division, The Heritage Foundation, Washington's No. 1 think tank online website database, online distance calculator, and others for the duration of 2010 to 2019 for 10 consecutive years. The empirical data analyzing tool used was Random effect model (REM), which is effective in estimation of time-invariant data. The empirical data analyzed using STATA software result indicates that Ethiopia has a trade potential with seven countries of G20, whereas Ethiopia overtrade with 12 countries and EU region. The Ethiopia’s and G20 countries/region bilateral trade flow statistically significant/ p<0.05/determinants were the population of G20 countries, growth domestic products of G20 countries, growth domestic products of Ethiopia, geographical distance between Ethiopia and G20 countries. The top five G20 countries exported to Ethiopia were china, United State of America, European Union, India, and South Africa, whereas the top five G20 countries imported from Ethiopia were EU, China, United State of America, Saudi Arabia, and Germany, respectively. Finally, the policy implication were Ethiopia has to Keep the consistence of trade flow with overtraded countries and improve with under traded countries through trade policy revision, and secondly, focusing on the trade determinants to improve trade flow is recommended.Keywords: trade gravity model, trade determinants, G20, international trade, trade potential
Procedia PDF Downloads 21112744 Evaluation of the Cities Specific Characteristics in the Formation of the Safavid Period Mints
Authors: Mahmood Seyyed, Akram Salehi Heykoei, Hamidreza Safakish Kashani
Abstract:
Among the remaining resource of the past, coins considered as an authentic documents among the most important documentary sources. The coins were minted in a place that called mint. The number and position of the mints in each period reflects the amount of economic power, political security and business growth, which was always fluctuated its position with changing the political and economic condition. Considering that, trade has more growth during the Safavid period than previous ones, the mint also has been in greater importance. It seems the one hand, the growth of economic in Safavid period has a direct link with the number and places of the mints at that time and in the other hand, the mints have been formed in some places because of the specific characteristic of cities and regions. Increasing the number of mints in the north of the country due to the growth of silk trade and in the west and northwest due to the political and commercial relation with Ottoman Empire, also the characteristics such as existence of mines, located in the Silk Road and communication ways, all are the results of this investigation. Accordingly, in this article researcher tries to examine the characteristics that give priority to a city for having mint. With considering that in the various historical periods, the mints were based in the most important cities in terms of political and social, at that time, this article examines the cities specific characteristics in the formation of the mints in Safavid period.Keywords: documentary sources, coins, mint, city, Safavid
Procedia PDF Downloads 265