Search results for: Islamic social security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12102

Search results for: Islamic social security

11712 Food Security Model and the Role of Community Empowerment: The Case of a Marginalized Village in Mexico, Tatoxcac, Puebla

Authors: Marco Antonio Lara De la Calleja, María Catalina Ovando Chico, Eduardo Lopez Ruiz

Abstract:

Community empowerment has been proved to be a key element in the solution of the food security problem. As a result of a conceptual analysis, it was found that agricultural production, economic development and governance, are the traditional basis of food security models. Although the literature points to social inclusion as an important factor for food security, no model has considered it as the basis of it. The aim of this research is to identify different dimensions that make an integral model for food security, with emphasis on community empowerment. A diagnosis was made in the study community (Tatoxcac, Zacapoaxtla, Puebla), to know the aspects that impact the level of food insecurity. With a statistical sample integrated by 200 families, the Latin American and Caribbean Food Security Scale (ELCSA) was applied, finding that: in households composed by adults and children, have moderated food insecurity, (ELCSA scale has three levels, low, moderated and high); that result is produced mainly by the economic income capacity and the diversity of the diet on its food. With that being said, a model was developed to promote food security through five dimensions: 1. Regional context of the community; 2. Structure and system of local food; 3. Health and nutrition; 4. Information and technology access; and 5. Self-awareness and empowerment. The specific actions on each axis of the model, allowed a systemic approach needed to attend food security in the community, through the empowerment of society. It is concluded that the self-awareness of local communities is an area of extreme importance, which must be taken into account for participatory schemes to improve food security. In the long term, the model requires the integrated participation of different actors, such as government, companies and universities, to solve something such vital as food security.

Keywords: community empowerment, food security, model, systemic approach

Procedia PDF Downloads 367
11711 SeCloudBPMN: A Lightweight Extension for BPMN Considering Security Threats in the Cloud

Authors: Somayeh Sobati Moghadam

Abstract:

Business processes are crucial for organizations and help businesses to evaluate and optimize their performance and processes against current and future-state business goals. Outsourcing business processes to the cloud becomes popular due to a wide varsity of benefits and cost-saving. However, cloud outsourcing raises enterprise data security concerns, which must be incorporated in Business Process Model and Notation (BPMN). This paper, presents SeCloudBPMN, a lightweight extension for BPMN which extends the BPMN to explicitly support the security threats in the cloud as an outsourcing environment. SeCloudBPMN helps business’s security experts to outsource business processes to the cloud considering different threats from inside and outside the cloud. In this way, appropriate security countermeasures could be considered to preserve data security in business processes outsourcing to the cloud.

Keywords: BPMN, security threats, cloud computing, business processes outsourcing, privacy

Procedia PDF Downloads 264
11710 Islamic Finance and Trade Promotion in the African Continental Free Trade Area: An Exploratory Study

Authors: Shehu Usman Rano Aliyu

Abstract:

Despite the significance of finance as a major trade lubricant, evidence in the literature alludes to its scarcity and increasing cost, especially in developing countries where small and medium-scale enterprises are worst affected. The creation of the African Continental Free Trade Area (AFCFTA) in 2018, an organ of the African Union (AU), was meant to serve as a beacon for deepening economic integration through the removal of trade barriers inhibiting intra-African trade and movement of persons, among others. Hence, this research explores the role Islamic trade finance (ITF) could play in spurring intra- and inter-African trade. The study involves six countries; Egypt, Kenya, Malaysia, Morocco, Nigeria, and Saudi Arabia, and employs survey research, a total of 430 sample data, and SmartPLS Structural Equation Modelling (SEM) techniques in its analyses. We find strong evidence that Shari’ah, legal and regulatory compliance issues of the ITF institutions rhythm with the internal, national, and international compliance requirements equally as the unique instruments applied in ITF. In addition, ITF was found to be largely driven by global economic and political stability, socially responsible finance, ethical and moral considerations, risk-sharing, and resilience of the global Islamic finance industry. Further, SMEs, Governments, and Importers are the major beneficiary sectors. By and large, AfCFTA’s protocols align with the principles of ITF and are therefore suited for the proliferation of Islamic finance in the continent. And, while AML/KYC and BASEL requirements, compliance to AAOIFI and IFSB standards, paucity of Shari'ah experts, threats to global security, and increasing global economic uncertainty pose as major impediments, the future of ITF would be shaped by a greater need for institutional and policy support, global economic cum political stability, robust regulatory framework, and digital technology/fintech. The study calls for the licensing of more ITF institutions in the continent, participation of multilateral institutions in ITF, and harmonization of Shariah standards.

Keywords: AfCFTA, islamic trade finance, murabaha, letter of credit, forwarding

Procedia PDF Downloads 49
11709 Islamic Financial Services in Africa: Development and Operations of the Big Emerging Markets

Authors: Shamsuddeen Muhammad Ahmad

Abstract:

The emergence and operations of Islamic Financial Institutions (IFIs) are being regarded as the new economic and financial pride at the global stage today. Admittedly, therefore, the IFIs has continued to impact positively on the economies of its host countries, especially the Gulf Cooperation Council (GCC) region, Asian and Western countries as well as making a steady in-road into the sub-Saharan Africa. Hence, the number of countries that adopted Islamic financial system in Africa has continued to increase. As a matter of fact, this paper examines the role and contributions of Islamic Financial Institutions (IFIs) to the economic growth and financial development of the big emerging markets in the African continent i.e. South Africa, Nigeria, and Egypt. The methods adopted for this study are descriptive, comparative and analytical in nature. Essentially, the findings from this study reveal that the three sampled countries are benefitting from the presence of IFIs in their economies in terms of contributions to economic growth and real sector participation, particularly for Egypt and South Africa. Similarly, they reap from foreign direct investments and economic diversification among others. However, this study recommends that African countries should integrate IFIs as part and parcel of their economic and financial systems, in order to benefit optimally from this new economic phenomenon.

Keywords: Islamic financial services, Africa, emerging markets, development, operation

Procedia PDF Downloads 268
11708 The Implications of Some Social Variables in Increasing the Unemployed in Egypt

Authors: Mohamed Elkhouli

Abstract:

This research sets out to identify some social factors or variables that may need to be controlled in order to decrease the volume of unemployed in Egypt. As well as, it comes to investigate the relationship between a set of social variables and unemployment issue in Egypt in the sake of determining the most important social variables influencing the rise of unemployed during the time series targeted (2002-2012). Highlighting the unemployment issue is becoming an increasingly important topic in all countries throughout the world resulting from expand their globalization efforts. In general, the study tries to determine what the most social priorities are likely to adopt seriously by the Egypt's government in order to solve the unemployed problem. The results showed that the low value for both of small projects and the total value of disbursed social security respectively have significant impact on increasing the No. of unemployed in Egypt, according to the target period by the current study.

Keywords: Egypt, social status, unemployment, unemployed

Procedia PDF Downloads 316
11707 The Kadiria Zawiya: Architecture and Islamic Sufi Paradigm

Authors: Ghada Chater, Mounir Dhouib

Abstract:

Zawiyas are mausoleums where saints called 'waly' are buried and where ritual practices of Sufi Islamic movement take place. These funerary monuments have constituted since the medieval period a fundamental component of rural and urban Islamic landscape, especially that of Tunisia.The hypothesis is that these monuments reflect in their architecture the Sufi underlying thought. The paper’s target is to verify the validity of this hypothesis and possibly show the incarnation mode of Islamic Sufi paradigm in the zawiya’s architecture. This study considers the main Zawiya of one of the most important religious brotherhoods in Tunisia, which is Kadiria. A morphological analysis has been conducted and crossed later to a spiritual hermeneutic test. The result of this confrontation was significant: the paradigmatic element of the zawiya, materialized by the esoteric / exoteric dome 'kubba', returns in its geometry and structure to one of the Sufism key concepts: the unity of the creative spirit in the diversity and plurality of evanescent bodies. Thus, the creative act finds its reflection not only in the spirit of the perfect human microcosm (the waly microcosm), but also within the building dedicated to him.

Keywords: architecture, Islam, Sufism, waly, zawiya

Procedia PDF Downloads 341
11706 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 75
11705 The Islamic Advertising Standardisation Revisited of Food Products

Authors: Nurzahidah Haji Jaapar, Anis Husna Abdul Halim, Mohd Faiz Mohamed Yusof, Mohd Dani Muhamad, Sharifah Fadylawaty Syed Abdullah

Abstract:

The growing size of Muslim is recognised with significant increasing of purchasing power in the market. The realm of trade and business has embedded religious values as the new market segments are emerging in offering food products to meet needs and demands of Muslim consumer. The emergence of new market in food industry, advertising is charged with all sort of negative effects includes promoting controversial unsafety and harmful products, wasteful spending and exploiting women and kids. Therefore, this research attempts to examine between previous examinations of advertising standardisation in ancient era and current practices in the market. This paper is based on content analysis of the literature. The results show that there are a bridge gap between the implementation of practices as the advent in industrial 4.0 in using digital advertising by food industry. Thus, this paper is able to recognize the differences between two era and significant in determining the best practices in advertising by following Islamic principles.

Keywords: Islamic advertising, unethical advertising, ethical advertising, Islamic principles

Procedia PDF Downloads 144
11704 Availability, Accessibility and Utilization of Information and Communication Technology in Teaching and Learning Islamic Studies in Colleges of Education, North-Eastern, Nigeria

Authors: Bello Ali

Abstract:

The use of Information and Communication Technology (ICT) in tertiary institutions by lecturers and students has become a necessity for the enhancement of quality teaching and learning. This study examined availability, accessibility and utilization of ICT in Teaching-Learning Islamic Studies in Colleges of Education, North-East, Nigeria. The study adopted multi-stage sampling technique, in which, five out of the eleven Colleges of Education (both Federal and State owned) were purposively selected for the study. Primary data was drawn from the respondents by the use of questionnaire, interviews and observations. The results of the study, generally, indicate that the availability and accessibility to ICT facilities in Colleges of Education in North-East, Nigeria, especially in teaching/learning delivery of Islamic studies were relatively inadequate and rare to lecturers and students. The study further reveals that the respondents’ level of utilization of ICT is low and only few computer packages and internet services were involved in the ICT utilization, which is yet to reach the real expected situation of the globalization and advancement in the application of ICT if compared to other parts of the world, as far as the teaching and learning of Islamic studies is concerned. Observations and conclusion were drawn from the findings and finally, recommendations on how to improve on ICT availability, accessibility and utilization in teaching/ learning were suggested.

Keywords: accessibility, availability, college of education, ICT, Islamic studies, learning, North-East, teaching, utilization

Procedia PDF Downloads 355
11703 A Flagship Framework with Feet of Clay: Operational and Structural Challenges of the African Peace and Security Architecture

Authors: Wiriranai Brilliant Masara

Abstract:

The African Peace and Security Architecture is widely celebrated and revered as a paragon of the will to address peace and security challenges in Africa. However, like any other institution, it is embedded with operational and institutional challenges that prevent it from effectively carrying out its mandate and turning goals into achieved results. The article examines the fundamental flaws and weaknesses of the African Peace and Security Architecture by focusing on its institutions, norms, instruments, and its relationship to Africa’s Regional Economic Communities. Therefore, the article reviews the flaws of the five elements of the African Peace and Security Architecture which are the Peace and Security Council, Panel of the Wise, Continental Early Warning System, African Standby Force, and Peace Fund.

Keywords: African Union, African Peace and Security Architecture, peace and security council, continental early warning system, African Standby Force, Panel of the Wise, Peace Fund

Procedia PDF Downloads 132
11702 Competitive Intelligence within the Maritime Security Intelligence

Authors: Dicky R. Munaf, Ayu Bulan Tisna

Abstract:

Competitive intelligence (business intelligence) is the process of observing the external environment which often conducted by many organizations to get the relevant information which will be used to create the organization policy, whereas, security intelligence is related to the function of the officers who have the duties to protect the country and its people from every criminal actions that might harm the national and individual security. Therefore, the intelligence dimension of maritime security is associated with all the intelligence activities including the subject and the object that connected to the maritime issues. The concept of intelligence business regarding the maritime security perspective is the efforts to protect the maritime security using the analysis of economic movements as the basic strategic plan. Clearly, a weak maritime security will cause high operational cost to all the economic activities which uses the sea as its media. Thus, it affects the competitiveness of a country compared to the other countries that are able to maintain the maritime law enforcement and secure their marine territory. So, the intelligence business within the security intelligence is important to conduct as the beginning process of the identification against the opponent strategy that might happen in the present or in the future. Thereby, the scenario of the potential impact of all the illegal maritime activities, as well as the strategy in preventing the opponent maneuver can be made.

Keywords: competitive intelligence, maritime security intelligence, intelligent systems, information technology

Procedia PDF Downloads 496
11701 Design and Implementation of a Cross-Network Security Management System

Authors: Zhiyong Shan, Preethi Santhanam, Vinod Namboodiri, Rajiv Bagai

Abstract:

In recent years, the emerging network worms and attacks have distributive characteristics, which can spread globally in a very short time. Security management crossing networks to co-defense network-wide attacks and improve the efficiency of security administration is urgently needed. We propose a hierarchical distributed network security management system (HD-NSMS), which can integrate security management across multiple networks. First, we describe the system in macrostructure and microstructure; then discuss three key problems when building HD-NSMS: device model, alert mechanism, and emergency response mechanism; lastly, we describe the implementation of HD-NSMS. The paper is valuable for implementing NSMS in that it derives from a practical network security management system (NSMS).

Keywords: network security management, device organization, emergency response, cross-network

Procedia PDF Downloads 161
11700 The Rise of Halal Banking and Financial Products in Post-Soviet Central Asia: A Study of Causative Factors

Authors: Bilal Ahmad Malik

Abstract:

With the fall of Soviet Union in 1991 the whole Central Asian region saw a dramatic rise in Muslim identity, a call back to Islamic legacy. Today, many Central Asian Muslims demand, what Islam has termed legal (Halal) and, avoid what Islam has termed illegal (Haram). The process of Islamic resurgence kicked off very quickly soon after the integration of Central Asian republics with other Muslim geographies through the membership of Organization of Islamic Conference (OIC) and other similar organizations. This interaction proved to be a vital push factor to the already existing indigenous reviving trends and sentiments. As a result, along with many other requirements, Muslim customer demand emerged as navel trend in the market in general and in banking and financial sector in particular. To get this demand fulfilled, the governments of CIS states like Kazakhstan, Uzbekistan, Azerbaijan, Turkmenistan, Kyrgyzstan and Tajikistan introduced Halal banking and financial products in the market. Firstly, the present paper would briefly discuss the core composition of Halal banking and financial products. Then, coming to its major theme, it would try to identify and analyze the causes that lead to the emergence of Islamic banking and finance industry in the Muslim majority Post-Soviet CIS States.

Keywords: causes, Central Asia, interest-free banking, Islamic Revival

Procedia PDF Downloads 396
11699 The Interpretation of World Order by Epistemic Communities in Security Studies

Authors: Gabriel A. Orozco

Abstract:

The purpose of this article is to make an approach to the Security Studies, exposing their theories and concepts to understand the role that have had in the interpretation of the changes and continuities of the world order and their impact on policies or decision-making facing the problems of the 21st century. The aim is to build a bridge between the security studies as a subfield and the meaning that has been given to the world order. The idea of epistemic communities serves as a methodological proposal about the different programs of research in security studies, showing their influence in the realities of States, intergovernmental organizations and transnational forces, moving to implement, perpetuate and project a vision of the world order.

Keywords: security studies, epistemic communities, international, relations

Procedia PDF Downloads 263
11698 Quality Education for the Poor People: Strategy of Islamic Education in the Medium Community

Authors: Naufal Ahmad Rijalul Alam

Abstract:

This article presents a quality of education for the poor people in Indonesia and the offering of strategy to be done. It also investigates the influence of Islamic Education which stands behind the religious values in developing effort of government to respond the problem with using humanities approaches in medium society. The offering strategy resulted in four agenda: 1) building a shared commitment, 2) encouraging the improvement of the quality of public and private schools, 3) encouraging the use of 'the indicator of disaffection' for gifted children, and 4) encouraging the enlargement of vocational training centers and polytechnics. The conclusion is that the quality of education can be increased with these four agenda, although they are not too easy because it deals with other factors such as the economy, politics, and culture which is happening in the country.

Keywords: quality education, poor people, strategy of Islamic education, medium community

Procedia PDF Downloads 470
11697 A Comprehensive Framework to Ensure Data Security in Cloud Computing: Analysis, Solutions, and Approaches

Authors: Loh Fu Quan, Fong Zi Heng, Burra Venkata Durga Kumar

Abstract:

Cloud computing has completely transformed the way many businesses operate. Traditionally, confidential data of a business is stored in computers located within the premise of the business. Therefore, a lot of business capital is put towards maintaining computing resources and hiring IT teams to manage them. The advent of cloud computing changes everything. Instead of purchasing and managing their infrastructure, many businesses have started to shift towards working with the cloud with the help of a cloud service provider (CSP), leading to cost savings. However, it also introduces security risks. This research paper focuses on the security risks that arise during data migration and user authentication in cloud computing. To overcome this problem, this paper provides a comprehensive framework that includes Transport Layer Security (TLS), user authentication, security tokens and multi-level data encryption. This framework aims to prevent authorized access to cloud resources and data leakage, ensuring the confidentiality of sensitive information. This framework can be used by cloud service providers to strengthen the security of their cloud and instil confidence in their users.

Keywords: Cloud computing, Cloud security, Cloud security issues, Cloud security framework

Procedia PDF Downloads 109
11696 Ontology-Based Representation of Islamic Rules to Perform Salah

Authors: Hamza Zafar, Quratulain Rajput

Abstract:

Salah (نماز ) is one of five pillars of Islam and obligatory for every Muslims. However, due to the lack of Islamic knowledge it might be very difficult for a layperson to perform it correctly. This paper presents an ontology based representation of Islamic rules to perform Salah. The Salah ontology has been built under the guidance of domain expert in light of Quran and Hadith. The ontology consists of basic concepts as well as relationship among concepts and constraints on them. The basic concepts include cleanness, body cover, Salah timing and steps to perform Salah. The SWRL rule language has been used to represent rule to determine whether the Salah performed correctly or it should be repeated. Finally, we evaluate the use of the Salat ontology through user’s example queries using SPARQL queries.

Keywords: prayer, salah, ontology, SPARQL queries, reasoning

Procedia PDF Downloads 409
11695 Implications of Private Military Security Companies on Stewardship of the Profession of Arms

Authors: Kevin Krupski

Abstract:

Private Military Security Companies have grown to become a major force contributor to nations in military operations. Scholars have debated the implications of this in relation to control and efficiency related to the privatization of violence, but there has been little discussion on how these companies affect the profession of arms. Specifically, this paper seeks to address how the privatization of violence influences the military’s stewardship, whether private military security companies are capable of stewardship of the military profession, and whether there are aspects of stewardship of the military profession that private military security companies are capable of emulating. This paper reviews literature on stewardship, the relationship of the military to the state, and private military security companies in order to identify overlap between uniformed military services and the private sector. Then, it offers a typology for determining under what conditions an organization would act as a steward. Ultimately, there are insufficient reasons for private military security companies to act as stewards of the profession of arms.

Keywords: stewardship, military profession, civil-military, security

Procedia PDF Downloads 241
11694 ISIS and Social Media

Authors: Neda Jebellie

Abstract:

New information and communication technologies (ICT) not only has revolutionized the world of communication but has also strongly impacted the state of international terrorism. Using the potential of social media, the new wave of terrorism easily can recruit new jihadi members, spread their violent ideology and garner financial support. IS (Islamic State) as the most dangerous terrorist group has already conquered a great deal of social media space and has deployed sophisticated web-based strategies to promote its extremist doctrine. In this respect the vastly popular social media are the perfect tools for IS to establish its virtual Caliphate (e-caliphate) and e-Ommah (e-citizen).Using social media to release violent videos of beheading journalists, burning their hostages alive and mass killing of prisoners are IS strategies to terrorize and subjugate its enemies. Several Twitter and Facebook accounts which are IS affiliations have targeted young generation of Muslims all around the world. In fact IS terrorists use modern resources of communication not only to share information and conduct operations but also justify their violent acts. The strict Wahhabi doctrine of ISIS is based on a fundamental interpretation of Islam in which religious war against non Muslims (Jihad) and killing infidels (Qatal) have been praised and recommended. Via social media IS disseminates its propaganda to inspire sympathizers across the globe. Combating this new wave of terrorism which is exploiting new communication technologies is the most significant challenge for authorities. Before the rise of internet and social media governments had to control only mosques and religious gathering such as Friday sermons(Jamaah Pray) to prevent spreading extremism among Muslims community in their country. ICT and new communication technologies have heighten the challenge of dealing with Islamic radicalism and have amplified its threat .According to the official reports even some of the governments such as UK have created a special force of Facebook warriors to engage in unconventional warfare in digital age. In compare with other terrorist groups, IS has effectively grasped social media potential. Their horrifying released videos on YouTube easily got viral and were re-twitted and shared by thousands of social media users. While some of the social media such as Twitter and Facebook have shut down many accounts alleged to IS but new ones create immediately so only blocking their websites and suspending their accounts cannot solve the problem as terrorists recreate new accounts. To combat cyber terrorism focusing on disseminating counter narrative strategies can be a solution. Creating websites and providing online materials to propagate peaceful and moderate interpretation of Islam can provide a cogent alternative to extremist views.

Keywords: IS-islamic state, cyber terrorism, social media, terrorism, information, communication technologies

Procedia PDF Downloads 483
11693 Islamic Perspective on Autism Spectrum Disorder: Lived Experience of Muslim Families of Children with Autism Spectrum Disorder in a City in the UK

Authors: Hawa Khan

Abstract:

Autism is a complex disorder related to abnormalities in the development of brain structure and neurological function and a new phenomenon which is epidemically on the increase. The Muslim community, with its profound commitment to the all-encompassing Islamic precedence, views all phenomena in the light of religious imperatives. How autism is understood and treated in these communities is key to successful inclusive services. Moreover, parents mentioned their Islamic faith as a coping mechanism for the challenges they faced while caring for their child. This study utilises interpretative phenomenology analysis as a methodology that seeks to interpret the meaning the participants make of their experiences, which extends descriptive analysis. Semi-structured interviews were conducted with 5 family units that included fathers, mothers, grandparents, and siblings. In the preliminary stage, this study found families give high importance of accessible Islamic education for their child and questioning the accountability of the child who might not be able to follow the Islamic way of life entirely or understand the concept of Allah. Moreover, the families expressed their beliefs in traditional and religious treatment as an effective way to treat and cure autism. This poses a major barrier between families seeking support and professionals providing services. Consequentially, it can also result in a low uptake of mainstream services from the Muslim community. Exploring the lived experiences of parents from the Muslim community and how ASD is conceptualised in this community could have implications for improved and effective home, community, and service collaboration.

Keywords: autism spectrum disorder, Islamic education, religious beliefs, mainstream services

Procedia PDF Downloads 109
11692 Unified Theory of the Security Dilemma: Geography, MAD and Democracy

Authors: Arash Heydarian Pashakhanlou

Abstract:

The security dilemma is one of the key concepts in International Relations (IR), and the numerous engagements with it have created a great deal of confusion regarding its essence. That is why this article seeks to dissect the security dilemma and rebuild it from its foundational core. In doing so, the present study highlights that the security dilemma requires interaction among actors that seek to protect themselves from other's capacity for harm under the condition of uncertainty to operate. In this constellation, actors are confronted with the dilemma of motives, power, and action, which they seek to resolve by acquiring information regarding their opponents. The relationship between the parties is shaped by the harm-uncertainty index (HUI) consisting of geographical distance, MAD, and joint democracy that determines the intensity of the security dilemma. These elements define the unified theory of the security dilemma (UTSD) developed here. UTSD challenges the prevailing view that the security dilemma is a unidimensional paradoxical concept, regulated by the offense-defense balance and differentiation that only occurs in anarchic settings with tragic outcomes and is equivalent to the spiral model.

Keywords: security dilemma, revisionism, status quo, anarchy, uncertainty, tragedy, spiral, deterrence

Procedia PDF Downloads 231
11691 Encounter of Muslim World with Western Social Sciences: Reception, Indigenization, Islamization

Authors: Mohammad Hossein Panahi

Abstract:

Modern social sciences developed in Western Europe, and from there, it disseminated to the rest of the world, including Muslim World. Within the hierarchical world social science system that emerged in the 19th and 20th centuries, the West occupied the center, and the Third and Muslim Worlds fell into its periphery. Many social scientists, especially sociologists, in the Third and Muslim World since the 1970s have criticized this worldwide unequal division of scientific labor and have called for the development of independent/indigenous social sciences relevant to their own social conditions. Based on the conceptual framework of the World Social Science System, this paper studied the encounter of Muslim social scientists/sociologists with the Western social sciences. Using inductive thematic content analysis as the method of research, the author analyzed 32 purposefully selected articles from among over 500 collected articles from the 1970s to 2018 and categorized the obtained themes. The findings revealed three main types of encounters: reception, indigenization, and Islamization. ‘Reception’ refers to the encounter of those Muslim social scientists who embrace the positivist approach and believe that Western social sciences are valid and applicable worldwide, including the Muslim World. ‘Indigenization’ refers to the approach of those Muslim social scientists who, along with many critical Third World social scientists, reject the universality of Western social sciences and call for the development of indigenous social sciences. ‘Islamization’ refers to the position of those religious Muslim social scientists who believe that Muslim nations should Islamize social sciences based on the Islamic value and knowledge systems, in order to attain viable social sciences and free themselves from Western domination. Discussing these encounters, their supporters and opponents, the paper concludes that despite various efforts, none of the two alternatives to the Western social sciences have been able to replace it so far.

Keywords: indigenization, Islamization, Muslim world, social sciences, world social science system

Procedia PDF Downloads 133
11690 An Effective Route to Control of the Safety of Accessing and Storing Data in the Cloud-Based Data Base

Authors: Omid Khodabakhshi, Amir Rozdel

Abstract:

The subject of cloud computing security research has allocated a number of challenges and competitions because the data center is comprised of complex private information and are always faced various risks of information disclosure by hacker attacks or internal enemies. Accordingly, the security of virtual machines in the cloud computing infrastructure layer is very important. So far, there are many software solutions to develop security in virtual machines. But using software alone is not enough to solve security problems. The purpose of this article is to examine the challenges and security requirements for accessing and storing data in an insecure cloud environment. In other words, in this article, a structure is proposed for the implementation of highly isolated security-sensitive codes using secure computing hardware in virtual environments. It also allows remote code validation with inputs and outputs. We provide these security features even in situations where the BIOS, the operating system, and even the super-supervisor are infected. To achieve these goals, we will use the hardware support provided by the new Intel and AMD processors, as well as the TPM security chip. In conclusion, the use of these technologies ultimately creates a root of dynamic trust and reduces TCB to security-sensitive codes.

Keywords: code, cloud computing, security, virtual machines

Procedia PDF Downloads 184
11689 Study and Acquisition of the Duality of the Arabic Language

Authors: Oleg Redkin, Olga Bernikova

Abstract:

It is commonly accepted that every language is both pure linguistic phenomenon as well as socially significant communicative system, which exists on the basis of certain society - its collective 'native speaker'. Therefore the language evolution and features besides its own linguistic rules and regulations are also defined by the influence of a number of extra-linguistic factors. The above mentioned statement may be illustrated by the example of the Arabic language which may be characterized by the following peculiarities: - the inner logic of the Arabic language - the 'algebraicity' of its morphological paradigms and grammar rules; - association of the Arabic language with the sacred texts of Islam, its close ties with the pre-Islamic and Islamic cultural heritage - the pre-Islamic poetry and Islamic literature and science; - territorial distribution, which in recent years went far beyond the boundaries of its traditional realm due to the development of new technologies and the spread of mass media, and what is more important, migration processes; - association of the Arabic language with the so called 'Renaissance of Islam'. These peculiarities should be remembered while considering the status of the Modern Standard Arabic (MSA) language or the Classical Arabic (CA) language as well as the Modern Arabic (MA) dialects in synchrony or from the diachronic point of view. Continuity of any system in diachrony on the one hand depends on the level of its ability to adapt itself to changing environment and by its internal ties on the other. Structural durability of language is characterized by its inner logic, hierarchy of paradigms and its grammar rules, as well as continuity of their implementation in acts of everyday communication. Since the Arabic language is both linguistic and social phenomenon the process of the Arabic language acquisition and study should not be focused only on the knowledge about linguistic features or development of communicative skills alone, but must be supplied with the information related to culture, history and religion of peoples of certain region that will expand and enrich competences of the target audience.

Keywords: Arabic, culture, Islam, language

Procedia PDF Downloads 272
11688 Socio Economic Impact and Status of the Islamic Perspective of Veil

Authors: Shagufta Jahangir, Nadeemullah, Yaqoob, Raisa Jahangir

Abstract:

The Persian language word ‘Purdah’ and in Arabic ‘Hajab’ is used for veil. Veil has been used by women for being escaped from men. In one way or the other veil has been continuously used in ancient as well as modern civilizations by women. Developed nations have blamed the use of veil an obstacle in the process of development. Therefore, modern nations have struggled to get rid of the use of veil. They argue that it is a sign of slavery for women and it is an obstacle in the path of development. The modern secular Muslims considered veil as the biggest obstacle for social and economic development. It makes a woman helpless, as being zanjir in her feet. It has become an obstacle in the process of development for women. It is also considered as a tool for segregation among men and women. The so called Muslims of the modern era are trying to introduce changes in religion by imitation the modern nations of the world. In particular ways for Muslim woman use of veil in Islam is must. It is a right provided her by religion. It provides her strength. In the Holy Quran word ‘Hajab’ is used 5 times. Islam is against domination and forceful practice of veil, as a part of teaching of Islam it is being adopted by women as a protection. This article aims at: (1) historical background of veil (2) Its existence in civilizations, (3) Meaning and interpretation of veil in Islamic context, (4) Economic impact of it on women (5) Discussion on its practice in Islamic (eastern) and other (European) circles and conclusions followed by concerted bibliography.

Keywords: veil, economic development, civilizations, obstacle, secular Muslims, segregation

Procedia PDF Downloads 324
11687 Generating a Functional Grammar for Architectural Design from Structural Hierarchy in Combination of Square and Equal Triangle

Authors: Sanaz Ahmadzadeh Siyahrood, Arghavan Ebrahimi, Mohammadjavad Mahdavinejad

Abstract:

Islamic culture was accountable for a plethora of development in astronomy and science in the medieval term, and in geometry likewise. Geometric patterns are reputable in a considerable number of cultures, but in the Islamic culture the patterns have specific features that connect the Islamic faith to mathematics. In Islamic art, three fundamental shapes are generated from the circle shape: triangle, square and hexagon. Originating from their quiddity, each of these geometric shapes has its own specific structure. Even though the geometric patterns were generated from such simple forms as the circle and the square, they can be combined, duplicated, interlaced, and arranged in intricate combinations. So in order to explain geometrical interaction principles between square and equal triangle, in the first definition step, all types of their linear forces individually and in the second step, between them, would be illustrated. In this analysis, some angles will be created from intersection of their directions. All angles are categorized to some groups and the mathematical expressions among them are analyzed. Since the most geometric patterns in Islamic art and architecture are based on the repetition of a single motif, the evaluation results which are obtained from a small portion, is attributable to a large-scale domain while the development of infinitely repeating patterns can represent the unchanging laws. Geometric ornamentation in Islamic art offers the possibility of infinite growth and can accommodate the incorporation of other types of architectural layout as well, so the logic and mathematical relationships which have been obtained from this analysis are applicable in designing some architecture layers and developing the plan design.

Keywords: angle, equal triangle, square, structural hierarchy

Procedia PDF Downloads 189
11686 Traditional Sustainable Architecture Techniques and Its Applications in Contemporary Architecture: Case Studies of the Islamic House in Fatimid Cairo and Sana'a, Cities in Egypt and Yemen

Authors: Ahmed S. Attia

Abstract:

This paper includes a study of modern sustainable architectural techniques and elements that are originally found in vernacular and traditional architecture, particularly in the Arab region. Courtyards, Wind Catchers, and Mashrabiya, for example, are elements that have been developed in contemporary architecture using modern technology to create sustainable architecture designs. An analytical study of the topic will deal with some examples of the Islamic House in Fatimid Cairo city in Egypt, analyzing its elements and their relationship to the environment, in addition to the examples in southern Egypt (Nubba) of sustainable architecture systems, and traditional houses in Sana'a city, Yemen, using earth resources of mud bricks and other construction materials. In conclusion, a comparative study between traditional and contemporary techniques will be conducted to confirm that it is possible to achieve sustainable architecture through the use of low-technology in buildings in Arab regions.

Keywords: Islamic context, cultural environment, natural environment, Islamic house, low-technology, mud brick, vernacular and traditional architecture

Procedia PDF Downloads 285
11685 Geographical Indication Protection for Agricultural Products: Contribution for Achieving Food Security in Indonesia

Authors: Mas Rahmah

Abstract:

Indonesia is the most populous Southeast Asian nations, as Indonesia`s population is constantly growing, food security has become a crucial trending issue. Although Indonesia has more than enough natural resources and agricultural products to ensure food security for all, Indonesia is still facing the problem of food security because of adverse weather conditions, increasing population, political instability, economic factors (unemployment, rising food prices), and the dependent system of agriculture. This paper will analyze that Geographical Indication (GI) can aid in transforming Indonesian agricultural-dependent system by tapping the unique product attributes of their quality products since Indonesia has a lot of agricultural products with unique quality and special characteristic associated with geographical factors such as Toraja Coffee, Alor Vanili, Banda Nutmeg, Java Tea, Deli Tobacco, Cianjur Rise etc. This paper argues that the reputation and agricultural products and their intrinsic quality should be protected under GI because GI will provide benefit supporting the food security program. Therefore, this paper will expose the benefit of GI protection such as increasing productivity, improving the exports of GI products, creating employment, adding economic value to products, and increasing the diversity of supply of natural and unique quality products, etc. that can contribute to food security. The analysis will finally conclude that the scenario of promoting GI may indirectly contribute to food security through adding value by incorporating territory specific cultural, environmental and social qualities into production, processing and developing of unique local, niche and special agricultural products.

Keywords: geographical indication, food security, agricultural product, Indonesia

Procedia PDF Downloads 363
11684 Azan in Funeral: A Local Islamic Tradition in Indonesia

Authors: Muhajirin Gafar

Abstract:

In Indonesia, Azan not only used as a reminder or call to prayer, its also used at the birth of a child, as the direction of the Prophet Muhammad PBUH, but also become part of a 'tradition’ to echoed in obsequies or the funeral, even there is a tradition in which the Azan echoed in the four corners of the grave. This tradition has become a necessity and has become part of the local Islamic culture preserved from time to time, although it certainly can not be known legal basis underlying the tradition. Based on the phenomenon, this paper proposed three research objective, namely: 1) To described the history about tradition Azan in funeral, 2) To analyze some of the postulates supporting the occurrence of the tradition, 3) To find out the postulates/ hadist which has been arranged in accordance with the instructions of the Prophet Muhammad PBUH about the rules of funeral. To reconstruct the history of the emergence of events azan tradition in the funeral this research used historical method, while the second and third objective used library research. Data and facts systematically processed and analyzed so as to be able to answer the questions of what, who, where, when, how, and why an event occurred. Finally, this research used Takhrij al-hadith a method to look at the validity of the arguments of the hadith. Result found that tradition of Azan in funeral has been around since the presence of Islam in Indonesia. This tradition continued and became a local Islamic culture which spread almost all over Indonesia, even considered part of religious guidance. While there are no decisive postulates which can be accounted for this tradition, except ‘qiyas’ postulates which are not appropriate. Most Indonesian Muslim put Azan as the first priority to do in funeral while oblivious other compulsory things that must be recited when lay down the corpse. They tend to assume that this tradition is a part of Islamic local culture.

Keywords: Azan, tradition, qiyas, Islamic local, hadist

Procedia PDF Downloads 504
11683 Cybersecurity and Governance for Humanitarian Work: An Approach for Addressing Security Risks

Authors: Rossouw De Bruin, Sebastiaan H. Von Solms

Abstract:

The state of national security is an evolving concern. Companies, organizations, governments, states and individuals are aware of the security of their information and their assets however, they may not always be aware of the risks present. These risks are not only limited to non-existence of security procedures. Existing security can be severely flawed, especially if there is non-conformance towards policies, practices and procedures. When looking at humanitarian actions, we can easily identify these flaws. Unfortunately, humanitarian aid has to compete with factors from within the states, countries and continents they are working in. Furthermore, as technology improves, so does our connectivity to the internet and the way in which we use the internet. However, there are times when security is overlooked and humanitarian agencies are some of the agencies that do not always take security into consideration. The purpose of this paper will be to introduce the importance of cybersecurity and cybersecurity governance with respect to humanitarian work. We will also introduce and briefly discuss a model that can be used by humanitarian agencies to assess, manage and maintain their cybersecurity efforts.

Keywords: humanities, cybersecurity, cybersecurity governance, maturity, cybersecurity maturity, maturity model

Procedia PDF Downloads 258