Search results for: national security exception
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7116

Search results for: national security exception

6696 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 99
6695 A Study on Household Food Security and Dietary Diversity in Urban Centers of Thrissur

Authors: Sandra Thomas

Abstract:

This study tries to analyse the level of food security and dietary diversity among households of different socio-economic classes in the urban centers of Thrissur. The study revealed that there is no much difference in purchasing patterns of food articles among the socio-economic classes indicating a very high level of both physical and economic accessibility of food. On analysing the dietary diversity of the households none of the households scored below five and fifty-three per cent of the households scored eleven or twelve indicating higher diversity in diet. It was also found that income and education are the two important factors that influence the level of household food security.

Keywords: food security, dietary diversity, household level, socio-economic classes

Procedia PDF Downloads 125
6694 Strategies for Achieving Application of Science in National Development

Authors: Orisakwe Chimuanya Favour Israel

Abstract:

In a world filled with the products of scientific inquiry, scientific literacy has become a necessity for everyone because it is indispensable to achieving technological development of any nation. Everyone needs to use scientific information to make choices that arise every day. Everyone needs to be able to engage intelligently in public discourse and debate about important issues that involves science and technology. And everyone deserves to share in the excitement and personal fulfillment that can come from -understanding and learning about the natural world. No doubt that industrialized countries have, through their control of science and technology education, developed the potential to increase production, and to improve the standard of living of their people. The main thrust of this paper therefore, is to present an overview of science education, strategies for achieving application of science in national development, such as teaching science with the right spirit of inquiry. Also, the paper discussed three research models that can help in national development and suggests the best out of the three which is more realistic for a developing country like ours (Nigeria) to follow for a sustainable national development and finally suggests some key ways of solving problems of development.

Keywords: scientific inquiry, scientific literacy, strategies, sustainable national development

Procedia PDF Downloads 372
6693 Revisiting Ecotourism Development Strategy of Cuc Phuong National Park in Vietnam: Considering Residents’ Perception and Attitudes

Authors: Bui Duc Sinh

Abstract:

Ecotourism in national parks seemed to be one of the options in the conservation of the natural resources and to improve the living condition of local communities. However, ecotourism development will be useless if it lacks the perception and support of local communities and appropriate ecotourism strategies. The aims of this study were to measure residents’ perception and satisfaction towards ecotourism impacts and their attitudes for ecotourism development in Cuc Phuong National Park; to assess the current ecotourism strategies based on ecotourism criteria and then to provide recommendations on ecotourism development strategies. The primary data were collected through personal observations, in-depth interviews with residents and national park staffs, and from surveys on households in all of the five communes in the Cuc Phuong National Park. The results depicted that local communities were aware of ecotourism impacts and had positive attitudes toward ecotourism development, and were satisfied of ecotourism development. However, higher perception rate was found on specific groups such as the young, the high income and educated, and those with jobs related to ecotourism. The study revealed the issues of concerns about the current ecotourism development strategies in Cuc Phuong National Park. The major hindrances for ecotourism development were lack of local participation and unattractive ecotourism services. It was also suggested that Cuc Phuong National Park should use ecotourism criteria to implement ecotourism activities sustainably and to harmonize the sharing of benefits amongst the stakeholders. The approaches proposed were to: create local employment through reengineering, improve the ecotourism quality, appropriate tourism benefits to the stakeholders, and carry out education and training programs. Furthermore, the results of the study helped tour operators and tourism promoters aware the real concerns, issues on current ecotourism activities in Cuc Phuong National Park.

Keywords: ecotourism, ecotourism impact, local community, national park

Procedia PDF Downloads 339
6692 The Regulation of Alternative Dispute Resolution Institutions in Consumer Redress and Enforcement: A South African Perspective

Authors: Jacolien Barnard, Corlia Van Heerden

Abstract:

Effective and accessible consensual dispute resolution and in particular alternative dispute resolution, are central to consumer protection legislation. In this regard, the Consumer Protection Act 68 of 2008 (CPA) of South Africa is no exception. Due to the nature of consumer disputes, alternative dispute resolution (in theory) is an effective vehicle for the adjudication of disputes in a timely manner avoiding overburdening of the courts. The CPA sets down as one of its core purposes the provision of ‘an accessible, consistent, harmonized, effective and efficient system of redress for consumers’ (section 3(1)(h) of the CPA). Section 69 of the Act provides for the enforcement of consumer rights and provides for the National Consumer Commission to be the Central Authority which streamlines, adjudicates and channels disputes to the appropriate forums which include Alternative Dispute Resolution Agents (ADR-agents). The purpose of this paper is to analyze the regulation of these enforcement and redress mechanisms with particular focus on the Central Authority as well as the ADR-agents and their crucial role in successful and efficient adjudication of disputes in South Africa. The South African position will be discussed comparatively with the European Union (EU) position. In this regard, the European Union (EU) Directive on Alternative Dispute Resolution for Consumer Disputes (2013/11/EU) will be discussed (The ADR Directive). The aim of the ADR Directive is to solve contractual disputes between consumers and traders (suppliers or businesses) regardless of whether the agreement was concluded offline or online or whether or not the trader is situated in another member state (Recitals 4-6). The ADR Directive provides for a set of quality requirements that an ADR body or entity tasked with resolving consumer disputes should adhere to in member states which include regulatory mechanisms for control. Transparency, effectiveness, fairness, liberty and legality are all requirements for a successful ADR body and discussed within this chapter III of the Directive. Chapters III and IV govern the importance of information and co-operation. This includes information between ADR bodies and the European Commission (EC) but also between ADR bodies or entities and national authorities enforcing legal acts on consumer protection and traders. (In South Africa the National Consumer Tribunal, Provincial Consumer Protectors and Industry ombuds come to mind). All of which have a responsibility to keep consumers informed. Ultimately the papers aims to provide recommendations as to the successfulness of the current South African position in light of the comparative position in Europe and the highlight the importance of proper regulation of these redress and enforcement institutions.

Keywords: alternative dispute resolution, consumer protection law, enforcement, redress

Procedia PDF Downloads 233
6691 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 301
6690 Audit Management of Constipation According to National Institute for Health and Care Excellence Guideline

Authors: Areej Makeineldein Mustafa

Abstract:

The study evaluates the management processes and healthcare provider compliance with the National Institute for Health and Care Excellence recommendations for constipation management. We aimed to evaluate the adherence to National Institute for Health and Care Excellence guidelines in the management of constipation during the period from February to June 2023. We collected data from a random sample ( 51 patients) over 4 months with inclusion criteria for patients above 60 who were just admitted to the care of the elderly department during this period. Patient age, sex, medical records for constipation, acute or chronic constipation, or opioid-induced constipation, and treatment options were used to identify constipation and the type of treatment given. Our findings indicate that there is a gap between practice and National Institute for Health and Care Excellence guideline steps; only 3 patient was given medications according to National Institute for Health and Care Excellence guidelines in order of combination or steps of escalation. Addressing these gaps could potentially lead to enhanced patient outcomes and an overall improvement in the quality of care provided to individuals suffering from constipation.

Keywords: constipation, elderly, management, patient

Procedia PDF Downloads 89
6689 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 76
6688 Preliminary Study of Medicinal Plants in Phu Langka National Park, Nakhon Phanom Province, Thailand

Authors: W. Chatan, W. Promprom

Abstract:

Phu Langka National Park is located in Nakhon Phanom Province, the Northeast of Thailand. It contains about 50 km2 of one mountain and three types of forest including deciduous dipterocarp, mixed deciduous and dry evergreen forests. It was interesting area because of that there were some local ethnic groups living around the national park and most people use plants in this area for their life. The objective of this research is to preliminary survey of the use of medicinal plants from this area by local ethnic groups living around the national park. Colour photographs of each species were prepared. In addition, ecology, distribution in the study area, utilization and vernacular names were provided. The result showed that sixteen species of medicinal plant species were found and most plants were used for digestive system and wound. The voucher specimens were deposited in the Forest Herbarium, Department of National Parks, Wildlife and Plant Conservation (BKF), Thailand.

Keywords: diversity, ethnobotany, ethnophamacology, taxonomy, utilization

Procedia PDF Downloads 196
6687 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 291
6686 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 300
6685 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 430
6684 Ensuring a Sustainable National Development Through Entrepreneurship Education in Nigerian Tertiary Institutions

Authors: Adeyemi Oluremi Olubusuyi

Abstract:

In most of the developed countries, entrepreneurship education has been and will continue to be, a great economic stimulator. Entrepreneurship advantages cannot be overemphasized in any society that desires sustainable national development because it creates new technologies, production and services; which in turn encourage improved productivity and rapid economic growth. Economic growth will invariably have positive influences on the health, thereby leading to sound body systems, increase in the lifespan, improvement in social status and standard condition of living. Promoting an effective application of entrepreneurship education principle will, in no small measure, propel Nigeria to the much desired enviable national development level which the country is currently yearning for. The focus of this paper is to discuss entrepreneurship education with reference to its concept, nature, objectives and development approaches.

Keywords: entreprenuership, entrepreneurship education, national development, tertiary institutions

Procedia PDF Downloads 114
6683 A History of Taiwan’s Secret Nuclear Program

Authors: Hsiao-ting Lin

Abstract:

This paper analyzes the history of Taiwan’s secret program to develop its nuclear weapons during the Cold War. In July 1971, US President Richard Nixon shocked the world when he announced that his national security adviser Henry Kissinger had made a secret trip to China and that he himself had accepted an invitation to travel to Beijing. This huge breakthrough in the US-PRC relationship was followed by Taipei’s loss of political legitimacy and international credibility as a result of its UN debacle in the fall that year. Confronted with the Nixon White House’s opening to the PRC, leaders in Taiwan felt being betrayed and abandoned, and they were obliged to take countermeasures for the sake of national interest and regime survival. Taipei’s endeavor to create an effective nuclear program, including the possible development of nuclear weapons capabilities, fully demonstrates the government’s resolution to pursue its own national policy, even if such a policy was guaranteed to undermine its relations with the United States. With hindsight, Taiwan’s attempt to develop its own nuclear weapons did not succeed in sabotaging the warming of US-PRC relations. Worse, it was forced to come to a full stop when, in early 1988, the US government pressured Taipei to close related facilities and programs on the island. However, Taiwan’s abortive attempt to develop its nuclear capability did influence Washington’s and Beijing’s handling of their new relationship. There did develop recognition of a common American and PRC interest in avoiding a nuclearized Taiwan. From this perspective, Beijing’s interests would best be served by allowing the island to remain under loose and relatively benign American influence. As for the top leaders on Taiwan, such a policy choice demonstrated how they perceived the shifting dynamics of international politics in the 1960s and 1970s and how they struggled to break free and pursue their own independent national policy within the rigid framework of the US-Taiwan alliance during the Cold War.

Keywords: taiwan, richard nixon, nuclear program, chiang Kai-shek, chiang ching-kuo

Procedia PDF Downloads 131
6682 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 97
6681 Privatization of Pakistan Gas Sector: Role of Regulator

Authors: Lala Rukh, Muhammad Abbas Choudhary, Saddam Akber Abbasi

Abstract:

In Pakistan, the privatization of major sector of the national economy i.e. power, telecom, and gas is very strongly advocated since 80s. With varying degree of progress made in these sectors, it has been the government’s approach that the privatization accelerates the sectorial growth, increases operational efficiency and attracts the foreign investment and is of special significance for developing economies. The gas sector was not an exception and the privatization in this sector has moved through various stages during this time within the realms of socio-political agenda. This paper presents the overview of the gas sector in the country. The Oil and Gas Regulatory Authority (OGRA) Ordinance and privatization commission policy position as depicted in the press briefings provides philosophical foundations to the privatization and sectorial restructuring in this paper. The role of the major players from privatization perspective is discussed with special reference to the importance of natural gas sector. The case study further discusses the economic regulations that are being adopted by utility regulators in Pakistan and elsewhere in the world and some issues that the Regulatory Authority will be concerned are outlined. Major operators in the gas sector including Oil & Gas Development Corporation (OGDC), Sui Northern Gas Pipelines Limited (SNGPL), Sui Southern Gas Pipelines Limited (SSGPL) is also presented.

Keywords: privatization, economic regulation, OGDCL, SSGCL, SNGPL

Procedia PDF Downloads 437
6680 Eco-Friendly Cleansers Initiation for Eco-Campsite Development in Khao Yai National Park, Thailand

Authors: Tatsanawalai Utarasakul

Abstract:

Environmental impact has occurred at Khao Yai National Park, especially the water pollution by tourist activities as a result of 800,000 tourists visiting annually. To develop an eco-campsite, eco-friendly cleansers were implemented in Lam Ta Khlong and Pha Kluay Mai Campsites for tourists and restaurants. The results indicated the positive effects of environmentally friendly cleansers on water quality in Lam Ta Khlong River and can be implemented in other protected areas to decrease chemical contamination in ecosystems.

Keywords: sustainable tourism management, eco-campsite, Khao Yai National Park, ecology

Procedia PDF Downloads 395
6679 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 569
6678 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 476
6677 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 76
6676 Criminal Law and Internet of Things: Challenges and Threats

Authors: Celina Nowak

Abstract:

The development of information and communication technologies (ICT) and a consequent growth of cyberspace have become a reality of modern societies. The newest addition to this complex structure has been Internet of Things which is due to the appearance of smart devices. IoT creates a new dimension of the network, as the communication is no longer the domain of just humans, but has also become possible between devices themselves. The possibility of communication between devices, devoid of human intervention and real-time supervision, generated new societal and legal challenges. Some of them may and certainly will eventually be connected to criminal law. Legislators both on national and international level have been struggling to cope with this technologically evolving environment in order to address new threats created by the ICT. There are legal instruments on cybercrime, however imperfect and not of universal scope, sometimes referring to specific types of prohibited behaviors undertaken by criminals, such as money laundering, sex offences. However, the criminal law seems largely not prepared to the challenges which may arise because of the development of IoT. This is largely due to the fact that criminal law, both on national and international level, is still based on the concept of perpetration of an offence by a human being. This is a traditional approach, historically and factually justified. Over time, some legal systems have developed or accepted the possibility of commission of an offence by a corporation, a legal person. This is in fact a legal fiction, as a legal person cannot commit an offence as such, it needs humans to actually behave in a certain way on its behalf. Yet, the legislators have come to understand that corporations have their own interests and may benefit from crime – and therefore need to be penalized. This realization however has not been welcome by all states and still give rise to doubts of ontological and theoretical nature in many legal systems. For this reason, in many legislations the liability of legal persons for commission of an offence has not been recognized as criminal responsibility. With the technological progress and the growing use of IoT the discussions referring to criminal responsibility of corporations seem rather inadequate. The world is now facing new challenges and new threats related to the ‘smart’ things. They will have to be eventually addressed by legislators if they want to, as they should, to keep up with the pace of technological and societal evolution. This will however require a reevaluation and possibly restructuring of the most fundamental notions of modern criminal law, such as perpetration, guilt, participation in crime. It remains unclear at this point what norms and legal concepts will be and may be established. The main goal of the research is to point out to the challenges ahead of the national and international legislators in the said context and to attempt to formulate some indications as to the directions of changes, having in mind serious threats related to privacy and security related to the use of IoT.

Keywords: criminal law, internet of things, privacy, security threats

Procedia PDF Downloads 162
6675 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 392
6674 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 521
6673 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 335
6672 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 346
6671 Digital Image Steganography with Multilayer Security

Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal

Abstract:

In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.

Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix

Procedia PDF Downloads 337
6670 Make Populism Great Again: Identity Crisis in Western World with a Narrative Analysis of Donald Trump's Presidential Campaign Announcement Speech

Authors: Soumi Banerjee

Abstract:

In this research paper we will go deep into understanding Benedict Anderson’s definition of the nation as an imagined community and we will analyze why and how national identities were created through long and complex processes, and how there can exist strong emotional bonds between people within an imagined community, given the fact that these people have never known each other personally, but will still feel some form of imagined unity. Such identity construction on the part of an individual or within societies are always in some sense in a state of flux as imagined communities are ever changing, which provides us with the ontological foundation for reaching on this paper. This sort of identity crisis among individuals living in the Western world, who are in search for psychological comfort and security, illustrates a possible need for spatially dislocated, ontologically insecure and vulnerable individuals to have a secure identity. To create such an identity there has to be something to build upon, which could be achieved through what may be termed as ‘homesteading’. This could in short, and in my interpretation of Kinnvall and Nesbitt’s concept, be described as a search for security that involves a search for ‘home’, where home acts as a secure place, which one can build an identity around. The next half of the paper will then look into how populism and identity have played an increasingly important role in the political elections in the so-called western democracies of the world, using the U.S. as an example. Notions of ‘us and them’, the people and the elites will be looked into and analyzed through a social constructivist theoretical lens. Here we will analyze how such narratives about identity and the nation state affects people, their personality development and identity in different ways by studying the U.S. President Donald Trump’s speeches and analyze if and how he used different identity creating narratives for gaining political and popular support. The reason to choose narrative analysis as a method in this research paper is to use the narratives as a device to understand how the perceived notions of 'us and them' can initiate huge identity crisis with a community or a nation-state. This is a relevant subject as results and developments such as rising populist rightwing movements are being felt in a number of European states, with the so-called Brexit vote in the U.K. and the election of Donald Trump as president are two of the prime examples. This paper will then attempt to argue that these mechanisms are strengthened and gaining significance in situations when humans in an economic, social or ontologically vulnerable position, imagined or otherwise, in a general and broad meaning perceive themselves to be under pressure, and a sense of insecurity is rising. These insecurities and sense of being under threat have been on the rise in many of the Western states that are otherwise usually perceived to be some of the safest, democratically stable and prosperous states in the world, which makes it of interest to study what has changed, and help provide some part of the explanation as to how creating a ‘them’ in the discourse of national identity can cause massive security crisis.

Keywords: identity crisis, migration, ontological security(in), nation-states

Procedia PDF Downloads 255
6669 A Summary of the Research on the Driving Mechanism of Space Expansion in China's National New District

Authors: Qin Xia

Abstract:

’National New District’ as a regional overall promotion of strategic thinking has become increasingly mature, but its spatial expansion is still chaotic and disorderly, so it is urgent to summarize the complex and unique driving mechanism contained in its spatial expansion to formulate sustainable urban expansion plan. Under the understanding of the general laws of the driving mechanism of China's space expansion, it is found that the existing research on the driving mechanism of the space expansion of national new districts is insufficient. The research area focuses on the research of the driving mechanism of the space expansion of a single new area. In terms of research methods, qualitative description is the main focus. In terms of research content, it is limited to the expansion speed, intensity, and area of the new district itself and does not involve the expansion and utilization efficiency of space and the spillover efficiency to surrounding cities. The specific connotations of social, economic, political, and geographical categories are not thoroughly explored. It is often a general explanation that a certain factor has promoted it. The logic is not rigorous and convincing, and the description is relatively static, with different time and space. There is less literature on scale interaction. Through the reflection on the key and difficult points of the drive mechanism of the space expansion of the national new area, it is clear that the existing research on the drive mechanism of the space expansion of the national new area should be continued to drive the sustainable expansion of space.

Keywords: national new district, space expansion, driving mechanism, existing research

Procedia PDF Downloads 169
6668 Fundamentals of Islamic Resistive Economy and Practical Solutions: A Study from Perspective of Infallible Imams

Authors: Abolfazl Alishahi Ghalehjoughi

Abstract:

Economic independence and security of Islamic world is the top priority. Economic dependence of Muslim countries on economies of non-Muslim imperialist countries results in political and cultural dependencies, and such dependencies will jeopardize the noble Islamic culture; because the will of a dependent country to implements the noble teachings of Islam would be faced with challenges. Solidarity of Muslim countries to achieve a uniformed and resistive economy-based Islamic economic system can improve ability of Islamic world to resist and counteract economic shocks produced by imperialists. Islam is the most complete religion in every aspect, from ideological and epistemological, to legislative and ethical, and economic aspect is no exception. Islam provides solutions to develop a flourishing economy for the whole Islamic nation. Knowledge of such solutions and identification of mechanisms to operationalise them in Islamic communities can highly contributed to establishment of the superior Islamic economy. Encourage of hard working, achievement and knowledge production, correction of consumption patterns, optimized management of import and export, avoiding Islamically prohibited income, economic discipline and equity, and promotion of interest free loan and the like are among the most important solutions to realize such resistive economy.

Keywords: resistive economy, cultural independence, Islam, solidarity

Procedia PDF Downloads 394
6667 Privatising Higher Education: Imparting Quality in Academics

Authors: Manish Khanna

Abstract:

Higher education seeks to preserve, transmit and advance knowledge. It is one of the most important instruments of change and progress. The observation of Kothari Commission (1964-66) is true even today; The destiny of India is now being shaped in her classrooms. This, we believe, is no more rhetoric. In the world based on science and technology it is education that determines the level of prosperity, welfare, and security of the people. On the quality and number of persons coming out of our schools and colleges will depend our success in the great enterprise of national reconstruction.

Keywords: higher education, quality in academics, Kothari commission, privatising higher education

Procedia PDF Downloads 481