Search results for: host security threats
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3956

Search results for: host security threats

3506 Evidence-Based Policy Making to Improve Human Security in Pakistan

Authors: Ayesha Akbar

Abstract:

Pakistan is moving from a security state to a welfare state despite several security challenges both internal and external. Human security signifies a varied approach in different regions depending upon the leadership and policy priorities. The link between human development and economic growth is not automatic. It has to be created consciously by forward-looking policies and strategies by national governments. There are seven components or categories of human security these include: Economic Security, Personal Security, Health Security, Environmental Security, Food Security, Community Security and Political Security. The increasing interest of the international community to clearly understand the dimensions of human security provided the grounds to Pakistani scholars as well to ponder on the issue and delineate lines of human security. A great deal of work has been either done or in process to evaluate human security indicators in Pakistan. Notwithstanding, after having been done a great deal of work the human security in Pakistan is not satisfactory. A range of deteriorating indicators of human development that lies under the domain of human security leaves certain inquiries to be answered. What are the dimensions of human security in Pakistan? And how are they being dealt from the perspective of policy and institution in terms of its operationalization in Pakistan? Is the human security discourse reflects evidence-based policy changes. The methodology is broadly based on qualitative methods that include interviews, content analysis of policy documents. Pakistan is among the most populous countries in the world and faces high vulnerability to climate change. Literacy rate has gone down with the surge of youth bulge to accommodate in the job market. Increasing population is creating food problems as the resources have not been able to compete with the raising demands of food and other social amenities of life. Majority of the people are facing acute poverty. Health outcomes are also not satisfactory with the high infant and maternal mortality rate. Pakistan is on the verge of facing water crisis as the water resources are depleting so fast with the high demand in agriculture and energy sector. Pakistan is striving hard to deal with the declining state of human security but the dilemma is lack of resources that hinders in meeting up with the emerging demands. The government requires to bring about more change with scaling-up economic growth avenues with enhancing the capacity of human resources. A modern performance drive culture with the integration of technology is required to deliver efficient and effective service delivery. On an already fast track process of reforms; e-governance and evidence based policy mechanism is being instilled in the government process for better governance and evidence based decisions.

Keywords: governance, human development index, human security, Pakistan, policy

Procedia PDF Downloads 227
3505 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia

Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan

Abstract:

This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.

Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia

Procedia PDF Downloads 363
3504 Distinct Antiviral Pathway for ZFP36-Like Family Members Against Flavivirus Infection

Authors: Ren-Jye Lin, Li-Hsiung Lin, Bing-Cheng Liu, Ching-Len Liao

Abstract:

The human zinc finger protein 36-like protein family, containing zinc finger protein 36-like 1 (ZFP36L1) and zinc finger protein 36-like 2 (ZFP36L2), belongs to CCCH-type zinc-finger protein identified as an RNA-binding protein that participates in controlling posttranscriptional regulation via RNA decay pathways. Recently, we demonstrated that human ZFP36L1 showed potent antiviral activity against flavivirus Infection by both 5´-3´ XRN1 and 3´-5´RNA-exosome RNA decay pathways (Journal of Virology 2022 Jan 12;96(1): e0166521). However, another zinc finger protein 36-like protein member, ZFP36L2, in the host defense response against flaviviruses has yet to be addressed. Here, we also demonstrate that ZFP36L2 functions as a host innate defender against flaviviruses, including Japanese encephalitis virus (JEV) and dengue virus (DENV). Overexpression of ZFP36L2 reduced JEV and DENV infection, and ZFP36L2 knockdown significantly promoted viral replication. Distinct from the antiviral mechanism of ZFP36L1, ZFP36L2 inhibits flavivirus infection by only a 5´-3´ XRN1-mediated RNA decay pathway but not the 3´-5´RNA-exosome RNA decay pathway. Human ZFP36L1 and ZFP36L2 can restrict flavivirus replication by directly binding and destabilizing viral RNA. Thus, for the first time, human zinc finger protein 36-like family members, ZFP36L1 and ZFP36L2, are identified as host antiviral factors that can bind and degrade flavivirus viral RNA by diverse antiviral mechanisms.

Keywords: ZFP36L1, ZFP36L2, 5'-3' exonuclease XRN1, antiviral mechansim

Procedia PDF Downloads 50
3503 Scenarios of Societal Security and Business Continuity Cycles

Authors: Jiří F. Urbánek, Jiří Barta

Abstract:

Societal security, continuity scenarios, and methodological cycling approach understands in this article. Namely, societal security organizational challenges ask implementation of international standards BS 25999-2 and global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity, and interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization systems, resulting to a crisis scene or even to a battle theater. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management, and overmastering in real environments.

Keywords: business continuity, societal security, crisis scenarios cycles, interoperability

Procedia PDF Downloads 361
3502 Distribution of Spotted Fever Group in Ixodid Ticks, Domestic Cattle and Buffalos of Faisalabad District, Punjab, Pakistan

Authors: Muhammad Sohail Sajid, Qurat-ul-Ain, Zafar Iqbal, Muhammad Nisar Khan, Asma Kausar, Adil Ejaz

Abstract:

Rickettsiosis, caused by a Spotted Fever Group Rickettsiae (SFGR), is considered as an emerging infectious disease from public and veterinary perspective. The present study reports distribution of SFGR in the host (buffalo and cattle) and vector (ticks) population determined through gene specific amplification through PCR targeting outer membrane protein (ompA). Tick and blood samples were collected using standard protocols through convenient sampling from district Faisalabad. Ticks were dissected to extract salivary glands (SG). Blood and tick SG pools were subjected to DNA extraction and amplification of ompA using PCR. Overall prevalence of SFGR was reported as 21.5% and 33.6 % from blood and ticks, respectively. Hyalomma anatolicum was more prevalent tick associated with SFGR as compared to Rhipicephalus sp. Higher prevalence of SFGR was reported in cattle (25%) population as compared to that of buffalo (17.07%). On seasonal basis, high SFGR prevalence was recorded during spring season (48.1%, 26.32%, 17.76%) as compared to winter (27.9%, 21.43%, 15.38%) in vector and host (cattle and buffalo respectively) population. Sequencing analysis indicated that rickettsial endo-symbionts were associated with ticks of the study area. These results provided baseline information about the prevalence of SFGR in vector and host population.

Keywords: Rickettsia, livestock, polymerase chain reaction, sequencing, ticks, vectors

Procedia PDF Downloads 242
3501 The Impact of Water Reservoirs on Biodiversity and Food Security and the Creation of Adaptation Mechanisms

Authors: Inom S. Normatov, Abulqosim Muminov, Parviz I. Normatov

Abstract:

Problems of food security and the preservation of reserved zones in the region of Central Asia under the conditions of the climate change induced by the placement and construction of large reservoirs are considered. The criteria for the optimum placement and construction of reservoirs that entail the minimum impact on the environment are established. The need for the accounting of climatic parameters is shown by the calculation of the water quantity required for the irrigation of agricultural lands.

Keywords: adaptation, biodiversity, food security, water reservoir, risk

Procedia PDF Downloads 230
3500 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978

Authors: Naseer Ahmad Bhat

Abstract:

Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.

Keywords: detentions, Kashmir, public safety act, liberty, security

Procedia PDF Downloads 201
3499 Case Study of Migrants, Cultures and Environmental Crisis

Authors: Christina Y. P. Ting

Abstract:

Migration is a global phenomenon with movements of migrants from developed and developing countries to the host societies. Migrants have changed the host countries’ demography – its population structure and also its ethnic cultural diversity. Acculturation of migrants in terms of their adoption of the host culture is seen as important to ensure that they ‘fit into’ their adopted country so as to participate in everyday public life. However, this research found that the increase of the China-born migrants’ post-migration consumption level had impact on Australia’s environment reflected not only because of their adoption of elements of the host culture, but also retention of aspects of Chinese culture – indicating that the influence of bi-culturalism was in operation. This research, which was based on the face-to-face interview with 61 China-born migrants in the suburb of Box Hill, Melbourne, investigated the pattern of change in the migrants’ consumption upon their settlement in Australia. Using an ecological footprint calculator, their post-migration footprints were found to be larger than pre-migration footprint. The uniquely-derived CALD (Culturally and Linguistically Diverse) Index was used to measure individuals’ strength of connectedness to ethnic culture. Multi-variant analysis was carried out to understand which independent factors that influence consumption best explain the change in footprint (which is the difference between pre-and post-migration footprints, as a dependent factor). These independent factors ranged from socio-economic and demographics to the cultural context, that is, the CALD Index and indicators of acculturation. The major findings from the analysis were: Chinese culture (as measured by the CALD Index) and indicators of acculturation such as length of residency and using English in communications besides the traditional factors such as age, income and education level made significant contributions to the large increase in the China-born group’s post-migration consumption level. This paper as part of a larger study found that younger migrants’ large change in their footprint were related to high income and low level of education. This group of migrants also practiced bi-cultural consumption in retaining ethnic culture and adopting the host culture. These findings have importantly highlighted that for a host society to tackle environmental crisis, governments need not only to understand the relationship between age and consumption behaviour, but also to understand and embrace the migrants’ ethnic cultures, which may act as bridges and/or fences in relationships. In conclusion, for governments to deal with national issues such as environmental crisis within a cultural diverse population, it necessitates an understanding of age and aspects of ethnic culture that may act as bridges and fences. This understanding can aid in putting in place policies that enable the co-existence of a hybrid of the ethnic and host cultures in order to create and maintain a harmonious and secured living environment for population groups.

Keywords: bicultural consumer, CALD index, consumption, ethnic culture, migrants

Procedia PDF Downloads 217
3498 The Role of Multinational Enterprises' Investments in Emerging Country's Economic Development, Case of Georgia

Authors: V. Charaia

Abstract:

From the strategic point of view, not all Foreign Direct Investments (FDIs) are always positively benefiting the host economy, i.e. not all Multinational Enterprises (MNEs) are promoting local/host economies. FDI could have different impact on different sectors of the economy, based not only on annual investment amount, but MNE motivations and peculiarities of the host economy in particular. FDI analysis based only on its amount can lead to incorrect decisions, it is much more important to understand the essence of investment. Consequently, our research is oriented on MNE’s motivations, answering which sectors are most popular among international investors and why, what motivated them to invest into one or another business. Georgian economy for the last period of time is attracting more and more efficiency seeking investments, which could be translated as - concentrating production in a limited number of locations to supply various markets, while benefiting local economy with: new technologies, employment, exports diversification, increased income for the local economy and so on. Foreign investors and MNEs in particular are no longer and not so much interested in the resource seeking investments, which was the case for Georgia in the last decade of XX century. Despite the fact of huge progress for the Georgian economy, still there is a room for foreign investors to make a local market oriented investments. The local market is still rich in imported products, which should be replaced by local ones. And the last but not the least important issue is that approximately 30% of all FDIs in Georgia according to this research are “efficiency seeking” investments, which is an enormous progress and a hope for future Georgian success.

Keywords: investments, MNE, FDI motivations, Georgian economy

Procedia PDF Downloads 308
3497 Migration, Food Security, Rapid Urbanization and Population Rise in Nigeria: A Wake-Up Call to Policy-Makers

Authors: A. E. Obayelu, S. O. Olubiyo

Abstract:

Food is different from other commodities because everybody needs food for survival. This has led to a shift in focus to food security in the global policy arena. However, there is paucity of studies on the interactions between food security, migration, urbanization and population rise. This paper therefore look at the linkages between migration and food security in the context of rapid urbanization and population rise of Nigeria. The study obtained data and information from both secondary sources and primary method through the voice of some selected Nigerians through telephone interview. The findings revealed that, the primary factor for the rapid urbanization in Nigeria is migration; most foods are still produced by peasant farmers who are scattered all over the rural areas and not multinational companies who produce on large scale. The country is still characterized with inadequate infrastructural facilities and services to cater for growing population. There are no protective policies enforced by the Nigeria government. In most cases, the migrants are left entirely on mercy of what they can find to due for survival. The most common coping mechanisms by migrants from rural to urban areas are changing food intake in terms of quantity, quality, diversity and frequency and prioritizing children. Policies that address urban food security need to consider the complex relationship between rapid population rise and migration and appropriate transformations that will be able to manage urbanization. With increasing rate of urbanization, the focus of food security should no longer be that of rural only

Keywords: agricultural commercialization, agricultural transformation, food security, urban, urbanization

Procedia PDF Downloads 401
3496 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 317
3495 The Role of Leapfrogging: Cross-Level Interactions and MNE Decision-Making in Conflict-Settings

Authors: Arrian Cornwell, Larisa Yarovaya, Mary Thomson

Abstract:

This paper seeks to examine the transboundary nature of foreign subsidiary exit vs. stay decisions when threatened by conflict in a host country. Using the concepts of nested vulnerability and teleconnections, we show that the threat of conflict can transcend bounded territories and have non-linear outcomes for actors, institutions and systems at broader scales of analysis. To the best of our knowledge, this has not been done before. By introducing the concepts of ‘leapfrogging upwards’ and ‘cascading downwards’, we develop a two-stage model which characterises the impacts of conflict as transboundary phenomena. We apply our model to a dataset of 266 foreign subsidiaries in six conflict-afflicted host countries over 2011-2015. Our results indicate that information is transmitted upwards and subsequent pressure flows cascade downwards, which, in turn, influence exit decisions.

Keywords: subsidiary exit, conflict, information transmission, pressure flows, transboundary

Procedia PDF Downloads 245
3494 Food Security in the Middle East and North Africa

Authors: Sara D. Garduno-Diaz, Philippe Y. Garduno-Diaz

Abstract:

To date, one of the few comprehensive indicators for the measurement of food security is the Global Food Security Index. This index is a dynamic quantitative and qualitative bench marking model, constructed from 28 unique indicators, that measures drivers of food security across both developing and developed countries. Whereas the Global Food Security Index has been calculated across a set of 109 countries, in this paper we aim to present and compare, for the Middle East and North Africa (MENA), 1) the Food Security Index scores achieved and 2) the data available on affordability, availability, and quality of food. The data for this work was taken from the latest (2014) report published by the creators of the GFSI, which in turn used information from national and international statistical sources. According to the 2014 Global Food Security Index, MENA countries rank from place 17/109 (Israel, although with resent political turmoil this is likely to have changed) to place 91/109 (Yemen) with household expenditure spent in food ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food as a share of household consumption in most countries and better food safety net programs in the MENA have contributed to a notable increase in food affordability. The region has also however experienced a decline in food availability, owing to more limited food supplies and higher volatility of agricultural production. In terms of food quality and safety the MENA has the top ranking country (Israel). The most frequent challenges faced by the countries of the MENA include public expenditure on agricultural research and development as well as volatility of agricultural production. Food security is a complex phenomenon that interacts with many other indicators of a country’s well-being; in the MENA it is slowly but markedly improving.

Keywords: diet, food insecurity, global food security index, nutrition, sustainability

Procedia PDF Downloads 328
3493 Bring Your Own Devices (BOYD): Risks and Mitigation Strategies

Authors: Mohammed Ketel

Abstract:

This paper discusses the security issues related to Bring Your Own Devices (BYOD) programs, an increasingly popular choice for small and big businesses alike, and explores the benefits, risks, the available controls and solutions to mitigate the inherent security concerns with mobile devices, in general, and BYOD programs specifically. The paper also discusses the approaches that organizations can apply to mitigate the risks, which may include policies, diverse technologies, education, and training.

Keywords: BYOD, security, policies, standards, controls, education

Procedia PDF Downloads 265
3492 Biopotential of Introduced False Indigo and Albizia’s Weevils in Host Plant Control and Duration of Its Development Stages in Southern Regions of Panonian Basin

Authors: Renata Gagić-Serdar, Miroslava Markovic, Ljubinko Rakonjac, Aleksandar Lučić

Abstract:

The paper present the results of the entomological experimental studies of the biological, ecological, and (bionomic) insect performances, such as seasonal adaptation of introduced monophagous false indigo and albizias weevil’s Acanthoscelides pallidipennis Motschulsky. and Bruchidius terrenus (Sharp), Coleoptera: Chrysomelidae: Bruchinae, to phenological phases of aggressive invasive host plant Amorpha fruticosa L. and Albizia julibrissin (Fabales: Fabaceae) on the territory of Republic of Serbia with special attention on assessing and monitoring of new formed and detected inter species relations between autochthons parasite wasps from fauna (Hymenoptera: Chalcidoidea) and herbaceous seed weevil beetle. During 15 years (2006-2021), on approximately 30 localities, data analyses were done for observed experimental host plants from samples with statistical significance. Status of genera from families Hymenoptera: Chalcidoidea.: Pteromalidae and Eulophidae, after intensive investigations, has been trophicly identified. Recorded seed pest species of A. fruticosa or A. julibrissin (Fabales: Fabaceae) was introduced in Serbia and planted as ornamental trees, they also were put undergo different kinds of laboratory and field research tests during this period in a goal of collecting data about lasting each of develop stage of their seed beetles. Field generations in different stages were also monitored by continuous infested seed collecting and its disection. Established host plant-seed predator linkage was observed in correlation with different environment parameters, especially water level fluctuations in bank corridor formation stands and riparian cultures.

Keywords: amorpha, albizia, chalcidoid wasp, invasiveness, weevils

Procedia PDF Downloads 69
3491 Modern Conditions and Tendencies of Development of Agro-Industrial Complex of the Republic of Kazakhstan

Authors: А. А. Yessekeyeva, А. S. Moldagaliyeva, G. K. Shulanbekova

Abstract:

The purpose of this article is to describe challenges associated with enhancement of government control over agro industrial sector in order to maintain food security. The need for government control over agricultural industry stems from the fact that the State is accountable to its citizens for establishing their standard living conditions, food and other agricultural product supplies. Agro industrial sector is in a special position within the market place preventing its full and equal participation in an interdisciplinary competition. Low-profit agricultural industry that is dependent on the natural and strongly marked seasonal and cyclical production factors is more underdeveloped in terms of technology and relatively static industry as compared to the manufacturing industry. Therefore, agricultural industry development directly affects food security of the country.

Keywords: food security, agro-industry, Kazakhstan, food security

Procedia PDF Downloads 266
3490 Labour Migration in Russia in the Context of Russia’s National Security Problem

Authors: A. V. Dolzhikova

Abstract:

The article deals with the problems of labour migration in the Russian Federation in the context of Russia's national security, provides the typology of migrants residing in the territory of the Russian Federation and analyzes the risk factors. The author considers the structure of migration flows and the terms of legal, economic and socio-cultural adaptation of migrants in the Russian Federation. In this connection, the status of the Russian migration legislation, the concept of the comprehensive exam in Russian as a foreign language, history of Russia and the basics of the Russian Federation legislation for foreign citizens which was introduced in Russia on January 1, 2015, are analyzed. The article discloses its role as the adaptation strategy and the factor of Russia's migration security.

Keywords: comprehensive exam, migration policy, migration legislation, Russia's national security

Procedia PDF Downloads 340
3489 Cultural Adaptation of Foreign Students in Vienna, A Sociolinguistic Case Study of Iranian Students in Vienna

Authors: Roshanak Nouralian

Abstract:

The primary focus of my Ph.D. dissertation revolves around the interconnection between language and culture, as well as the crucial role that language plays in facilitating communication and fostering integration within the host society for immigrants. This research specifically focuses on Iranian students studying at various universities in Vienna. Throughout this study, I have attempted to examine and analyze their challenges in various life situations in Austria. The broad dimensions of the research question led the research process to apply a constructivist grounded theory strategy. I have also used critical discourse analysis that is in line with constructivist GT's point of view to look closely at the borders, contradictions, and inequalities that came up in the participants' real-life experiences. Data from individual interviews and group discussions have expanded the research trajectory beyond disciplinary boundaries toward a transdisciplinary approach. The research findings indicate how the language policy of the host society leads to the establishment of power relationships and the arousal of a sense of cultural dominance among the research participants. This study investigates the problems experienced by participants in their daily interactions within the host society. Additionally, the results illustrate the development of a dependency relationship between participants and their host society despite linguistic policies that cause a sense of cultural hegemony. Conversely, the obtained data allowed me to examine the participants' language ideologies. The findings of this study show that social linguistics has the potential to go beyond the boundaries of its field. This is possible by using a variety of research strategies and analyzing people's real-life experiences to find out how language affects different parts of their daily lives. Therefore, in this conference, discussing the logic of employing a constructivist GT strategy along with critical discourse analysis (CDA) in this research, I intend to discuss the achieved results.

Keywords: cultural adapttaion, language policy, language ideology, cultural hegemony, transdisciplinary research, constructivist grounded theory, critical discourse analysis

Procedia PDF Downloads 39
3488 Protection of the Object of the Critical Infrastructure in the Czech Republic

Authors: Michaela Vašková

Abstract:

With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.

Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit

Procedia PDF Downloads 319
3487 Geographical Indication Protection for Agricultural Products: Contribution for Achieving Food Security in Indonesia

Authors: Mas Rahmah

Abstract:

Indonesia is the most populous Southeast Asian nations, as Indonesia`s population is constantly growing, food security has become a crucial trending issue. Although Indonesia has more than enough natural resources and agricultural products to ensure food security for all, Indonesia is still facing the problem of food security because of adverse weather conditions, increasing population, political instability, economic factors (unemployment, rising food prices), and the dependent system of agriculture. This paper will analyze that Geographical Indication (GI) can aid in transforming Indonesian agricultural-dependent system by tapping the unique product attributes of their quality products since Indonesia has a lot of agricultural products with unique quality and special characteristic associated with geographical factors such as Toraja Coffee, Alor Vanili, Banda Nutmeg, Java Tea, Deli Tobacco, Cianjur Rise etc. This paper argues that the reputation and agricultural products and their intrinsic quality should be protected under GI because GI will provide benefit supporting the food security program. Therefore, this paper will expose the benefit of GI protection such as increasing productivity, improving the exports of GI products, creating employment, adding economic value to products, and increasing the diversity of supply of natural and unique quality products, etc. that can contribute to food security. The analysis will finally conclude that the scenario of promoting GI may indirectly contribute to food security through adding value by incorporating territory specific cultural, environmental and social qualities into production, processing and developing of unique local, niche and special agricultural products.

Keywords: geographical indication, food security, agricultural product, Indonesia

Procedia PDF Downloads 343
3486 System Security Impact on the Dynamic Characteristics of Measurement Sensors in Smart Grids

Authors: Yiyang Su, Jörg Neumann, Jan Wetzlich, Florian Thiel

Abstract:

Smart grid is a term used to describe the next generation power grid. New challenges such as integration of renewable and decentralized energy sources, the requirement for continuous grid estimation and optimization, as well as the use of two-way flows of energy have been brought to the power gird. In order to achieve efficient, reliable, sustainable, as well as secure delivery of electric power more and more information and communication technologies are used for the monitoring and the control of power grids. Consequently, the need for cybersecurity is dramatically increased and has converged into several standards which will be presented here. These standards for the smart grid must be designed to satisfy both performance and reliability requirements. An in depth investigation of the effect of retrospectively embedded security in existing grids on it’s dynamic behavior is required. Therefore, a retrofitting plan for existing meters is offered, and it’s performance in a test low voltage microgrid is investigated. As a result of this, integration of security measures into measurement architectures of smart grids at the design phase is strongly recommended.

Keywords: cyber security, performance, protocols, security standards, smart grid

Procedia PDF Downloads 298
3485 The South African Polycentric Water Resource Governance-Management Nexus: Parlaying an Institutional Agent and Structured Social Engagement

Authors: J. H. Boonzaaier, A. C. Brent

Abstract:

South Africa, a water scarce country, experiences the phenomenon that its life supporting natural water resources is seriously threatened by the users that are totally dependent on it. South Africa is globally applauded to have of the best and most progressive water laws and policies. There are however growing concerns regarding natural water resource quality deterioration and a critical void in the management of natural resources and compliance to policies due to increasing institutional uncertainties and failures. These are in accordance with concerns of many South African researchers and practitioners that call for a change in paradigm from talk to practice and a more constructive, practical approach to governance challenges in the management of water resources. A qualitative theory-building case study through longitudinal action research was conducted from 2014 to 2017. The research assessed whether a strategic positioned institutional agent can be parlayed to facilitate and execute WRM on catchment level by engaging multiple stakeholders in a polycentric setting. Through a critical realist approach a distinction was made between ex ante self-deterministic human behaviour in the realist realm, and ex post governance-management in the constructivist realm. A congruence analysis, including Toulmin’s method of argumentation analysis, was utilised. The study evaluated the unique case of a self-steering local water management institution, the Impala Water Users Association (WUA) in the Pongola River catchment in the northern part of the KwaZulu-Natal Province of South Africa. Exploiting prevailing water resource threats, it expanded its ancillary functions from 20,000 to 300,000 ha. Embarking on WRM activities, it addressed natural water system quality assessments, social awareness, knowledge support, and threats, such as: soil erosion, waste and effluent into water systems, coal mining, and water security dimensions; through structured engagement with 21 different catchment stakeholders. By implementing a proposed polycentric governance-management model on a catchment scale, the WUA achieved to fill the void. It developed a foundation and capacity to protect the resilience of the natural environment that is critical for freshwater resources to ensure long-term water security of the Pongola River basin. Further work is recommended on appropriate statutory delegations, mechanisms of sustainable funding, sufficient penetration of knowledge to local levels to catalyse behaviour change, incentivised support from professionals, back-to-back expansion of WUAs to alleviate scale and cost burdens, and the creation of catchment data monitoring and compilation centres.

Keywords: institutional agent, water governance, polycentric water resource management, water resource management

Procedia PDF Downloads 115
3484 Application of PSK Modulation in ADS-B 1090 Extended Squitter Authentication

Authors: A-Q. Nguyen. A. Amrhar, J. Zambrano, G. Brown, O.A. Yeste-Ojeda, R. Jr. Landry

Abstract:

Since the presence of Next Generation Air Transportation System (NextGen), Automatic Dependent Surveillance-Broadcast (ADS-B) has raised specific concerns related to the privacy and security, due to its vulnerable, low-level of security and limited payload. In this paper, the authors introduce and analyze the combination of Pulse Amplitude Modulation (PAM) and Phase Shift Keying (PSK) Modulation in conventional ADS-B, forming Secure ADS-B (SADS-B) avionics. In order to demonstrate the potential of this combination, Hardware-in-the-loop (HIL) simulation was used. The tests' results show that, on the one hand, SADS-B can offer five times the payload as its predecessor. This additional payload of SADS-B can be used in various applications, therefore enhancing the ability and efficiency of the current ADS-B. On the other hand, by using the extra phase modulated bits as a digital signature to authenticate ADS-B messages, SADS-B can increase the security of ADS-B, thus ensure a more secure aviation as well. More importantly, SADS-B is compatible with the current ADS-B In and Out. Hence, no significant modifications will be needed to implement this idea. As a result, SADS-B can be considered the most promising approach to enhance the capability and security of ADS-B.

Keywords: ADS-B authentication, ADS-B security, NextGen ADS-B, PSK signature, secure ADS-B

Procedia PDF Downloads 294
3483 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 333
3482 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro

Authors: Safwan Mawlood Hussien

Abstract:

Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.

Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro

Procedia PDF Downloads 100
3481 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 267
3480 Regression Approach for Optimal Purchase of Hosts Cluster in Fixed Fund for Hadoop Big Data Platform

Authors: Haitao Yang, Jianming Lv, Fei Xu, Xintong Wang, Yilin Huang, Lanting Xia, Xuewu Zhu

Abstract:

Given a fixed fund, purchasing fewer hosts of higher capability or inversely more of lower capability is a must-be-made trade-off in practices for building a Hadoop big data platform. An exploratory study is presented for a Housing Big Data Platform project (HBDP), where typical big data computing is with SQL queries of aggregate, join, and space-time condition selections executed upon massive data from more than 10 million housing units. In HBDP, an empirical formula was introduced to predict the performance of host clusters potential for the intended typical big data computing, and it was shaped via a regression approach. With this empirical formula, it is easy to suggest an optimal cluster configuration. The investigation was based on a typical Hadoop computing ecosystem HDFS+Hive+Spark. A proper metric was raised to measure the performance of Hadoop clusters in HBDP, which was tested and compared with its predicted counterpart, on executing three kinds of typical SQL query tasks. Tests were conducted with respect to factors of CPU benchmark, memory size, virtual host division, and the number of element physical host in cluster. The research has been applied to practical cluster procurement for housing big data computing.

Keywords: Hadoop platform planning, optimal cluster scheme at fixed-fund, performance predicting formula, typical SQL query tasks

Procedia PDF Downloads 212
3479 Advancing Energy Security Through Regional Cooperation in Southern Africa: An Assessment of the Challenges and Opportunities

Authors: Loide Sambo

Abstract:

Achieving energy security has, in the past few decades, become one of the main goals in the security agenda of every country around the world. For Southern African Countries (SAC) the aim is not different, yet these countries face a particular challenge in the pursuit of their energy security. More than just secure enough energy sources to fuel their industrial and societal needs, SAC have as well to ensure that they trade their rich energy resources to the global market in a way that promotes and safeguards their economic development objectives. Considering the relevance of this issue to the SAC, the present paper explores the possibility of these countries to achieve energy security through regional cooperation, under the Southern Africa Development Community (SADC) platform. It discusses the challenges and opportunities for advancing energy security in this region through cooperation. After analyzing the data through the documentary analysis method, it was found that regional cooperation among SAC to improve energy security is not effective since cooperation in the region is still very susceptible to a plethora of challenges, such as political instability, lack of development of infrastructure and expertise, lack of good governance, lack of sense of cohesiveness, and most important lack of political commitment. It was also found that significant commitment on regional cooperation had been centered on the electricity sub-sector due to the region’s huge electricity deficit. Thus less commitment is dedicated to the development and policy harmonization of the other sub-sectors such as the one of natural gas and oil, for instance. Hence, it is recommended that the leadership of the SAC is fully committed to cooperate and harmonize the policies, the strategic plans, as well as the infrastructure concerning to all the natural energy resources and its respective sub-sectors. This would provide the SAC significant leverage to negotiate for the energy market access, ensuring that the region’s energy commodities are traded, while the countries themselves retain enough energy to sustain their economic growth and development, improving, therefore, their energy security.

Keywords: regional cooperation, energy security, economic development, political commitment

Procedia PDF Downloads 232
3478 Juridically Secure Trade Mechanisms for Alternative Dispute Resolution in Transnational Business Negotiations

Authors: Linda Frazer

Abstract:

A pluralistic methodology focuses on promoting an understanding that an alternative juridical framework for the regulation of transnational business negotiations (TBN) between private business parties is fundamentally required. This paper deals with the evolving assessment of the doctoral research of the author which demonstrated that due to insufficient juridical tools, negotiations are commonly misunderstood within the complexity of pluralistic and conflicting legal regimes. This inadequacy causes uncertainty in the enforcement of legal remedies, leaving business parties surprised. Consequently, parties cannot sufficiently anticipate when and how legal rights and obligations are created, often counting on oral or incomplete agreements which may lead to the misinterpretation of the extent of their legal rights and obligations. This uncertainty causes threats to business parties for fear of creating unintended legal obligations or, conversely, that law will not enforce intended agreements for failure to pass the tests of contractual validity. A need to find a manner to set default standards of communications and standards of conduct to monitor our evolving global trade would aid law to provide the security, predictability and foreseeability during alternative dispute resolution required by TBN parties. The conclusion of this study includes a proposal of new trade mechanisms, termed 'Bills of Negotiations' (BON) to enhance party autonomy and promote the ability for TBN parties to self-regulate within the boundaries of law. BON will be guided by a secure juridical institutionalized setting that caters to guiding communications during TBN and resolving disputes that arise along the negotiation processes on a fast track basis.

Keywords: alternative resolution disputes, ADR, good faith, good faith, juridical security, legal regulation, trade mechanisms, transnational business negotiations

Procedia PDF Downloads 123
3477 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration

Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu

Abstract:

This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.

Keywords: migration, border, security, memory effect

Procedia PDF Downloads 59