Search results for: information security competencies
12773 Communication Skills Training in Continuing Nursing Education: Enabling Nurses to Improve Competency and Performance in Communication
Authors: Marzieh Moattari Mitra Abbasi, Masoud Mousavinasab, Poorahmad
Abstract:
Background: Nurses in their daily practice need to communicate with patients and their families as well as health professional team members. Effective communication contributes to patients’ satisfaction which is a fundamental outcome of nursing practice. There are some evidences in support of patients' dissatisfaction with nurses’ performance in communication process. Therefore improving nurses’ communication skills is a necessity for nursing scholars and nursing administrators. Objective: The aim of the present study was to evaluate the effect of a 2-days workshop on nurses’ competencies and performances in communication in a central hospital located in the sought of Iran. Materials and Method: This is a randomized controlled trial which comprised of a convenient sample of 70 eligible nurses, working in a central hospital. They were randomly divided into 2 experimental and control groups. Nurses’ competencies was measured by an Objective Structured Clinical Examination (OSCE) and their performance was measured by asking eligible patients hospitalized in the nurses work setting during a one month period to evaluate nurses' communication skills before and 2 months after intervention. The experimental group participated in a 2 day workshop on communication skills. Content included in this workshop were: the importance of communication (verbal and non verbal), basic communication skills such as initiating the communication, active listening and questioning technique. Other subjects were patient teaching, problem solving, and decision making, cross cultural communication and breaking bad news. Appropriate teaching strategies such as brief didactic sessions, small group discussion and reflection were applied to enhance participants learning. The data was analyzed using SPSS 16. Result: A significant between group differences was found in nurses’ communication skills competencies and performances in the posttest. The mean scores of the experimental group was higher than that of the control group in the total score of OSCE as well as all stations of OSCE (p<0.003). Overall posttest mean scores of patient satisfaction with nurse's communication skills and all of its four dimensions significantly differed between the two groups of the study (p<0.001). Conclusion: This study shows that the education of nurses in communication skills, improves their competencies and performances. Measurement of Nurses’ communication skills as a central component of efficient nurse patient relationship by valid and reliable methods of evaluation is recommended. Also it is necessary to integrate teaching of communication skills in continuing nursing education programs. Trial Registration Number: IRCT201204042621N11Keywords: communication skills, simulation, performance, competency, objective structure, clinical evaluation
Procedia PDF Downloads 21812772 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia
Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan
Abstract:
This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia
Procedia PDF Downloads 39112771 Scenarios of Societal Security and Business Continuity Cycles
Authors: Jiří F. Urbánek, Jiří Barta
Abstract:
Societal security, continuity scenarios, and methodological cycling approach understands in this article. Namely, societal security organizational challenges ask implementation of international standards BS 25999-2 and global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity, and interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization systems, resulting to a crisis scene or even to a battle theater. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management, and overmastering in real environments.Keywords: business continuity, societal security, crisis scenarios cycles, interoperability
Procedia PDF Downloads 38512770 The Impact of Water Reservoirs on Biodiversity and Food Security and the Creation of Adaptation Mechanisms
Authors: Inom S. Normatov, Abulqosim Muminov, Parviz I. Normatov
Abstract:
Problems of food security and the preservation of reserved zones in the region of Central Asia under the conditions of the climate change induced by the placement and construction of large reservoirs are considered. The criteria for the optimum placement and construction of reservoirs that entail the minimum impact on the environment are established. The need for the accounting of climatic parameters is shown by the calculation of the water quantity required for the irrigation of agricultural lands.Keywords: adaptation, biodiversity, food security, water reservoir, risk
Procedia PDF Downloads 25612769 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978
Authors: Naseer Ahmad Bhat
Abstract:
Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.Keywords: detentions, Kashmir, public safety act, liberty, security
Procedia PDF Downloads 22812768 A Novel Software Model for Enhancement of System Performance and Security through an Optimal Placement of PMU and FACTS
Authors: R. Kiran, B. R. Lakshmikantha, R. V. Parimala
Abstract:
Secure operation of power systems requires monitoring of the system operating conditions. Phasor measurement units (PMU) are the device, which uses synchronized signals from the GPS satellites, and provide the phasors information of voltage and currents at a given substation. The optimal locations for the PMUs must be determined, in order to avoid redundant use of PMUs. The objective of this paper is to make system observable by using minimum number of PMUs & the implementation of stability software at 22OkV grid for on-line estimation of the power system transfer capability based on voltage and thermal limitations and for security monitoring. This software utilizes State Estimator (SE) and synchrophasor PMU data sets for determining the power system operational margin under normal and contingency conditions. This software improves security of transmission system by continuously monitoring operational margin expressed in MW or in bus voltage angles, and alarms the operator if the margin violates a pre-defined threshold.Keywords: state estimator (SE), flexible ac transmission systems (FACTS), optimal location, phasor measurement units (PMU)
Procedia PDF Downloads 40912767 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century
Authors: Jimoh Yusuf Amuda
Abstract:
Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.Keywords: human, insecurity, security, terrorism
Procedia PDF Downloads 34112766 Bring Your Own Devices (BOYD): Risks and Mitigation Strategies
Authors: Mohammed Ketel
Abstract:
This paper discusses the security issues related to Bring Your Own Devices (BYOD) programs, an increasingly popular choice for small and big businesses alike, and explores the benefits, risks, the available controls and solutions to mitigate the inherent security concerns with mobile devices, in general, and BYOD programs specifically. The paper also discusses the approaches that organizations can apply to mitigate the risks, which may include policies, diverse technologies, education, and training.Keywords: BYOD, security, policies, standards, controls, education
Procedia PDF Downloads 28812765 Opacity Synthesis with Orwellian Observers
Authors: Moez Yeddes
Abstract:
The property of opacity is widely used in the formal verification of security in computer systems and protocols. Opacity is a general language-theoretic scheme of many security properties of systems. Opacity is parametrized with framework in which several security properties of a system can be expressed. A secret behaviour of a system is opaque if a passive attacker can never deduce its occurrence from the system observation. Instead of considering the case of static observability where the set of observable events is fixed off-line or dynamic observability where the set of observable events changes over time depending on the history of the trace, we introduce Orwellian partial observability where unobservable events are not revealed provided that downgrading events never occurs in the future of the trace. Orwellian partial observability is needed to model intransitive information flow. This Orwellian observability is knwon as ipurge function. We show in previous work how to verify opacity for regular secret is opaque for a regular language L w.r.t. an Orwellian projection is PSPACE-complete while it has been proved undecidable even for a regular language L w.r.t. a general Orwellian observation function. In this paper, we address two problems of opacification of a regular secret ϕ for a regular language L w.r.t. an Orwellian projection: Given L and a secret ϕ ∈ L, the first problem consist to compute some minimal regular super-language M of L, if it exists, such that ϕ is opaque for M and the second consists to compute the supremal sub-language M′ of L such that ϕ is opaque for M′. We derive both language-theoretic characterizations and algorithms to solve these two dual problems.Keywords: security policies, opacity, formal verification, orwellian observation
Procedia PDF Downloads 22512764 The Curse of Oil: Unpacking the Challenges to Food Security in the Nigeria's Niger Delta
Authors: Abosede Omowumi Babatunde
Abstract:
While the Niger Delta region satisfies the global thirst for oil, the inhabitants have not been adequately compensated for the use of their ancestral land. Besides, the ruthless exploitation and destruction of the natural environment upon which the inhabitants of the Niger Delta depend for their livelihood and sustenance by the activities of oil multinationals, pose major threats to food security in the region and by implication, Nigeria in general, Africa, and the world, given the present global emphasis on food security. This paper examines the effect of oil exploitation on household food security, identify key gaps in measures put in place to address the changes to livelihoods and food security and explore what should be done to improve the local people access to sufficient, safe and culturally acceptable food in the Niger Delta. Data is derived through interviews with key informants and Focus Group Discussions (FGDs) conducted with respondents in the local communities in the Niger Delta states of Delta, Bayelsa and Rivers as well as relevant extant studies. The threat to food security is one important aspect of the human security challenges in the Niger Delta which has received limited scholarly attention. In addition, successive Nigerian governments have not meaningfully addressed the negative impacts of oil-induced environmental degradation on traditional livelihoods given the significant linkages between environmental sustainability, livelihood security, and food security. The destructive impact of oil pollution on the farmlands, crops, economic trees, creeks, lakes, and fishing equipment is so devastating that the people can no longer engage in productive farming and fishing. Also important is the limited access to modern agricultural methods for fishing and subsistence farming as fishing and farming are done using mostly crude implements and traditional methods. It is imperative and urgent to take stock of the negative implications of the activities of oil multinationals for environmental and livelihood sustainability, and household food security in the Niger Delta.Keywords: challenges, food security, Nigeria's Niger delta, oil
Procedia PDF Downloads 24912763 Modern Conditions and Tendencies of Development of Agro-Industrial Complex of the Republic of Kazakhstan
Authors: А. А. Yessekeyeva, А. S. Moldagaliyeva, G. K. Shulanbekova
Abstract:
The purpose of this article is to describe challenges associated with enhancement of government control over agro industrial sector in order to maintain food security. The need for government control over agricultural industry stems from the fact that the State is accountable to its citizens for establishing their standard living conditions, food and other agricultural product supplies. Agro industrial sector is in a special position within the market place preventing its full and equal participation in an interdisciplinary competition. Low-profit agricultural industry that is dependent on the natural and strongly marked seasonal and cyclical production factors is more underdeveloped in terms of technology and relatively static industry as compared to the manufacturing industry. Therefore, agricultural industry development directly affects food security of the country.Keywords: food security, agro-industry, Kazakhstan, food security
Procedia PDF Downloads 28712762 Labour Migration in Russia in the Context of Russia’s National Security Problem
Authors: A. V. Dolzhikova
Abstract:
The article deals with the problems of labour migration in the Russian Federation in the context of Russia's national security, provides the typology of migrants residing in the territory of the Russian Federation and analyzes the risk factors. The author considers the structure of migration flows and the terms of legal, economic and socio-cultural adaptation of migrants in the Russian Federation. In this connection, the status of the Russian migration legislation, the concept of the comprehensive exam in Russian as a foreign language, history of Russia and the basics of the Russian Federation legislation for foreign citizens which was introduced in Russia on January 1, 2015, are analyzed. The article discloses its role as the adaptation strategy and the factor of Russia's migration security.Keywords: comprehensive exam, migration policy, migration legislation, Russia's national security
Procedia PDF Downloads 36512761 Protection of the Object of the Critical Infrastructure in the Czech Republic
Authors: Michaela Vašková
Abstract:
With the increasing dependence of countries on the critical infrastructure, it increases their vulnerability. Big threat is primarily in the human factor (personnel of the critical infrastructure) and in terrorist attacks. It emphasizes the development of methodology for searching of weak points and their subsequent elimination. This article discusses methods for the analysis of safety in the objects of critical infrastructure. It also contains proposal for methodology for training employees of security services in the objects of the critical infrastructure and developing scenarios of attacks on selected objects of the critical infrastructure.Keywords: critical infrastructure, object of critical infrastructure, protection, safety, security, security audit
Procedia PDF Downloads 34412760 Geographical Indication Protection for Agricultural Products: Contribution for Achieving Food Security in Indonesia
Authors: Mas Rahmah
Abstract:
Indonesia is the most populous Southeast Asian nations, as Indonesia`s population is constantly growing, food security has become a crucial trending issue. Although Indonesia has more than enough natural resources and agricultural products to ensure food security for all, Indonesia is still facing the problem of food security because of adverse weather conditions, increasing population, political instability, economic factors (unemployment, rising food prices), and the dependent system of agriculture. This paper will analyze that Geographical Indication (GI) can aid in transforming Indonesian agricultural-dependent system by tapping the unique product attributes of their quality products since Indonesia has a lot of agricultural products with unique quality and special characteristic associated with geographical factors such as Toraja Coffee, Alor Vanili, Banda Nutmeg, Java Tea, Deli Tobacco, Cianjur Rise etc. This paper argues that the reputation and agricultural products and their intrinsic quality should be protected under GI because GI will provide benefit supporting the food security program. Therefore, this paper will expose the benefit of GI protection such as increasing productivity, improving the exports of GI products, creating employment, adding economic value to products, and increasing the diversity of supply of natural and unique quality products, etc. that can contribute to food security. The analysis will finally conclude that the scenario of promoting GI may indirectly contribute to food security through adding value by incorporating territory specific cultural, environmental and social qualities into production, processing and developing of unique local, niche and special agricultural products.Keywords: geographical indication, food security, agricultural product, Indonesia
Procedia PDF Downloads 36912759 The Secrecy Capacity of the Semi-Deterministic Wiretap Channel with Three State Information
Authors: Mustafa El-Halabi
Abstract:
A general model of wiretap channel with states is considered, where the legitimate receiver and the wiretapper’s observations depend on three states S1, S2 and S3. State S1 is non-causally known to the encoder, S2 is known to the receiver, and S3 remains unknown. A secure coding scheme, based using structured-binning, is proposed, and it is shown to achieve the secrecy capacity when the signal at legitimate receiver is a deterministic function of the input.Keywords: physical layer security, interference, side information, secrecy capacity
Procedia PDF Downloads 38912758 Monitoring and Evaluation of Web-Services Quality and Medium-Term Impact on E-Government Agencies' Efficiency
Authors: A. F. Huseynov, N. T. Mardanov, J. Y. Nakhchivanski
Abstract:
This practical research is aimed to improve the management quality and efficiency of public administration agencies providing e-services. The monitoring system developed will provide continuous review of the websites compliance with the selected indicators, their evaluation based on the selected indicators and ranking of services according to the quality criteria. The responsible departments in the government agencies were surveyed; the questionnaire includes issues of management and feedback, e-services provided, and the application of information systems. By analyzing the main affecting factors and barriers, the recommendations will be given that lead to the relevant decisions to strengthen the state agencies competencies for the management and the provision of their services. Component 1. E-services monitoring system. Three separate monitoring activities are proposed to be executed in parallel: Continuous tracing of e-government sites using built-in web-monitoring program; this program generates several quantitative values which are basically related to the technical characteristics and the performance of websites. The expert assessment of e-government sites in accordance with the two general criteria. Criterion 1. Technical quality of the site. Criterion 2. Usability/accessibility (load, see, use). Each high-level criterion is in turn subdivided into several sub-criteria, such as: the fonts and the color of the background (Is it readable?), W3C coding standards, availability of the Robots.txt and the site map, the search engine, the feedback/contact and the security mechanisms. The on-line survey of the users/citizens – a small group of questions embedded in the e-service websites. The questionnaires comprise of the information concerning navigation, users’ experience with the website (whether it was positive or negative), etc. Automated monitoring of web-sites by its own could not capture the whole evaluation process, and should therefore be seen as a complement to expert’s manual web evaluations. All of the separate results were integrated to provide the complete evaluation picture. Component 2. Assessment of the agencies/departments efficiency in providing e-government services. - the relevant indicators to evaluate the efficiency and the effectiveness of e-services were identified; - the survey was conducted in all the governmental organizations (ministries, committees and agencies) that provide electronic services for the citizens or the businesses; - the quantitative and qualitative measures are covering the following sections of activities: e-governance, e-services, the feedback from the users, the information systems at the agencies’ disposal. Main results: 1. The software program and the set of indicators for internet sites evaluation has been developed and the results of pilot monitoring have been presented. 2. The evaluation of the (internal) efficiency of the e-government agencies based on the survey results with the practical recommendations related to the human potential, the information systems used and e-services provided.Keywords: e-government, web-sites monitoring, survey, internal efficiency
Procedia PDF Downloads 30412757 Application of PSK Modulation in ADS-B 1090 Extended Squitter Authentication
Authors: A-Q. Nguyen. A. Amrhar, J. Zambrano, G. Brown, O.A. Yeste-Ojeda, R. Jr. Landry
Abstract:
Since the presence of Next Generation Air Transportation System (NextGen), Automatic Dependent Surveillance-Broadcast (ADS-B) has raised specific concerns related to the privacy and security, due to its vulnerable, low-level of security and limited payload. In this paper, the authors introduce and analyze the combination of Pulse Amplitude Modulation (PAM) and Phase Shift Keying (PSK) Modulation in conventional ADS-B, forming Secure ADS-B (SADS-B) avionics. In order to demonstrate the potential of this combination, Hardware-in-the-loop (HIL) simulation was used. The tests' results show that, on the one hand, SADS-B can offer five times the payload as its predecessor. This additional payload of SADS-B can be used in various applications, therefore enhancing the ability and efficiency of the current ADS-B. On the other hand, by using the extra phase modulated bits as a digital signature to authenticate ADS-B messages, SADS-B can increase the security of ADS-B, thus ensure a more secure aviation as well. More importantly, SADS-B is compatible with the current ADS-B In and Out. Hence, no significant modifications will be needed to implement this idea. As a result, SADS-B can be considered the most promising approach to enhance the capability and security of ADS-B.Keywords: ADS-B authentication, ADS-B security, NextGen ADS-B, PSK signature, secure ADS-B
Procedia PDF Downloads 31912756 Illegal Migration and Refugee Crisis as a Threat to National Security, Economic and Social System: The Bulgarian Case
Authors: Jordan Deliversky
Abstract:
Unlike all conventional forms of migration, migration crisis and migratory processes provide pressure to governments and are being expressed as different phenomenon in relation to nature and forms. The objective of this paper is to present the migration and refugee crisis as revealing numerous challenges faced by authorities responsible for the social and economic stability in Bulgaria as well as those providing conditions for reinforcement of the high level of national security in Bulgaria. The analysis is focused on exploring the multiple origins of factors influencing migration processes in Europe, in the light of the measures provided by the Bulgarian state authorities. The main results show that the society itself is facing the challenge of integrating refugees and migrants, so to be able to comply with the principles and values associated with tolerance to social, religious and cultural differences, and not allowing migrants to become marginalized community. Migration pressure creates a number of risks and threats to the Bulgarian national security. Our country has the capacity and resources to meet these potential threats, as a main factor for minimizing the risks to national security is the improvement of coordination and coherence of actions between various actors serving to the security sector.Keywords: legislation, migrants, refugees, security, terrorism
Procedia PDF Downloads 34312755 A Survey on Smart Security Mechanism Using Graphical Passwords
Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi
Abstract:
Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.Keywords: shoulder-surfing, security, authentication, text-passwords
Procedia PDF Downloads 36212754 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro
Authors: Safwan Mawlood Hussien
Abstract:
Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro
Procedia PDF Downloads 11912753 A Survey on Genetic Algorithm for Intrusion Detection System
Authors: Prikhil Agrawal, N. Priyanka
Abstract:
With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security
Procedia PDF Downloads 29712752 Advancing Energy Security Through Regional Cooperation in Southern Africa: An Assessment of the Challenges and Opportunities
Authors: Loide Sambo
Abstract:
Achieving energy security has, in the past few decades, become one of the main goals in the security agenda of every country around the world. For Southern African Countries (SAC) the aim is not different, yet these countries face a particular challenge in the pursuit of their energy security. More than just secure enough energy sources to fuel their industrial and societal needs, SAC have as well to ensure that they trade their rich energy resources to the global market in a way that promotes and safeguards their economic development objectives. Considering the relevance of this issue to the SAC, the present paper explores the possibility of these countries to achieve energy security through regional cooperation, under the Southern Africa Development Community (SADC) platform. It discusses the challenges and opportunities for advancing energy security in this region through cooperation. After analyzing the data through the documentary analysis method, it was found that regional cooperation among SAC to improve energy security is not effective since cooperation in the region is still very susceptible to a plethora of challenges, such as political instability, lack of development of infrastructure and expertise, lack of good governance, lack of sense of cohesiveness, and most important lack of political commitment. It was also found that significant commitment on regional cooperation had been centered on the electricity sub-sector due to the region’s huge electricity deficit. Thus less commitment is dedicated to the development and policy harmonization of the other sub-sectors such as the one of natural gas and oil, for instance. Hence, it is recommended that the leadership of the SAC is fully committed to cooperate and harmonize the policies, the strategic plans, as well as the infrastructure concerning to all the natural energy resources and its respective sub-sectors. This would provide the SAC significant leverage to negotiate for the energy market access, ensuring that the region’s energy commodities are traded, while the countries themselves retain enough energy to sustain their economic growth and development, improving, therefore, their energy security.Keywords: regional cooperation, energy security, economic development, political commitment
Procedia PDF Downloads 24812751 An Analysis of Non-Elliptic Curve Based Primality Tests
Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li
Abstract:
Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test
Procedia PDF Downloads 8812750 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security
Authors: Yael Deutsch, Arieh Gavious
Abstract:
The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.Keywords: game theory, profiling, security, nash equilibrium
Procedia PDF Downloads 10912749 Impact of the Fourth Industrial Revolution on Food Security in South Africa
Authors: Fiyinfoluwa Giwa, Nicholas Ngepah
Abstract:
This paper investigates the relationship between the Fourth Industrial Revolution and food security in South Africa. The Ordinary Least Square was adopted from 2012 Q1 to 2021 Q4. The study used artificial intelligence investment and the food production index as the measure for the fourth industrial revolution and food security, respectively. Findings reveal a significant and positive coefficient of 0.2887, signifying a robust statistical relationship between AI adoption and the food production index. As a policy recommendation, this paper recommends the introduction of incentives for farmers and agricultural enterprises to adopt AI technologies -and the expansion of digital connectivity and access to technology in rural areas.Keywords: Fourth Industrial Revolution, food security, artificial intelligence investment, food production index, ordinary least square
Procedia PDF Downloads 7512748 Transfer of Information Heritage between Algerian Veterinarians and Breeders: Assessment of Information and Communication Technology Using Mobile Phone
Authors: R. Bernaoui, P. Ohly
Abstract:
Our research shows the use of the mobile phone that consolidates the relationship between veterinarians, and that between breeders and veterinarians. On the other hand it asserts that the tool in question is a means of economic development. The results of our survey reveal a positive return to the veterinary community, which shows that the mobile phone has become an effective means of sustainable development through the transfer of a rapid and punctual information inheritance via social networks; including many Internet applications. Our results show that almost all veterinarians use the mobile phone for interprofessional communication. We therefore believe that the use of the mobile phone by livestock operators has greatly improved the working conditions, just as the use of this tool contributes to a better management of the exploitation as long as it allows limit travel but also save time. These results show that we are witnessing a growth in the use of mobile telephony technologies that impact is as much in terms of sustainable development. Allowing access to information, especially technical information, the mobile phone, and Information and Communication of Technology (ICT) in general, give livestock sector players not only security, by limiting losses, but also an efficiency that allows them a better production and productivity.Keywords: algeria, breeder-veterinarian, digital heritage, networking
Procedia PDF Downloads 12012747 Cyber Security Situational Awareness among Students: A Case Study in Malaysia
Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa
Abstract:
This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.Keywords: cyber security awareness, cyber security education, cyber security, school students
Procedia PDF Downloads 30212746 Moodle-Based E-Learning Course Development for Medical Interpreters
Authors: Naoko Ono, Junko Kato
Abstract:
According to the Ministry of Justice, 9,044,000 foreigners visited Japan in 2010. The number of foreign residents in Japan was over 2,134,000 at the end of 2010. Further, medical tourism has emerged as a new area of business. Against this background, language barriers put the health of foreigners in Japan at risk, because they have difficulty in accessing health care and communicating with medical professionals. Medical interpreting training is urgently needed in response to language problems resulting from the rapid increase in the number of foreign workers in Japan over recent decades. Especially, there is a growing need in medical settings in Japan to speak international languages for communication, with Tokyo selected as the host city of the 2020 Summer Olympics. Due to the limited number of practical activities on medical interpreting, it is difficult for learners to acquire the interpreting skills. In order to eliminate the shortcoming, a web-based English-Japanese medical interpreting training system was developed. We conducted a literature review to identify learning contents, core competencies for medical interpreters by using Pubmed, PsycINFO, Cochrane Library, and Google Scholar. Selected papers were investigated to find core competencies in medical interpreting. Eleven papers were selected through literature review indicating core competencies for medical interpreters. Core competencies in medical interpreting abstracted from the literature review, showed consistency in previous research whilst the content of the programs varied in domestic and international training programs for medical interpreters. Results of the systematic review indicated five core competencies: (a) maintaining accuracy and completeness; (b) medical terminology and understanding the human body; (c) behaving ethically and making ethical decisions; (d) nonverbal communication skills; and (e) cross-cultural communication skills. We developed an e-leaning program for training medical interpreters. A Web-based Medical Interpreter Training Program which cover these competencies was developed. The program included the following : online word list (Quizlet), allowing student to study online and on their smartphones; self-study tool (Quizlet) for help with dictation and spelling; word quiz (Quizlet); test-generating system (Quizlet); Interactive body game (BBC);Online resource for understanding code of ethics in medical interpreting; Webinar about non-verbal communication; and Webinar about incompetent vs. competent cultural care. The design of a virtual environment allows the execution of complementary experimental exercises for learners of medical interpreting and introduction to theoretical background of medical interpreting. Since this system adopts a self-learning style, it might improve the time and lack of teaching material restrictions of the classroom method. In addition, as a teaching aid, virtual medical interpreting is a powerful resource for the understanding how actual medical interpreting can be carried out. The developed e-learning system allows remote access, enabling students to perform experiments at their own place, without being physically in the actual laboratory. The web-based virtual environment empowers students by granting them access to laboratories during their free time. A practical example will be presented in order to show capabilities of the system. The developed web-based training program for medical interpreters could bridge the gap between medical professionals and patients with limited English proficiency.Keywords: e-learning, language education, moodle, medical interpreting
Procedia PDF Downloads 36612745 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments
Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka
Abstract:
Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance
Procedia PDF Downloads 5112744 Safety, Healthy, Intact, and Halal as New Indonesia Policy on Food Security and Safety to Support SDG'S: Sustainable Development Goals
Authors: Ramadhan Febriansyah, Sarah Novianti, Santi Agustini
Abstract:
Indonesia is a big country with Moslem population. The government must fulfill all needs of the people. However, we do not have a good policy yet especially on healthy, safety and halal food. We try to offer a new solution to overcome this with ASUH (Aman, Sehat, Utuh, Halal) or in English is SHIH (Safe, Healthy, Intact, Halal) as alternative Indonesian policy on food security. This policy is Indonesian Government’s commitment to support Sustainability Development Goals program for the zero hunger (end hunger, to achieve food security and improved nutrition for Indonesian people, of course, to promote sustainable agriculture). Hopefully, it not only can increasing quality on food especially on livestock goods (meat, egg, milk) but also to guarantee the halal food. However, this policy can be an example to others country especially Moslem countries to support SDG’s programs. This research conducted means of the descriptive method; the authors find compare the secondary data obtained from journals, textbook and scientific articles in order to determine the factors that influence food safety and food security. Relevant data used and contain a description of SDG’s as well as about the system food safety and food security that SHIH (Safe, Healthy, Intact and Halal) so these ideas can be implemented.Keywords: food safety, food security, food sovereignty, halal SDG's
Procedia PDF Downloads 383