Search results for: national security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6859

Search results for: national security

6409 Climate Policy Actions for Sustaining International Agricultural Development Projects: The Role of Non-State, Sub-National Stakeholder Engagements, and Monitoring and Evaluation

Authors: EMMANUEL DWAMENA SASU

Abstract:

International climate policy actions require countries under Paris Agreement to design instruments, provide support (financial and technical), and strengthen institutional capacity with tendency to transcending policy formulation to implementation and sustainability. Changes associated with moisture depletion has been a growing phenomenon; especially in developing countries with projected global GDP drop from 7% to 2% between 2005 and 2050. These developments have potential to adversely affect food production in feeding the growing world population, with corresponding rise in global hunger. Incongruously, there is global absence of a harmonized policy direction; capable of providing the required indicators on climate policies for monitoring sustainability of international agricultural development projects. We conduct extensive review and synthesis on existing limitations on global climate policy governance, agricultural food security and sustainability of international agricultural development projects, and conjecture the role of non-state and sub-national climate stakeholder engagements, and monitoring and evaluation strategies for improved climate policy action for sustaining international agricultural development projects.

Keywords: climate policy, agriculture, development projects, sustainability

Procedia PDF Downloads 125
6408 Maras and Public Security in Central America in XXI Century

Authors: Michal Stelmach

Abstract:

The aim of this paper is a critical analysis of the security policy in the field of the fight against transnational criminal groups in Central America in XXI century. We are analyzing all taken issues from several perspectives: political, anthropological, sociological and legal which allows me to confront behavior and the attitudes of the political elites against official legislative changes and declared actions, strategies and policies against practice. In the first part of paper we would like to present the genesis and characteristic of transnational gangs, called maras and next we would like to present their activities and roles within chosen sectors of organized crimes. In the second part we will analyze the government’s policy towards transnational criminal groups. The analysis will be concentrated on public safety policy implemented in specific Central American countries as well as regional international cooperation. The main intention of the author is to present the state of the security in Central America in XXI century by emphasizing failures and successes in the fight against transnational criminal organizations. Additionally we want to present and define the challenges currently facing the region now and to show the prediction of the situation’s development within next future and to define the recommendations on the design of public security policies in Central American countries.

Keywords: maras, public security, human rights, Central America

Procedia PDF Downloads 333
6407 Historical Analysis of the Evolution of Swiss Identity and the Successful Integration of Multilingualism into the Swiss Concept of Nationhood

Authors: James Beringer

Abstract:

Switzerland’s ability to forge a strong national identity across linguistic barriers has long been of interest to nationalism scholars. This begs the question of how this has been achieved, given that traditional explanations of luck or exceptionalism appear highly reductionist. This paper evaluates the theory that successful Swiss management of linguistic diversity stems from the strong integration of multilingualism into Swiss national identity. Using archival analysis of Swiss government records, historical accounts of prominent Swiss citizens, as well as secondary literature concerning the fundamental aspects of Swiss national identity, this paper charts the historical evolution of Swiss national identity. It explains how multilingualism was deliberately and successfully integrated into Swiss national identity as a response to political fragmentation along linguistic lines during the First World War. Its primary conclusions are the following. Firstly, the earliest foundations of Swiss national identity were purposefully removed from any association with a single national language. This produced symbols, myths, and values -such as a strong commitment to communalism, the imagery of the Swiss natural landscape, and the use of Latin expressions, which can be adopted across Swiss linguistic groups. Secondly, the First World War triggered a turning point in the evolution of Swiss national identity. The fundamental building blocks proved insufficient in preventing political fractures amongst linguistic lines, as each Swiss linguistic group gravitated towards its linguistic neighbours within Europe. To avoid a repeat of such fragmentation, a deliberate effort was made to fully integrate multilingualism as a fundamental aspect of Swiss national identity. Existing natural symbols, such as the St Gotthard Mountains, were recontextualized in order to become associated with multilingualism. The education system was similarly reformed to reflect the unique multilingual nature of the Swiss nation. The successful result of this process can be readily observed in polls and surveys, with large segments of the Swiss population highlighting multilingualism as a uniquely Swiss characteristic, indicating the symbiotic connection between multilingualism and the Swiss nation.

Keywords: language's role in identity formation, multilingualism in nationalism, national identity formation, Swiss national identity history

Procedia PDF Downloads 189
6406 Alternative Key Exchange Algorithm Based on Elliptic Curve Digital Signature Algorithm Certificate and Usage in Applications

Authors: A. Andreasyan, C. Connors

Abstract:

The Elliptic Curve Digital Signature algorithm-based X509v3 certificates are becoming more popular due to their short public and private key sizes. Moreover, these certificates can be stored in Internet of Things (IoT) devices, with limited resources, using less memory and transmitted in network security protocols, such as Internet Key Exchange (IKE), Transport Layer Security (TLS) and Secure Shell (SSH) with less bandwidth. The proposed method gives another advantage, in that it increases the performance of the above-mentioned protocols in terms of key exchange by saving one scalar multiplication operation.

Keywords: cryptography, elliptic curve digital signature algorithm, key exchange, network security protocol

Procedia PDF Downloads 146
6405 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 359
6404 Prevalence of Enterocytozoon hepatopenaei in Shrimp Cultured in Inland Saline Water

Authors: Naveen Kumar B. T., Anuj Tyagi, Prabjeet Singh, Shanthanagouda A. H., Sumeet Rai

Abstract:

Inland saline water resources are gaining the importance in expanding the aquaculture activities to mitigate the nutritional and food security issues of the world. For profitable and sustainable aquaculture practices, scientific farming, biosecurity measure, and best fish health management should be the integral part of developmental activities. Keeping in line with global awareness and trends, the Indian government has taken an innovative step to conduct disease surveillance and awareness programme for aquatic disease through network project. This ‘National Surveillance Programme for Aquatic Animal Diseases (NSPAAD)’ is being implemented in collaboration of national institutes and state agriculture universities with funding support from National Fisheries Development Board (NFDB), Govt. of India. Guru Angad Dev Veterinary and Animal Sciences University (GADVASU), Ludhiana, an NSPAAD collaborator, has been actively engaged in disease surveillance in the Indian state of Punjab. Shrimp farming in inland saline areas of Punjab is expanding at a tremendous pace under the guidance of GADVASU along with the support of State Fisheries Department. Under this national disease surveillance programme, we reported Enterocytozoon hepatopenaei (EHP) infection in the Litopenaeus vannamei cultured in the inland saline waters. Polymerase chain reaction (PCR) based diagnosis was carried out using the OIE (World Organisation for Animal Health) protocol. It was observed that out of 20 shrimp farms, two farms were 1st step PCR positive and two more farms were nested PCR positive. All the EHP positive ponds had shown the white faeces along with mortalities at very low rate. Therefore, implementation of biosecurity and continuous surveillance and monitoring program for finfish and shellfish aquaculture are in need of the hour to prevent and control the large-scale disease outbreaks and subsequent economic losses.

Keywords: disease, EHP, inland saline water, shrimp culture

Procedia PDF Downloads 262
6403 Analysis of Security Vulnerabilities for Mobile Health Applications

Authors: Yuli Paola Cifuentes Sanabria, Lina Paola Beltrán Beltrán, Leonardo Juan Ramírez López

Abstract:

The availability to deploy mobile applications for healthcare is increasing daily thru different mobile app stores. But within these capabilities the number of hacking attacks has also increased, in particular into medical mobile applications. The security vulnerabilities in medical mobile apps can be triggered by errors in code, incorrect logic, poor design, among other parameters. This is usually used by malicious attackers to steal or modify the users’ information. The aim of this research is to analyze the vulnerabilities detected in mobile medical apps according to risk factor standards defined by OWASP in 2014.

Keywords: mHealth apps, OWASP, protocols, security vulnerabilities, risk factors

Procedia PDF Downloads 517
6402 Towards a Secure Storage in Cloud Computing

Authors: Mohamed Elkholy, Ahmed Elfatatry

Abstract:

Cloud computing has emerged as a flexible computing paradigm that reshaped the Information Technology map. However, cloud computing brought about a number of security challenges as a result of the physical distribution of computational resources and the limited control that users have over the physical storage. This situation raises many security challenges for data integrity and confidentiality as well as authentication and access control. This work proposes a security mechanism for data integrity that allows a data owner to be aware of any modification that takes place to his data. The data integrity mechanism is integrated with an extended Kerberos authentication that ensures authorized access control. The proposed mechanism protects data confidentiality even if data are stored on an untrusted storage. The proposed mechanism has been evaluated against different types of attacks and proved its efficiency to protect cloud data storage from different malicious attacks.

Keywords: access control, data integrity, data confidentiality, Kerberos authentication, cloud security

Procedia PDF Downloads 335
6401 From Risk/Security Analysis via Timespace to a Model of Human Vulnerability and Human Security

Authors: Anders Troedsson

Abstract:

For us humans, risk and insecurity are intimately linked to vulnerabilities - where there is vulnerability, there is potentially risk and insecurity. Reducing vulnerability through compensatory measures means decreasing the likelihood of a certain external event be qualified as a risk/threat/assault, and thus also means increasing the individual’s sense of security. The paper suggests that a meaningful way to approach the study of risk/ insecurity is to organize thinking about the vulnerabilities that external phenomena evoke in humans as perceived by them. Such phenomena are, through a set of given vulnerabilities, potentially translated into perceptions of "insecurity." An ontological discussion about salient timespace characteristics of external phenomena as perceived by humans, including such which potentially can be qualified as risk/threat/assault, leads to the positing of two dimensions which are central for describing what in the paper is called the essence of risk/threat/assault. As is argued, such modeling helps analysis steer free of the subjective factor which is intimately connected to human perception and which mediates between phenomena “out there” potentially identified as risk/threat/assault, and their translation into an experience of security or insecurity. A proposed set of universally given vulnerabilities are scrutinized with the help of the two dimensions, resulting in a modeling effort featuring four realms of vulnerabilities which together represent a dynamic whole. This model in turn informs modeling on human security.

Keywords: human vulnerabilities, human security, immediate-inert, material-immaterial, timespace

Procedia PDF Downloads 297
6400 Design and Implementation of an Image Based System to Enhance the Security of ATM

Authors: Seyed Nima Tayarani Bathaie

Abstract:

In this paper, an image-receiving system was designed and implemented through optimization of object detection algorithms using Haar features. This optimized algorithm served as face and eye detection separately. Then, cascading them led to a clear image of the user. Utilization of this feature brought about higher security by preventing fraud. This attribute results from the fact that services will be given to the user on condition that a clear image of his face has already been captured which would exclude the inappropriate person. In order to expedite processing and eliminating unnecessary ones, the input image was compressed, a motion detection function was included in the program, and detection window size was confined.

Keywords: face detection algorithm, Haar features, security of ATM

Procedia PDF Downloads 419
6399 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 345
6398 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 128
6397 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 219
6396 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 684
6395 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 462
6394 Print Media Framing of National Disasters: A Content Analysis of the Daily Graphic and Daily Guide

Authors: Abena Abokoma Asemanyi

Abstract:

The study examined how the National Disasters are framed in the print media: a study of Daily Graphic newspaper in Ghana. The communication theories employed to conduct this study was Agenda Setting Theory by McCombs and Shaw and the Framing theory by Goffman and Entman. The media’s coverage of National Disasters are of much concern to the general public. This research seeks to know how the Daily Graphic framed National Disasters that occurred in January 2015 and June 2015 respectively. The January 2015 National Disasters was termed as Fire Outbreaks while the June 2015 National Disasters was Twin Disasters. A total of 43 disaster news stories were analysed for this study. Out of the total number, 9 headline stories were analysed in the month of January 2015 and 34 headline stories were looked at in the month of June 2015. The study came up with five (5) themes. Through Content Analysis, the study also revealed that the theme of Action featured more than the other themes which are Fear, Violence, Sympathy and Confusion. Finally, the study showed the number of days disaster news headlines lasted in the Daily Graphic during the period stated above. It was revealed that the Fire Outbreaks in January 2015 appeared in the Daily Graphic for 8 days while the Twin Disasters appeared in 16 days in June 2015.

Keywords: national disaster framing, ghana, daily graphic, daily guide

Procedia PDF Downloads 428
6393 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 526
6392 Empirical Testing of Hofstede’s Measures of National Culture: A Study in Four Countries

Authors: Nebojša Janićijević

Abstract:

At the end of 1970s, Dutch researcher Geert Hofstede, had conducted an enormous empirical research on the differences between national cultures. In his huge research, he had identified four dimensions of national culture according to which national cultures differ and determined the index for every dimension of national culture for each country that took part in his research. The index showed a country’s position on the continuum between the two extreme poles of the cultural dimensions. Since more than 40 years have passed since Hofstede's research, there is a doubt that, due to the changes in national cultures during that period, they are no longer a good basis for research. The aim of this research is to check the validity of Hofstee's indices of national culture The empirical study conducted in the branches of a multinational company in Serbia, France, the Netherlands and Denmark aimed to determine whether Hofstede’s measures of national culture dimensions are still valid. The sample consisted of 155 employees of one multinational company, where 40 employees came from three countries and 35 employees were from Serbia. The questionnaire that analyzed the positions of national cultures according to the Hofstede’s four dimensions was formulated on the basis of the initial Hofstede’s questionnaire, but it was much shorter and significantly simplified comparing to the original questionnaire. Such instrument had already been used in earlier researches. A statistical analysis of the obtained questionnaire results was done by a simple calculation of the frequency of the provided answers. Due to the limitations in methodology, sample size, instrument, and applied statistical methods, the aim of the study was not to explicitly test the accuracy Hofstede’s indexes but to enlighten the general position of the four observed countries in national culture dimensions and their mutual relations. The study results have indicated that the position of the four observed national cultures (Serbia, France, the Netherlands and Denmark) is precisely the same in three out of four dimensions as Hofstede had described in his research. Furthermore, the differences between national cultures and the relative relations between their positions in three dimensions of national culture correspond to Hofstede’s results. The only deviation from Hofstede’s results is concentrated around the masculinity–femininity dimension. In addition, the study revealed that the degree of power distance is a determinant when choosing leadership style. It has been found that national cultures with high power distance, like Serbia and France, favor one of the two authoritative leadership styles. On the other hand, countries with low power distance, such as the Netherlands and Denmark, prefer one of the forms of democratic leadership styles. This confirms Hofstede’s premises about the impact of power distance on leadership style. The key contribution of the study is that Hofstede’s national culture indexes are still a reliable tool for measuring the positions of countries in national culture dimensions, and they can be applied in the cross-cultural research in management. That was at least the case with four observed countries: Serbia, France, the Netherlands, and Denmark.

Keywords: national culture, leadership styles, power distance, collectivism, masculinity, uncertainty avoidance

Procedia PDF Downloads 74
6391 Internally Displaced Persons: Implication to National Development in Nigeria

Authors: Olasunkanmi G. Jeje, John G. Laah, Eunice S. A. Jeje

Abstract:

In recent times Nigeria has been bedeviled with political, religious and ethnic crises such as indigene/settler phenomena, Boko Haram etc. resulting in the emergence of internally displaced persons(IDPs), this has been a hunch on national development. Most states of the federation have had their share of one crisis or the other such as Jos, Yobe, Borno etc thereby affecting the economy of the country. These persons are uprooted from their residential locations of which they are active contributors to the national GDP. In addition, the attempt to rehabilitate them has gulped billions of naira for feeding, shelter and medicals etc., which is not adequate for such. However, the financing could have been used for projects such as capacity building and infrastructural development. Similarly, traumatic experience by this group of people is overwhelming as most of them are mainly the aged, women and children. Importantly, the active roles of youths that constitute the productive sector of the economy have also been truncated. Therefore, it is the prerogative of this research to examine the effect of IDP's on National Development and also to recommend solutions.

Keywords: development, implication, internally displaced persons, Nigeria

Procedia PDF Downloads 316
6390 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 126
6389 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset

Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor

Abstract:

The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.

Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques

Procedia PDF Downloads 11
6388 Attitude of Beef Cattle Farmers toward Biosecurity Practices

Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim

Abstract:

The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.

Keywords: attitude, beef cattle, biosecurity, farmers

Procedia PDF Downloads 296
6387 Criminal Attitude vs Transparency in the Arab World

Authors: Keroles Akram Saed Ghatas

Abstract:

The political violence that characterized 1992 continued into 1993, creating a major security crisis for President Hosni Mubarak's government as the death toll and human rights abuses soared. Increasingly sensitive to criticism of 's human rights activities, the government established human rights departments in key ministries, beginning with the Foreign Office in February. Similar offices have been set up in the Justice and Agriculture Ministries, and plans to set up an office in the Home Office have been announced. It turned out that the main task of the law unit was to overturn the conclusions of international human rights organizations.President Mubarak was elected in a national referendum on October 4 for a third six-year term after being appointed on July 21 by the People's Assembly, an elected parliament overwhelmingly dominated by the in-power National Democratic Party will Mr. Mubarak ran unhindered. The Interior Ministry announced that nearly 16 million people cast their votes (84% of eligible voters), of which 96.28%. voted for presidential re-election.In 1993, armed Islamic extremists escalated their attacks on Christian citizens, government officials, police officers and senior security officials, resulting in casualties among the intended victims and bystanders. Sporadic attacks on buses, boats and tourist attractions also occurred throughout the year. From March 1992 to October 28, 1993, a total of 222 people lost their lives in the riots: 36 Coptic Christians and 38 other citizens; If one is a foreigner; sixty-six members of the Security Forces; and seventy-six known or suspected activists who were killed while resisting arrest. The latter was killed in airstrikes and firefights with security forces and at the site of planned attacks. On March 9-10, a series of airstrikes in Cairo, Giza, Qalyubiya province north of the capital and Aswan killed fifteen suspected militants and five members of the security forces.One of the airstrikes in Giza, part of Greater Cairo, killed the wife and son of Khalifa Mahmoud Ramadan, a suspected militant who was himself killed. The government agency Middle East News Agency reported on March 10 that the raids were part of a "broad confrontational plan aimed at ofterrorist elements"The state of emergency declared in October 1981 after the assassination of President Anwar el-Sadat was still in force in Egypt. The law, previously in effect continuously from June 1967 to May 1980, continued to grant the executive branch unique legal powers that effectively overrode the human rights guarantees of the Egyptian constitution. These provisions included wide discretionary powers in arresting and detaining individuals, as well as the ability to try civilians in military courts. The Cairo-based Independent Organization for Human Rights said so in a document sent to the United Nations in July 1993The human rights committee said the continued imposition of the state of emergency had resulted in "another constitution for the country" and "led to widespread misconduct by the security apparatus".

Keywords: constitution, human rights, legal power, president, anwar, el-sadat, assassination, state of emergency, middle east, news, agency, confrontational, arresting, fugitive, leaders, terrorist, elements, armed islamic extremists.

Procedia PDF Downloads 44
6386 VCloud: A Security Framework for VANET

Authors: Wiseborn Manfe Danquah, D. Turgay Altilar

Abstract:

Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.

Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)

Procedia PDF Downloads 354
6385 Dynamics of Norms and Identities Facilitate Countries to Resolve Their Conflicts: A Case Study of ASEAN

Authors: Chander Shekhar Kohli

Abstract:

In the field of international relations, countries have been experiencing distinct nature of conflicts. But, in the case of Association of Southeast Asian Nations (ASEAN) for a long time, the members have witnessed conflicts, small and large. These conflicts, as a result, have given catastrophic outcomes, such as killings and destroying properties. For the resolution of such conflicts, nonetheless, efforts likewise have been made, simultaneously, in terms of establishing peace and security. In this background, the ASEAN presents a significant example as before it had faced several wars, like Vietnam War, Cambodia conflicts, and so on. This research paper, therefore, strives to examine the ASEAN as a case with the help of both primary and secondary sources. It likewise will be dealt with how changing norms and identity building facilitate the ASEAN countries to deal with their conflicts both internal and external. This paper also will discuss how internal developments within countries affect conflict resolution process as each member of ASEAN is guided by its national interest. It is then argued that conflict resolution in the ASEAN is moving from its existing power-based solution to norms and identity-based solution as member countries have become more dependent on other countries. The research, therefore, is concluded by saying that the conflicts could only be resolved through building norms and common identities, which of course are recognized crucial mechanisms among the ASEAN countries with some exceptions.

Keywords: ASEAN, conflict resolution, norms and identities, peace and security

Procedia PDF Downloads 207
6384 The Comparison of Dismount Skill between National and International Men’s Artistic Gymnastics in Parallel Bars Apparatus

Authors: Chen ChihYu, Tang Wen Tzu, Chen Kuang Hui

Abstract:

Aim —To compare the dismount skill between Taiwanese and elite international gymnastics in parallel bars following the 2017-2020 code of points. Methods—The gymnasts who advanced to the parallel bars event finals of these four competitions including World Championships, Universiade, the National Games of Taiwan, and the National Intercollegiate Athletic Games of Taiwan both 2017 and 2019 were selected in this study. The dismount skill of parallel bars was analyzed, and the average difficulty score was compared by one-way ANOVA. Descriptive statistics were applied to present the type of dismount skill and the difficulty of each gymnast in these four competitions. The data from World Championships and Universiade were combined as the international group (INT), and data of Taiwanese National Games and National Intercollegiate Athletic Games were also combined as the national group (NAT). The differences between INT and NAT were analyzed by the Chi-square test. The statistical significance of this study was set at α= 0.05. Results— i) There was a significant difference in the mean parallel bars dismount skill in these four competitions analyzed by one-way ANOVA. Both dismount scores of World Championships and Universiade were significantly higher than in Taiwanese National Games and National Intercollegiate Athletic Games (0.58±0.08 & 0.56±0.08 > 0.42±0.06 & 40±0.06, p < 0.05). ii) Most of the gymnasts in World Championships and Universiade selected the 0.6-point skill as the parallel bars dismount element, and for the Taiwanese National Games and the National Intercollegiate Athletic Games, most of the gymnasts performed the 0.4-point dismount skill. iii) The result of the Chi-square test has shown that there was a significant difference in the selection of parallel bars dismount skill. The INT group used the E or E+ difficulty element as the dismount skill, and the NAT group selected the D or D- difficulty element. Conclusion— The level of parallel bars dismount in Taiwanese gymnastics is inferior to elite international gymnastics. It is suggested that Taiwanese gymnastics must try to practice the F difficulty dismount (double salto forward tucked with half twist) in the future.

Keywords: Artistic Gymnastics World Championships, dismount, difficulty score, element

Procedia PDF Downloads 142
6383 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 90
6382 Federal Character Principle and the Challenges of National Integration in Nigeria: A Comparative Analysis of Some Federal Appointments under Jonathan and Buhari Administrations

Authors: Simon O. Obadahun, Samuel Otohinoyi

Abstract:

The Nigerian state is heterogeneous both in character and content. Efforts to manage this diversity has so far not yielded the desired result. This paper examines the Federal Character Principle as one of the instruments intended to manage our obvious diversity such that no part of the country is marginalized or feels marginalized or sidelined. The paper observed that the Federal Character Principle have not achieved its set objectives, which is national unity and loyalty. It draws from secondary sources and discovered that there are factors that make an equitable distribution of public appointments difficult which is beyond the powers of the federal character commission. The major argument of this paper is that if the Federal Character Commission as an organization expected to enforce this principle is not restructured and given more power to sanction individuals and organizations that are found of circumventing the relevant guidelines in this regards, the hope of national unity and loyalty will continue to be a mirage.

Keywords: appointments, federalism, federal character, national integration

Procedia PDF Downloads 332
6381 The Role of Community Gardens in Urban Food Security: A Case Study of the Thulubukele Community Farm in Newlands West

Authors: Nadine Ponnusamy

Abstract:

Reducing risks to food security resulting from climate change is recognized as one of the major challenges of the 21st century. The risks to food security have intensified, primarily due to globalization, a growing population, rapid urbanization, and the constantly evolving urban environment. One of the key challenges facing cities is the need to supply sufficient food to households amid increasing demand, which necessitates a continuous effort to enhance food production. Given the severity of climate change, it is imperative to adopt solutions to address food insecurity. Communities and individuals must explore sustainable livelihood options that do not harm the environment. Urban agriculture represents one of the many strategies that can be employed to improve household food security. The objective of this research is to establish the extent to which community gardens can enhance urban food security, focusing on the Thulubukele Community Farm in Newlands West, Durban. The researcher utilized a qualitative case study approach to gain insight into urban agriculture and food security within this context, while also examining the long-term impacts on food security and community development. The sampling method utilized for selecting participants and gathering information included purposive sampling. Since the study centers on urban agriculture, key stakeholders were specifically targeted. Participants were selected for interviews based on their involvement in the food garden. In-depth interviews were conducted to collect and analyze data. Secondary data from the literature facilitated a comparative analysis of similar case studies through precedent studies. This study demonstrates that growing food not only improves the nutritional value of the produce but also enhances household food security, enables individuals to generate disposable income, and facilitates significant contributions to the local community and other organizations in need.

Keywords: community gardens, food security, South Africa, urban agriculture

Procedia PDF Downloads 11
6380 An Extended Model for Sustainable Food and Nutrition Security in the Agrifood Sector

Authors: Ioannis Manikas

Abstract:

The increased consumer demand for environmentally friendly production and distribution practices and the stricter environmental regulations turned environmental aspects into important criteria in business decision-making. On the other hand, Food and Nutrition Security (FNS) has evolved dramatically during the last decades in theory and practice serving as a reference point for exchanging experiences among all agents involved in programs and projects to fostering policy and strategy development. Global pressures make it more important than ever to gain a better understanding of the contribution that agrifood businesses make to FNS and to examine ways to make them more resilient in an increasingly globalized and uncertain world. This study extends the standard three-dimensional model of sustainability to include two more dimensions: A technological dimension and a policy/political dimension. Apart from the economic, environmental and social dimensions regularly used in sustainability literature, the extended model will accurately represent the measures and policies addressing food and nutrition security.

Keywords: food and nutrition security, sustainability, food safety, resilience

Procedia PDF Downloads 339