Search results for: income security
3846 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security
Authors: Rhisan Mae Enriquez-Morales
Abstract:
The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea
Procedia PDF Downloads 3933845 Determining Disparities in the Distribution of the Energy Efficiency Resource through the History of Michigan Policy
Authors: M. Benjamin Stacey
Abstract:
Energy efficiency has been increasingly recognized as a high value resource through state policies that require utility companies to implement efficiency programs. While policymakers have recognized the statewide economic, environmental, and health related value to residents who rely on this grid supplied resource, varying interests in energy efficiency between socioeconomic groups stands undifferentiated in most state legislation. Instead, the benefits are oftentimes assumed to be distributed equitably across these groups. Despite this fact, these policies are frequently sited by advocacy groups, regulatory bodies and utility companies for their ability to address the negative financial, health and other social impacts of energy poverty in low income communities. Yet, while most states like Michigan require programs that target low income consumers, oftentimes no requirements exist for the equitable investment and energy savings for low income consumers, nor does it stipulate minimal spending levels on low income programs. To further understand the impact of the absence of these factors in legislation, this study examines the distribution of program funds and energy efficiency savings to answer a fundamental energy justice concern; Are there disparities in the investment and benefits of energy efficiency programs between socioeconomic groups? This study compiles data covering the history of Michigan’s Energy Efficiency policy implementation from 2010-2016, analyzing the energy efficiency portfolios of Michigan’s two main energy providers. To make accurate comparisons between these two energy providers' investments and energy savings in low and non-low income programs, the socioeconomic variation for each utility coverage area was captured and accounted for using GIS and US Census data. Interestingly, this study found that both providers invested more equitably in natural gas efficiency programs, however, together these providers invested roughly three times less per household in low income electricity efficiency programs, which resulted in ten times less electricity savings per household. This study also compares variation in commission approved utility plans and actual spending and savings results, with varying patterns pointing to differing portfolio management strategies between companies. This study reveals that for the history of the implementation of Michigan’s Energy Efficiency Policy, that the 35% of Michigan’s population who qualify as low income have received substantially disproportionate funding and energy savings because of the policy. This study provides an overview of results from a social perspective, raises concerns about the impact on energy poverty and equity between consumer groups and is an applicable tool for law makers, regulatory agencies, utility portfolio managers, and advocacy groups concerned with addressing issues related to energy poverty.Keywords: energy efficiency, energy justice, low income, state policy
Procedia PDF Downloads 1873844 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 3453843 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults
Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer
Abstract:
Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security
Procedia PDF Downloads 1283842 Main Chaos-Based Image Encryption Algorithm
Authors: Ibtissem Talbi
Abstract:
During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich
Procedia PDF Downloads 6843841 Modelling the Long Rune of Aggregate Import Demand in Libya
Authors: Said Yousif Khairi
Abstract:
Being a developing economy, imports of capital, raw materials and manufactories goods are vital for sustainable economic growth. In 2006, Libya imported LD 8 billion (US$ 6.25 billion) which composed of mainly machinery and transport equipment (49.3%), raw material (18%), and food products and live animals (13%). This represented about 10% of GDP. Thus, it is pertinent to investigate factors affecting the amount of Libyan imports. An econometric model representing the aggregate import demand for Libya was developed and estimated using the bounds test procedure, which based on an unrestricted error correction model (UECM). The data employed for the estimation was from 1970–2010. The results of the bounds test revealed that the volume of imports and its determinants namely real income, consumer price index and exchange rate are co-integrated. The findings indicate that the demand for imports is inelastic with respect to income, index price level and The exchange rate variable in the short run is statistically significant. In the long run, the income elasticity is elastic while the price elasticity and the exchange rate remains inelastic. This indicates that imports are important elements for Libyan economic growth in the long run.Keywords: import demand, UECM, bounds test, Libya
Procedia PDF Downloads 3613840 Gendered Effects on Productivity Gap Due to Information Asymmetry
Authors: Shruti Sengupta
Abstract:
According to the nationally representative data, about 73% of India's rural workforce is engaged in agriculture. While women make significant contributions to total agriculture production, they contribute to about one-third in India. In terms of gender composition, about 80% of the female and 69% of the male workforce is engaged in agriculture in rural India. Still, it is common to find gender differences in plot management within the household. In the last two and half years, India's agri-food system has undergone several changes due to this pandemic, both the demand and supply side, making agriculture more information and knowledge-intensive. Therefore, this paper investigates, using a nationally representative sample, how information asymmetry affects the net returns per hectare of land between female and male farm managers. Empirical results show that information intensity has a significant positive effect on net farm returns per hectare. Results suggest that if females have the same access to technical information as their male counterparts, their farm income can go up by .96 pp compared to male-headed farms. Results also indicate that literate females have higher farm incomes than non-literate females. The study contributes to the literature by employing gender differentials in farm income due to the information gap.Keywords: agriculture, gender, information asymmetry, farm income, social bias
Procedia PDF Downloads 1423839 Service Quality in Thai Tourism: An Experience of Inbound Tourists Visited Bangkok, Thailand
Authors: Sudawan Somjai
Abstract:
The purposes of this research were to investigate the five important perceptions of service quality from inbound tourists who visited Bangkok, Thailand in the first quarter of 2014. Data were collected from over 10 important tourist destinations in Bangkok. The independent variables of this study included gender, age, levels of education, occupation, income, and country of origin while the dependent variables included their experience, opinion, and comment on the service received during visited tourist destinations. A simple random sampling method was performed to obtain 400 respondents. The respondents were both male and female in the same proportion. However, the majority were between 31-40 years old. Most were married with an undergraduate degree. Most were considered themselves as middle income with an average income of the respondents was between $30,001-40,000 per year. The findings revealed that the majority of respondents came to Bangkok because of low cost and high quality of tourism. The majority came to Bangkok for the first time and spent about 10 days in Thailand. The five important service perceptions that were observed by the inbound tourists in descending order according to mean were reliable of service provider, proper time of service provider, competency of service provider, neat and clean of service provider, and politeness of service provider.Keywords: experience, inbound tourists, perception, service quality
Procedia PDF Downloads 3583838 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy
Authors: Babatunde Osabiya
Abstract:
Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.Keywords: security risk, legal framework, cyber security and policy, national security
Procedia PDF Downloads 933837 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)
Authors: Yousef Farhaoui
Abstract:
An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).Keywords: intrusion detection, architectures, characteristic, tools, security
Procedia PDF Downloads 4623836 Gendered Effects on Productivity Gap Due to Information Asymmetry in India
Authors: Shruti Sengupta
Abstract:
According to the nationally representative data, about 73% of India's rural workforce is engaged in agriculture. While women make significant contributions to total agriculture production, they contribute to about one-third in India. In terms of gender composition, about 80% of the female and 69% of the male workforce is engaged in agriculture in rural India. Still, it is common to find gender differences in plot management within the household. In the last two and half years, India's agri-food system has undergone several changes due to this pandemic, both the demand and supply side, making agriculture more information and knowledge-intensive. Therefore, this paper investigates, using a nationally representative sample, how information asymmetry affects the net returns per hectare of land between female and male farm managers. Empirical results show that information intensity has a significant positive effect on net farm returns per hectare. Results suggest that if females have the same access to technical information as their male counterparts, their farm income can go up by .96 pp compared to male-headed farms. Results also indicate that literate females have higher farm incomes than non-literate females. The study contributes to the literature by employing gender differentials in farm income due to the information gap.Keywords: agriculture, gender, information asymmetry, farm income, social bias
Procedia PDF Downloads 1043835 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia
Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey
Abstract:
Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.Keywords: food security, migrants, strategies, inferential statistics
Procedia PDF Downloads 5263834 Trade Outcomes of Agri-Environmental Regulations’ Heterogeneity: New Evidence from a Gravity Model
Authors: Najla Kamergi
Abstract:
In a world context of increasing interest in environmental issues, this paper investigates the effect of agri-environmental regulations heterogeneity on the volume of crop commodities’ exports using a theoretically justified gravity model of Anderson and van Wincoop (2003) for the 2003–2013 period. Our findings show that the difference in exporter and importer environmental regulations is more relevant to agricultural trade than trade agreements. In fact, the environmental gap between the two partners is decreasing slightly but significantly crop commodities’ exports according to our results. We also note that the sector of fruit and vegetables is more sensitive to this determinant, unlike cereals that remain relatively less affected. Furthermore, high-income countries have more tendency to trade with countries characterized by similar environmental stringency. Further results show that the BRICS are clearly importing from developed countries where the environmental difference is relatively important. It is likely that emerging countries are witnessing a growing demand for high-quality and “green” crop commodities captured by high-income exporters. Surprisingly, our results suggest that low and middle-income countries with the same level of environmental stringency are more likely to trade crop commodities.Keywords: agricultural trade, environment, gravity model, food crops, agri-environmental efficiency, DEA
Procedia PDF Downloads 1363833 Managing Risks of Civil War: Accounting Practices in Egyptian Households
Authors: Sumohon Matilal, Neveen Abdelrehim
Abstract:
The purpose of this study is to examine the way households manage the risks of civil war, using the calculative practices of accounting as a lens. As is the case with other social phenomena, accounting serves as a conduit for attributing values and rationales to crisis and in the process makes it visible and calculable. Our focus, in particular, is on the dialogue facilitated by the numerical logic of accounting between the householder and a crisis scenario, such as civil war. In other words, we seek to study how the risk of war is rationalized through household budgets, income and expenditure statements etc. and how such accounting constructs in turn shape attitudes toward earnings and spending in a wartime economy. The existing literature on war and accounting demonstrates how an accounting logic can have potentially destabilising consequences and how it is used to legitimise war. However, very few scholars have looked at the way accounting constructs are used to internalise the effects of war in an average household and the behavioural consequences that arise from such accounting. Relatedly, scholars studying household accounting have mostly focussed on the links between gender and hierarchy in relation to managing the financial affairs. Few have focused on the role of household accounts in a crisis scenario. This study intends to fill this gap. We draw upon Egypt, a country in the middle of civil war since 2011 for our purpose. We intend to carry out 15-20 semi-structured interviews with middle income households in Cairo that maintain some form of accounts to study the following issues: 1. How do people internalise the risks of civil war? What kind of accounting constructs do they use (this may take the form of simple budgets, income-expenditure notes/statements on a periodic basis, spreadsheets etc.) 2. How has civil war affected household expenditure? Are people spending more/less than before? 3. How has civil war affected household income? Are people finding it difficult/easy to survive on the pre-war income? 4. How is such accounting affecting household behaviour towards earnings and expenditure? Are families prioritising expenditure on necessities alone? Are they refraining from indulging in luxuries? Are family members doing two or three jobs to cope with difficult times? Are families increasingly turning toward borrowing? Is credit available? From whom?Keywords: risk, accounting, war, crisis
Procedia PDF Downloads 2013832 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique
Authors: Veysel Çelik, Aynur Aker, Ebru Güç
Abstract:
Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy
Procedia PDF Downloads 1263831 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 113830 Teachers' Mental Health: Perceived Social Justice and Life Satisfaction
Authors: Yan Li, Qi-Fan Jia, Jie Zhou
Abstract:
In today’s China, primary and secondary teachers are living a hard life with high pressure but low payment, which results in a sense of unfair and less satisfaction of life. However, teachers’ life satisfaction is a significant factor of their mental health and plays an important role in the development and progress of the society. This study was aimed to explore the effect of teachers’ perception of social justice on life satisfaction. 450 primary and secondary teachers from China were measured with life satisfaction scales, social justice scales, income satisfaction scale, job satisfaction scale, pressure condition scale, and major life event scale. Results showed their pressure is significantly higher than average, while life satisfaction, job satisfaction, income satisfaction and perceived social justice are lower. Hierarchical regression analysis showed that demographic variables, i.e., gender, age, education level and matric status, and factors related to occupation, i.e., professional title, school type and working hours per day cannot predict teachers’ life satisfaction. Teachers who had worked for 11-20 years had a lower life satisfaction compared to those with 1-5 years working experience. However, social status, monthly household income, income satisfaction, as well as job satisfaction were positively related to life satisfaction, whereas pressure condition was negatively related to it. After controlling for demographic factors and individual attitudes, social justice still had a positive effect on life satisfaction, among which distributive justice played a more important role than procedural justice. The suggestions on teachers’ condition in China and the implications for education reform to improve teachers’ mental health are discussed.Keywords: life satisfaction, mental health, primary and secondary teachers, social justice
Procedia PDF Downloads 3183829 Numerical Board Game for Low-Income Preschoolers
Authors: Gozde Inal Kiziltepe, Ozgun Uyanik
Abstract:
There is growing evidence that socioeconomic (SES)-related differences in mathematical knowledge primarily start in early childhood period. Preschoolers from low-income families are likely to perform substantially worse in mathematical knowledge than their counterparts from middle and higher income families. The differences are seen on a wide range of recognizing written numerals, counting, adding and subtracting, and comparing numerical magnitudes. Early differences in numerical knowledge have a permanent effect childrens’ mathematical knowledge in other grades. In this respect, analyzing the effect of number board game on the number knowledge of 48-60 month-old children from disadvantaged low-income families constitutes the main objective of the study. Participants were the 71 preschoolers from a childcare center which served low-income urban families. Children were randomly assigned to the number board condition or to the color board condition. The number board condition included 35 children and the color board game condition included 36 children. Both board games were 50 cm long and 30 cm high; had ‘The Great Race’ written across the top; and included 11 horizontally arranged, different colored squares of equal sizes with the leftmost square labeled ‘Start’. The numerical board had the numbers 1–10 in the rightmost 10 squares; the color board had different colors in those squares. A rabbit or a bear token were presented to children for selecting, and on each trial spun a spinner to determine whether the token would move one or two spaces. The number condition spinner had a ‘1’ half and a ‘2’ half; the color condition spinner had colors that matched the colors of the squares on the board. Children met one-on-one with an experimenter for four 15- to 20-min sessions within a 2-week period. In the first and fourth sessions, children were administered identical pretest and posttest measures of numerical knowledge. All children were presented three numerical tasks and one subtest presented in the following order: counting, numerical magnitude comparison, numerical identification and Count Objects – Circle Number Probe subtest of Early Numeracy Assessment. In addition, same numerical tasks and subtest were given as a follow-up test four weeks after the post-test administration. Findings obtained from the study; showed that there was a meaningful difference between scores of children who played a color board game in favor of children who played number board game.Keywords: low income, numerical board game, numerical knowledge, preschool education
Procedia PDF Downloads 3533828 Attitude of Beef Cattle Farmers toward Biosecurity Practices
Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim
Abstract:
The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.Keywords: attitude, beef cattle, biosecurity, farmers
Procedia PDF Downloads 2963827 VCloud: A Security Framework for VANET
Authors: Wiseborn Manfe Danquah, D. Turgay Altilar
Abstract:
Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)
Procedia PDF Downloads 3543826 Educational Institutional Approach for Livelihood Improvement and Sustainable Development
Authors: William Kerua
Abstract:
The PNG University of Technology (Unitech) has mandatory access to teaching, research and extension education. Given such function, the Agriculture Department has established the ‘South Pacific Institute of Sustainable Agriculture and Rural Development (SPISARD)’ in 2004. SPISARD is established as a vehicle to improve farming systems practiced in selected villages by undertaking pluralistic extension method through ‘Educational Institutional Approach’. Unlike other models, SPISARD’s educational institutional approach stresses on improving the whole farming systems practiced in a holistic manner and has a two-fold focus. The first is to understand the farming communities and improve the productivity of the farming systems in a sustainable way to increase income, improve nutrition and food security as well as livelihood enhancement trainings. The second is to enrich the Department’s curriculum through teaching, research, extension and getting inputs from farming community. SPISARD has established number of model villages in various provinces in Papua New Guinea (PNG) and with many positive outcome and success stories. Adaption of ‘educational institutional approach’ thus binds research, extension and training into one package with the use of students and academic staff through model village establishment in delivering development and extension to communities. This centre (SPISARD) coordinates the activities of the model village programs and linkages. The key to the development of the farming systems is establishing and coordinating linkages, collaboration, and developing partnerships both within and external institutions, organizations and agencies. SPISARD has a six-point step strategy for the development of sustainable agriculture and rural development. These steps are (i) establish contact and identify model villages, (ii) development of model village resource centres for research and trainings, (iii) conduct baseline surveys to identify problems/needs of model villages, (iv) development of solution strategies, (v) implementation and (vi) evaluation of impact of solution programs. SPISARD envisages that the farming systems practiced being improved if the villages can be made the centre of SPISARD activities. Therefore, SPISARD has developed a model village approach to channel rural development. The model village when established become the conduit points where teaching, training, research, and technology transfer takes place. This approach is again different and unique to the existing ones, in that, the development process take place in the farmers’ environment with immediate ‘real time’ feedback mechanisms based on the farmers’ perspective and satisfaction. So far, we have developed 14 model villages and have conducted 75 trainings in 21 different areas/topics in 8 provinces to a total of 2,832 participants of both sex. The aim of these trainings is to directly participate with farmers in the pursuit to improving their farming systems to increase productivity, income and to secure food security and nutrition, thus to improve their livelihood.Keywords: development, educational institutional approach, livelihood improvement, sustainable agriculture
Procedia PDF Downloads 1543825 The Effect of Satisfaction with the Internet on Online Shopping Attitude With TAM Approach Controlled By Gender
Authors: Velly Anatasia
Abstract:
In the last few decades extensive research has been conducted into information technology (IT) adoption, testing a series of factors considered to be essential for improved diffusion. Some studies analyze IT characteristics such as usefulness, ease of use and/or security, others focus on the emotions and experiences of users and a third group attempts to determine the importance of socioeconomic user characteristics such as gender, educational level and income. The situation is similar regarding e-commerce, where the majority of studies have taken for granted the importance of including these variables when studying e-commerce adoption, as these were believed to explain or forecast who buys or who will buy on the internet. Nowadays, the internet has become a marketplace suitable for all ages and incomes and both genders and thus the prejudices linked to the advisability of selling certain products should be revised. The objective of this study is to test whether the socioeconomic characteristics of experienced e-shoppers such as gender rally moderate the effect of their perceptions of online shopping behavior. Current development of the online environment and the experience acquired by individuals from previous e-purchases can attenuate or even nullify the effect of these characteristics. The individuals analyzed are experienced e-shoppers i.e. individuals who often make purchases on the internet. The Technology Acceptance Model (TAM) was broadened to include previous use of the internet and perceived self-efficacy. The perceptions and behavior of e-shoppers are based on their own experiences. The information obtained will be tested using questionnaires which were distributed and self-administered to respondent accustomed using internet. The causal model is estimated using structural equation modeling techniques (SEM), followed by tests of the moderating effect of socioeconomic variables on perceptions and online shopping behavior. The expected findings of this study indicated that gender moderate neither the influence of previous use of the internet nor the perceptions of e-commerce. In short, they do not condition the behavior of the experienced e-shopper.Keywords: Internet shopping, age groups, gender, income, electronic commerce
Procedia PDF Downloads 3363824 Enhancing Healthcare Data Protection and Security
Authors: Joseph Udofia, Isaac Olufadewa
Abstract:
Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.Keywords: cloud security, healthcare, cybersecurity, policy and standard
Procedia PDF Downloads 903823 Parental Education and Income Influencing Knowledge, Attitudes, and Perceptions of Oral Health Self-Care Practices
Abstract:
Oral health behaviors such as dietary preferences and tooth brushing are acquired during a child’s primary socialization period yet many oral health promotion interventions are implemented without taking into account the role and impact of parental influence in supporting healthy oral health behaviors. The aim and objective of this study was to determine the relationship between parental income and level of education with knowledge, attitudes and perceptions of oral health care practices. Methods: The study design was cross-sectional and exploratory, and data collection occurred in two phases. Phase 1 comprised of a self-administered questionnaire. The sample consisted of parents of 313 Grade 1 learners aged between 5-6 years old attending one of twelve selected public primary schools in the Chatsworth Circuit, Durban, South Africa. Phase 2 comprised of focus group discussions held at 5 purposively selected schools. Data collection comprised of a semi-structured face-to-face group interview with the objective of obtaining a deeper understanding of parental knowledge, attitudes and perceptions of dental caries. Results and Discussion: Almost 56% of participants earned a monthly income of less than R6000 (600 US dollars). Nearly three quarters (77.5%) of participants indicated that they did not have medical aid/insurance scheme. More than three-quarters of the participants (76.6%) identified diet as being the primary cause of decayed teeth. More than half of the study sample (56.1%) indicated that milk teeth were important and that rotten teeth (74.6%) could affect the child’s health. Almost half (49.8%) of participants reported that “bad teeth” were inherited. With more than two-thirds of the participants (77.7%), having at most a high school education, there was a correlation between the level of the caregiver’s education and the oral health care of the child. The analysis of the correlation between a child having decayed teeth and income (p=.007); and the manner in which the income is received (p=.003) was statistically significant. The results indicate that more effort needs to be placed in understanding parental knowledge, perceptions and attitudes towards dental caries. Parental level of education, income and oral health literacy is shown to be related to attitudes, and perceptions towards dental caries and its subsequent preventive measures. These findings have important implications for oral health planning at community and facility-based levels.Keywords: oral health prevention, parental education, dental caries, attitudes and perceptions
Procedia PDF Downloads 3853822 Household Food Insecurity and Associated Coping Strategies in Urban, Peri-Urban and Rural Settings: A Case of Morogoro and Iringa Towns, Tanzania
Authors: U. Tumaini, J. Msuya
Abstract:
Food insecurity is a worrying challenge worldwide with sub-Saharan Africa including Tanzania being the most affected. Although factors that influence household food access security status and ways of coping with such factors have been examined, little has been reported on how these coping strategies vary along the urban-rural continuum especially in medium-sized towns. The purpose of this study was to identify food insecurity coping strategies employed by households and assess whether they are similar along the urban-rural continuum. The study was cross-sectional in design whereby a random sample of 279 households was interviewed using structured questionnaire. Data were analysed using Statistical Package for Social Sciences (SPSS) Version 20 software. It was revealed that the proportion of households relying on less preferred and quality foods, eating fewer meals per day, undertaking work for food or money, performing farm and off-farm activities, and selling fall back assets was higher in rural settings compared to urban and peri-urban areas. Similarly, more households in urban and peri-urban areas cope with food access insecurity by having strict food budgets compared to those in rural households (p ≤ 0.001). The study concludes that food insecurity coping strategies vary significantly from one spatial entity to another. It is thereby recommended that poor, particularly rural households should be supported to diversify their income-generating activities not only for food security purposes during times of food shortage but also as businesses aimed at increasing their household incomes.Keywords: food coping strategies, household food insecurity, medium-sized towns, urban-rural continuum
Procedia PDF Downloads 3283821 Distribution Urban Public Spaces Among Riyadh Residential Neighborhoods
Authors: Abdulwahab Alalyani, Mahbub Rashid
Abstract:
Urban Open Space (UOS) a central role to promotes community health, including daily activities, but these resources may not available, accessible enough, and or equitably be distributed. This paper measures and compares spatial equity of the availability and accessibility UOS among low, middle, and high-income neighborhoods in Riyadh city. The measurement mothdulgy for the UOSavailability was by calculating the total of UOS with respect to the population total (m2/inhabitant) and the accessibility indicted by using walking distance of a 0.25 mi (0.4 km) buffering streets network.All UOS were mapped and measured using geographical information systems. To evaluate the significant differences in UOS availability and accessibility across low, medium, and high-income Riyadh neighborhoods, we used a One-way ANOVA analysis of covariance to test the differences.The findings are as follows; finding, UOSavailability was lower than global standers. Riyadh has only 1.13 m2 per capita of UOS, and the coverage accessible area by walking distance to UOS was lower than 50%. The final finding, spatial equity of the availability and accessibility, were significantly different among Riyadh neighborhoods based on socioeconomic status. The future development of UOS should be focused on increasing Urban park availability and should be given priority to those low-income and unhealthy communities.Keywords: distribution urban open space, urban open space accessibility, spatial equity, riyadh city
Procedia PDF Downloads 1033820 The Impacts of Natural Resources-Funded Infrastructure Investment in Africa: Evidence from Guinea-Bissau
Authors: Julio Vicente Cateia
Abstract:
This study aims to analyze the economic impacts of infrastructure investment in Africa, focusing on the Guinea-Bissau economy. Through a dynamic CGE model, we find that the natural resource revenues (or aid)-funded infrastructure investments generate externalities that increase factor returns. The private investment improvements propagate externalities effects on GDP and job opportunities outcomes. Household income and consumption were positively impacted, though the poorer benefited the most. The income inequality has reduced. However, funding by the mix of debt and direct taxes produces opposite effects. We suggest a potential pro-poor growth agenda in Africa.Keywords: infrastructure investment, poverty alleviation, CGE modeling, African economies, applied economics
Procedia PDF Downloads 1393819 An Extended Model for Sustainable Food and Nutrition Security in the Agrifood Sector
Authors: Ioannis Manikas
Abstract:
The increased consumer demand for environmentally friendly production and distribution practices and the stricter environmental regulations turned environmental aspects into important criteria in business decision-making. On the other hand, Food and Nutrition Security (FNS) has evolved dramatically during the last decades in theory and practice serving as a reference point for exchanging experiences among all agents involved in programs and projects to fostering policy and strategy development. Global pressures make it more important than ever to gain a better understanding of the contribution that agrifood businesses make to FNS and to examine ways to make them more resilient in an increasingly globalized and uncertain world. This study extends the standard three-dimensional model of sustainability to include two more dimensions: A technological dimension and a policy/political dimension. Apart from the economic, environmental and social dimensions regularly used in sustainability literature, the extended model will accurately represent the measures and policies addressing food and nutrition security.Keywords: food and nutrition security, sustainability, food safety, resilience
Procedia PDF Downloads 3393818 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications
Authors: Chieh-Fu Chang, Wan-Hsin Hsieh
Abstract:
We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.Keywords: security, IWE, cliff effect, space communications
Procedia PDF Downloads 4253817 Ensuring Cyber Security Using Kippo Honeypots
Authors: S. Vivekananda Pandian
Abstract:
A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.Keywords: attackers, security, Kippo Honeypots, virtual machine
Procedia PDF Downloads 427