Search results for: security laws
3060 Survival of Islamic Banking Services in Tanzania: A Quick Survey on Conflicting Legal Framework
Authors: Ayoub Ali Maulana
Abstract:
“The success and sustainability of an Islamic finance system depends on the ability to establish a comprehensive legal and regulatory framework that supports synergy amongst the components in the system”. Numbers of banks have introduced Islamic banking windows claiming that their products follow Islamic banking values without any compromise. National Bank of Commerce Limited, Stanbic Bank Limited, Kenya Commercial Bank, The Peoples Bank of Zanzibar and Amana Bank Limited are some of the banks which offer Islamic banking products in Tanzania. To date, there is no single provision in Tanzanian laws that speak of Islamic banking activities in the country. Despite the fact that consultancy commissioned to International Monetary Fund (IMF) to research on the best laws to govern Islamic banking industry in the country, the speed is not encouraging in making sure that the same is introduced as soon as possible. This paper highlights the trend of the banking services in Tanzania and examines the application of Islamic banking system in the Tanzanian conventional banking environment. In particular the paper considers whether the Islamic banking services in Tanzania can survive without an appropriate legal framework that accommodates it.Keywords: islamic banks, interest, islamic windows, Tanzania
Procedia PDF Downloads 3483059 Partnering with Stakeholders to Secure Digitization of Water
Authors: Sindhu Govardhan, Kenneth G. Crowther
Abstract:
Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.Keywords: cyber security, shared responsibility, IIOT, threat modelling
Procedia PDF Downloads 773058 Norms and Laws: Fate of Community Forestry in Jharkhand
Authors: Pawas Suren
Abstract:
The conflict between livelihood and forest protection has been a perpetual phenomenon in India. In the era of climate change, the problem is expected to aggravate the declining trend of dense forest in the country, creating impediments in the climate change adaptation by the forest dependent communities. In order to access the complexity of the problem, Hazarinagh and Chatra districts of Jharkhand were selected as a case study. To identify norms practiced by the communities to manage community forestry, the ethnographic study was designed to understand the values, traditions, and cultures of forest dependent communities, most of whom were tribal. It was observed that internalization of efficient forest norms is reflected in the pride and honor of such behavior while violators are sanctioned through guilt and shame. The study analyzes the effect of norms being practiced in the management and ecology of community forestry as common property resource. The light of the findings led towards the gaps in the prevalent forest laws to address efficient allocation of property rights. The conclusion embarks on reconsidering accepted factors of forest degradation in India.Keywords: climate change, common property resource, community forestry, norms
Procedia PDF Downloads 3433057 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm
Authors: Fairouz Beggas
Abstract:
Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.Keywords: arabic data, encryption, playfair, symmetric algorithm
Procedia PDF Downloads 873056 A Comparative Analysis of Geometric and Exponential Laws in Modelling the Distribution of the Duration of Daily Precipitation
Authors: Mounia El Hafyani, Khalid El Himdi
Abstract:
Precipitation is one of the key variables in water resource planning. The importance of modeling wet and dry durations is a crucial pointer in engineering hydrology. The objective of this study is to model and analyze the distribution of wet and dry durations. For this purpose, the daily rainfall data from 1967 to 2017 of the Moroccan city of Kenitra’s station are used. Three models are implemented for the distribution of wet and dry durations, namely the first-order Markov chain, the second-order Markov chain, and the truncated negative binomial law. The adherence of the data to the proposed models is evaluated using Chi-square and Kolmogorov-Smirnov tests. The Akaike information criterion is applied to assess the most effective model distribution. We go further and study the law of the number of wet and dry days among k consecutive days. The calculation of this law is done through an algorithm that we have implemented based on conditional laws. We complete our work by comparing the observed moments of the numbers of wet/dry days among k consecutive days to the calculated moment of the three estimated models. The study shows the effectiveness of our approach in modeling wet and dry durations of daily precipitation.Keywords: Markov chain, rainfall, truncated negative binomial law, wet and dry durations
Procedia PDF Downloads 1253055 Contingency Screening Using Risk Factor Considering Transmission Line Outage
Authors: M. Marsadek, A. Mohamed
Abstract:
Power system security analysis is the most time demanding process due to large number of possible contingencies that need to be analyzed. In a power system, any contingency resulting in security violation such as line overload or low voltage may occur for a number of reasons at any time. To efficiently rank a contingency, both probability and the extent of security violation must be considered so as not to underestimate the risk associated with the contingency. This paper proposed a contingency ranking method that take into account the probabilistic nature of power system and the severity of contingency by using a newly developed method based on risk factor. The proposed technique is implemented on IEEE 24-bus system.Keywords: line overload, low voltage, probability, risk factor, severity
Procedia PDF Downloads 5453054 Multi Criteria Authentication Method in Cognitive Radio Networks
Authors: Shokoufeh Monjezi Kouchak
Abstract:
Cognitive radio network (CRN) is future network .Without this network wireless devices can’t work appropriately in the next decades. Today, wireless devices use static spectrum access methods and these methods don’t use spectrums optimum so we need use dynamic spectrum access methods to solve shortage spectrum challenge and CR is a great device for DSA but first of all its challenges should be solved .security is one of these challenges .In this paper we provided a survey about CR security. You can see this survey in tables 1 to 7 .After that we proposed a multi criteria authentication method in CRN. Our criteria in this method are: sensing results, following sending data rules, position of secondary users and no talk zone. Finally we compared our method with other authentication methods.Keywords: authentication, cognitive radio, security, radio networks
Procedia PDF Downloads 3923053 Household Food Security and Poverty Reduction in Cameroon
Authors: Bougema Theodore Ntenkeh, Chi-bikom Barbara Kyien
Abstract:
The reduction of poverty and hunger sits at the heart of the United Nations 2030 Agenda for Sustainable Development, and are the first two of the Sustainable Development Goals. The World Food Day celebrated on the 16th of October every year, highlights the need for people to have physical and economic access at all times to enough nutritious and safe food to live a healthy and active life; while the world poverty day celebrated on the 17th of October is an opportunity to acknowledge the struggle of people living in poverty, a chance for them to make their concerns heard, and for the community to recognize and support poor people in their fight against poverty. The association between household food security and poverty reduction is not only sparse in Cameroon but mostly qualitative. The paper therefore investigates the effect of household food security on poverty reduction in Cameroon quantitatively using data from the Cameroon Household Consumption Survey collected by the Government Statistics Office. The methodology employed five indicators of household food security using the Multiple Correspondence Analysis and poverty is captured as a dummy variable. Using a control function technique, with pre and post estimation test for robustness, the study postulates that household food security has a positive and significant effect on poverty reduction in Cameroon. A unit increase in the food security score reduces the probability of the household being poor by 31.8%, and this effect is statistically significant at 1%. The result further illustrates that the age of the household head and household size increases household poverty while households residing in urban areas are significantly less poor. The paper therefore recommends that households should diversify their food intake to enhance an effective supply of labour in the job market as a strategy to reduce household poverty. Furthermore, family planning methods should be encouraged as a strategy to reduce birth rate for an equitable distribution of household resources including food while the government of Cameroon should also develop the rural areas given that trend in urbanization are associated with the concentration of productive economic activities, leading to increase household income, increased household food security and poverty reduction.Keywords: food security, poverty reduction, SDGs, Cameroon
Procedia PDF Downloads 773052 The Impact of Corporate Governance Mechanisms on Dividend Policy
Authors: Tahar Tayachi, Ahlam Alrehaili
Abstract:
Purpose: The purpose of this paper is to investigate the relationship between the corporate board characteristics and the dividend policy among firms on the Saudi Stock Exchange. Design/Methodology/Approach: This paper uses a sample of 103 nonfinancial firms over a time period of 4 years from 2015 to 2018. To investigate how corporate governance mechanisms such as board independence, the board size, frequency of meetings, and free cash flow impact dividends, the study uses Logit and Tobit models. Findings: This paper finds that board size, board independence, and frequency of board meetings have no influence on a firm’s decision to pay dividends, while board size has a significantly positive impact on the levels of cash dividends paid to investors. This study also finds that the level of free cash flows has a positively significant influence on both the decision to pay dividends and the magnitude of dividend payouts. Research Limitations/Implications: This paper attempts to study the effectiveness of dividend policy among some firms on the Saudi Stock Exchange. Practical Implications: The findings reveal that board characteristics, which represent one of the crucial mechanisms of corporate governance, were found to be complementary to corporate laws and regulations imposed on the Saudi market in 2015. The findings also imply that capital market authorities should revise their corporate regulations and ensure that protection laws are adequate and strong enough to protect the interests of all shareholders. Originality/Value: This paper is among the few studies focusing on dividend policy in Saudi Arabia. Finally, these findings suggest that the improvements in corporate laws in Saudi Arabia led to such an outcome, and it has become prevalent in dividend policy decisions and behaviors of Saudi firms.Keywords: agency theory, Tobit, corporate governance, dividend payout, Logit
Procedia PDF Downloads 2043051 Pakistan Nuclear Security: Threats from Non-State Actors
Authors: Jennifer Wright
Abstract:
The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism
Procedia PDF Downloads 2263050 Design and Construction of Vehicle Tracking System with Global Positioning System/Global System for Mobile Communication Technology
Authors: Bala Adamu Malami
Abstract:
The necessity of low-cost electronic vehicle/car security designed in coordination with other security measures is always there in our society to reduce the risk of vehicle intrusion. Keeping this problem in mind, we are designing an automatic GPS system which is technology to build an integrated and fully customized vehicle to detect the movement of the vehicle and also serve as a security system at a reasonable cost. Users can locate the vehicle's position via GPS by using the Google Maps application to show vehicle coordinates on a smartphone. The tracking system uses a Global System for Mobile Communication (GSM) modem for communication between the mobile station and the microcontroller to send and receive commands. Further design can be improved to capture the vehicle movement range and alert the vehicle owner when the vehicle is out of range.Keywords: electronic, GPS, GSM modem, communication, vehicle
Procedia PDF Downloads 993049 Bypassing Docker Transport Layer Security Using Remote Code Execution
Authors: Michael J. Hahn
Abstract:
Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.Keywords: cloud, cryptography, Docker, Linux, security
Procedia PDF Downloads 1983048 Emotional Security in Relation to Students' Emotional Efficiency
Authors: Ibtisam Mahmoud Mohammed Sultan
Abstract:
The present research aimed to identify the level of both emotional and emotional competence among students in Tikrit University aimed to know the assumptions in statistical significance for both variables as gender variables (m-f) and specialty (scientific-humanistic), as research to learn what Relationship between emotional safety and efficiency alanfaalet Tikrit University students. The researcher built emotional security measure (54) as built measure emotional competence (46), as the researcher extract full alsaykomtrih characteristics of both scales. The research sample consisted of (600) students selected by the random way and applying the scales on a basic search sample and processed statistical data using a variety of methods, including statistical test (test T.) and Pearson correlation coefficient, the researcher found a set of results. The following: 1. that the Tikrit University students possess a high level of emotional security. 2. to safely enjoy passionate males more than females. 3. that there is no difference between students of scientific and humanitarian specialization in variable emotional security. 4. that the Tikrit University students enjoy a high level of emotional competence. 5. the female-male outperforming in emotional competence level. 6. the humanitarian specialization students Excel in emotional competence for those of specialty. 7. the existence of a positive correlation between variables. Through search results, the researcher has developed a set of conclusions, proposals, and recommendations.Keywords: relation, emotional security, students, efficiency
Procedia PDF Downloads 1203047 Classifying Time Independent Plane Symmetric Spacetime through Noether`s Approach
Authors: Nazish Iftikhar, Adil Jhangeer, Tayyaba Naz
Abstract:
The universe is expanding at an accelerated rate. Symmetries are useful in understanding universe’s behavior. Emmy Noether reported the relation between symmetries and conservation laws. These symmetries are known as Noether symmetries which correspond to a conserved quantity. In differential equations, conservation laws play an important role. Noether symmetries are helpful in modified theories of gravity. Time independent plane symmetric spacetime was classified by Noether`s theorem. By using Noether`s theorem, set of linear partial differential equations was obtained having A(r), B(r) and F(r) as unknown radial functions. The Lagrangian corresponding to considered spacetime in the Noether equation was used to get Noether operators. Different possibilities of radial functions were considered. Firstly, all functions were same. All the functions were considered as non-zero constant, linear, reciprocal and exponential respectively. Secondly, two functions were proportional to each other keeping third function different. Second case has four subcases in which four different relationships between A(r), B(r) and F(r) were discussed. In all cases, we obtained nontrivial Noether operators including gauge term. Conserved quantities for each Noether operators were also presented.Keywords: Noether gauge symmetries, radial function, Noether operator, conserved quantities
Procedia PDF Downloads 2303046 Investigation of Scaling Laws for Stiffness and strength in Bioinspired Glass Sponge Structures Produced by Fused Filament Fabrication
Authors: Hassan Beigi Rizi, Harold Auradou, Lamine Hattali
Abstract:
Various industries, including civil engineering, automotive, aerospace, and biomedical fields, are currently seeking novel and innovative high-performance lightweight materials to reduce energy consumption. Inspired by the structure of Euplectella Aspergillum Glass Sponges (EA-sponge), 2D unit cells were created and fabricated using a Fused Filament Fabrication (FFF) process with Polylactic acid (PLA) filaments. The stiffness and strength of bio-inspired EA-sponge lattices were investigated both experimentally and numerically under uniaxial tensile loading and are compared to three standard square lattices with diagonal struts (Designs B and C) and non-diagonal struts (Design D) reinforcements. The aim is to establish predictive scaling laws models and examine the deformation mechanisms involved. The results indicated that for the EA-sponge structure, the relative moduli and yield strength scaled linearly with relative density, suggesting that the deformation mechanism is stretching-dominated. The Finite element analysis (FEA), with periodic boundary conditions for volumetric homogenization, confirms these trends and goes beyond the experimental limits imposed by the FFF printing process. Therefore, the stretching-dominated behavior, investigated from 0.1 to 0.5 relative density, demonstrate that the study of EA-sponge structure can be exploited for the realization of square lattice topologies that are stiff and strong and have attractive potential for lightweight structural applications. However, the FFF process introduces an accuracy limitation, with approximately 10% error, making it challenging to print structures with a relative density below 0.2. Future work could focus on exploring the impact of different printing materials on the performance of EA-sponge structures.Keywords: bio-inspiration, lattice structures, fused filament fabrication, scaling laws
Procedia PDF Downloads 53045 Robust Data Image Watermarking for Data Security
Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan
Abstract:
In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms
Procedia PDF Downloads 5153044 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques
Authors: John Onyima, Ikechukwu Ezepue
Abstract:
Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection
Procedia PDF Downloads 3053043 The Influence of the Islamic State (IS) on India: Recent Developments and Challenges
Authors: Alvite Singh Ningthoujam
Abstract:
The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively.Keywords: India, Islamic State, Muslim, Security
Procedia PDF Downloads 3763042 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 1853041 Recognition and Enforcement of Foreign Decree Divorces in India with Special Reference to the Hindu Marriage Act, 1955
Authors: Poonamdeep kaur
Abstract:
With the increase in number of Non-Resident Indian marriages there is also increase in foreign decree divorces which inevitably causes the problem of recognition and enforcement of foreign judgments in India. The Hindus in India are governed by the Hindu Marriage Act, 1956. According to the said Act the courts in India have jurisdiction to try the matrimonial dispute if the marriage is performed in India or the parties to the marriage have domicile in India irrespective of their nationality status. But, sometimes one of the parties to the marriage whose marriage is solemnized in India obtains divorce in foreign courts and prays for the recognition and enforcement of such divorce in India. In such case section 13 of the Indian Civil Procedure Code, 1908, comes into play for the recognition and enforcement of foreign divorces in India. The section makes a foreign judgment conclusive in India subject to the fulfilment of certain conditions. Even if a foreign decree divorce is given on personal connecting factors of the parties to the matrimonial dispute like domicile, such divorce may still be refused recognition in India by virtue of section 13 of the Indian Civil Procedure Code, 1908. It is a universal truth that municipal law of countries is not the same throughout the world. Comity plays an important role in recognition and enforcing a foreign judgment, but, now in India the principle is not applied mechanically as the divorce matter is dealt strictly with regard to Indian Law. So in this paper there will be deep analysis of Indian case laws relating to recognition and enforcement of foreign divorces and based on this a comparative study will be made with the laws of Canada and England on the same subject to find out whether the Indian law on recognition and Enforcement of foreign judgment are in line with the laws of Canada and England and whether in recent years the Indian courts have evolved some new principles of private international law to deal with limping marriages. At last conclusions will be drawn out from the comparative study and suggestions would be given to make the rules of recognition and enforcement of foreign judgments on divorce more certain.Keywords: divorce, foreign decree, private international law, recognition and enforcement of foreign judgment
Procedia PDF Downloads 1913040 Inadequacy and Inefficiency of the Scoping Requirements in the Preparation of Environmental Impact Assessment Reports for Dam and Reservoir Projects in Thailand
Authors: Natsuda Rattamanee
Abstract:
Like other countries, Thailand continually experiences strong protests against dam and reservoir proposals, especially large-scale projects. The protestors are constantly worried about the potential significant adverse impacts of the projects on the environment and society. Although project proponents are required by laws to assess the environmental and social impacts of the dam proposals by making environmental impact assessment (EIA) reports and finding mitigation measures before implementing the plans, the outcomes of the assessments often do not lessen the affected people and public’s concerns about the potential negative effects of the projects. One of the main reasons is that Thailand does not have a proper and efficient law to regulate project proponents when determining the scope of environmental impact assessments. Scoping is the crucial second stage of the preparation of an EIA report. The appropriate scope of assessments will allow EIA studies to focus only on the significant effects of the proposed project on particular resources, areas, and communities. It will offer crucial and sufficient information to the decision-makers and the public. The decision to implement the dam and reservoir projects considered based on the assessments with a proper scoping will eventually be more widely accepted by the public and reduce community opposition. The research work seeks to identify flaws in the current requirements of scoping steps under Thai laws and regulations and proposes recommendations to improve the legal scheme. The paper explores the well-established United States laws and relevant rules regulating how lead agencies determine the scope of their environmental impact assessments and some guidelines concerning scoping published by dominant institutions. Policymakers and legislature will find the results of studies helpful in improving the scoping-step requirements of EIA for dam and reservoir projects and reducing the level of anti-dam protests in Thailand.Keywords: dam and reservoir, EIA, environmental impact assessment, law, scoping, Thailand
Procedia PDF Downloads 883039 Female Frontline Health Workers in High-Risk Workplaces: Legal Protection in Bangladesh amid the Covid-19 Pandemic
Authors: Nabila Farhin, Israt Jahan
Abstract:
Despite the feminisation of the global health force, women mostly engage in nursing, midwifery and community health workers (HWs), and the posts like surgeons, doctors, and specialists are generally male-dominated. It is also prominent in Bangladesh, where female HWs witness systematic workplace inequalities, discrimination, and underpayment. The Covid-19 pandemic put unsurmountable pressure on HWs as they had to serve in high-risk workplaces as frontliners. The already disadvantaged female HWs shouldered the same burden, were overworked without adequate occupational health and safety measures (OSH) and risked their lives. Acknowledging their vulnerable workplace conditions, the World Health Organization (WHO) and International Labour Organization (ILO) circulated a few specialised guidelines amid the peril. Bangladesh tried to adhere to international guidelines while formulating pandemic management strategies. In reality, the already weak and understaffed health sector collapsed with the patient influx and many HWs got infected and died in the line of duty, exposing the high-risk nature of the work. Unfortunately, the gender-segregated data of infected HWs are absent. This qualitative research investigates whether the existing laws of Bangladesh are adequate in protecting female HWs as frontliners in high-risk workplaces during the Covid-19 pandemic. The paper first examines international labour laws safeguarding female frontline HWs. It also analyses the specialised Covid-19 pandemic guidelines protecting their interests. Finally, the research investigates the compliance of Bangladesh as per international legal guidance during the pandemic. In doing so, it explores the domestic laws, professional guidelines for HWs and pandemic response strategies. The paper critically examines the primary sources like international and national statutes, rules, regulations and guidelines. Secondary sources like authoritative journal articles, books and newspaper reports are contextually analysed in line with the objective of the paper. The definition of HW is ambiguous in the labour laws of Bangladesh. It leads to confusion regarding the extent of legal protection rendered to female HWs at private hospitals in high-risk situations. The labour laws are not applicable in Public hospitals, as the employees follow the public service rules. Unfortunately, the country has no specialised law to protect HWs in high-risk workplaces, and the professional guidelines for HWs also remain inadequate in this regard. Even though the pandemic management strategies highlight some protective measures in high-risk situations, they only deal with HWs who are pregnant or have underlying health issues. No specialised protective guidelines can be found for female HWs as frontliners. Therefore, the laws are insufficient and failed to render adequate legal protection to female frontline HWs during the pandemic. The country also lacks comprehensive health legislation and uniform institutional and professional guidelines, preventing them from accessing grievance mechanisms. Hence, the female HWs felt victimised while duty-bound to serve in high-risk workplaces without adequate safeguards. Bangladesh should clarify the definition of HWs and standardise the service rules for providing medical care in high-risk workplaces. The research also recommends adequate health legislation and specialised legal protection to safeguard female HWs in future emergencies.Keywords: female health workers (HWs), high-risk workplaces, Covid-19 pandemic, Bangladesh
Procedia PDF Downloads 783038 Physically Informed Kernels for Wave Loading Prediction
Authors: Daniel James Pitchforth, Timothy James Rogers, Ulf Tyge Tygesen, Elizabeth Jane Cross
Abstract:
Wave loading is a primary cause of fatigue within offshore structures and its quantification presents a challenging and important subtask within the SHM framework. The accurate representation of physics in such environments is difficult, however, driving the development of data-driven techniques in recent years. Within many industrial applications, empirical laws remain the preferred method of wave loading prediction due to their low computational cost and ease of implementation. This paper aims to develop an approach that combines data-driven Gaussian process models with physical empirical solutions for wave loading, including Morison’s Equation. The aim here is to incorporate physics directly into the covariance function (kernel) of the Gaussian process, enforcing derived behaviors whilst still allowing enough flexibility to account for phenomena such as vortex shedding, which may not be represented within the empirical laws. The combined approach has a number of advantages, including improved performance over either component used independently and interpretable hyperparameters.Keywords: offshore structures, Gaussian processes, Physics informed machine learning, Kernel design
Procedia PDF Downloads 1923037 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 1563036 Social and Political Economy of Paid and Unpaid Work: Work of Women Home Based Workers in National Capital Region (NCR), India
Authors: Sudeshna Sengupta
Abstract:
Women’s work lives weave a complex fabric of myriad work relations and complex structures. Lives, when seen from the lens of work, is a saga of conjugated oppression by intertwined structures that are vertically and horizontally interwoven in a very complex manner. Women interact with multiple institutions through their work. The interactions and interplay of institutions shape their organization of work. They intersperse productive work with reproductive work, unpaid economic activities with unpaid care work, and all kinds of activities with leisure and self-care. The proposed paper intends to understand how women working as home-based workers in the National Capital Region (NCR) of India are organizing their everyday work, and how the organization of work is influenced by the interplay of structures. Situating itself in a multidisciplinary theoretical framework, this paper brings out how the gendering of work is playing out in the political, economic and social domain and shaping the work-life within the family, and in the paid workspace. The paper will use a primary data source, which is qualitative in nature. It will comprise 15 qualitative interviews of women home-based workers from the National Capital Region. The research uses a life history approach. The sampling was purposive using snowballing as a method. The dataset is part of the primary data (qualitative) collected for the ongoing Ph.D. work in Gender Studies at Ambedkar University Delhi. The home-based workers interviewed were in “non-factory” wage relations based on piece rates with flexible working hours. Their workplaces were their own homes with no spatial divide between living spaces and workspaces. Home-based workers were recognized as a group in the domain of labor economics in the 1980s. When menial work was cheaper than machine work, the capital owners preferred to outsource work as home-based work to women. These production spaces are fragmented and the identity of gender is created within labor processes to favor material accumulation. Both the employers and employees acknowledged the material gain of the capital owner when work was subcontracted to women at home. Simultaneously the market reinforced women’s reproductive role by conforming to patriarchal ideology. The contractors played an important role in implementing localized control on workers and also in finding workers for fragmented, gendered production processes. Their presence helped the employers in bringing together multiple forms of oppression that ranged from creating a structure to flout laws by creating shadow employers. It created an intertwined social and economic structure as well as a workspace where the line between productive and reproductive work gets blurred. The state invisibilized itself either by keeping the sector out of the domain of laws or by not implementing its own laws regulating working conditions or social security. It allowed the local hierarchy to function and define localized working conditions. The productive reproductive continuum reveals a labor control that influenced both the productive and reproductive work of women.Keywords: informal sector, paid work, women workers, labor processes
Procedia PDF Downloads 1613035 Formal Verification for Ethereum Smart Contract Using Coq
Authors: Xia Yang, Zheng Yang, Haiyong Sun, Yan Fang, Jingyu Liu, Jia Song
Abstract:
The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts.Keywords: smart contract, formal verification, Ethereum, Coq
Procedia PDF Downloads 6913034 LGBT+ Migrants: A Cultural and Legislative Comparison in Canada, Italy and Egypt
Authors: Andreas Aceranti, Simonetta Vernocchi, Federica Brondoni, Marco Colorato, Marta Primatesta
Abstract:
This study entitled “LGBT+ migrants: a cultural and legislative comparison in Canada, Italy and Egypt” suggests an analysis of the living conditions of migrants who are members of the LGBT+ community in Canada, Italy and Egypt. The acronym LGBT+ refers to lesbian, gay, bisexual, transgender and all other gender identities and sexual orientations that do not fit into the male and female binary. This study aims at reflecting on the living conditions of LGBT+ migrants and the relatable difficulties they may face due to the culture and laws of their countries. Migratory flows were examined by providing a definition of "migrant" and the choices that drive a person to migrate elsewhere explained, followed by a focus on the recognition of refugee status related to sexual orientation and gender identity. Furthermore, we will deal with Canada, Italy and Egypt respectively, by analyzing for each country the history and rise of the LGBT+ community, the different laws and especially the migrants’ rights. Finally, the services and associations designed to provide a response to the needs of these people will be analyzed, highlighting the branches which nowadays operate in those areas and the importance of the cultural mediator.Keywords: LGBTQ+, migrants, international rights, discrimination
Procedia PDF Downloads 1123033 Examining Child Rape Provisions of Bangladesh in Comparison with Other South Asian Countries
Authors: Monira Nazmi Jahan
Abstract:
Child rape or child abuse is a serious and fearsome crime against children, which is an epidemic almost in every state of today’s world. However, in the case of Bangladesh, the scenario is terrifying. The objective of this paper is to examine the laws relating to child rape in Bangladesh as according to a renowned Daily Newspaper 'Prothom Alo', nearly 346 children are being raped since January 2019. This paper discusses and draws the difference of child rape provisions of Bangladesh with other South-Asian countries, comprises of India, Maldives, Pakistan, Sri Lanka, Nepal, Bhutan, and Afghanistan. In Bangladesh, girls below 18 years are considered to be a child. ‘The Penal Code, 1860’ and a special law ‘Nari O Shishu Nirjatan Daman Ain, 2012’ provides that any person committing child rape will be punished with rigorous life imprisonment and fine. This piece of law also gives provisions for punishment in case of child’s death after the commission of rape and gang rape, and the punishment is the death penalty. In India there is ‘The Protection of Children from Sexual Offences Act, 2012’ (POSCO) which has separate provisions for sexual assault, penetrative sexual assault and aggravated penetrative sexual assault by different categories of person such as relatives, institutional officers and trustees and also for mentally and physically challenged child victims and provides punishment up to death penalty. In Pakistan, there is ‘Pakistan Penal Code Amended Act, 2016’ which has only two provisions for child rape. In case offence committed by one person, the punishment is 10 to 25 years of imprisonment and fine. In case of offence committed by two or more persons, each shall be liable to death or imprisonment for life. Unfortunately, Afghanistan has no laws for the protection of rape victims of women let alone children, whereas there are a lot of child rape cases, including both girls and boys who are used for sexual slavery. The Maldives has a special law named ‘Special Provisions Act to Deal with Child Sex Abuse Offenders.’ This has categorized the offenders like POSCO and has provided punishments accordingly. The punishments are: punishments range from 1 to 25 years accordingly, whereas Bangladesh has lesser provisions, but the gravity and duration of punishments are much higher. The Penal Code of Sri Lanka imposes a minimum sentence of 10 years for those convicted of raping a child under 18 years. In Bhutan, child rape provision is made according to the age of a child. ‘The Penal Code of Bhutan, 2004’, mentions provisions for the rape of a child in case of child rape below and above 12 years, gang rape of a child below and above 12 years and has graded the punishments as first, second and third degree. Though Bangladesh has better provisions for punishments, the ages are not categorized in the laws. In Nepal there is ‘Act relating to Children, 2018’ provisions are made for offenders who use or cause or engage child sexual exploitation, and the punishment is same for rape offenders according to prevailing laws in Nepal. No separate punishments for child offenders are made. The ultimate conclusion that can be drawn is Bangladesh has better punishments than all other South-Asian countries and same punishment as India however, Bangladesh can make or amend the laws and categorize offenders as like POSCO of India, Special provisions of Maldives and Bhutan.Keywords: child rape, death penalty, sexual slavery, South Asia
Procedia PDF Downloads 1103032 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis
Authors: Sarthak Mishra, Astha Sinha
Abstract:
There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats
Procedia PDF Downloads 2323031 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria
Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue
Abstract:
The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.Keywords: personal variables, students, perception, school security
Procedia PDF Downloads 77