Search results for: social security reform
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 11672

Search results for: social security reform

11162 Impact of Ethiopia's Productive Safety Net Program on Household Dietary Diversity and Child Nutrition in Rural Ethiopia

Authors: Tagel Gebrehiwot, Carolina Castilla

Abstract:

Food insecurity and child malnutrition are among the most critical issues in Ethiopia. Accordingly, different reform programs have been carried to improve household food security. The Food Security Program (FSP) (among others) was introduced to combat the persistent food insecurity problem in the country. The FSP combines a safety net component called the Productive Safety Net Program (PSNP) started in 2005. The goal of PSNP is to offer multi-annual transfers, such as food, cash or a combination of both to chronically food insecure households to break the cycle of food aid. Food or cash transfers are the main elements of PSNP. The case for cash transfers builds on the Sen’s analysis of ‘entitlement to food’, where he argues that restoring access to food by improving demand is a more effective and sustainable response to food insecurity than food aid. Cash-based schemes offer a greater choice of use of the transfer and can allow a greater diversity of food choice. It has been proven that dietary diversity is positively associated with the key pillars of food security. Thus, dietary diversity is considered as a measure of household’s capacity to access a variety of food groups. Studies of dietary diversity among Ethiopian rural households are somewhat rare and there is still a dearth of evidence on the impact of PSNP on household dietary diversity. In this paper, we examine the impact of the Ethiopia’s PSNP on household dietary diversity and child nutrition using panel household surveys. We employed different methodologies for identification. We exploit the exogenous increase in kebeles’ PSNP budget to identify the effect of the change in the amount of money households received in transfers between 2012 and 2014 on the change in dietary diversity. We use three different approaches to identify this effect: two-stage least squares, reduced form IV, and generalized propensity score matching using a continuous treatment. The results indicate the increase in PSNP transfers between 2012 and 2014 had no effect on household dietary diversity. Estimates for different household dietary indicators reveal that the effect of the change in the cash transfer received by the household is statistically and economically insignificant. This finding is robust to different identification strategies and the inclusion of control variables that determine eligibility to become a PSNP beneficiary. To identify the effect of PSNP participation on children height-for-age and stunting we use a difference-in-difference approach. We use children between 2 and 5 in 2012 as a baseline because by then they have achieved long-term failure to grow. The treatment group comprises children ages 2 to 5 in 2014 in PSNP participant households. While changes in height-for-age take time, two years of additional transfers among children who were not born or under the age of 2-3 in 2012 have the potential to make a considerable impact on reducing the prevalence of stunting. The results indicate that participation in PSNP had no effect on child nutrition measured as height-for-age or probability of beings stunted, suggesting that PSNP should be designed in a more nutrition-sensitive way.

Keywords: continuous treatment, dietary diversity, impact, nutrition security

Procedia PDF Downloads 309
11161 Chaos Cryptography in Cloud Architectures with Lower Latency

Authors: Mohammad A. Alia

Abstract:

With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.

Keywords: chaos, cloud computing, security, cryptography

Procedia PDF Downloads 326
11160 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults

Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer

Abstract:

Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.

Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security

Procedia PDF Downloads 107
11159 Main Chaos-Based Image Encryption Algorithm

Authors: Ibtissem Talbi

Abstract:

During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.

Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich

Procedia PDF Downloads 666
11158 Limiting Freedom of Expression to Fight Radicalization: The 'Silencing' of Terrorists Does Not Always Allow Rights to 'Speak Loudly'

Authors: Arianna Vedaschi

Abstract:

This paper addresses the relationship between freedom of expression, national security and radicalization. Is it still possible to talk about a balance between the first two elements? Or, due to the intrusion of the third, is it more appropriate to consider freedom of expression as “permanently disfigured” by securitarian concerns? In this study, both the legislative and the judicial level are taken into account and the comparative method is employed in order to provide the reader with a complete framework of relevant issues and a workable set of solutions. The analysis moves from the finding according to which the tension between free speech and national security has become a major issue in democratic countries, whose very essence is continuously endangered by the ever-changing and multi-faceted threat of international terrorism. In particular, a change in terrorist groups’ recruiting pattern, attracting more and more people by way of a cutting-edge communicative strategy, often employing sophisticated technology as a radicalization tool, has called on law-makers to modify their approach to dangerous speech. While traditional constitutional and criminal law used to punish speech only if it explicitly and directly incited the commission of a criminal action (“cause-effect” model), so-called glorification offences – punishing mere ideological support for terrorism, often on the web – are becoming commonplace in the comparative scenario. Although this is direct, and even somehow understandable, consequence of the impending terrorist menace, this research shows many problematic issues connected to such a preventive approach. First, from a predominantly theoretical point of view, this trend negatively impacts on the already blurred line between permissible and prohibited speech. Second, from a pragmatic point of view, such legislative tools are not always suitable to keep up with ongoing developments of both terrorist groups and their use of technology. In other words, there is a risk that such measures become outdated even before their application. Indeed, it seems hard to still talk about a proper balance: what was previously clearly perceived as a balancing of values (freedom of speech v. public security) has turned, in many cases, into a hierarchy with security at its apex. In light of these findings, this paper concludes that such a complex issue would perhaps be better dealt with through a combination of policies: not only criminalizing ‘terrorist speech,’ which should be relegated to a last resort tool, but acting at an even earlier stage, i.e., trying to prevent dangerous speech itself. This might be done by promoting social cohesion and the inclusion of minorities, so as to reduce the probability of people considering terrorist groups as a “viable option” to deal with the lack of identification within their social contexts.

Keywords: radicalization, free speech, international terrorism, national security

Procedia PDF Downloads 179
11157 Time for the United Kingdom to Implement Statutory Clawback Provision on Directors’ Remunerations: Lessons and Experiences from the United States and the Netherlands

Authors: John Kong Shan Ho

Abstract:

Senior executives’ remunerations of public companies have aroused much debate and attention in the media. In the aftermath of the Global Financial Crisis (GFC), excessive executive pay arrangements were blamed for contributing to excessive risk-taking, which caused the financial meltdown. Since then, regulators and lawmakers around the world have introduced regulations to strengthen the corporate governance of listed companies. A key aspect of such reform is by strengthening regulatory intervention over executives’ remunerations and increasing the transparency of such information. This article is written against such background and examines the recent proposal by the UK BEIS to ask the FRC to amend the UK Corporate Governance Code (UKCGC) to strengthen clawback provisions for directors’ remuneration in listed companies as part of its audit reform. The article examines the background and debates regarding the possible implementation of such a measure in the UK. Contrary to the BEIS’ proposal, it argues that implementing it through the UKCGC is unlikely to enhance overall corporate governance and audit quality. It argues that the UK should follow the footsteps of its US and Dutch counterparts by enacting legislation to claw back directors’ remunerations. It will also provide some recommendations as to the key factors that need to be considered in drafting such a statutory provision.

Keywords: company law, corporate governance, agency problem, directors' remunerations, clawbacks

Procedia PDF Downloads 105
11156 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy

Authors: Babatunde Osabiya

Abstract:

Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.

Keywords: security risk, legal framework, cyber security and policy, national security

Procedia PDF Downloads 71
11155 The Professionalization of Teachers in the Context of the Development of a Future-Oriented Technical and Vocational Education and Training System in Egypt

Authors: Sherin Ahmed El-Badry Sadek

Abstract:

In this research, it is scientifically examined what contribution the professionalization of teachers can make to the development of a future-oriented vocational education and training system in Egypt. For this purpose, a needs assessment of the Egyptian vocational training system with the central actors and prevailing structures forms the foundation of the study, which theoretically underpinned with the attempt to resolve to some extent the tension between Luhmann's systems theory approach and the actor-centered theory of professional teacher competence. The vocational education system, in particular, must be adaptable and flexible due to the rapidly changing qualification requirements. In view of the pace of technological progress and the associated market changes, vocational training is no longer to be understood only as an educational tool aimed at those who achieve poorer academic performance or are not motivated to take up a degree. Rather, it is to be understood as a cornerstone for the development of society, and international experience shows that it is the core of lifelong learning. But to what extent have the education systems been able to react to these changes in their political, social, and technological systems? And how effective and sustainable are these changes actually? The vocational training system, in particular, has a particular impact on other social systems, which is why the appropriate parameters with the greatest leverage must be identified and adapted. Even if systems and structures are highly relevant, teachers must not hide behind them and must instead strive to develop further and to constantly learn. Despite numerous initiatives and programs to reform vocational training in Egypt, including the EU-funded Technical and Vocational Education and Training (TVET) reform phase I and phase II, the fit of the skilled workers to the needs of the labor market is still insufficient. Surveys show that the majority of employers are very dissatisfied with the graduates that the vocational training system produces. The data was collected through guideline-based interviews with experts from the education system and relevant neighboring systems, which allowed me to reconstruct central in-depth structures, as well as patterns of action and interpretation, in order to subsequently feed these into a matrix of recommendations for action. These recommendations are addressed to different decision-makers and stakeholders and are intended to serve as an impetus for the sustainable improvement of the Egyptian vocational training system. The research findings have shown that education, and in particular vocational training, is a political field that is characterized by a high degree of complexity and which is embedded in a barely manageable, highly branched landscape of structures and actors. At the same time, the vocational training system is not only determined by endogenous factors but also increasingly shaped by the dynamics of the environment and the neighboring social subsystems, with a mutual dependency relationship becoming apparent. These interactions must be taken into account in all decisions, even if prioritization of measures and thus a clear sequence and process orientation are of great urgency.

Keywords: competence orientation, educational policies, education systems, expert interviews, globalization, organizational development, professionalization, systems theory, teacher training, TVET system, vocational training

Procedia PDF Downloads 122
11154 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 441
11153 The Effect of Artificial Intelligence on Human Rights Obligations and Theories

Authors: Sameh Sarwat Melek Mikheal

Abstract:

The relationship between development and human rights has long been the subject of academic debate. To understand the dynamics between these two concepts, various principles are adopted, from the right to development to development-based human rights. Despite the initiatives taken, the relationship between development and human rights remains unclear. However, the overlap between these two views and the idea that efforts should be made in the field of human rights have increased in recent years. It is then evaluated whether the right to sustainable development is acceptable or not. This article concludes that the principles of sustainable development are directly or indirectly recognized in various human rights instruments, and this is a good answer to the question posed above. This book therefore cites regional and international human rights agreements such as , as well as the jurisprudence and interpretative guidelines of human rights institutions, to prove this hypothesis.

Keywords: balance, counter-terrorism, cyber-terrorism, human rights, security, violation sustainable development, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 25
11152 Compact Settlement: The Direction of Chinese Future Urban Residential Area Sustainable Development

Authors: Yajing Jiang, Jing Wu

Abstract:

Residential area construction links many problems such as population resources, ecology, social values, public services and transportation in the city. After Chinese housing reform, a large number of residential area development accompanied by the loss of agricultural and ecological land. To explore the future of Chinese urban residential area, this article concentrates on how the 'Compact Settlement' behaves in improving the living environment and saving the resources. Through the research of residential area in Hangzhou, there are some determines that increasing the development intensity of the area can indeed bring some improvement in the overall environment. In conclusion, possible design alternatives are discussed for leading Chinese urban development towards a more sustainable path.

Keywords: compact city development, environmental sustainability, residential area, Hangzhou

Procedia PDF Downloads 288
11151 New Public Management at Public Administration in Bangladesh: An Exploratory Study

Authors: Biback Das

Abstract:

New Public Management, a phenomenal tool, which is used to enforcing in public administration in different country’s to enhance the capacities. Since the 1980s, New Public Management (NPM) is primarily focusing to modernize the public sector. From the initial period, many developed countries such as UK, New Zealand, Australia, and the USA are applied in their administration to modernize. Almost 1990s, it has been applied in many developing countries. This study can describe the real situations of NPM based administration. Bangladesh Government has taken many projects to reform the public sector under NPM. Even many Development Agencies like UN, UNDP, World Bank, Asian Development Bank and so on, along with many developed countries also invested and prescribed to take NPM based reform that can to restructure the public sector so that it can maximize the efforts to provide the better service. This study examines using many factors that effects work on Public Administration in Bangladesh and also assessing its endeavor to adopt in it. Although Government has taken such initiatives to implement NPM originated reform, it’s not effectively been implemented to bring positive change about as per NPM objectives. This study mainly examines some initiatives in Bangladesh that have the influence of NPM as well as some drawbacks that can’t help the satisfaction of these initiatives. This article help to identify the efforts of many development agencies providing a fund to enhance the NPM based projects with their specific conditions that are prescribed by them helping to get fund. Therefore, to establish effective public management or to follow NPM model, Bangladesh need having an institutional framework, sound rule of law, proper structure, effective civil service system, appropriate checks, and balances to restructure the public sector help along with donor agencies ad implement in it. Bangladesh Government has applied its recent days to enhance the capabilities in its Public Administration. Moreover, this study mainly identifies how the designing strategies, program formulating, its implementation in various sector such as education, health sector etc. and how to reduce the backdrop the during problem by smooth functioning. This paper is also assessing the influence of many projects like PPP (Public-Private and Partnership) to work along with private organizations for smooth service delivery. Accordingly, this paper briefly reviews how it applies in a global context following the taken many initiatives and the consequences of Bangladesh context.

Keywords: new public management, capacity building, conditionalities, service delivery, public-private-partnership

Procedia PDF Downloads 118
11150 Orientation towards Social Entrepreneurship-Prioritary: Givens for Overcoming Social Inequality

Authors: Revaz Gvelesiani

Abstract:

Nowadays, social inequality increasingly strengthens the trend from business entrepreneurship to social entrepreneurship. It can be said that business entrepreneurs, according to their interests, move towards social entrepreneurship. Effectively operating markets create mechanisms, which lead to 'good' behavior. This is the most important feature of the rationally functioning society. As for the prospects of social entrepreneurship, expansion of entrepreneurship concept at the social arena may lead to such an outcome, when people who are skeptical about business, become more open towards entrepreneurship as a type of activity. This is the way which by means of increased participation in entrepreneurship promotes fair distribution of wealth. Today 'entrepreneurship for all' is still a dream, although the one, which may come true.

Keywords: social entrepreneurship, business entrepreneurship, functions of entrepreneurship, social inequality, social interests, interest groups, interest conflicts

Procedia PDF Downloads 339
11149 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 104
11148 The Dynamics of Jordanian Socio-Political Satire after the Arab Spring

Authors: Yousef Barahmeh

Abstract:

There is a wide cultural belief that Jordanians are po-faced and unable to produce humour and satire. However, in the light of the harbingers of the Arab Spring in the early 2011, socio-political satire has thrived notably in social media as a rigorous act of critique and dissent against the institutionalized discourse. This paper seeks to explore the case study of Ahmad Hassan al-Zou’bi’s satirical articles and Facebook posts in the context of theories of satire and digital politics. Al-Zou’bi is the most prominent and prolific Jordanian satirist who rose to prominence after the Arab Spring. The analysis shows that his satirical articles provide a vintage point to the rhetoric behind the socio-political and economic reform programs as much as the adverse impact of neoliberal governments in the modern history of Jordan.

Keywords: Arab Spring, digital politics, humour and socio-political satire

Procedia PDF Downloads 432
11147 Israeli Households Caring for Children and Adults with Intellectual and Developmental Disabilities: An Explorative Study

Authors: Ayelet Gur

Abstract:

Background: In recent years we are witnessing a welcome trend in which more children/persons with disabilities are living at home with their families and within their communities. This trend is related to various policy innovations as the UN Convention on the Rights of People with Disabilities that reflect a shift from the medical-institutional model to a human rights approach. We also witness the emergence of family centered approaches that perceive the family and not just the individual with the disability as a worthy target of policy planning, implementation and evaluation efforts. The current investigation aims to explore economic, psychological and social factors among households of families of children or adults with intellectual disabilities in Israel and to present policy recommendation. Methods: A national sample of 301 households was recruited through the education and employment settings of persons with intellectual disability. The main caregiver of the person with the disability (a parent) was interviewed. Measurements included the income and expense surveys; assets and debts questionnaire; the questionnaire on resources and stress; the social involvement questionnaire and Personal Wellbeing Index. Results: Findings indicate significant gaps in financial circumstances between households of families of children with intellectual disabilities and households of the general Israeli society. Households of families of children with intellectual disabilities report lower income and higher expenditures and loans than the general society. They experience difficulties in saving and coping with unexpected expenses. Caregivers (the parents) experience high stress, low social participation, low financial support from family, friend and non-governmental organizations and decreased well-being. They are highly dependent on social security allowances which constituted 40% of the household's income. Conclusions: Households' dependency on social security allowances may seem contradictory to the encouragement of persons with intellectual disabilities to favor independent living in light of the human rights approach to disability. New policy should aim at reducing caregivers' stress and enhance their social participation and support, with special emphasis on families of lower socio-economic status. Finally, there is a need to continue monitoring the economic and psycho-social needs of households of families of children with intellectual disabilities and other developmental disabilities.

Keywords: disability policy, family policy, intellectual and developmental disabilities, Israel, households study, parents of children with disabilities

Procedia PDF Downloads 132
11146 Social Business: Opportunities and Challenges

Authors: Muhammad Mustafizur Rahaman

Abstract:

Social business is a new concept in the field of Business Economics and Capitalist Economy. It has increased the importance in economic and social development in emerging economies. Professor Muhammad Yunus is the founding father of the notion. While conventional business underscores profit maximization as a core business principle, social business calls for addressing social problems at the expense of profit. This underlying principle gives social business advantageous position over conventional businesses to serve those who live at the bottom of the pyramid. It also poses grave challenges to the social business because social business sacrifices profit at one hand and seeks financial sustainability on the other. For the sake of its financial sustainability, the social business might increase the price of its product or service which might lower its social impact, thus, makes the business self-defeating. Therefore, social business should be more innovative in every business process including production, marketing, and management. Otherwise, the business is unlikely to be driven out from the society.

Keywords: innovativeness, self-defeat, social business, social problem

Procedia PDF Downloads 594
11145 Attitude of Beef Cattle Farmers toward Biosecurity Practices

Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim

Abstract:

The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.

Keywords: attitude, beef cattle, biosecurity, farmers

Procedia PDF Downloads 271
11144 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law

Procedia PDF Downloads 101
11143 VCloud: A Security Framework for VANET

Authors: Wiseborn Manfe Danquah, D. Turgay Altilar

Abstract:

Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.

Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)

Procedia PDF Downloads 330
11142 Thai Cane Farmers' Responses to Sugar Policy Reforms: An Intentions Survey

Authors: Savita Tangwongkit, Chittur S Srinivasan, Philip J. Jones

Abstract:

Thailand has become the world’s fourth largest sugarcane producer and second largest sugar exporter. While there have been a number of drivers of this growth, the primary driver has been wide-ranging government support measures. Recently, the Thai government has emphasized the need for policy reform as part of a broader industry restructuring to bring the sector up-to-date with the current and future developments in the international sugar market. Because of the sectors historical dependence on government support, any such reform is likely to have a very significant impact on the fortunes of Thai cane farmers. This study explores the impact of three policy scenarios, representing a spectrum of policy approaches, on Thai cane producers. These reform scenarios were designed in consultation with policy makers and academics working in the cane sector. Scenario 1 captures the current ‘government proposal’ for policy reform. This scenario removes certain domestic production subsidies but seeks to maintain as much support as is permissible under current WTO rules. The second scenario, ‘protectionism’, maintains the current internal market producer supports, but otherwise complies with international (WTO) commitments. Third, the ‘libertarian scenario’ removes all production support and market interventions, trade and domestic consumption distortions. Most important driver of producer behaviour in all of the scenarios is the producer price of cane. Cane price is obviously highest under the protectionism scenario, followed by government proposal and libertarian scenarios, respectively. Likely producer responses to these three policy scenarios was determined by means of a large-scale survey of cane farmers. The sample was stratified by size group and quotas filled by size group and region. One scenario was presented to each of three sub-samples, consisting of approx.150 farmers. Total sample size was 462 farms. Data was collected by face-to-face interview between June and August 2019. There was a marked difference in farmer response to the three scenarios. Farmers in the ‘Protectionism’ scenario, which maintains the highest cane price and those who farm larger cane areas are more likely to continue cane farming. The libertarian scenario is likely to result in the greatest losses in terms of cane production volume broadly double that of the ‘protectionism’ scenario, primarily due to farmers quitting cane production altogether. Over half of loss cane production volume comes from medium-size farm, i.e. the largest and smallest producers are the most resilient. This result is likely due to the fact that the medium size group are large enough to require hired labour but lack the economies of scale of the largest farms. Over all size groups the farms most heavily specialized in cane production, i.e. those devoting 26-50% of arable land to cane, are also the most vulnerable, with 70% of all farmers quitting cane production coming from this group. This investigation suggests that cane price is the most significant determinant of farmer behaviour. Also, that where scenarios drive significantly lower cane price, policy makers should target support towards mid-sized producers, with policies that encourage efficiency gains and diversification into alternative agricultural crops.

Keywords: farmer intentions, farm survey, policy reform, Thai cane production

Procedia PDF Downloads 92
11141 Determinants of Internationalization of Social Enterprises: A 20-Year Review

Authors: Xiaoqing Li

Abstract:

Social entrepreneurship drives the global movement as social enterprises create best ways to satisfy social needs through connecting international resources. However, what determines social enterprises to internationalize is underexplored. This study aims to answer this question by conducting a systematic review of studies of past 20 years on social enterprises' internationalization. Findings reveal that factors at the individual (entrepreneur), firm, and environment (home and host country) levels determine the degree of social enterprises' internationalization. Future research is challenged by: a. adopting an integrated approach examining the three levels to explain social enterprises' internationalization; b. the different nature of social enterprises from commercial businesses demands scholars to refine and develop appropriate theoretical models to capture the dynamism of social enterprises' internationalization behavior.

Keywords: determinants, entrepreneurship, internationalization, social enterprises

Procedia PDF Downloads 191
11140 Personality Characteristics Managerial Skills and Career Preference

Authors: Dinesh Kumar Srivastava

Abstract:

After liberalization of the economy, technical education has seen rapid growth in India. A large number of institutions are offering various engineering and management programmes. Every year, a number of students complete B. Tech/M. Tech and MBA programmes of different institutes, universities in India and search for jobs in the industry. A large number of companies visit educational institutes for campus placements. These companies are interested in hiring competent managers. Most students show preference for jobs from reputed companies and jobs having high compensation. In this context, this study was conducted to understand career preference of postgraduate students and junior executives. Personality characteristics influence work life as well as personal life. In the last two decades, five factor model of personality has been found to be a valid predictor of job performance and job satisfaction. This approach has received support from studies conducted in different countries. It includes neuroticism, extraversion, and openness to experience, agreeableness, and conscientiousness. Similarly three social needs, namely, achievement, affiliation and power influence motivation and performance in certain job functions. Both approaches have been considered in the study. The objective of the study was first, to analyse the relationship between personality characteristics and career preference of students and executives. Secondly, the study analysed the relationship between personality characteristics and skills of students. Three managerial skills namely, conceptual, human and technical have been considered in the study. The sample size of the study was 266 including postgraduate students and junior executives. Respondents have completed BE/B. Tech/MBA programme. Three dimensions of career preference namely, identity, variety and security and three managerial skills were considered as dependent variables. The results indicated that neuroticism was not related to any dimension of career preference. Extraversion was not related to identity, variety and security. It was positively related to three skills. Openness to experience was positively related to skills. Conscientiousness was positively related to variety. It was positively related to three skills. Similarly, the relationship between social needs and career preference was examined using correlation. The results indicated that need for achievement was positively related to variety, identity and security. Need for achievement was positively related to managerial skills Need for affiliation was positively related to three dimensions of career preference as well as managerial skills Need for power was positively related to three dimensions of career preference and managerial skills Social needs appear to be stronger predictor of career preference and managerial skills than big five traits. Findings have implications for selection process in industry.

Keywords: big five traits, career preference, personality, social needs

Procedia PDF Downloads 256
11139 On the Allopatry of National College Entrance Exam in China: The Root, Policy and Strategy

Authors: Shi Zhang

Abstract:

This paper aims to introduce the allopatry of national college entrance examination which allow migrant students enter senior high schools and take college entrance exam where they live, identifies the reasons affect the implementation of this policy in the Chinese context. Most of China’s provinces and municipalities recently have announced new policies regarding national college entrance exams for non-local students. The paper conducts SWOT analysis reveals the opportunities, strength, weakness and challenges of the scheme, so as to discuss the implementation strategies from the perspectives of idea and institution. The research findings imply that the government should take a more positive attitude toward relaxing the allopatry of NCEE policy restrictions, and promote the reform household registration policy and NCEE policy with synchronous operations. Higher education institutions should explore the diversification of enrollment model; the government should issue the authority of universities and colleges to select elite migrant students beyond the restrictions of NCEE. To suit reform policies to local conditions, the big cities such as Beijing, Shanghai and Guangzhou should publish related compensate measures for children of migrant workers access to higher vocational colleges with tuition fee waivered. 

Keywords: college entrance examination, higher education, education policy, education equality

Procedia PDF Downloads 354
11138 Victim and Active Subject of the Crime of Violence in Family Reflected in the Criminal Code of the Republic of Moldova

Authors: Nastas Andrei

Abstract:

Ensuring accessible and functional justice is one of the priority objectives of judicial reform, and protecting the family against any acts that may harm its existence is one of the first priorities that have determined the need to defend the social order. In this context, the correlative approach of the victim and the aggressor becomes relevant as a subject of the crime of domestic violence. Domestic violence is a threat of physical, moral, or material harm, externalized now or in the past, or its provocation, which is characterized by a constant tendency to escalate and a high probability of repetitiveness in the relationship between the social partners, regardless of their legal status or domicile.Studying the legal support to identify the particularities of the victim and the subject of the crime of domestic violence facilitates the identification of the determinants of this crime, therefore, the development of means to prevent domestic violence. The scientific research has been effectuated on the base of the proper and authentic empirical data obtained from the analysis of the judicial practice in the matter of domestic violence, as well as being based on the most recent scientific issues in the field of the Substantive Criminal Law and other branches of science (criminology, psychology, sociology, pedagogy). As a result of the study performed, there have been formulated conclusions and interpretations able to be used in the science of the Substantive Criminal law, as well as in the practice of application of the legal norm in the matter of domestic violence.

Keywords: family violence, victim, crime, violence

Procedia PDF Downloads 85
11137 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 58
11136 Social Business Models: When Profits and Impacts Are Not at Odds

Authors: Elisa Pautasso, Matteo Castagno, Michele Osella

Abstract:

In the last decade, the emergence of new social needs as an effect of the economic crisis has stimulated the flourishing of business endeavours characterised by explicit social goals. Social start-ups, social enterprises or Corporate Social Responsibility operations carried out by traditional companies are quintessential examples in this regard. This paper analyses these kinds of initiatives in order to discover the main characteristics of social business models and to provide insights to social entrepreneurs for developing or improving their strategies. The research is conducted through the integration of literature review and case study analysis and, thanks to the recognition of the importance of both profits and social impacts as the key success factors for a social business model, proposes a framework for identifying indicators suitable for measuring the social impacts generated.

Keywords: business model, case study, impacts, social business

Procedia PDF Downloads 319
11135 Audit Quality and Audit Regulation in European Union: A Perspective, Considering Actual and Perception Based Measures

Authors: Daniela Monteiro

Abstract:

Considering the entry into force of the new EU audit reform regarding statutory auditors, in effect in all member states since 2016, this research aims to identify which audit regulation rules are associated with a high-level audit quality on both its dimensions, i.e., the actual quality and the perceived quality, in relation to public interest entities, within the European Union, and whether those rules have the same impact on both dimensions. Its measurement was based on the following proxies: the quality of financial information through earnings management and the impact of qualified opinions on financial costs. We considered in the research regulation subjects such as auditors’ rotation and provision of services (NAS) and also the level of market concentration. The criteria to include these issues in the research was its contemplation of the new rules. We studied the period before the audit reform (2009-2015) when the regulation measures were less uniform. Besides the consideration of both dimensions of audit quality and several regulation measures, we believe our conclusions configure an important contribution to this research field, considering the involvement of the first 15 member states of the European Union. The results consolidate the assumption that the balance between competence and independence is not the only challenge related to the regulation of the audit profession. The evidence demonstrates that the balance between actual and perceived quality is also a relevant matter. The major conclusion is that the challenge is to keep balanced both actual and perceived audit quality whilst ensuring the independence and competence of auditors.

Keywords:

Procedia PDF Downloads 161
11134 Modernization and Modernity: The Professional Education Concept in the Political Discourse of the Legislative Congress of Minas Gerais (1892-1930)

Authors: Milene Magalhães Pinto, Irlen Antônio Gonçalves

Abstract:

The purpose of this paper is to discuss how the historical processes of organization and reform of professional education contributed with the educational projects for the training/education starting from the idea of modernization of Brazil by way of industry and skilled worker. In the discourse of Congress Legislative of Minas Gerais is possible to identify the role of education as a mediating body of construction processes and rationalization modernizing of the country. The hypothesis is that education is an important instrument for promoting progress and citizenship and the way to form the professional who would serve the social and economic purposes of modernization of Brazil in the nineteenth and twentieth centuries. In this sense, we investigate the relationship of the concept of professional education with the ideas of modernization and modernity.

Keywords: education, modernization and education, legislative congress of Minas Gerais, professional education

Procedia PDF Downloads 496
11133 Social Entrepreneurship as an Innovative Women Empowerment Model against the Poverty in Türkiye

Authors: Rumeysa Terzioglu

Abstract:

Social entrepreneurship is not only a new concept but also an engaging factor of development that utilizes opportunities in economic and social areas for women. Social entrepreneurs have experience in determining and solving social problems with community participation. Social entrepreneurship is a consequence of individual social and economic initiatives contributing to women’s social and economic development against poverty. Women’s empowerment is an essential point for development. Türkiye has been developing an alternative empowerment model for women affected by the national development plan. Social entrepreneurship is an alternative model of social and economic empowerment of women’s status in Türkiye.

Keywords: social entrepreneurship, women, women empowerment, development

Procedia PDF Downloads 76