Search results for: Arabic Fodio Nigeria security
4829 Human Security and Human Trafficking Related Corruption
Authors: Ekin D. Horzum
Abstract:
The aim of the proposal is to examine the relationship between human trafficking related corruption and human security. The proposal suggests that the human trafficking related corruption is about willingness of the states to turn a blind eye to the human trafficking cases. Therefore, it is important to approach human trafficking related corruption in terms of human security and human rights violation to find an effective way to fight against human trafficking. In this context, the purpose of this proposal is to examine the human trafficking related corruption as a safe haven in which trafficking thrives for perpetrators.Keywords: human trafficking, human security, human rights, corruption, organized crime
Procedia PDF Downloads 4754828 The Woman in Arabic Popular Proverbs, Stereotypical Roles and Actual Pain: The Woman in the Institution of Marriage as a Sample
Authors: Hanan Bishara
Abstract:
This study deals with the subject of Popular Arabic Proverbs and the stereotypical roles and images that they create about the woman in general and Arab woman in particular. Popular proverbs in general are considered to be essence of experiences of society and the extract of its collective thought establish wisdom in a distinguished concise tight mold or style that affects the majority of people and keep them alive by virtue of constant use and oral currency through which they are transmitted from one generation to another. Proverbs deal with different aspects and types of people, different social relations, including the society's attitude about the woman. Proverbs about women in the human heritage in general and the Arab heritage in particular are considered of a special characteristics and remarkable in their being dynamic ones that move in all directions of life. Most of them carry the essence of the social issues and are distributed in such a way that they have become part of the private life of the general public. This distribution covers all periods and fields of the woman's life, the social, the economic and psychological ones. The woman occupies a major space in the Popular Proverbs because she is the center of social life inside and outside the house. The woman's statuses and images in the provers are numerous and she is often described in parallel images but each one differs from the other. These images intertwine due to their varieties and multiplicity and ultimately, they constitute a general stereotypical image of the woman, which degrades her status as a woman, a mother and a wife. The study shows how Popular Proverbs in Arabic reflect the Arab woman's position and status in her society.Keywords: Arab, proverb, popular, society, woman
Procedia PDF Downloads 2014827 Optimizing the Passenger Throughput at an Airport Security Checkpoint
Authors: Kun Li, Yuzheng Liu, Xiuqi Fan
Abstract:
High-security standard and high efficiency of screening seem to be contradictory to each other in the airport security check process. Improving the efficiency as far as possible while maintaining the same security standard is significantly meaningful. This paper utilizes the knowledge of Operation Research and Stochastic Process to establish mathematical models to explore this problem. We analyze the current process of airport security check and use the M/G/1 and M/G/k models in queuing theory to describe the process. Then we find the least efficient part is the pre-check lane, the bottleneck of the queuing system. To improve passenger throughput and reduce the variance of passengers’ waiting time, we adjust our models and use Monte Carlo method, then put forward three modifications: adjust the ratio of Pre-Check lane to regular lane flexibly, determine the optimal number of security check screening lines based on cost analysis and adjust the distribution of arrival and service time based on Monte Carlo simulation results. We also analyze the impact of cultural differences as the sensitivity analysis. Finally, we give the recommendations for the current process of airport security check process.Keywords: queue theory, security check, stochatic process, Monte Carlo simulation
Procedia PDF Downloads 2004826 A Framework for Security Risk Level Measures Using CVSS for Vulnerability Categories
Authors: Umesh Kumar Singh, Chanchala Joshi
Abstract:
With increasing dependency on IT infrastructure, the main objective of a system administrator is to maintain a stable and secure network, with ensuring that the network is robust enough against malicious network users like attackers and intruders. Security risk management provides a way to manage the growing threats to infrastructures or system. This paper proposes a framework for risk level estimation which uses vulnerability database National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) and the Common Vulnerability Scoring System (CVSS). The proposed framework measures the frequency of vulnerability exploitation; converges this measured frequency with standard CVSS score and estimates the security risk level which helps in automated and reasonable security management. In this paper equation for the Temporal score calculation with respect to availability of remediation plan is derived and further, frequency of exploitation is calculated with determined temporal score. The frequency of exploitation along with CVSS score is used to calculate the security risk level of the system. The proposed framework uses the CVSS vectors for risk level estimation and measures the security level of specific network environment, which assists system administrator for assessment of security risks and making decision related to mitigation of security risks.Keywords: CVSS score, risk level, security measurement, vulnerability category
Procedia PDF Downloads 3214825 Looking Elsewhere for Job: Relationship between Procedural Justice and Survivors’ Turnover Intent in Consolidated Nigeria Banks
Authors: Fasanmi Samuel Sunday
Abstract:
The study examines the relationship between procedural justice and turnover intent among survivors in a consolidated Nigeria bank. Opinions of eight hundred and eighty five staff of First City Monumental Bank and Finbank who survived the consolidated process were conveniently sampled using battery of tests. Two hypotheses were tested for this study. Results revealed that procedural justice and demographic variables (sex, age, previous banking job experience, and year of work experience) were significantly, independently and jointly influence turnover intent among survivors in consolidated banks in Nigeria. Also, there was a significant relationship between procedural justice and turnover intent among survivors in a consolidated bank in Nigeria. It was recommended that if the workers perceived the process of downsizing to be fair, they tend to reason with their management and coast along with the process rather than increasing in their turnover intent which will eventually drastically reduce the profitability matrix which the banks desired so desperately.Keywords: bankers, procedural justice, sex, turnover intent
Procedia PDF Downloads 5134824 Concordance of Maghrebian Place Names in Hungarian School Atlases
Authors: Malak Alasli
Abstract:
Hungarians come to use geographic names that are foreign to their environment and language in diverse settings, hence the aim of trying to adapt them to their own linguistic context. The Maghreb region (Morocco, Algeria, and Tunisia) uses both Arabic and French in presenting the place names. Consequently, the lexicographical treatment of the toponym will, therefore, consist of both the presentation of the toponymic term and the pronunciation of the entries. The motivation behind this approach is the need for a better identification of the place in question by avoiding ambiguities, and for more respect to the heritage by conforming to the right use of toponyms both in written as well as in oral practice. The goal is to provide Hungarians with a set of data by attempting a system of transliteration from French/Arabic to Hungarian, where the place names of the Maghreb are transliterated for more efficient usage. To examine the importance of toponyms’ pronunciation, the latter were collected from several 20th and 21st Hungarian school atlases. Most people meet, for the first time, foreign place names in school, hence the choice of solely extracting place names from school atlases as sample data. Interviews targeted university students, where they were asked to pronounce the place names collected. Results revealed the intricacy behind the pronunciation. Two main conclusions emerged; Hungarian students encountered challenges reading the toponyms, and Arabic speakers could not identify the names either, which causes a cut in communication. Ergo, the importance of elaborating on the pronunciation of toponyms. Concordance is where you find variants of a name. Therefore, a chart was put forward including all the name variants obtained from various references with their Arabic transcription indicating any changes that may have occurred, and the origin of the denomination (Roman, Berber, etc.). A case will also be added for comments and observations. This work embraces a dual purpose. It will provide information to Hungarians on the official names of foreign places in case of occurring changes; for instance, 'El-goléa, Algeria' (used in a latest edition of a school atlas) has now the official name of 'El Ménia'. It will also serve as a reference for knowing the correct and precise forms of place names’ pronunciation.Keywords: concordance, onomastics, settlement names, school atlases
Procedia PDF Downloads 1094823 Extending the AOP Joinpoint Model for Memory and Type Safety
Authors: Amjad Nusayr
Abstract:
Software security is a general term used to any type of software architecture or model in which security aspects are incorporated in this architecture. These aspects are not part of the main logic of the underlying program. Software security can be achieved using a combination of approaches, including but not limited to secure software designs, third part component validation, and secure coding practices. Memory safety is one feature in software security where we ensure that any object in memory has a valid pointer or a reference with a valid type. Aspect-Oriented Programming (AOP) is a paradigm that is concerned with capturing the cross-cutting concerns in code development. AOP is generally used for common cross-cutting concerns like logging and DB transaction managing. In this paper, we introduce the concepts that enable AOP to be used for the purpose of memory and type safety. We also present ideas for extending AOP in software security practices.Keywords: aspect oriented programming, programming languages, software security, memory and type safety
Procedia PDF Downloads 1274822 Data Security: An Enhancement of E-mail Security Algorithm to Secure Data Across State Owned Agencies
Authors: Lindelwa Mngomezulu, Tonderai Muchenje
Abstract:
Over the decades, E-mails provide easy, fast and timely communication enabling businesses and state owned agencies to communicate with their stakeholders and with their own employees in real-time. Moreover, since the launch of Microsoft office 365 and many other clouds based E-mail services, many businesses have been migrating from the on premises E-mail services to the cloud and more precisely since the beginning of the Covid-19 pandemic, there has been a significant increase of E-mails utilization, which then leads to the increase of cyber-attacks. In that regard, E-mail security has become very important in the E-mail transportation to ensure that the E-mail gets to the recipient without the data integrity being compromised. The classification of the features to enhance E-mail security for further from the enhanced cyber-attacks as we are aware that since the technology is advancing so at the cyber-attacks. Therefore, in order to maximize the data integrity we need to also maximize security of the E-mails such as enhanced E-mail authentication. The successful enhancement of E-mail security in the future may lessen the frequency of information thefts via E-mails, resulting in the data of South African State-owned agencies not being compromised.Keywords: e-mail security, cyber-attacks, data integrity, authentication
Procedia PDF Downloads 1364821 Design and Implementation of Security Middleware for Data Warehouse Signature, Framework
Authors: Mayada Al Meghari
Abstract:
Recently, grid middlewares have provided large integrated use of network resources as the shared data and the CPU to become a virtual supercomputer. In this work, we present the design and implementation of the middleware for Data Warehouse Signature, DWS Framework. The aim of using the middleware in our DWS framework is to achieve the high performance by the parallel computing. This middleware is developed on Alchemi.Net framework to increase the security among the network nodes through the authentication and group-key distribution model. This model achieves the key security and prevents any intermediate attacks in the middleware. This paper presents the flow process structures of the middleware design. In addition, the paper ensures the implementation of security for DWS middleware enhancement with the authentication and group-key distribution model. Finally, from the analysis of other middleware approaches, the developed middleware of DWS framework is the optimal solution of a complete covering of security issues.Keywords: middleware, parallel computing, data warehouse, security, group-key, high performance
Procedia PDF Downloads 1194820 Employees' Attitude towards Corporate Governance without Unions
Authors: Bamidele Olufemi Ifenowo
Abstract:
The study examined the practice of managing business organizations in Nigeria today without unions. It explored how this phenomenon evolved and became popular in the newly emerging mega banks in Nigeria. Attitudes of selected banks' employees to this phenomenon were surveyed.Simple statistical tools were used for data analysis. The findings revealed that most new employees who form the bulk of the sample never really cared about unionism. On the other hand, old and experienced employees were positively disposed towards unionism. This category of employees abhorred the current display of authoritarianism cum paternalism which seemed to characterize the managerial practice of most new generation banks in Nigeria today.Keywords: authoritarianism, corporate governance, deunionisation, unionization, paternalism
Procedia PDF Downloads 2644819 Managing Education through, Effective School Community Relationships/Participation for National Security
Authors: Shehu S. Janguza
Abstract:
The need for national security cannot be over Emphasis, which should be pursued by any means. Thus the need for effective management of education through effective school community Relationship/participation. In preparing and implementing only effort to promote community involvement in manning Education, it is importance to understand the whole picture of community participation, how it works, what forms are used, what benefit it can yield and what we should expect in the process of carrying out the efforts finally emphasis will be made on how effective school community relationship/participation and lead to national security.Keywords: community participation, managing, school community, national security
Procedia PDF Downloads 5944818 Empowering Female Entrepreneurs for Economic Development: Challenges and Prospects within the Nigerian Economy
Authors: Inyene Nathaniel Nkanta
Abstract:
The present economic situation in Nigeria, with an increase in inflation rate due to the fall of crude oil prices and post covid-19 crisis, has increased the level of poverty and suffering in Nigeria, particularly the women. Against that backdrop, this research project is initiated to explore ways to empower women through entrepreneurship education and training to ameliorate the poverty level amongst women in Nigeria. A qualitative approach to data collection will be applied in this study and to test the assertions of this research project empirically, this research adopts a case study research method as this will enable me to obtain and probe ways women can be empowered through semi-structured interviews and focus groups. The result of this research project will provide an original perspective on human capital development, most importantly, the need for entrepreneurial education and entrepreneurial literature and practice.Keywords: women, Nigeria, entrepreneurship education, Economic development, human capital
Procedia PDF Downloads 854817 Adaptation in Translation of 'Christmas Every Day' Short Story by William Dean Howells
Authors: Mohsine Khazrouni
Abstract:
The present study is an attempt to highlight the importance of adaptation in translation. To convey the message, the translator needs to take into account not only the text but also extra-linguistic factors such as the target audience. The present paper claims that adaptation is an unavoidable translation strategy when dealing with texts that are heavy with religious and cultural themes. The translation task becomes even more challenging when dealing with children’s literature as the audience are children whose comprehension, experience and world knowledge are limited. The study uses the Arabic translation of the short story ‘Christmas Every Day’ as a case study. The short story will be translated, and the pragmatic problems involved will be discussed. The focus will be on the issue of adaptation. i.e., the source text should be adapted to the target language audience`s social and cultural environment.Keywords: pragmatic adaptation, Arabic translation, children's literature, equivalence
Procedia PDF Downloads 2154816 Security Issues and Primary School Participation in Kenya
Authors: Rose Mwanza
Abstract:
This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.Keywords: ethnicity, social media, participation in school, poverty, terrorism
Procedia PDF Downloads 614815 'Sea Power: Concept, Influence and Securitization'; the Nigerian Navy's Role in a Developing State like Nigeria
Authors: William Abiodun Duyile
Abstract:
It is common knowledge that marine food has always been found from the sea, energy can also be found underneath and, to a growing extent; other mineral resources have come from the sea spaces. It is the importance of the sea and the sea lines of communication to littoral nations that has made concepts such as sea power, naval power, etc., significant to them. The study relied on documentary data. The documentary data were sourced from government annual departmental reports, newspapers and correspondence. The secondary sources used were subjected to internal and external criticism for authentication, and then to textual and contextual analyses. The study found that the differential level of seamanship amongst states defined their relationship. It was sea power that gave some states an edge over the others. The study proves that over the ages sea power has been core to the development of States or Empires. The study found that the Nigerian Navy was centre to Nigeria’s conquest of the littoral areas of Biafra, like Bonny, Port-Harcourt, and Calabar; it was also an important turning point of the Nigerian civil war since by it Biafra became landlocked. The research was able to identify succinctly the Nigerian Navy’s contribution to the security and development of the Nigerian State.Keywords: sea power, naval power, land locked states, warship
Procedia PDF Downloads 1374814 Measures for Conflict Management in Nigerian Higher Institutions
Authors: Oyelade Oluwatoyin
Abstract:
The phenomenon of crises in educational sector in Nigeria has reached its peak in the 21st century. Thus, this paper examines the strategies that can be used in managing the conflict situation in Nigeria Higher Institution of learning. The causes of conflicts such as inadequate funding, insufficient school facilities, poor working condition, poor enrolment, proliferation of higher institutions and unfavourable administrative decision are the major detriment of law and order i.e. strike action, destruction of property and programmes coupled with the student unrest. This write-up will make use of the available information and with the aim of adding value to existing knowledge. It was recommend that steps should be taken by policy maker to prevent scourge of conflicts in tertiary institutions in NigeriaKeywords: conflicts, higher institutions, management, measures
Procedia PDF Downloads 3684813 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya
Authors: Masese Chuma Benard, Martin Onsiro Ronald
Abstract:
Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)
Procedia PDF Downloads 844812 Maintaining User-Level Security in Short Message Service
Authors: T. Arudchelvam, W. W. E. N. Fernando
Abstract:
Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication
Procedia PDF Downloads 3954811 Multilingualism as an Impetus to Nigerian Religious and Political Crises: the Way Forward
Authors: Kehinde, Taye Adetutu
Abstract:
The fact that Nigeria as a nation is faced by myriads of problems associated with religious crises and political insecurity is no news, the spoken statement and actions of most political giant were the major cause of this unrest. The 'unlearnt' youth within the regions has encompassed the situation. This scenario is further compounded by multilingual nature of the country as it is estimated that there exists amount 400 indigenous languages in Nigeria. It is an indisputable fact that english language which has assumed the status of an official language in Nigeria, given its status has a language of power and captivity by a few with no privilege to attend school. However, educating people in their indigenous language; crises can be averted through the proper orientation and mass literacy campaign, especially for the timid illiterate one, so as to live in unity, peace, tranquillity, and harmony as indivisible nation. In investigating the problem in this study with an emphasis on three major Nigerian language (Yoruba, Igbo and Hausa), participants observations and survey questionnaire were administered to about one hundred and twenty (120) respondents who were randomly selected throughout the three major ethnic groups in Nigeria. Findings from this study reveals that teaching and learning of cognitive words and information are more effective in ones mother tongue and helps in stimulating new ideas and changes. This paper was able to explore and critically examine the current state of affairs in Nigeria and proffer possible solutions to the prevailing situations by identifying how indigenous languages and linguistics can be used to ameliorate the present political and religious crisis for Nigeria, thus providing a proper recommendation to achieve meaningful stability and coexistence within a nation.Keywords: multilingualism, political crisis, religious, Nigeria
Procedia PDF Downloads 4404810 Applications of AI, Machine Learning, and Deep Learning in Cyber Security
Authors: Hailyie Tekleselase
Abstract:
Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data
Procedia PDF Downloads 1264809 A CM-Based Model for 802.11 Networks Security Policies Enforcement
Authors: Karl Mabiala Dondia, Jing Ma
Abstract:
In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy
Procedia PDF Downloads 3804808 Water Hyacinth (Eichhornia crassipes) in Nigeria Coastal Waters; lmpacts, Challenges and Prospects
Authors: Efe Ogidiaka-Obende, Gabriel C. C. Ndinwa, John Atadiose, Ewoma O. Oduma
Abstract:
Water hyacinth (Eichhornia crassipes), which is a native of South America, is believed to have found its way into Nigeria waters through Pot-Novo creek, Benin Republic, in September 1984. This study attempts to review the impacts, challenges, and prospects of water hyacinths in Nigeria's coastal waters. Water hyacinth possesses a very high proliferation rate, and its infestation in Nigeria's coastal waters poses severe problems to the fishing, recreational, transportation, and health sector, amongst other activities. The weed has been reported to disrupt aquatic ecosystems, clog waterways, and create associated problems with water supply, irrigation, and drainage. To curb this menace, a huge amount of money is used yearly for its management, which is not sustainable. There is, however, a positive twist to this plant as it has the potential to be used as fertilizers, feed for fish, craft materials, biogas, and many more. Due to its high population and related economic importance and implications in Nigeria's coastal waters, it is highly recommended that more research works be carried out on the of making optimal use of this plant.Keywords: waste to wealth, environmental pollution, water hyacinth, biogas, sustainable development goals
Procedia PDF Downloads 854807 The Role of Human Resource Capabilities and Knowledge Management on Employees’ Performance in the Nuclear Energy Sector of Nigeria
Authors: Hakeem Ade Omokayode Idowu
Abstract:
The extent of the role played by human capabilities developments as well as knowledge management on employees’ performance in the nuclear energy sector of Nigeria remains unclear. This is in view of the important role which human resource capabilities could play in the desire to generate energy using nuclear resources. This study appraised the extent of human resource capabilities available in the nuclear energy sector of Nigeria. It further examined the relationship between knowledge management and employees’ performance in the nuclear energy sector. The study adopted a descriptive research design with a population that comprised all the 1736 members of staff of the selected centres, institutes, and the headquarters of the Nigeria Atomic Energy Commission (NAEC), Nigerian Nuclear Regulatory Authority (NNRA), and Energy Commission of Nigeria (ECN) and a sample size of 332 employees was selected using purposive and convenience sampling techniques. Data collected were subjected to analysis using frequency counts and simple regression. The results showed that majority of the employees perceived that they have to a high extent of availability of knowledge (118, 35.5%), credibility (134, 40.4%), alignment (130, 39.2%), performance (126, 38%) and innovation (138, 41.6%) The result of the hypothesis tested indicated that knowledge management has a positive and significant effect on employees’ performance (Beta weight = 0.336, R2 =0.113, F-value = 41.959, p-value = 0.000< 0.05). The study concluded that human resource capabilities and knowledge management could enhance employee performance within the nuclear energy sector of Nigeria.Keywords: human resource capabilities, knowledge management, employees productivity, national development
Procedia PDF Downloads 724806 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms
Authors: Saint C. Nguedjip
Abstract:
This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women
Procedia PDF Downloads 1044805 Proactive WPA/WPA2 Security Using DD-WRT Firmware
Authors: Mustafa Kamoona, Mohamed El-Sharkawy
Abstract:
Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.Keywords: Wi-Fi, WPS, TLS, DD-WRT
Procedia PDF Downloads 2334804 The Role of Information and Communication Technology in Curbing Electoral Malpractices in Nigeria
Authors: Fred Fudah Moveh, Muhammad Abba Jallo
Abstract:
Electoral fraud remains a persistent threat to democracy in Nigeria, undermining public trust and stalling political development. This study explores the role of Information and Communication Technology (ICT) in curbing electoral fraud, focusing on its application in recent Nigerian elections. The paper identifies the main forms of electoral fraud, evaluates the effectiveness of ICT-based interventions like the Permanent Voter Card (PVC) and the Bi-modal Voter Accreditation System (BVAS), and discusses challenges such as poor infrastructure, voter intimidation, and legal inadequacies. Data was collected through structured questionnaires and interviews and analyzed using SPSS software. Results reveal that while ICT has mitigated some forms of fraud, systemic issues continue to hinder its full potential. The study concludes with recommendations for enhancing the application of ICT in Nigeria’s electoral process.Keywords: ICT, electoral fraud, election process, Nigeria, political instability
Procedia PDF Downloads 234803 Marketing and Customer Relationship in Post Consolidation Banking Sector of Nigeria
Authors: Nnedum Obiajuru Anthony Ugochukwu, Ezechukwu Emmanuel Ntomchukwu
Abstract:
The research investigated the importance of marketing and customer relationship management in post-consolidated banks in achieving success and survival in the face of intense competition and global economic meltdown. The problem lies in the fact that during the pre-consolidation era in the banking industry in Nigeria, banks were comfortable transacting their businesses from their armchairs. Little attention was paid to marketing by banks as a veritable means of achieving and consolidating their profit position. This situation, no doubt sustained because banks were more or less currency exchange centers where customers buy and sell foreign exchange which was highly demanded, but in very short supply. Today, deregulation and consolidation of banks in Nigeria have tremendously increased the tempo of activities in the banking industry, and competition has become very severe among banks. The weak link in the success of post-consolidated banks in Nigeria is the utter neglect, and light or unserious consideration of customer relationship marketing by banks. Armchair banking which banks have been practicing has no regard for marketing as a means to survival. However, in order to survive, post-consolidated banks must take relationship marketing and customer relationship management seriously especially in the face of the current global economic crisis. This paper aims at exploring the role of marketing in building and managing customer relationships as a means to survival in post-consolidation banking in Nigeria.Keywords: marketing, customer relationships, banking sector, Nigeria
Procedia PDF Downloads 3004802 Challenges and Opportunities of Utilization of Social Media by Business Education Students in Nigeria Universities
Authors: Titus Amodu Umoru
Abstract:
The global economy today is full of sophistication. All over the world, business and marketing practices are undergoing an unprecedented transformation. In realization of this fact, the federal government of Nigeria has put in place a robust transformation agenda in order to put Nigeria in a better position to be a competitive player and in the process transform all sectors of its economy. New technologies, especially the internet, are the driving force behind this transformation. However, technology has inadvertently affected the way businesses are done thus necessitating the acquisition of new skills. In developing countries like Nigeria, citizens are still battling with effective application of those technologies. Obviously, students of business education need to acquire relevant business knowledge to be able to transit into the world of work on graduation from school and compete favourably in the labour market. Therefore, effective utilization of social media by both teachers and students can help extensively in empowering students with the needed skills. Social media which is described as a group of internet-based applications that build on the ideological foundations of Web 2.0, and which allow the creation and exchange of user-generated content, if incorporated into the classroom experience may be the needed answer to unemployment and poverty in Nigeria as beneficiaries can easily connect with existing and potential enterprises and customers, engage with them and reinforce mutual business benefits. Challenges and benefits of social media use in education in Nigeria universities were revealed in this study.Keywords: business education, challenges, opportunities, utilization, social media
Procedia PDF Downloads 4154801 Liquidity Management in Islamic Banks: Challenges and Prospects for Non-Interest Banking in Nigeria
Authors: Fatai O. Bakare
Abstract:
This paper x-rays the liquidity problems exposed to by Islamic banks in terms of challenges in managing surplus as well as deficit liquidity positions and the attendant effects in the contemporary system of Islamic banking. Effective liquidity management is understood to be a cardinal consideration for sustainability of Islamic/non-interest banking in Nigeria and the world over. While a background is laid by considering the general situations at a global scale, a particular attention is devoted to the peculiar circumstances of the non-interest banking in Nigeria. In bring home the points various efforts of major notable supra-national institutions in bridging liquidity management gap in Islamic banks are presented. While it is believed that a good lesson could be learnt from the developmental phases of Malaysian Islamic banking system and the approaches to meeting its liquidity management problems, much emphasis is laid in maintaining that, although in the absence of political will to provide systemic support for non-interest banking in Nigeria, the challenge of liquidity management is not unsurmountable.Keywords: deficit, liquidity management, non-interest, surplus
Procedia PDF Downloads 3214800 The Use of Energy Efficiency and Renewable Energy in Building for Sustainable Development
Authors: Zakariya B. H., Idris M. I., Jungudo M. A.
Abstract:
High energy consumptions of urban settlements in Nigeria are escalating due to strong population growth and migration as a result of crises. The demand for lighting, heating, ventilation and air conditioning (LHVAC) is becoming higher. Conversely, there is a poor electricity supply to both rural and urban settlement in Nigeria. Generators were mostly used in Nigeria as a source of energy for LHVAC. Energy efficiency can be defined as any measure taken to reduce the amount of energy consumed for heating ventilation and air-conditioning (HVAC), and house hold appliances like computers, stoves, refrigerators, televisions etc. The aim of the study was to minimize energy consumption in building through the integration of energy efficiency and renewable energy in building sector. Some of the energy efficient buildings within the study area were identified, the study covers there major cities of Nigeria namely, Abuja, Kaduna and Lagos city. The cost of investment on the energy efficiency and renewable energy was determined and compared with other fossil energy source for conventional building. Findings revealed that the low energy and energy efficient buildings in Nigeria are cheaper than the conventional ones. Based on the finding of the research, construction stake holders are strongly encouraged to abandon the conventional buildings and consider energy efficiency and renewable energy in buildings.Keywords: energy, efficiency, LHVAC, sustainable development
Procedia PDF Downloads 581