Search results for: cyber security awareness
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5326

Search results for: cyber security awareness

4786 Enhancing Maritime Governance in Africa: Challenges of Maritime Policy Development in the East African Community

Authors: Christantus Begealawuh Nchongayi

Abstract:

As clearly stated in goal 14 of sustainable development goals, global oceans greatly contribute to making the earth habitable for mankind. This explains why ocean governance is an important global concern today. The emerging maritime security problems and the impact of climate change on African oceans, evidenced by tropical cyclones as seen recently in the Southern region of Africa, is also an indication that maritime governance and policymaking are important elements of peace and security in Africa. Within the last decade, there have been commendable efforts towards maritime governance and policymaking in Africa, although implementation of existing maritime policies is still lacking. This paper provides a snapshot of the overall state of the maritime policymaking process in Africa. It specifically explores the challenges facing policymakers in developing national and regional maritime security strategy in the East African Community. For methodology, the paper relied on primary and secondary data. Primary data was collected from informal discussions with policymakers and key policy-making bodies in Africa, and from a survey of public opinions. The study found that the Africa Integrated Maritime Strategy (2050 AIMS) is a recent template for regional and national maritime security policymaking in Africa and that although maritime security has in the past not been prioritized in the security agenda of the East African Community, developing and aligning a regional maritime security strategy to the 2050 AIMS will result to positive regional integration outcomes in East Africa.

Keywords: 2050 Africa integrated maritime strategy, east African community, maritime policy-making, maritime security

Procedia PDF Downloads 200
4785 The Study of the Awareness of Sexual Risk Bahaviors and Sexual Risk Behaviors of Adolescents Students

Authors: Sumitta Sawangtook, Parichart Thano

Abstract:

The purposes of research were to study the relationship between the awareness of sexual risk behaviors and sexual risk behaviors of adolescent students, and to compare the sexual risk behaviors of adolescent students by gender, education level, sweetheart’s number, achievement, sexual value, and the influence of the friendship group. The research sample of 344 sevenths through twelfth grade students in secondary school for the academic year 2014, Dindang district Bangkok was selected by simple random sampling. The research instruments are: 1) demographic questionnaire 2) evaluation form of the awareness of sexual risk behaviors 3) questionnaire about sexual value 4) questionnaire about the influence of the friendship group and 5) evaluation form of sexual risk behaviors. They were used for data collections which are subsequently analyzed by percentage, mean, standard deviation, t-test, One-way Analysis of Variances. The results of this study were presented as follow: 1) The awareness of sexual risk behaviors was negatively correlated with sexual risk behaviors of adolescent students (r=-.27, p=.000). 2) There was significant difference at .05 level in sexual risk behaviors among adolescent students who had gender difference (t=5.90, p=.000). 3) There was no significant difference at .05 level in sexual risk behaviors among adolescent students who had the different level of education (t=1.41, p=.16). 4) There was significant difference at .05 level in sexual risk behaviors among adolescent students who had the different level of sweetheart’s number (F=13.03, p=.000). 5) There was significant difference at .05 level in sexual risk behaviors among adolescent students who had the different level of achievement (F=4.77, p=.009). 6) There were significant difference at .05 level in sexual risk behaviors among adolescent students who had different level of sexual value (F=50.91, p=.000) 7) There were significant difference at .05 level in sexual risk behaviors among adolescent students who had different level of the influence of the friendship group (F=98.41, p=.000).

Keywords: the awareness of sexual risk behaviors, sexual risk behaviors, adolescent students

Procedia PDF Downloads 442
4784 The Intention to Use E-Money Transaction: The Moderating Effect of Security in Conceptual Frammework

Authors: Husnil Khatimah, Fairol Halim

Abstract:

This research examines the moderating impact of security on intention to use e-money that adapted from some variables of the TAM (Technology Acceptance Model) and TPB (Theory of Planned Behavior). This study will use security as moderating variable and finds these relationship depends on customer intention to use e-money as payment tools. The conceptual framework of e-money transactions was reviewed to understand behavioral intention of consumers from perceived usefulness, perceived ease of use, perceived behavioral control and security. Quantitative method will be utilized as sources of data collection. A total of one thousand respondents will be selected using quota sampling method in Medan, Indonesia. Descriptive analysis and Multiple Regression analysis will be conducted to analyze the data. The article ended with suggestion for future studies.

Keywords: e-money transaction, TAM & TPB, moderating variable, behavioral intention, conceptual paper

Procedia PDF Downloads 436
4783 Intrusion Detection in SCADA Systems

Authors: Leandros A. Maglaras, Jianmin Jiang

Abstract:

The protection of the national infrastructures from cyberattacks is one of the main issues for national and international security. The funded European Framework-7 (FP7) research project CockpitCI introduces intelligent intrusion detection, analysis and protection techniques for Critical Infrastructures (CI). The paradox is that CIs massively rely on the newest interconnected and vulnerable Information and Communication Technology (ICT), whilst the control equipment, legacy software/hardware, is typically old. Such a combination of factors may lead to very dangerous situations, exposing systems to a wide variety of attacks. To overcome such threats, the CockpitCI project combines machine learning techniques with ICT technologies to produce advanced intrusion detection, analysis and reaction tools to provide intelligence to field equipment. This will allow the field equipment to perform local decisions in order to self-identify and self-react to abnormal situations introduced by cyberattacks. In this paper, an intrusion detection module capable of detecting malicious network traffic in a Supervisory Control and Data Acquisition (SCADA) system is presented. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM is an intrusion detection mechanism that does not need any labeled data for training or any information about the kind of anomaly is expecting for the detection process. This feature makes it ideal for processing SCADA environment data and automates SCADA performance monitoring. The OCSVM module developed is trained by network traces off line and detects anomalies in the system real time. The module is part of an IDS (intrusion detection system) developed under CockpitCI project and communicates with the other parts of the system by the exchange of IDMEF messages that carry information about the source of the incident, the time and a classification of the alarm.

Keywords: cyber-security, SCADA systems, OCSVM, intrusion detection

Procedia PDF Downloads 527
4782 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector

Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid

Abstract:

For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.

Keywords: electricity, energy policy, energy security, Malaysia

Procedia PDF Downloads 289
4781 Employee Branding: An Exploratory Study Applied to Nurses in an Organization

Authors: Pawan Hinge, Priya Gupta

Abstract:

Due to cutting edge competitions between organizations and war for talent, the workforce as an asset is gaining significance. The employees are considered as the brand ambassadors of an organization, and their interactions with the clients and customers might impact directly or indirectly on the overall value of the organization. Especially, organizations in the healthcare industry the value of an organization in the perception of their employees can be one of the revenue generating and talent retention strategy. In such context, it is essential to understand that the brand awareness among employees can effect on employer brand image and brand value since the brand ambassadors are the interface between organization and customers and clients. In this exploratory study, we have adopted both quantitative and qualitative approaches for data analysis. Our study shows existing variation among nurses working in different business units of the same organization in terms of their customer interface or interactions and brand awareness.

Keywords: brand awareness, brand image, brand value, customer interface

Procedia PDF Downloads 264
4780 Teachers’ Awareness of the Significance of Lifelong Learning: A Case Study of Secondary School Teachers of Batna - Algeria

Authors: Bahloul Amel

Abstract:

This study is an attempt to raise the awareness of the stakeholders and the authorities on the sensitivity of Algerian secondary school teachers of English as a Foreign Language about the students’ loss of English language skills learned during formal schooling with effort and at expense and the supposed measures to arrest that loss. Data was collected from secondary school teachers of EFL and analyzed quantitatively using a questionnaire containing open-ended and close-ended questions. The results advocate a consensus about the need for actions to be adopted to make assessment techniques outcome-oriented. Most of the participants were in favor of including curricular activities involving contextualized learning, problem-solving learning critical self-awareness, self and peer-assisted learning, use of computers and internet so as to make learners autonomous.

Keywords: lifelong learning, EFL, contextualized learning, Algeria

Procedia PDF Downloads 332
4779 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 301
4778 The Impact of Self-Viewing in Virtual Teamwork on Team Creativity: The Mediating Effect of Objective Self-Awareness and the Moderating Effect of Psychological Safety

Authors: Xueyang Li

Abstract:

This thesis investigates the impact of self-viewing on team creativity in virtual teamwork and examines the role of objective self-awareness and psychological safety in this context. The study uses a quantitative research approach and collects data from 304 participants working in virtual teams. We hypothesized that observing oneself in online meetings would lead to a heightened sense of objective self and thus lower team creativity and that psychological safety would moderate their relationship. We tested these hypotheses in a laboratory experiment manipulating whether participants were able to observe themselves during the completion of an online team creativity task and manipulating whether participants were subjected to a psychological safety intervention. The results indicate that self-observation has a negative effect on team creativity in virtual teamwork, while objective self-awareness mediates this relationship, and psychological safety plays a moderating role. We discuss several aspects of the theoretical explanation of the findings. This study contributes to the existing literature by highlighting the importance of self-observation in virtual teamwork and provides practical implications for managers and team leaders to promote creativity in virtual teams.

Keywords: objective self-awareness, psychological safety, self-viewing, team creativity, virtual teamwork

Procedia PDF Downloads 85
4777 A Systematic Review of Situational Awareness and Cognitive Load Measurement in Driving

Authors: Aly Elshafei, Daniela Romano

Abstract:

With the development of autonomous vehicles, a human-machine interaction (HMI) system is needed for a safe transition of control when a takeover request (TOR) is required. An important part of the HMI system is the ability to monitor the level of situational awareness (SA) of any driver in real-time, in different scenarios, and without any pre-calibration. Presenting state-of-the-art machine learning models used to measure SA is the purpose of this systematic review. Investigating the limitations of each type of sensor, the gaps, and the most suited sensor and computational model that can be used in driving applications. To the author’s best knowledge this is the first literature review identifying online and offline classification methods used to measure SA, explaining which measurements are subject or session-specific, and how many classifications can be done with each classification model. This information can be very useful for researchers measuring SA to identify the most suited model to measure SA for different applications.

Keywords: situational awareness, autonomous driving, gaze metrics, EEG, ECG

Procedia PDF Downloads 105
4776 English as a Foreign Language Students’ Perceptions towards the British Culture: The Case of Batna 2 University, Algeria

Authors: Djelloul Nedjai

Abstract:

The issue of cultural awareness triggers many controversies, especially in a context where individuals do not share the same cultural backgrounds and characteristics. The Algerian context is no exception. It has been widely documented by the literature that culture remains essential in many domains. In higher education, for instance, culture plays a pivotal role in shaping individuals’ perceptions and attitudes. Henceforth, the current paper attempts to look at the perceptions of the British culture held by students engaged in learning English as a Foreign Language (EFL) at the department of English at Banta 2 University, Algeria. It also inquires into EFL students’ perceptions of British culture. To address the aforementioned research queries, a descriptive study has been carried out wherein a questionnaire of fifteen (15) items has been deployed to collect students’ attitudes and perceptions toward British culture. Results showcase that, indeed, EFL students of the department of English at Banta 2 University hold both positive and negative perceptions towards British culture at different levels. The explanation could relate to the student's lack of acquaintance with and awareness of British culture. Consequently, this paper is an attempt to address the issue of cultural awareness from the perspective of EFL students.

Keywords: British culture, cultural awareness, EFL students’ perceptions, higher education

Procedia PDF Downloads 72
4775 DISGAN: Efficient Generative Adversarial Network-Based Method for Cyber-Intrusion Detection

Authors: Hongyu Chen, Li Jiang

Abstract:

Ubiquitous anomalies endanger the security of our system con- stantly. They may bring irreversible damages to the system and cause leakage of privacy. Thus, it is of vital importance to promptly detect these anomalies. Traditional supervised methods such as Decision Trees and Support Vector Machine (SVM) are used to classify normality and abnormality. However, in some case, the abnormal status are largely rarer than normal status, which leads to decision bias of these methods. Generative adversarial network (GAN) has been proposed to handle the case. With its strong generative ability, it only needs to learn the distribution of normal status, and identify the abnormal status through the gap between it and the learned distribution. Nevertheless, existing GAN-based models are not suitable to process data with discrete values, leading to immense degradation of detection performance. To cope with the discrete features, in this paper, we propose an efficient GAN-based model with specifically-designed loss function. Experiment results show that our model outperforms state-of-the-art models on discrete dataset and remarkably reduce the overhead.

Keywords: GAN, discrete feature, Wasserstein distance, multiple intermediate layers

Procedia PDF Downloads 110
4774 Awareness and Attitudes of Primary Grade Teachers (1-4th Grade) Towards Inclusive Education

Authors: Maheshwari Payal, Shapurkar Mayaan

Abstract:

The present research aimed at studying the awareness and attitudes of teachers towards inclusive education. The sample consisted of 60 teachers, teaching in the primary section (1st – 4th) of regular schools affiliated to the SSC board in Mumbai. The sample was selected by Multi-stage cluster sampling technique. A semi-structured self-constructed interview schedule and a self-constructed attitude scale were used to study the awareness of teachers about disability and Inclusive education, and their attitudes towards inclusive education respectively. Themes were extracted from the interview data and quantitative data was analyzed using SPSS package. Results revealed that teachers had some amount of awareness but an inadequate amount of information on disabilities and inclusive education. Disability to most (37) teachers meant “an inability to do something”. The difference between disability and handicap was stated by most as former being cognitive while handicap being physical in nature. With regard to Inclusive education, a large number (46) stated that they were unaware of the term and did not know what it meant. The majority (52) of them perceived maximum challenges for themselves in an inclusive set up, and emphasized on the role of teacher training courses in the area of providing knowledge (49) and training in teaching methodology (53). Although, 83.3% of teachers held a moderately positive attitude towards inclusive education, a large percentage (61.6%) of participants felt that being in inclusive set up would be very challenging for both children with special needs and without special needs. Though, most (49) of the teachers stated that children with special needs should be educated in a regular classroom, but they further clarified that only those should be in a regular classroom who have physical impairments of mild or moderate degree.

Keywords: attitude, awareness, inclusive education, teachers

Procedia PDF Downloads 306
4773 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 83
4772 Food Security and Utilization in Ethiopia

Authors: Tuji Jemal Ahmed

Abstract:

Food security and utilization are critical aspects of ensuring the well-being and prosperity of a nation. This paper examines the current state of food security and utilization in Ethiopia, focusing on the challenges, opportunities, and strategies employed to address the issue. Ethiopia, a country in East Africa, has made significant progress in recent years to improve food security and utilization for its population. However, persistent challenges such as recurrent droughts, limited access to resources, and low agricultural productivity continue to pose obstacles to achieving sustainable food security. The paper begins by providing an overview of the concept of food security, emphasizing its multidimensional nature and the importance of access, availability, utilization, and stability. It then explores the specific factors influencing food security and utilization in Ethiopia, including natural resources, climate variability, agricultural practices, infrastructure, and socio-economic factors. Furthermore, the paper highlights the initiatives and interventions implemented by the Ethiopian government, non-governmental organizations, and international partners to enhance food security and utilization. These efforts include agricultural extension programs, irrigation projects, investments in rural infrastructure, and social safety nets to protect vulnerable populations. The study also examines the role of technology and innovation in improving food security and utilization in Ethiopia. It explores the potential of sustainable agricultural practices, such as conservation agriculture, improved seed varieties, and precision farming techniques. Additionally, it discusses the role of digital technologies in enhancing access to market information, financial services, and agricultural inputs for smallholder farmers. Finally, the paper discusses the importance of collaboration and partnerships between stakeholders, including government agencies, development organizations, research institutions, and communities, in addressing food security and utilization challenges. It emphasizes the need for integrated and holistic approaches that consider both production and consumption aspects of the food system.

Keywords: food security, utilization, Ethiopia, challenges

Procedia PDF Downloads 68
4771 Challenges for Interface Designers in Designing Sensor Dashboards in the Context of Industry 4.0

Authors: Naveen Kumar, Shyambihari Prajapati

Abstract:

Industry 4.0 is the fourth industrial revolution that focuses on interconnectivity of machine to machine, human to machine and human to human via Internet of Things (IoT). Technologies of industry 4.0 facilitate communication between human and machine through IoT and forms Cyber-Physical Production System (CPPS). In CPPS, multiple shop floors sensor data are connected through IoT and displayed through sensor dashboard to the operator. These sensor dashboards have enormous amount of information to be presented which becomes complex for operators to perform monitoring, controlling and interpretation tasks. Designing handheld sensor dashboards for supervision task will become a challenge for the interface designers. This paper reports emerging technologies of industry 4.0, changing context of increasing information complexity in consecutive industrial revolutions and upcoming design challenges for interface designers in context of Industry 4.0. Authors conclude that information complexity of sensor dashboards design has increased with consecutive industrial revolutions and designs of sensor dashboard causes cognitive load on users. Designing such complex dashboards interfaces in Industry 4.0 context will become main challenges for the interface designers.

Keywords: Industry4.0, sensor dashboard design, cyber-physical production system, Interface designer

Procedia PDF Downloads 115
4770 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 83
4769 A Study on Household Food Security and Dietary Diversity in Urban Centers of Thrissur

Authors: Sandra Thomas

Abstract:

This study tries to analyse the level of food security and dietary diversity among households of different socio-economic classes in the urban centers of Thrissur. The study revealed that there is no much difference in purchasing patterns of food articles among the socio-economic classes indicating a very high level of both physical and economic accessibility of food. On analysing the dietary diversity of the households none of the households scored below five and fifty-three per cent of the households scored eleven or twelve indicating higher diversity in diet. It was also found that income and education are the two important factors that influence the level of household food security.

Keywords: food security, dietary diversity, household level, socio-economic classes

Procedia PDF Downloads 109
4768 Raising High School English Teachers' Awareness of World Englishes

Authors: Julio Cesar Torres Rocha

Abstract:

The present study is a three-stage action research that aims at raising EFL teachers’ awareness of World Englishes (WE) within a critical perspective of inquiry. Through a taught module on English and its varieties, a survey, a reflection paper, and a semi-structured interview were used to collect the data. The results of the study showed that there was a clear change of conception, at the theoretical level, in teachers’ papers. However, WE was regarded as future possibility for action. On the one hand, all of the participants said the module changed their conception of other varieties of English different from British and American ones. They all went from identifying themselves with either American or British variety, a celebratory perspective, to acknowledging and accepting other English varieties, a critical perspective of English as an international language (EIL).

Keywords: teachers’ s awareness, English as an international language, introducing world Englishes, critical applied linguistics

Procedia PDF Downloads 507
4767 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 270
4766 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 285
4765 Need for a National Newborn Screening Programme in India: Pilot Study Data

Authors: Sudheer Moorkoth, Leslie Edward Lewis, Pragna Rao

Abstract:

Newborn screening (NBS) is a part of routine newborn care in many countries worldwide to detect early any rare treatable conditions and inborn errors of metabolism (IEM). India has not started this program yet. In an attempt to understand the challenges in implementing a national newborn screening program in India, we initiated a pilot newborn screening project funded by the Government of Canada. Along with initiating the newborn screening at Kasturba Hospital, Manipal in South India, for screening six disorders (Congenital Hypothyroidism(CH), Congenital Adrenal Hyperplasia (CAH), Galactosemia, Biotinidase deficiency, Glucose-6-Phosphate Dehydrogenase deficiency (G-6PD) and Phenylketonurea), we also studied the awareness of various stakeholders on the newborn screening. In a period of nine months from August 2017 to March 2018 we could screen 1915 newborns (999 male and 916 female). The result showed that there were seven babies screened positive. This interim result points to an incidence rate of 1 in 270 children for these rare disorders collectively. This includes three confirmed cases of CH, two cases of G-6PD deficiency, and one case each for Galctosemia and CAH. A questionnaire based study to understand the awareness among various stakeholders revealed that there is little awareness among parents, adolescents and anganwadi workers (public health worker). The interim data points to the need for a national newborn screening programme in India. There is also an immediate need to undertake large-scale awareness programme to create knowledge on NBS among the various stakeholders.

Keywords: awareness, inborn errors of metabolism (IEM), newborn screening, rare disease

Procedia PDF Downloads 231
4764 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 406
4763 Challenges of Good Government in Enhancing Food Security for Sustainable National Development in Nigeria

Authors: Egboja Simon, Agi Sunday

Abstract:

One of the most important key to success of a nation is to ensure steady development and national economic self - sufficiency and independence. There have been challenges in food security related issues in many developing nations. The problems may be as a result of rise in food price across the globe diminishing global food reserve and erratic weather patterns among other factors. In Nigeria several Agricultural politics have been formulated to curtail food security challenges. Unfortunately, these policies have not yielded the deserved results of increase food production. This paper is designed to identify the various challenges confronting food security in Nigeria with a view of highlighting the reasons that accounting for these problems. This paper also suggests ways of addressing these challenges and concludes by saying that subsidization of the process of farm inputs like fertilizer, improved seed and agro chemicals education of the farmers on modern methods of farming through extension services, improvisation of villages based food storage mechanism and provision of infrastructural facilities in rural areas to facilitate the preservation and easy evacuation of farm produce should be encouraged.

Keywords: governance, security, food, development, conflict, hunger, society, sustainability

Procedia PDF Downloads 309
4762 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 138
4761 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 552
4760 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 459
4759 How to Ensure Environmental Sustainability and Food Security through the Use of Payments for Environmental Services in Developing Countries

Authors: Carlos Alves

Abstract:

This research paper demonstrates how payments for environmental services (PES) can be an effective mechanism to combat food insecurity and reduce environmental degradation in developing countries. The paper begins by discussing how environmental services affect each one of the pillars of food security: availability, access, and utilization of food. However, due to numerous global environmental challenges, a new pillar of food security based on environmental sustainability is proposed and discussed. An argument is then made that PES can usefully combat food insecurity. It can provide an extra income to those who take on environmental service and help them to have a better access to food. In order to be successful in addressing food insecurity, PES schemes should target on the poor and redress issues that can prevent their effectiveness. Finally, the research presents a case study that discusses how several developing countries addressed problems and successfully developed PES programs.

Keywords: environmental sustainability, food security, nutrition, payments for environmental services

Procedia PDF Downloads 376
4758 Fostering Positive Mindset: Grounded Theory Study of Self-Awareness in Emerging Adults

Authors: Maha Ben Salem

Abstract:

The transformative aspect of emerging adulthood brings about a development of self-processes, including changes in self-esteem and personal goals. Success in this life stage entails the emotional growth necessary to navigate the demands and challenges of college life. Understanding the concept of self-awareness within this particular age group sheds light on emerging adults’ internal world and the transformative aspect of their emotional growth. Uncovering the thoughts' processes that foster or hinder self-awareness is important to the understanding of how emerging adults learn to make themselves positive or negative. However, existing research in self-awareness has explored this phenomenon mostly using quantitative research methodology or through tying an individual’s level of self-awareness to specific actions or outcomes. Little is known about the process of how college students emerging adults notice and monitor their inner thoughts and emotions. Methodology and theoretical orientation: A grounded theory study using in-depth semi-structured interview was utilized. Nine interviews have been conducted. A constructionist framework was employed to generate a theory as for how self-awareness facilitates specific patterns of thinking in emerging adults. The choice of grounded theory emanates from a lack of knowledge regarding underlying thinking procedures and internal states that emerging adult college students navigate in an attempt to make meaning out of the new academic experience and life stage. Findings: Initial data analysis generated the following categories of the theory: (a) a non-judgmental perception of negative thinking and negative emotions that allow for a better understanding of the self; (b) negative state of mind is easy to overcome when it is accepted and acknowledged; (c) knowledge of the actual and desired self-generates an intentional decision to shift to a positive mindset. Preliminary findings indicate that college academic and social environment foster a new understanding of the self that yield a change in mindset and in self-knowledge.

Keywords: college environment, emergent adults, grounded theory, positive mindset, self-awareness

Procedia PDF Downloads 116
4757 Inter-Departmental Survey to Check the Impact of Bio-Safety Training Sessions among Lab Employees

Authors: Noorulaine Maqsood, Saeed Khan

Abstract:

Background: Concern regarding incident reporting and bio-safety training in clinical laboratories in Pakistan has increased remarkably in the last few years due to rapid increase in diagnosis and research on infectious organisms. In order to ensure the safety of employees, this issue needs to be addressed immediately. Bio-safety training sessions and lectures are necessary for the protection of laboratory workers in order to ensure safe practices and minimize the count of incident reporting in the lab. Objective: To carry out an inter-departmental survey in lab regarding the awareness of bio-safety practices among lab employees before and after conducting bio-safety training sessions. Methodology: We conducted a 30 questions survey of laboratory workers in June 2013 (before training session) to gather information related to bio-safety awareness. Afterwards, we conducted another survey after training sessions and workshops related to bio-safety. Result: The survey regarding bio-safety level showed that before the training session 32% of the participants were aware of bio-safety level being used in their lab whereas after the session this percentage increased to 72%. 48% of the participants had information about the proper usage of PPE which increased to 76%. Awareness regarding proper management of hazardous waste increased from 32% to 64%. The incident reporting practice, sample handling and hand hygiene awareness was previously reported to be 40%, 65%, and 52% that increased to 80%, 85% and 88% respectively after the training session was completed. Conclusion: The first survey results showed lack of awareness that suggest nearly all senior scientists, faculty, medical technologist, lab attendant and housekeeping staff working in laboratories are required to have bio-safety training, and required inspection at least twice a year by a bio-safety officer and also required to renew their bio-safety training. After the training session, significant changes in awareness level and attitude of the participants regarding biosafety practices were observed. Therefore, such bio-safety sessions should be carried out regularly in clinical laboratories.

Keywords: biosafety practices, clinical laboratory, Pakistan, survey

Procedia PDF Downloads 413