Search results for: national security council
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6957

Search results for: national security council

6417 Criminal Attitude vs Transparency in the Arab World

Authors: Keroles Akram Saed Ghatas

Abstract:

The political violence that characterized 1992 continued into 1993, creating a major security crisis for President Hosni Mubarak's government as the death toll and human rights abuses soared. Increasingly sensitive to criticism of 's human rights activities, the government established human rights departments in key ministries, beginning with the Foreign Office in February. Similar offices have been set up in the Justice and Agriculture Ministries, and plans to set up an office in the Home Office have been announced. It turned out that the main task of the law unit was to overturn the conclusions of international human rights organizations.President Mubarak was elected in a national referendum on October 4 for a third six-year term after being appointed on July 21 by the People's Assembly, an elected parliament overwhelmingly dominated by the in-power National Democratic Party will Mr. Mubarak ran unhindered. The Interior Ministry announced that nearly 16 million people cast their votes (84% of eligible voters), of which 96.28%. voted for presidential re-election.In 1993, armed Islamic extremists escalated their attacks on Christian citizens, government officials, police officers and senior security officials, resulting in casualties among the intended victims and bystanders. Sporadic attacks on buses, boats and tourist attractions also occurred throughout the year. From March 1992 to October 28, 1993, a total of 222 people lost their lives in the riots: 36 Coptic Christians and 38 other citizens; If one is a foreigner; sixty-six members of the Security Forces; and seventy-six known or suspected activists who were killed while resisting arrest. The latter was killed in airstrikes and firefights with security forces and at the site of planned attacks. On March 9-10, a series of airstrikes in Cairo, Giza, Qalyubiya province north of the capital and Aswan killed fifteen suspected militants and five members of the security forces.One of the airstrikes in Giza, part of Greater Cairo, killed the wife and son of Khalifa Mahmoud Ramadan, a suspected militant who was himself killed. The government agency Middle East News Agency reported on March 10 that the raids were part of a "broad confrontational plan aimed at ofterrorist elements"The state of emergency declared in October 1981 after the assassination of President Anwar el-Sadat was still in force in Egypt. The law, previously in effect continuously from June 1967 to May 1980, continued to grant the executive branch unique legal powers that effectively overrode the human rights guarantees of the Egyptian constitution. These provisions included wide discretionary powers in arresting and detaining individuals, as well as the ability to try civilians in military courts. The Cairo-based Independent Organization for Human Rights said so in a document sent to the United Nations in July 1993The human rights committee said the continued imposition of the state of emergency had resulted in "another constitution for the country" and "led to widespread misconduct by the security apparatus".

Keywords: constitution, human rights, legal power, president, anwar, el-sadat, assassination, state of emergency, middle east, news, agency, confrontational, arresting, fugitive, leaders, terrorist, elements, armed islamic extremists.

Procedia PDF Downloads 19
6416 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).

Keywords: intrusion detection, architectures, characteristic, tools, security

Procedia PDF Downloads 449
6415 Dynamics of Norms and Identities Facilitate Countries to Resolve Their Conflicts: A Case Study of ASEAN

Authors: Chander Shekhar Kohli

Abstract:

In the field of international relations, countries have been experiencing distinct nature of conflicts. But, in the case of Association of Southeast Asian Nations (ASEAN) for a long time, the members have witnessed conflicts, small and large. These conflicts, as a result, have given catastrophic outcomes, such as killings and destroying properties. For the resolution of such conflicts, nonetheless, efforts likewise have been made, simultaneously, in terms of establishing peace and security. In this background, the ASEAN presents a significant example as before it had faced several wars, like Vietnam War, Cambodia conflicts, and so on. This research paper, therefore, strives to examine the ASEAN as a case with the help of both primary and secondary sources. It likewise will be dealt with how changing norms and identity building facilitate the ASEAN countries to deal with their conflicts both internal and external. This paper also will discuss how internal developments within countries affect conflict resolution process as each member of ASEAN is guided by its national interest. It is then argued that conflict resolution in the ASEAN is moving from its existing power-based solution to norms and identity-based solution as member countries have become more dependent on other countries. The research, therefore, is concluded by saying that the conflicts could only be resolved through building norms and common identities, which of course are recognized crucial mechanisms among the ASEAN countries with some exceptions.

Keywords: ASEAN, conflict resolution, norms and identities, peace and security

Procedia PDF Downloads 195
6414 Physiochemical Parameters Assessment and Evaluation of the Quality of Drinking Water in Some Parts of Lagos State

Authors: G. T. Mudashiru, Mayowa P. Ibitola

Abstract:

Investigation was carried out at Ikorodu North local council development area of Lagos state using physiochemical parameters to study the quality drinking water. It was ascertained that the human functions and activities were dependent on the continuous and availability of good drinking water. Six water samples were collected at six different boreholes from various outlets and homes in Ikorodu North local council development area. Lagos state Nigeria. Analysis was carried out to determine the purity of water for domestic use. Physicochemical properties evaluation was adapted using standard chemical methods. A number of parameters such as PH, turbidity, conductivity, total dissolved solids, color, chloride, sulphate, nitrate, hardness were determined. Heavy metals such as Zn, Mg, Fe, Pb, Hg, and Mn as well as total coliform counts were observed. The resulted values of each parameter were justified with World Health Organization (WHO) and Lagos state water regulatory commission LSWRC standard values for quantitative comparison. The result reveals that all the water had pH value well below the WHO maximum permissible level for potable water. Other physicochemical parameters were within the safe limit of WHO standard showing the portability nature of the water. It can be concluded that though the water is potable, there should be a kind of treatment of the water before consumption to prevent outbreak of diseases.

Keywords: drinking water, physiology, boreholes, heavy metals, domestic

Procedia PDF Downloads 191
6413 National Identity in Connecting the Community through Mural Art for Petronas Dagangan Berhad

Authors: Nadiah Mohamad, Wan Samiati Andriana Wan Mohd Daud, M. Suhaimi Tohid, Mohd Fazli Othman, Mohamad Rizal Salleh

Abstract:

This is a collaborative project of the mural art between The Department of Fine Art from Universiti Teknologi MARA (UiTM) and Petronas Dagangan Berhad (PDB), the most leading retailer and marketer of downstream oil and gas products in Malaysia. Five different states in the Peninsular of Malaysia that has been identified in showcasing the National Identity of Malaysia at each Petronas gas station, this also includes the Air Keroh in Melaka, Pasir Pekan in Kelantan, Pontian in Johor, Simpang Pulai in Perak, and also Wakaf Bharu in Terengganu. This project is to analyze the element of national identity that has been demonstrated at the Petronas's Mural. The ultimate aim of the mural is to let the community and local people to be aware about what Malaysians are consists and proud of and how everyone is able to connect with the idea through visual art. The method that is being explained in this research is by using visual data through research and also self-experience in collecting the visual data in identifying what images is considered as the national identity and idea development and visual analysis is being transferred based upon the visual data collection. In this stage, elements and principles of design will be the key in highlighting what is necessary for a work of art. In conclusion, visual image of the National Identity of Malaysia is able to connect to the audience from local and also to the people from outside the country to learn and understand the beauty and diversity of Malaysia as a unique country with art through the wall of five Petronas gas station.

Keywords: community, fine art, mural art, national identity

Procedia PDF Downloads 186
6412 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia

Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey

Abstract:

Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.

Keywords: food security, migrants, strategies, inferential statistics

Procedia PDF Downloads 506
6411 Public-Private Partnership in Tourism Development: Kuwait Experience within 2035 Vision

Authors: Obaid Alotaibi

Abstract:

Tourism and recreation have become one of the important and influential sectors in most of the modern economies. This sector has been accepted as one of the alternative sources of national income, employment, and foreign exchange. Kuwait has many potentialities in tourism and recreation, and exploitation of this leads to more diversification of the economy besides augmenting its contribution to the GDP. It is an import-oriented economy; it requires hard currencies (foreign exchange) to meet the import costs as well as to maintain stability in the international market. To compensate for the revenue fall stemmed from fluctuations in oil prices -where the agriculture, fisheries, and industrial sectors are too immune and inelastic- the only alternative solution is the regeneration of the tourism and recreation to surface. This study envisages the characteristics of tourism and recreation, the economic and social importance for the society, the physical and human endowments, as well as the tourist pattern and plans for promoting and sustaining tourism in the country. The study summarizes many recommendations, including the necessity of establishing authority or a council for tourism, linking the planning of tourism development with the comprehensive planning for economic and social development in Kuwait in the shadow of 2035 vision, and to encourage the investors to develop new tourist and recreation projects.

Keywords: Kuwait, public-private, partnership, tourism, 2035 vision

Procedia PDF Downloads 105
6410 Examining the Effects of National Disaster on the Performance of Hospitality Industry in Korea

Authors: Kim Sang Hyuck, Y. Park Sung

Abstract:

The outbreak of national disasters stimulates the decrease of the both internal and domestic tourism demands, causing bad effects on the hospitality industry. The effective and efficient risk management regarding national disasters are being increasingly required from the hospitality industry practitioners and the tourism policymakers. To establish the effective and efficient risk management strategy on national disasters, the most essential prerequisite condition is the correct estimation of national disasters’ effects in terms of the size and duration of the damages occurred from national disaster on hospitality industry. More specifically, the national disasters are twofold: natural disaster and social disaster. In addition, the hospitality industry has consisted of several types of business, such as hotel, restaurant, travel agency, etc. As reasons of the above, it is important to consider how each type of national disasters differently influences on the performance of each type of hospitality industry. Therefore, the purpose of this study is examining the effects of national disaster on hospitality industry in Korea based on the types of national disasters as well as the types of hospitality business. The monthly data was collected from Jan. 2000 to Dec. 2016. The indexes of industrial production for each hospitality industry in Korea were used with the proxy variable for the performance of each hospitality industry. Two national disaster variables (natural disaster and social disaster) were treated as dummy variables. In addition, the exchange rate, industrial production index, and consumer price index were used as control variables in the research model. The impulse response analysis was used to examine the size and duration of the damages occurred from each type of national disaster on each type of hospitality industries. The results of this study show that the natural disaster and the social disaster differently influenced on each type of hospitality industry. More specifically, the performance of airline industry is negatively influenced by the natural disaster at the time of 3 months later from the incidence. However, the negative impacts of social disaster on airline industry occurred not significantly over the time periods. For the hotel industry, both natural disaster and social disaster negatively influence the performance of hotel industry at the time of 5 months and 6 months later, respectively. Also, the negative impact of natural disaster on the performance of restaurant industry occurred at the time of 5 months later, as well as for both 3 months and 6 months later for the social disaster. Finally, both natural disaster and social disaster negatively influence the performance of travel agency at the time of 3 months and 4 months later, respectively. In conclusion, the types of national disasters differently influence the performance of each type of hospitality industry in Korea. These results would provide an important information to establish the effective and efficient risk management strategy for the national disasters.

Keywords: impulse response analysis, Korea, national disaster, performance of hospitality industry

Procedia PDF Downloads 171
6409 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique

Authors: Veysel Çelik, Aynur Aker, Ebru Güç

Abstract:

Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.

Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy

Procedia PDF Downloads 111
6408 International Integration in Innovative Development of Economy

Authors: Tatyana Kolmykova, Elvira Sitnikova

Abstract:

Globalization is one of the key processes that are shaping the modern world. There are different often quite opposite attitudes toward globalization. However, it is impossible to avoid the effects of international integration, and they should be addressed in the process of formation and development of the national industrial sector.

Keywords: integrated structures, industrial sector, globalization, national

Procedia PDF Downloads 490
6407 Implementation-Oriented Discussion for Historical and Cultural Villages’ Conservation Planning

Authors: Xing Zhang

Abstract:

Since the State Council of China issued the Regulations on the Conservation of Historical Cultural Towns and Villages in 2008, formulation of conservation planning has been carried out in national, provincial and municipal historical and cultural villages for protection needs, which provides a legal basis for inheritance of historical culture and protection of historical resources. Although the quantity and content of the conservation planning are continually increasing, the implementation and application are still ambiguous. To solve the aforementioned problems, this paper explores methods to enhance the implementation of conservation planning from the perspective of planning formulation. Specifically, the technical framework of "overall objectives planning - sub-objectives planning - zoning guidelines - implementation by stages" is proposed to implement the planning objectives in different classifications and stages. Then combined with details of the Qiqiao historical and cultural village conservation planning project in Ningbo, five sub-objectives are set, which are implemented through the village zoning guidelines. At the same time, the key points and specific projects in the near-term, medium-term and long-term work are clarified, and the spatial planning is transformed into the action plan with time scale. The proposed framework and method provide a reference for the implementation and management of the conservation planning of historical and cultural villages in the future.

Keywords: conservation planning, planning by stages, planning implementation, zoning guidelines

Procedia PDF Downloads 222
6406 Multi-Sectoral Prioritization of Zoonotic Diseases in Uganda, 2017: The Perspective of One Health Experts

Authors: Musa Sekamatte

Abstract:

Background: Zoonotic diseases continue to be a public health burden in countries around the world. Uganda is especially vulnerable due to its location, biodiversity, and population. Given these concerns, the Ugandan government in collaboration with the Global Health Security Agenda conducted a zoonotic disease prioritization workshop to identify zoonotic diseases of concern to multiple Ugandan ministries. Materials and Methods: The One Health Zoonotic Disease Prioritization tool, developed by the U.S. Centers for Disease Control and Prevention (CDC), was used for prioritization of zoonotic diseases in Uganda. Workshop participants included voting members representing human, animal, and environmental health ministries as well as key partners who observed the workshop. Over 100 articles describing characteristics of these zoonotic diseases were reviewed for the workshop. During the workshop, criteria for prioritization were selected, and questions and weights relevant to each criterion were determined. Next steps for multi-sectoral engagement for the prioritized zoonoses were then discussed. Results: 48 zoonotic diseases were considered during the workshop. Criteria selected to prioritize zoonotic diseases in order of importance were (1) severity of disease in humans in Uganda, (2) availability of effective control strategies, (3) potential to cause an epidemic or pandemic in humans or animals, (4) social and economic impacts, and (5) bioterrorism potential. Seven zoonotic diseases were identified as priorities for Uganda: anthrax, zoonotic influenza viruses, viral hemorrhagic fevers, brucellosis, African trypanosomiasis, plague, and rabies. Discussion: One Health approaches and multi-sectoral collaborations are crucial in the surveillance, prevention, and control strategies for zoonotic diseases. Uganda used such an approach to identify zoonotic diseases of national concern. Identifying these priority diseases enables the National One Health Platform and the Zoonotic Disease Coordinating Office to address the diseases in the future.

Keywords: national one health platform, zoonotic diseases, multi-sectoral, severity

Procedia PDF Downloads 168
6405 The Regionalism Paradox in the Fight against Human Trafficking: Indonesia and the Limits of Regional Cooperation in ASEAN

Authors: Nur Iman Subono, Meidi Kosandi

Abstract:

This paper examines the role of regional cooperation in the Association of Southeast Asian Nations (ASEAN) in the fight against human trafficking for Indonesia. Many among scholars suggest that regional cooperation is necessary for combating human trafficking for its transnational and organized character as a crime against humanity. ASEAN members have been collectively active in responding transnational security issues with series of talks and collaboration agreement since early 2000s. Lately in 2015, ASEAN agreed on ASEAN Convention against Trafficking in Persons, particularly Women and Children (ACTIP) that requires each member to collaborate in information sharing and providing effective safeguard and protection of victims. Yet, the frequency of human trafficking crime occurrence remains high and tend to increase in Indonesian in 2017-2018. The objective of this paper is to examine the effectiveness and success of ACTIP implementation in the fight against human trafficking in Indonesia. Based on two years of research (2017-2018) in three provinces with the largest number of victims in Indonesia, this paper shows the tendency of persisting crime despite the implementation of regional and national anti-trafficking policies. The research was conducted by archive study, literature study, discourse analysis, and depth interviews with local government officials, police, prosecutors, victims, and traffickers. This paper argues that the relative success of ASEAN in establishing convention at the high-level meetings has not been followed with the success in its implementation in the society. Three main factors have contributed to the ineffectiveness of the agreements, i.e. (1) ASEAN institutional arrangement as a collection of sovereign states instead of supranational organization with binding authority; (2) the lack of commitment of ASEAN sovereign member-states to the agreements; and (3) the complexity and variety of the nature of the crime in each member-state. In effect, these factors have contributed to generating the regionalism paradox in ASEAN where states tend to revert to national policies instead of seeking regional collective solution.

Keywords: human trafficking, transnational security, regionalism, anti trafficking policy

Procedia PDF Downloads 133
6404 Attitude of Beef Cattle Farmers toward Biosecurity Practices

Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim

Abstract:

The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.

Keywords: attitude, beef cattle, biosecurity, farmers

Procedia PDF Downloads 279
6403 Correlation of Spirometry with Six Minute Walk Test and Grading of Dyspnoea in COPD Patients

Authors: Anand K. Patel

Abstract:

Background: Patients with COPD have decreased pulmonary functions, which in turn reflect on their day-to-day activities. Objectives: To assess the correlation between functional vital capacity (FVC) and forced expiratory volume in one second (FEV1) with 6 minutes walk test (6MWT). To correlate the Borg rating for perceived exertion scale (Borg scale) and Modified medical research council (MMRC) dyspnea scale with the 6MWT, FVC and FEV1. Method: In this prospective study total 72 patients with COPD diagnosed by the GOLD guidelines were enrolled after taking written consent. They were first asked to rate physical exertion on the Borg scale as well as the modified medical research council dyspnea scale and then were subjected to perform pre and post bronchodilator spirometry followed by 6 minute walk test. The findings were correlated by calculating the Pearson coefficient for each set and obtaining the p-values, with a p < 0.05 being clinically significant. Result: There was a significant correlation between spirometry and 6MWT suggesting that patients with lower measurements were unable to walk for longer distances. However, FVC had the stronger correlation than FEV1. MMRC scale had a stronger correlation with 6MWT as compared to the Borg scale. Conclusion: The study suggests that 6MWT is a better test for monitoring the patients of COPD. In spirometry, FVC should be used in monitoring patients with COPD, instead of FEV1. MMRC scale shows a stronger correlation than the Borg scale, and we should use it more often.

Keywords: spirometry, 6 minute walk test, MMRC, Borg scale

Procedia PDF Downloads 176
6402 VCloud: A Security Framework for VANET

Authors: Wiseborn Manfe Danquah, D. Turgay Altilar

Abstract:

Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.

Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)

Procedia PDF Downloads 334
6401 A Measurement Instrument to Determine Curricula Competency of Licensure Track Graduate Psychotherapy Programs in the United States

Authors: Laith F. Gulli, Nicole M. Mallory

Abstract:

We developed a novel measurement instrument to assess Knowledge of Educational Programs in Professional Psychotherapy Programs (KEP-PPP or KEP-Triple P) within the United States. The instrument was designed by a Panel of Experts (PoE) that consisted of Licensed Psychotherapists and Medical Care Providers. Licensure track psychotherapy programs are listed in the databases of the Commission on Accreditation for Marriage and Family Therapy Education (COAMFTE); American Psychological Association (APA); Council on Social Work Education (CSWE); and the Council for Accreditation of Counseling & Related Educational Programs (CACREP). A complete list of psychotherapy programs can be obtained from these professional databases, selecting search fields of (All Programs) in (All States). Each program has a Web link that electronically and directly connects to the institutional program, which can be researched using the KEP-Triple P. The 29-item KEP Triple P was designed to consist of six categorical fields; Institutional Type: Degree: Educational Delivery: Accreditation: Coursework Competency: and Special Program Considerations. The KEP-Triple P was designed to determine whether a specific course(s) is offered in licensure track psychotherapy programs. The KEP-Triple P is designed to be modified to assess any part or the entire curriculum of licensure graduate programs. We utilized the KEP-Triple P instrument to study whether a graduate course in Addictions was offered in Marriage and Family Therapy (MFT) programs. Marriage and Family Therapists are likely to commonly encounter patients with Addiction(s) due to the broad treatment scope providing psychotherapy services to individuals, couples and families of all age groups. Our study of 124 MFT programs which concluded at the end of 2016 found that we were able to assess 61 % of programs (N = 76) since 27 % (N = 34) of programs were inaccessible due to broken Web links. From the total of all MFT programs 11 % (N = 14) did not have a published curriculum on their Institutional Web site. From the sample study, we found that 66 % (N = 50) of curricula did not offer a course in Addiction Treatment and that 34 % (N =26) of curricula did require a mandatory course in Addiction Treatment. From our study sample, we determined that 15 % (N = 11) of MFT doctorate programs did not require an Addictions Treatment course and that 1 % (N = 1) did require such a course. We found that 99 % of our study sample offered a Campus based program and 1 % offered a hybrid program with both online and residential components. From the total sample studied, we determined that 84 % of programs would be able to obtain reaccreditation within a five-year period. We recommend that MFT programs initiate procedures to revise curricula to include a required course in Addiction Treatment prior to their next accreditation cycle, to improve the escalating addiction crisis in the United States. This disparity in MFT curricula raises serious ethical and legal consideration for national and Federal stakeholders as well as for patients seeking a competently trained psychotherapist.

Keywords: addiction, competency, curriculum, psychotherapy

Procedia PDF Downloads 131
6400 The Status of the Actio Popularis under International Environmental Law in Cases of Damage to Global Commons

Authors: Aimite Jorge, Leenekela Usebiu

Abstract:

In recent years the International Community has seen a rise of what can be termed as ‘actio popularis”;that is to say lawsuits brought by third parties in the interest of the public or the world community as a whole, such as in cases of genocide and terrorism prosecutions under international law. It is equally clear that under current globalized world the effect of multinational activities on the environment is often felt beyond the borders of the territories where they operate. Equally true is the fact that the correspondence of citizens self-determination with national government is increasingly upset by the increasing willingness of states to share some ‘sovereign powers’ in order to address new economic, environmental and security interdependencies. The ‘unbundling’ of functional governance from fixed territories sees continuously citizens give up their formal approval of key decisions in exchange for a more remote, indirect say in supra-national or international decision-making bodies. The efforts to address a growing transnational flow of ecological harm are at the forefront of such indirect transformations, as evidenced by a proliferation of multilateral environmental agreements (MEAs) over the past three decades. However, unlike the defence of the global commons in cases of terrorism and genocide, there is still to be a clear application of action popularis in the case of environment, despite acknowledgement that the effect of the activities of several multinationals on the environment is as destructive to the global commons as genocide or terrorism are. Thus, this paper looking at specific cases of harmful degradation of the environment by certain multinationals transcending national boundaries, argues that it is high-time for a serious consideration of the application of the actio-popularis to environmental concerns. Although it is acknowledged that in international environmental law the challenge to reach a “critical mass” of recognition and support for an ‘actio-popularis’ for environment damage is particularly demanding, it is worth the try.

Keywords: actio popularis in environment law, global commons, transnational environmental damage, law and environment

Procedia PDF Downloads 547
6399 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 63
6398 Embodying the Ecological Validity in Creating the Sustainable Public Policy: A Study in Strengthening the Green Economy in Indonesia

Authors: Gatot Dwi Hendro, Hayyan ul Haq

Abstract:

This work aims to explore the strategy in embodying the ecological validity in creating the sustainability of public policy, particularly in strengthening the green economy in Indonesia. This green economy plays an important role in supporting the national development in Indonesia, as it is a part of the national policy that posits the primary priority in Indonesian governance. The green economy refers to the national development covering strategic natural resources, such as mining, gold, oil, coal, forest, water, marine, and the other supporting infrastructure for products and distribution, such as fabrics, roads, bridges, and so forth. Thus, all activities in those national development should consider the sustainability. This sustainability requires the strong commitment of the national and regional government, as well as the local governments to put the ecology as the main requirement for issuing any policy, such as licence in mining production, and developing and building new production and supporting infrastructures for optimising the national resources. For that reason this work will focus on the strategy how to embody the ecological values and norms in the public policy. In detail, this work will offer the method, i.e. legal techniques, in visualising and embodying the norms and public policy that valid ecologically. This ecological validity is required in order to maintain and sustain our collective life.

Keywords: ecological validity, sustainable development, coherence, Indonesian Pancasila values, environment, marine

Procedia PDF Downloads 462
6397 Mapping the Technological Interventions to the National Action Plan for Marine Litter Management 2018-2025: Addressing the Marine Plastic Litter at the Marine Tourism Destinations in Indonesia

Authors: Kaisar Akhir, Azhar Slamet

Abstract:

This study aims to provide recommendations for addressing marine plastic litter at the ocean tourism destinations in Indonesia sustainably through technological interventions in the framework of the National Action Plan for Marine Litter Management 2018-2025. In Indonesia, marine tourism is a rapidly growing economic sector. However, marine tourism destinations are facing a global challenge called marine plastic litter. Marine plastic litter is a threat to those destinations since it has potential impacts on the reduction of marine environmental sustainability, the health of tourists and local communities as well as tourism business income. Since 2018, the Indonesian government has passed and promulgated the National Plan of Action on Marine Litter Management 2018-2025. This national action plan consists of three important key aspects of interventions (i.e., societal effort, technological application, and institutional coordination) and five strategies for addressing marine litter in Indonesia, in particular, to address 70% of marine plastic litter by 2025. The strategies include 1) National movement for raising awareness of stakeholders, 2) Land-based litter management, 3) Litter management at the sea and coasts, 4) Funding mechanism, institutional strengthening, monitoring, and law enforcement, and 5) Research and development. In this study, technological interventions around the world and in Indonesia are reviewed and analyzed on their relevance to the national action plan based on five criteria. As a result, there are twelve kinds of technological interventions recommended to be implemented for addressing marine plastic litter in the marine tourism destinations in Indonesia.

Keywords: marine litter management, marine plastic litter, national action plan, ocean sustainability, ocean tourism destination, technological interventions

Procedia PDF Downloads 150
6396 An Extended Model for Sustainable Food and Nutrition Security in the Agrifood Sector

Authors: Ioannis Manikas

Abstract:

The increased consumer demand for environmentally friendly production and distribution practices and the stricter environmental regulations turned environmental aspects into important criteria in business decision-making. On the other hand, Food and Nutrition Security (FNS) has evolved dramatically during the last decades in theory and practice serving as a reference point for exchanging experiences among all agents involved in programs and projects to fostering policy and strategy development. Global pressures make it more important than ever to gain a better understanding of the contribution that agrifood businesses make to FNS and to examine ways to make them more resilient in an increasingly globalized and uncertain world. This study extends the standard three-dimensional model of sustainability to include two more dimensions: A technological dimension and a policy/political dimension. Apart from the economic, environmental and social dimensions regularly used in sustainability literature, the extended model will accurately represent the measures and policies addressing food and nutrition security.

Keywords: food and nutrition security, sustainability, food safety, resilience

Procedia PDF Downloads 315
6395 Prevalence of Gestational Diabetes Mellitus in Western Australia from 2015 until 2020

Authors: Kumaressan Ragunathan, Arisudhan Anantharachagan

Abstract:

Gestational diabetes mellitus (GDM) is the subtype of diabetes that has been rapidly increasing in numbers in Australia. The annual percentage of GDM has increased more than 50 percent in the last decade. According to Diabetes Australia, more than five hundred thousand women in Australia will be diagnosed with GDM. Globally, the prevalence of GDM ranges from single-digit to more than 45%. The prevalence of GDM has increased significantly last five years after the introduction of new diagnostic criteria. Hence, we have decided to investigate the trend in GDM prevalence in a tertiary maternity unit at Western Australia and compare it to national prevalence. Data is derived from STORK Perinatal Database which has been used by Maternity services in Western Australia to populate information on pregnancy and labour. We have selected data from 2015 until 2020, which includes 17508 women. Among 17508 women, 3850 women were diagnosed with GDM. In 2015, we had a total of 2213 deliveries with 345 of them were complicated by GDM. GDM prevalence was 15.6% compared to the Australian national prevalence of 12%. In 2016, total deliveries increased to 2759 with 590 of were with GDM. GDM prevalence was 21.4% compared to the Australian national prevalence of 12%. In 2017, total deliveries further increased to 3049 with 675 with GDM. GDM prevalence was 22.1%, with an Australian national prevalence of 13%. In 2018, total deliveries continued to increase, with numbers reaching 3231 with 749 with GDM. GDM prevalence was 23.2%, with an Australian National prevalence of 14%. In 2019, total deliveries were 3110, with 712 complicated by GDM. GDM prevalence was 22.9%, with Australian national prevalence 14%. In 2020, total deliveries 3146 with 819 complicated by GDM. GDM prevalence increased to 26% and we were unable to compare this to national standard as national prevalence has not been released. Among 3890 women with GDM, 2482 (64%) of them required insulin. Apart from that, a total 1642(42%) from the GDM group were delivered via the Caesarean section. 2121 (55%) women with GDM required induction of labour. Overall, we demonstrated an increase in the prevalence of GDM in our unit from 2015 until 2020. Our prevalence is also higher compared to national prevalence. This could be contributed by the increasing number of obesity and in addition, our unit accepts referrals of women with a body mass index (BMI) of more than 40. Hence, further studies are required to look at other risk factors like ethnicity, socio-economic status, health literacy and age, which could contribute to this high prevalence.

Keywords: gestational diabetes mellitus, prevalence, Western Australia, Australia

Procedia PDF Downloads 146
6394 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications

Authors: Chieh-Fu Chang, Wan-Hsin Hsieh

Abstract:

We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.

Keywords: security, IWE, cliff effect, space communications

Procedia PDF Downloads 402
6393 The Multipurpose Usage of Livestock Animal Dungs for Food Production in Gwagwalada Area Council of the Federal Capital Territory, Abuja Nigeria

Authors: Michael Adedotun Oke

Abstract:

This paper, therefore, under study the various multiplier usages of the different Animal Dungs, from the animals such as Rabbits, Cows, Fishes, Sheep, and Poultry manure in the areas council of the Federal Capital Territory Abuja, Nigeria. Thus the various observations, with the pictorial representation, that was taken with the field survey from the different farms in Gwagawalada. Shows that the rabbits dungs are being used in some of the vegetables and crop farms, which serves as the nutrients, reduces the cost of production, ensure profitability, which also increases the different vegetative growth, early maturity, and the development of the crop and this is also applicable to some crops like maize, sweet potatoes. While the manure of the poultry products are being incorporated to fish ponds and the cows dungs are being used to serve as some manure to some certain crops, e.g. Okro, Maize, Pepper. Which provides the necessary nutritious values, but the various number of quantity of different bags of the various application are lacking, and the time of usage, it is also a life germane questions, which there are needs for further adaptive research, that will be involved and the reintroduction of new technology, that will be used in terms of the different methodology such as broadcasting and ring applications, of the dungs at large, while the seasons of the various applications. Thus the paper, therefore, suggested a training programs and production of manuals that will guide the various applications and usage and the effective dissemination of the various used of the simple technology, that will advances and teaching of a new mode of and the time of applications and the various quantity to used, during the applications.

Keywords: animals, usage, livestock, dungs, feaces, gwagawalada

Procedia PDF Downloads 161
6392 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income

Authors: M. Koray Cetin, Mehmet Mert

Abstract:

The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.

Keywords: exchange rate, panel data analysis, security, tourism revenues

Procedia PDF Downloads 327
6391 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 407
6390 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 90
6389 Formulation of a Rapid Earthquake Risk Ranking Criteria for National Bridges in the National Capital Region Affected by the West Valley Fault Using GIS Data Integration

Authors: George Mariano Soriano

Abstract:

In this study, a Rapid Earthquake Risk Ranking Criteria was formulated by integrating various existing maps and databases by the Department of Public Works and Highways (DPWH) and Philippine Institute of Volcanology and Seismology (PHIVOLCS). Utilizing Geographic Information System (GIS) software, the above-mentioned maps and databases were used in extracting seismic hazard parameters and bridge vulnerability characteristics in order to rank the seismic damage risk rating of bridges in the National Capital Region.

Keywords: bridge, earthquake, GIS, hazard, risk, vulnerability

Procedia PDF Downloads 386
6388 The Influence of the Vocational Teachers Empowerment toward the Vocational High Schools’ Performance Based on the Education National Standards of Indonesia

Authors: Abdul Haris Setiawan

Abstract:

Teachers empowerment is one of the important factors considered to contribute significantly to the achievement of the national education goals. This study was conducted to determine the influence on the vocational teachers empowerment toward the performance of the vocational high schools based on the Education National Standards of Indonesia. The population of the study was all vocational teachers at the State Vocational High schools in Surakarta, Central Java Province, Indonesia. The sampling technique used proportional random sampling technique. This study used a quantitative descriptive statistical analysis techniques. The data was collected using questionnaires. The data has been collected and then tested using analysis requirements test. Having tested using the requirements analysis and then the data processed using regression analysis between the independent and dependent variables to determine the effect and the regression equation. The results of the study found that the level of vocational high schools’ performance based on the Education National Standards of Indonesia was 74.29%, including in the high category; the level of vocational teachers empowerment was 76.20%, including in the high category; there was a positive influence of vocational teachers empowerment toward the vocational high schools’ performance based on the Education National Standards of Indonesia with a correlation coefficient of 0,886, and a contribution of 78.50% with the regression equation Y = 79.431 +0.534 X.

Keywords: vocational teachers, empowerment, vocational high school, the education national standards

Procedia PDF Downloads 381