Search results for: pacification and security policy plan
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7894

Search results for: pacification and security policy plan

7354 Glycemic Control in Rice Consumption among Households with Diabetes Patients: The Role of Food Security

Authors: Chandanee Wasana Kalansooriya

Abstract:

Dietary behaviour is a crucial factor affecting diabetes control. With increasing rates of diabetes prevalence in Asian countries, examining their dietary patterns, which are largely based on rice, is timely required. It has been identified that higher consumption of some rice varieties is associated with increased risk of type 2 diabetes. Although diabetes patients are advised to consume healthier rice varieties, which contains low glycemic, several conditions, one of which food insecurity, make them difficult to preserve those healthy dietary guidelines. Hence this study tries to investigate how food security affects on making right decisions of rice consumption within diabetes affected households using a sample from Sri Lanka, a country which rice considered as the staple food and records the highest diabetes prevalence rate in South Asia. The study uses data from the Household Income and Expenditure Survey 2016, a nationally representative sample conducted by the Department of Census and Statistics, Sri Lanka. The survey used a two-stage stratified sampling method to cover different sectors and districts of the country and collected micro-data on demographics, health, income and expenditures of different categories. The study uses data from 2547 households which consist of one or more diabetes patients, based on the self-recorded health status. The Household Dietary Diversity Score (HDDS), which constructed based on twelve food groups, is used to measure the level of food security. Rice is categorized into three groups according to their Glycemic Index (GI), high GI, medium GI and low GI, and the likelihood and impact made by food security on each rice consumption categories are estimated using a Two-part Model. The shares of each rice categories out of total rice consumption is considered as the dependent variable to exclude the endogeneity issue between rice consumption and the HDDS. The results indicate that the consumption of medium GI rice is likely to increase with the increasing household food security, but low GI varieties are not. Households in rural and estate sectors are less likely and Tamil ethnic group is more likely to consume low GI rice varieties. Further, an increase in food security significantly decreases the consumption share of low GI rice, while it increases the share of medium GI varieties. The consumption share of low GI rice is largely affected by the ethnic variability. The effects of food security on the likelihood of consuming high GI rice varieties and changing its shares are statistically insignificant. Accordingly, the study concludes that a higher level of food security does not ensure diabetes patients are consuming healthy rice varieties or reducing consumption of unhealthy varieties. Hence policy attention must be directed towards educating people for making healthy dietary choices. Further, the study provides a room for further studies as it reveals considerable ethnic and sectorial differences in making healthy dietary decisions.

Keywords: diabetes, food security, glycemic index, rice consumption

Procedia PDF Downloads 100
7353 The Applicability of General Catholic Canon Law during the Ongoing Migration Crisis in Hungary

Authors: Lorand Ujhazi

Abstract:

The vast majority of existing canonical studies about migration are focused on examining the general pastoral and legal regulations of the Catholic Church. The weakness of this approach is that it ignores a number of important factors; like the financial, legal and personal circumstances of a particular church or the canonical position of certain organizations which actually look after the immigrants. This paper is a case study, which analyses the current and historical migration related policies and activities of the Catholic Church in Hungary. To achieve this goal the study uses canon law, historical publications, various instructions and communications issued by church superiors, Hungarian and foreign media reports and the relevant Hungarian legislation. The paper first examines how the Hungarian Catholic Church assisted migrants like Armenians fleeing from the Ottoman Empire, Poles escaping during the Second World War, East German and Romanian citizens in the 1980s and refugees from the former Yugoslavia in the 1990s. These events underline the importance of past historical experience in the development of contemporary pastoral and humanitarian policy of the Catholic Church in Hungary. Then the paper turns to the events of the ongoing crisis by describing the unique challenges faced by churches in transit countries like Hungary. Then the research contrasts these findings with the typical responsibilities of churches in countries which are popular destinations for immigrants. The next part of the case study focuses on the changes to the pre-crisis legal and canonical framework which influenced the actions of hierarchical and charity organizations in Hungary. Afterwards, the paper illustrates the dangers of operating in an unclear legal environment, where some charitable activities of the church like a fundraising campaign may be interpreted as a national security risk by state authorities. Then the paper presents the reactions of Hungarian academics to the current migration crisis and finally it offers some proposals how to improve parts of Canon Law which govern immigration. The conclusion of the paper is that during the formulation of the central refugee policy of the Catholic Church decision makers must take into consideration the peculiar circumstances of its particular churches. This approach may prevent disharmony between the existing central regulations, the policy of the Vatican and the operations of the local church organizations.

Keywords: canon law, Catholic Church, civil law, Hungary, immigration, national security

Procedia PDF Downloads 308
7352 The Impact of Social Protection Intervention on Alleviating Social Vulnerability (Evidence from Ethiopian Rural Households)

Authors: Tewelde Gebresslase Haile, S. P. Singh

Abstract:

To bridge the existing knowledge gap on public intervention implementations, this study estimates the impact of social protection intervention (SPI) on alleviating social vulnerability. Following a multi-stage sampling, primary information was gathered through a self-administered questionnaire, FGD, and interviews from the target households located at four systematically selected districts of Tigrai, Ethiopia. Factor analysis and Propensity Score Matching are applied to construct Social Vulnerability Index (SVI) and measuring the counterfactual impact of selected intervention. As a multidimensional challenge, social vulnerability is found as an important concept used to guide policy evaluation. Accessibility of basic services of Social Affairs, Agriculture, Health and Education sectors, and Food Security Program are commonly used as SPIs. Finally, this study discovers that the households who had access to SPI have scored 9.65% lower SVI than in the absence of the intervention. Finally, this study suggests the provision of integrated, proactive, productive, and evidence-based SPIs to alleviate social vulnerability.

Keywords: social protection, livelihood assets, social vulnerability, public policy SVI

Procedia PDF Downloads 88
7351 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 156
7350 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 536
7349 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 129
7348 Applications of Greenhouse Data in Guatemala in the Analysis of Sustainability Indicators

Authors: Maria A. Castillo H., Andres R. Leandro, Jose F. Bienvenido B.

Abstract:

In 2015, Guatemala officially adopted the Sustainable Development Goals (SDG) according to the 2030 Agenda agreed by the United Nations Organization. In 2016, these objectives and goals were reviewed, and the National Priorities were established within the K'atún 2032 National Development Plan. In 2019 and 2021, progress was evaluated with 120 defined indicators, and the need to improve quality and availability of statistical data necessary for the analysis of sustainability indicators was detected, so the values to be reached in 2024 and 2032 were adjusted. The need for greater agricultural technology is one of the priorities established within SDG 2 "Zero Hunger". Within this area, protected agricultural production provides greater productivity throughout the year, reduces the use of chemical products to control pests and diseases, reduces the negative impact of climate and improves product quality. During the crisis caused by Covid-19, there was an increase in exports of fruits and vegetables produced in greenhouses from Guatemala. However, this information has not been considered in the 2021 revision of the Plan. The objective of this study is to evaluate the information available on Greenhouse Agricultural Production and its integration into the Sustainability Indicators for Guatemala. This study was carried out in four phases: 1. Analysis of the Goals established for SDG 2 and the indicators included in the K'atún Plan. 2. Analysis of Environmental, Social and Economic Indicator Models. 3. Definition of territorial levels in 2 geographic scales: Departments and Municipalities. 4. Diagnosis of the available data on technological agricultural production with emphasis on Greenhouses at the 2 geographical scales. A summary of the results is presented for each phase and finally some recommendations for future research are added. The main contribution of this work is to improve the available data that allow the incorporation of some agricultural technology indicators in the established goals, to evaluate their impact on Food Security and Nutrition, Employment and Investment, Poverty, the use of Water and Natural Resources, and to provide a methodology applicable to other production models and other geographical areas.

Keywords: greenhouses, protected agriculture, sustainable indicators, Guatemala, sustainability, SDG

Procedia PDF Downloads 83
7347 Enhanced Visual Sharing Method for Medical Image Security

Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar

Abstract:

In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.

Keywords: information security, medical images, cryptography, visual sharing

Procedia PDF Downloads 413
7346 The Effect of Maritime Security on National Development in Nigeria

Authors: Adegboyega Adedolapo Ola

Abstract:

Globally, a country’s maritime security has a significant impact on its national development because it serves as a major source of a commercial contact and food supply. However, the country has been faced with a number of problems, such as piracy, kidnapping, illegal bunkering and oil theft. As such, the study examined the contribution and the relationship between maritime security and Nigeria’s development, as well as the prospects and challenges of maritime security in Nigeria. The study utilized a questionnaire and focused group discussion/interview as instruments for data collection. The method of analysis employed in the study is descriptive. A total of Three Hundred and Ninety (390) respondents were randomly selected. The result of the study showed that maritime security contributes to national development in Nigeria by guaranteeing food security in Nigeria, creating employment opportunities as well as increasing the Gross Domestic Product (GDP) of the economy. It was also found that maritime security is yet to provide sufficient support for national development in Nigeria. It is further established that it has prospects for development through the creation of employment opportunities, increase in foreign earnings, and fostering improved living standards for citizens. The study concluded that the high level of corruption, piracy and kidnapping, lack of political will by the government and the porosity of the Nigerian borders are serious obstacles, among others. In attempting to solve the problem of piracy and kidnapping in Nigerian maritime, to contribute to National development, it is primordial to address the cancer of corruption, poverty, and youth unemployment. In view of this, the study recommends: among other things, that the maritime industry should be well secured by removing its constraints/bottlenecks so as to enhance its contributions to national development.

Keywords: maritime security, national development, terrorism, piracy

Procedia PDF Downloads 80
7345 Assessing India’s Foreign Policy Towards Afghanistan

Authors: Saifurahman Fayiz

Abstract:

Afghanistan and India have close technical, political, economic, and diplomatic bilateral ties. The ties is not limited between the governments of the two countries, but their relationship are among the peoples. India is the best regional trustworthy partner and biggest donor for the development of Afghanistan. The objectives of this study to assess India’s foreign policy towards Afghanistan since 9\11. The research method conducted based on qualitative research method with descriptive. The research findings propose that; India should deal with and build up its strategy relations with neighbor countries.

Keywords: strategy, policy, India, Afghanistan

Procedia PDF Downloads 325
7344 Analyzing the Impact of Local and International Artists in Creating Cultural Identity through Public Art: Case Study of Chicago Public Policies

Authors: Kaesha M. Freyaldenhoven

Abstract:

Chicago is a city in the United States whose cultural identity is largely shaped by public art pieces. Quintessential public works created by internationally renown artists – such as Anish Kapoor’s Cloud Gate in Millennium Park and 'The Picasso' in Daley Plaza – have historically contributed to developing a shared sense of community. In 2017, the city implemented a policy titled 50x50 Neighborhood Arts Project under the Chicago Public Art Plan. The policy promotes investments in contemporary public art to elevate neighborhood cultural assets and create a sense of place. Exclusively community-based artists were commissioned to accomplish the mission of the policy. Administrators felt only local artists would be capable of capturing the true essence of a neighborhood through art. This paper discusses the relationship between the public art and the culture of its respective neighborhood through close examination of aesthetic formal properties and social significance. Research compares the role of international artists with the role of local artists in cultivating the identity of a city through site-specific artworks in Chicago. Methodology unites theoretical research on understanding art and its function in the public space with empirical research on Chicago-based works. Theoretical frameworks provide an art historical foundation to explore the manner in which physical properties convey meaning through the work itself and its placement in an urban setting. Empirical research that examines policy documentation and press announcements released by the Department of Cultural Affairs and Special Events investigates project selection processes pertaining to the artists and neighborhoods. Ethnographies and interviews of individuals from diverse social segments in contemporary Chicago society measure impacts of the works on respective populations. Findings demonstrate works created by local artists activate neighborhoods and inculcate a sense of pride among community residents. Works created by international artists garner widespread media attention that frames the city’s cultural identity across temporal and geographic zones. This research can be utilized to inform future cultural policies pertaining to the commission of public art.

Keywords: Chicago, cultural policy, public art, urban art

Procedia PDF Downloads 127
7343 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia

Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan

Abstract:

This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.

Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia

Procedia PDF Downloads 388
7342 Policy Imperatives for Privatisation of Higher Education in India

Authors: Roli Pradhan

Abstract:

All over the globe, the resources of the government are declining, and the funding requirements in education are on a constant rise. The governments are desperately increasing the budgetary allocation for higher education, the economic plans have been labeling investment in higher education to be immensely vital for development of the nation. Still the fact is that the government of the developing nations like India lacks the potential to fund the rising demands of this sector. In the face of declining government funding for higher education, there are the growing needs and justifiable pressure for direct beneficiaries to bear a reasonable part of the cost of higher education. The supply-demand gap in higher education in India is on the increase. This paper evaluates the Indian National Education Policy over the past three decades, furnishes the need of financing of education by private players. The paper also covers the aspects of incorporating the different forms of financing in education and also focuses on the regulations pertaining to quality maintenance in the education system. The paper also targets to suggest policy imperatives for the future education policy for India.

Keywords: national education policy, privatisation, private financing, government funding

Procedia PDF Downloads 323
7341 Analysis and Design Modeling for Next Generation Network Intrusion Detection and Prevention System

Authors: Nareshkumar Harale, B. B. Meshram

Abstract:

The continued exponential growth of successful cyber intrusions against today’s businesses has made it abundantly clear that traditional perimeter security measures are no longer adequate and effective. We evolved the network trust architecture from trust-untrust to Zero-Trust, With Zero Trust, essential security capabilities are deployed in a way that provides policy enforcement and protection for all users, devices, applications, data resources, and the communications traffic between them, regardless of their location. Information exchange over the Internet, in spite of inclusion of advanced security controls, is always under innovative, inventive and prone to cyberattacks. TCP/IP protocol stack, the adapted standard for communication over network, suffers from inherent design vulnerabilities such as communication and session management protocols, routing protocols and security protocols are the major cause of major attacks. With the explosion of cyber security threats, such as viruses, worms, rootkits, malwares, Denial of Service attacks, accomplishing efficient and effective intrusion detection and prevention is become crucial and challenging too. In this paper, we propose a design and analysis model for next generation network intrusion detection and protection system as part of layered security strategy. The proposed system design provides intrusion detection for wide range of attacks with layered architecture and framework. The proposed network intrusion classification framework deals with cyberattacks on standard TCP/IP protocol, routing protocols and security protocols. It thereby forms the basis for detection of attack classes and applies signature based matching for known cyberattacks and data mining based machine learning approaches for unknown cyberattacks. Our proposed implemented software can effectively detect attacks even when malicious connections are hidden within normal events. The unsupervised learning algorithm applied to network audit data trails results in unknown intrusion detection. Association rule mining algorithms generate new rules from collected audit trail data resulting in increased intrusion prevention though integrated firewall systems. Intrusion response mechanisms can be initiated in real-time thereby minimizing the impact of network intrusions. Finally, we have shown that our approach can be validated and how the analysis results can be used for detecting and protection from the new network anomalies.

Keywords: network intrusion detection, network intrusion prevention, association rule mining, system analysis and design

Procedia PDF Downloads 226
7340 Scenarios of Societal Security and Business Continuity Cycles

Authors: Jiří F. Urbánek, Jiří Barta

Abstract:

Societal security, continuity scenarios, and methodological cycling approach understands in this article. Namely, societal security organizational challenges ask implementation of international standards BS 25999-2 and global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity, and interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization systems, resulting to a crisis scene or even to a battle theater. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management, and overmastering in real environments.

Keywords: business continuity, societal security, crisis scenarios cycles, interoperability

Procedia PDF Downloads 384
7339 Rural Electrification in India-Challenges and Solutions

Authors: P. Chandhra Sekhar, R. A. Deshpande, T. Raghunatha

Abstract:

The government of India has given special attention on rural electrification under Rajiv Gandhi Grameena Vidyuthikarana Yojana (RGGVY) during 10th plan and 11th plan. Government of India electrified about 107523 villages and 21164003 BPL Households. This paper briefs about various rural electrification programs initiated by government of India and status of RGGVY in India. The paper mainly describes about challenges in the rural electrification, new ideas recently implemented and suggestions for improvement in the rural electrification.

Keywords: rural electrification, RGGVY, NJY, BPL

Procedia PDF Downloads 417
7338 The Impact of Water Reservoirs on Biodiversity and Food Security and the Creation of Adaptation Mechanisms

Authors: Inom S. Normatov, Abulqosim Muminov, Parviz I. Normatov

Abstract:

Problems of food security and the preservation of reserved zones in the region of Central Asia under the conditions of the climate change induced by the placement and construction of large reservoirs are considered. The criteria for the optimum placement and construction of reservoirs that entail the minimum impact on the environment are established. The need for the accounting of climatic parameters is shown by the calculation of the water quantity required for the irrigation of agricultural lands.

Keywords: adaptation, biodiversity, food security, water reservoir, risk

Procedia PDF Downloads 254
7337 Unveiling Special Policy Regime, Judgment, and Taylor Rules in Tunisia

Authors: Yosra Baaziz, Moez Labidi

Abstract:

Given limited research on monetary policy rules in revolutionary countries, this paper challenges the suitability of the Taylor rule in characterizing the monetary policy behavior of the Tunisian Central Bank (BCT), especially in turbulent times. More specifically, we investigate the possibility that the Taylor rule should be formulated as a threshold process and examine the validity of such nonlinear Taylor rule as a robust rule for conducting monetary policy in Tunisia. Using quarterly data from 1998:Q4 to 2013:Q4 to analyze the movement of nominal short-term interest rate of the BCT, we find that the nonlinear Taylor rule improves its performance with the advent of special events providing thus a better description of the Tunisian interest rate setting. In particular, our results show that the adoption of an appropriate nonlinear approach leads to a reduction in the errors of 150 basis points in 1999 and 2009, and 60 basis points in 2011, relative to the linear approach.

Keywords: policy rule, central bank, exchange rate, taylor rule, nonlinearity

Procedia PDF Downloads 295
7336 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978

Authors: Naseer Ahmad Bhat

Abstract:

Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.

Keywords: detentions, Kashmir, public safety act, liberty, security

Procedia PDF Downloads 228
7335 The Dynamic of Decentralization of Education Policy in Post-Reform Indonesia: Local Perspectives

Authors: Mudiyati Rahmatunnisa

Abstract:

This study is about the implementation of decentralization of education policy in today’s Indonesia’s reform era. The policy has made education as one of the basic public services that must be performed by the local governments. After more than a decade of implementing the policy, what have been achieved? Has the implementation of educational affairs in the region been able to improve the quality of education services in the region? What obstacles or challenges faced by the region in the implementation of the educational affairs? How does region overcome obstacles or challenges? In answering those strategic questions, this study will particularly investigate the implementation of educational affairs in the city and District of Cirebon, the two district level of governments in West Java Province. The two loci of study provide interesting insight, given the range of previous studies did not specifically investigate using a local perspective (city and district level). This study employs a qualitative research method through case studies. Operationally, this study is sustained by several data collection techniques, i.e. interviews, documentary method, and systematic observation. Needless to say, there have been many factors distorting the ideal construction of decentralization of education policy.

Keywords: decentralization, decentralization of education, policy implementation, public service

Procedia PDF Downloads 378
7334 The Effect of Family Controlling Ownership on Financing Policy

Authors: Vera Diyanty, Akhmad Syahroza

Abstract:

This research aims to describe an empirical evidence of the influence of family control on the company’s financing policy. Additionally, this research also shows the effect of leadership from family member and the effectiveness of the board of commissioners on companies’ financing policy. The result of this study found that family control through direct and indirect ownership mechanism have a positive impact on the choice of bank loan compare to public debt. Nevertheless, this research also shows that companies’ founders who become CEO and the effectiveness of board of commissioners do not prove to increase the alignment effect nor decrease the negative impact of entrenchment effect on the bank loan preference.

Keywords: family controlling, family CEO, board effectiveness, financing policy

Procedia PDF Downloads 455
7333 Investigating Citizens’ Perceptions and Attitudes toward China’s National Determined Contribution's Energy Restructuring Plan in Linfen City

Authors: Yuan Zhao, Phimsupha Kokchang

Abstract:

As a responsible nation, China has outlined its Nationally Determined Contributions (NDCs) of reaching peak carbon by 2030 and carbon neutrality by 2060. Peak and carbon neutrality are tough goals to achieve, and China must undertake a shift to green energy. In contrast, China's existing energy consumption structure is unsustainable and heavily dependent on coal supplies. China must revise its energy mix planning in order to strengthen energy security and satisfy the requirement for low-carbon energy generation to mitigate climate change. Shanxi Province is one of China's most important coal-producing regions, and Linfen is one of the province's key economic towns. However, Shanxi Province's economic development is severely hampered by the region's high levels of pollution and energy consumption. The purpose of this study is to investigate Linfen citizens' perceptions and attitudes toward China's NDC's energy restructuring plan through questionnaires. The majority of respondents were aware of China's NDCs, as indicated by 402 valid responses to an online questionnaire. Furthermore, respondents' perceptions and attitudes toward renewable energy initiatives are growing. To ensure that the results were dependable and consistent, reliability and validity were examined. According to the findings, the majority of Linfen's citizens believe that renewable energy projects such as solar and wind, which are consistent with China's NDCs, may improve their quality of life, public health, and the nation's economy.

Keywords: China’s NDC, perceptions, attitudes, Linfen, energy restructuring

Procedia PDF Downloads 75
7332 Understanding Natural Resources Governance in Canada: The Role of Institutions, Interests, and Ideas in Alberta's Oil Sands Policy

Authors: Justine Salam

Abstract:

As a federal state, Canada’s constitutional arrangements regarding the management of natural resources is unique because it gives complete ownership and control of natural resources to the provinces (subnational level). However, the province of Alberta—home to the third largest oil reserves in the world—lags behind comparable jurisdictions in levying royalties on oil corporations, especially oil sands royalties. While Albertans own the oil sands, scholars have argued that natural resource exploitation in Alberta benefits corporations and industry more than it does Albertans. This study provides a systematic understanding of the causal factors affecting royalties in Alberta to map dynamics of power and how they manifest themselves during policy-making. Mounting domestic and global public pressure led Alberta to review its oil sands royalties twice in less than a decade through public-commissioned Royalty Review Panels, first in 2007 and again in 2015. The Panels’ task was to research best practices and to provide policy recommendations to the Government through public consultations with Albertans, industry, non-governmental organizations, and First Nations peoples. Both times, the Panels recommended a relative increase to oil sands royalties. However, irrespective of the Reviews’ recommendations, neither the right-wing 2007 Progressive Conservative Party (PC) nor the left-wing 2015 New Democratic Party (NDP) government—both committed to increase oil sands royalties—increased royalty intake. Why did two consecutive political parties at opposite ends of the political spectrum fail to account for the recommendations put forward by the Panel? Through a qualitative case-study analysis, this study assesses domestic and global causal factors for Alberta’s inability to raise oil sands royalties significantly after the two Reviews through an institutions, interests, and ideas framework. Indeed, causal factors can be global (e.g. market and price fluctuation) or domestic (e.g. oil companies’ influence on the Alberta government). The institutions, interests, and ideas framework is at the intersection of public policy, comparative studies, and political economy literatures, and therefore draws multi-faceted insights into the analysis. To account for institutions, the study proposes to review international trade agreements documents such as the North American Free Trade Agreement (NAFTA) because they have embedded Alberta’s oil sands into American energy security policy and tied Canadian and Albertan oil policy in legal international nods. To account for interests, such as how the oil lobby or the environment lobby can penetrate governmental decision-making spheres, the study draws on the Oil Sands Oral History project, a database of interviews from government officials and oil industry leaders at a pivotal time in Alberta’s oil industry, 2011-2013. Finally, to account for ideas, such as how narratives of Canada as a global ‘energy superpower’ and the importance of ‘energy security’ have dominated and polarized public discourse, the study relies on content analysis of Alberta-based pro-industry newspapers to trace the prevalence of these narratives. By mapping systematically the nods and dynamics of power at play in Alberta, the study sheds light on the factors that influence royalty policy-making in one of the largest industries in Canada.

Keywords: Alberta Canada, natural resources governance, oil sands, political economy

Procedia PDF Downloads 132
7331 Human Security: The Boko Haram Menace in Northern Nigeria in the 21st Century

Authors: Jimoh Yusuf Amuda

Abstract:

Human security is a great panacea for sustainable development of world societies. Today the whole globe cum human species is living in nightmares of insecurity. This is due to acts of terrorism by various terrorists’ organization worldwide. The situation is on the increase daily. The number of lives and properties lost to religious insurgency cannot be quantifiably analyzed. It is on this note that this paper examine the book haram menace in northern Nigerian vis-à-vis it’s threat to the existence of human lives. The methodology applied for this research is the multi-disciplinary approach, the use journal articles, news papers, magazines, oral interview. Field trips to areas of terrorist attack and the use of text books. The following recommendations were made base on the findings. First of all the Nigerian government should declare total war on the book haram terrorist, then secondly the source of armament coming to this terrorist should be blocked, thirdly the European world should also place an arms embargo on terrorist source arms demands, also security agencies-police, the military, immigration, customs, state security service should work hand-in-hand, in a security tight measures to reduce the penetration of insurgent into the society.

Keywords: human, insecurity, security, terrorism

Procedia PDF Downloads 339
7330 Exploring the Dynamics in the EU-Association of Southeast Asia Nations Interregional Relationship, 2012-2017

Authors: Xuechen Chen

Abstract:

The EU-ASEAN relations which can be dated back to 1972 represents one of the oldest group-to-group relationship in international politics. Despite a longstanding dialogue partnership, the EU and ASEAN have long been reluctant to forge deeper and substantial cooperation in political and security domains. However, the year of 2012 witnessed a salient shift in EU-ASEAN relations, with the EU significantly elevating ASEAN's profile in its external relations. Given the limited scholarly attention that has been devoted to this change in ASEAN-EU relations, this article explores why there has been a greater level of engagement and approximation between the EU and ASEAN. In particular, it asks why the EU, which had long been reluctant to recognize ASEAN as a strategic partner, has changed its policy towards ASEAN. Drawing on social constructivism, this article argues that the EU’s and ASEAN’s evolving identity-formation processes have played a significant role in reshaping their mutual perceptions, which subsequently leads to the modification of the interregional policies of both actors. The methodology of this study is based on content analysis of a wide range of official documents and policy papers from the EU and ASEAN, as well as more than 20 in-depth elite interviews with diplomats and experts working on the EU-ASEAN relationship from both organisations. Departing from the existing works which mainly adopt a Eurocentric perspective when analysing the EU-ASEAN interregionalism, this study suggests that the approximation of the EU-ASEAN relationship between 2012 and 2017 is driven by both actors’ adjustment of international identities, together with the internal dynamics and systematic changes within both regions.

Keywords: Association of Southeast Asia Nations, European Union, EU foreign policy, interregionalism

Procedia PDF Downloads 145
7329 Food Security in the Middle East and North Africa

Authors: Sara D. Garduno-Diaz, Philippe Y. Garduno-Diaz

Abstract:

To date, one of the few comprehensive indicators for the measurement of food security is the Global Food Security Index. This index is a dynamic quantitative and qualitative bench marking model, constructed from 28 unique indicators, that measures drivers of food security across both developing and developed countries. Whereas the Global Food Security Index has been calculated across a set of 109 countries, in this paper we aim to present and compare, for the Middle East and North Africa (MENA), 1) the Food Security Index scores achieved and 2) the data available on affordability, availability, and quality of food. The data for this work was taken from the latest (2014) report published by the creators of the GFSI, which in turn used information from national and international statistical sources. According to the 2014 Global Food Security Index, MENA countries rank from place 17/109 (Israel, although with resent political turmoil this is likely to have changed) to place 91/109 (Yemen) with household expenditure spent in food ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food as a share of household consumption in most countries and better food safety net programs in the MENA have contributed to a notable increase in food affordability. The region has also however experienced a decline in food availability, owing to more limited food supplies and higher volatility of agricultural production. In terms of food quality and safety the MENA has the top ranking country (Israel). The most frequent challenges faced by the countries of the MENA include public expenditure on agricultural research and development as well as volatility of agricultural production. Food security is a complex phenomenon that interacts with many other indicators of a country’s well-being; in the MENA it is slowly but markedly improving.

Keywords: diet, food insecurity, global food security index, nutrition, sustainability

Procedia PDF Downloads 353
7328 Always Keep in Control: The Pattern of TV Policy Changes in China

Authors: Shan Jiang

Abstract:

China is a country with a distinct cultural system. The Chinese Communist Party (CCP) is the central factor for everything, which naturally includes culture. There are quite a lot of cultural policies in China. The same goes for TV dramas. This paper traces the evolution of Chinese TV drama policy since 1986, examines the realistic situation behind the changes, and explores the structure and role of the government in shaping the process. Using historical documents and media reports, it first analyzes four key time nodes: 1986, 2003, 2012, and 2022. It shows how the policy shifts from restricting private production to opening up to public participation, from imposing one censorship to another, and from promoting some content to restricting some other area. It finds that the policy process is not simply rectilinear but rather wandering between deregulation and strengthening control. Secondly, it divides the policies into "basic" policies that establish the overall layout and more refined "strategic" policies that respond to more refined needs. It argues that the "basic" policy process is caused by China's political, economic, and cultural system reform, and then the "strategic" policy process is affected by more environmental factors, such as the government's follow-up development strategy, industrial development, technological innovation, and specific situations. Thirdly, it analysis the main body of the 104 policies from 2000 to 2021 and puts these subjects into China's power structure and cultural system, revealing that the policy issuers are all under the highest leadership of the Chinese Central Committee. Further, the paper challenges the typical description of Chinese cultural policy, which focuses on state control exclusively, identifies the forces within and outside the system that participate in or affect the policy-making process, and reveals the inter-subjective mechanism of policy change. In conclusion, the paper reveals that China's TV drama policy is under the unified leadership of the Party and the government, which greatly guarantees the consistency of the overall direction of cultural policy, that is, the right to speak firmly in the hands. The forces within the system can sometimes promote policy changes due to common development needs. However, folk discourse is only the object of control: when it breeds a certain amount of industrial space, the government will strengthen control over this space, suppress its potential "adverse effects", and instead provide protection and create conditions for the cultivation and growth of its mainstream discourse. However, the policy combination of basic policy and strategic policy, while having a strong effect and emergency capacity, also inhibits the innovation and diversification of the TV drama market. However, the state's substantial regulation will continue to exist in the future.

Keywords: TV Policy, China, policy process, cultural policy, culture management

Procedia PDF Downloads 91
7327 Bring Your Own Devices (BOYD): Risks and Mitigation Strategies

Authors: Mohammed Ketel

Abstract:

This paper discusses the security issues related to Bring Your Own Devices (BYOD) programs, an increasingly popular choice for small and big businesses alike, and explores the benefits, risks, the available controls and solutions to mitigate the inherent security concerns with mobile devices, in general, and BYOD programs specifically. The paper also discusses the approaches that organizations can apply to mitigate the risks, which may include policies, diverse technologies, education, and training.

Keywords: BYOD, security, policies, standards, controls, education

Procedia PDF Downloads 287
7326 Inventory Policy with Continuous Price Reduction in Solar Photovoltaic Supply Chain

Authors: Xiangrong Liu, Chuanhui Xiong

Abstract:

With the concern of large pollution emissions from coal-fired power plants and new commitment to green energy, global solar power industry was emerging recently. Due to the advanced technology, the price of solar photovoltaic(PV) module was reduced at a fast rate, which arose an interesting but challenge question to solar supply chain. This research is modeling the inventory strategies for a PV supply chain with a PV manufacturer, an assembler and an end customer. Through characterizing the manufacturer's and PV assembler's optimal decision in decentralized and centralized situation, this study shed light on how to improve supply chain performance through parameters setting in the contract design. The results suggest the assembler to lower the optimal stock level gradually each period before price reduction and set up a newsvendor base-stock policy in all periods after price reduction. As to the PV module manufacturer, a non-stationary produce-up-to policy is optimal.

Keywords: photovoltaic, supply chain, inventory policy, base-stock policy

Procedia PDF Downloads 347
7325 The Curse of Oil: Unpacking the Challenges to Food Security in the Nigeria's Niger Delta

Authors: Abosede Omowumi Babatunde

Abstract:

While the Niger Delta region satisfies the global thirst for oil, the inhabitants have not been adequately compensated for the use of their ancestral land. Besides, the ruthless exploitation and destruction of the natural environment upon which the inhabitants of the Niger Delta depend for their livelihood and sustenance by the activities of oil multinationals, pose major threats to food security in the region and by implication, Nigeria in general, Africa, and the world, given the present global emphasis on food security. This paper examines the effect of oil exploitation on household food security, identify key gaps in measures put in place to address the changes to livelihoods and food security and explore what should be done to improve the local people access to sufficient, safe and culturally acceptable food in the Niger Delta. Data is derived through interviews with key informants and Focus Group Discussions (FGDs) conducted with respondents in the local communities in the Niger Delta states of Delta, Bayelsa and Rivers as well as relevant extant studies. The threat to food security is one important aspect of the human security challenges in the Niger Delta which has received limited scholarly attention. In addition, successive Nigerian governments have not meaningfully addressed the negative impacts of oil-induced environmental degradation on traditional livelihoods given the significant linkages between environmental sustainability, livelihood security, and food security. The destructive impact of oil pollution on the farmlands, crops, economic trees, creeks, lakes, and fishing equipment is so devastating that the people can no longer engage in productive farming and fishing. Also important is the limited access to modern agricultural methods for fishing and subsistence farming as fishing and farming are done using mostly crude implements and traditional methods. It is imperative and urgent to take stock of the negative implications of the activities of oil multinationals for environmental and livelihood sustainability, and household food security in the Niger Delta.

Keywords: challenges, food security, Nigeria's Niger delta, oil

Procedia PDF Downloads 246