Search results for: European security
3831 General Awareness of Teenagers in Information Security
Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek
Abstract:
The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system
Procedia PDF Downloads 3923830 Materialisation of Good Governance Concept by Effective Investment Dispute Resolution in the European Union
Authors: Jagna Mucha, Anna Kańciak
Abstract:
The concept of good governance constitutes a wide perspective for academic discussion, because it provides a substantial theoretical background for settling many practical problems faced contemporarily by the EU. The basic assumptions of good governance have basically remained unchanged since the 90’s, when the concept was introduced by the World Bank, although the scholarly discussions reveal new facets of the said concept, when related to specific domains. The paper discusses the application of the specific elements of the concept of good governance in the field of the international investment law. Specifically, it seeks to demonstrate that the concept of good governance regulates the issue of international investments in that, among others, it requires the application of the alternative dispute resolution in order to make the investment law enforceable in the best possible way.Keywords: dispute resolution, european union, investments, good governance
Procedia PDF Downloads 3583829 New Security Approach of Confidential Resources in Hybrid Clouds
Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel
Abstract:
Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.Keywords: cloud, confidentiality, cryptography, security issues, trust issues
Procedia PDF Downloads 3783828 Derivative Usage, Ownership Structure, and Bank Value in European Countries
Authors: Chuang-Chang Chang, Keng-Yu Ho, Yu-Jen Hsiao, Hsin-Ni Yang
Abstract:
Using a sample of detailed ownership data of 1,032 listed commercial bank observations in 30 European countries from 2004 to 2010, we explore what categories of shareholder are more likely to use derivatives and how different types of owners affect the bank value. We find that a shift in equity from bank investors to either non-financial companies or institutional investors have increase incentives to use derivatives. Moreover, we have significant evidence that a shift in equity from bank investors to either family or manager shareholders who attend derivative activities will decrease bank value. However, a shift in equity from bank investors to non-financial companies who use derivative instrument will increase the bank value. Our results are also robustness to address for the potential endogeneity problems.Keywords: derivative usage, ownership structure, bank value
Procedia PDF Downloads 3483827 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique
Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam
Abstract:
With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services
Procedia PDF Downloads 1193826 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions
Authors: Behnam Zahednejad, Saeed Kosari
Abstract:
Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif
Procedia PDF Downloads 1023825 Role of Agriculture Equipment toward Food Security: Case Study of Agriculture Equipment Assistance during President Joko Widodo Era in Indonesia
Authors: Raihan Zahirah Mauludy Ridwan, Frisca Devi Choirina
Abstract:
Indonesia is an agrarian country endowed by fertile soil, supportive weather, and natural resources which can support agricultural activities. There are commodities which produced by local farmers. Even though Indonesia had commodities, it still imports stocks of staple food. To reduce the dependency on imported staple food, President Joko Widodo wants to generate more locally-produced staple food by giving 69.000 tractors, free seeds, and fertilizers to the local farmers. In Indonesia, the problem revolves around the amount of food production especially rice derived from farmers who cannot afford technologies which can support the agricultural activities. Moreover, they cannot afford seeds and fertilizers which can make the production of commodities more effective and have high quality. Therefore, the paper would like to answer how agriculture equipment assistance during President Joko Widodo era can give significant impact towards food security. The purpose of this paper is to explore the role of agriculture equipment assistance and its impact towards Indonesia’s food security. This paper uses Boserup and Ruthenberg theory of agricultural intensification to link agriculture equipment and intensification of production which in the end will have impact towards food security through case study method. The paper affirms that the role of agricultural equipment assistance toward food security in Indonesia is significant toward Indonesia’s food production and security.Keywords: agricultural equipment, agricultural intensification, Boserup, Indonesia, Joko Widodo, Ruthenberg
Procedia PDF Downloads 1873824 The Impact of Adopting Cross Breed Dairy Cows on Households’ Income and Food Security in the Case of Dejen Woreda, Amhara Region, Ethiopia
Authors: Misganaw Chere Siferih
Abstract:
This study assessed the impact of crossbreed dairy cows on household income and food security. The study area is found in Dejen Woreda, East Gojam Zone, and Amhara region of Ethiopia. Random sampling technique was used to obtain a sample of 80 crossbreed dairy cow owners and 176 indigenous dairy cow owners. The study employed food consumption score analytical framework to measure food security status of the household. No Statistical significant mean difference is found between crossbreed owners and indigenous owners. Logistic regression was employed to investigate crossbreed dairy cow adoption determinants , the result indicates that gender, education, labor number, land size cultivated, dairy cooperatives membership, net income and food security status of the household are statistically significant independent variables, which explained the binary dependent variable, crossbreed dairy cow adoption. Propensity score matching (PSM) was employed to analyze the impact of crossbreed dairy cow owners on farmers’ income and food security. The average net income of crossbreed dairy cow owners was found to be significantly higher than indigenous dairy cow owners. Estimates of average treatment effect of the treated (ATT) indicated that crossbreed dairy cow is able to impact households’ net income by 42%, 38.5%, 30.8% and 44.5% higher in kernel, radius, nearest neighborhood and stratification matching algorithms respectively as compared to indigenous dairy cow owners. However, estimates of average treatment of the treated (ATT) suggest that being an owner of crossbreed dairy cow is not able to affect food security significantly. Thus, crossbreed dairy cow enables farmers to increase income but not their food security in the study area. Finally, the study recommended establishing dairy cooperatives and advice farmers to become a member of them, attention to promoting the impact of crossbreed dairy cows and promotion of nutrition focus projects.Keywords: crossbreed dairy cow, net income, food security, propensity score matching
Procedia PDF Downloads 653823 Water Quality of Cengkareng Drain in Maritime Security Perspective
Authors: Febri Ramadhan, Sigid Hariyadi, Niken Tunjung Murti Pratiwi, Budiman Djoko Said
Abstract:
The scope about maritime security copes all of the problems emanating from maritime domain. Those problems can give such threats to national security of the state. One of threats taking place nowadays in maritime domain is about pollution. Pollution coming from many sources may increase water-borne disease risk that can cause the instability of national security. Pollution coming from many sources may increase water-borne disease risk. Hence the pollution makes an improper condition of environments for humans and others biota dwelling in the waters. One of the tools that can determine about pollution is by measuring about the water quality of its waters. In this case, what brings the waste and pollutants is there an activity of tidal waves introducing substances or energy into the natural environment. Cengkareng Drain is one of the water channels which is affected by tidal waves. Cengkareng Drain was become an observation area to examine the relation between water quality and tide waves. This research was conducted monthly from July to November 2015. Sampling of water was conducted every ebb and tide in every observation. Pollution index showed that the level of pollution on Cengkareng drain was moderately polluted, with the score about 7.7-8.6. Based on the results of t-test and analysis of similarity, the characteristic of water quality on rising tide does not significantly differ from the characteristic of water quality on ebbing tide. Therefore, we need a proper management as a means to control the pollutants in order to make good maritime security strategy.Keywords: maritime security, Cengkareng drain, water quality, tidal waves
Procedia PDF Downloads 2173822 A New Development Pathway And Innovative Solutions Through Food Security System
Authors: Osatuyi Kehinde Micheal
Abstract:
There is much research that has contributed to an improved understanding of the future of food security, especially during the COVID-19 pandemic. A pathway was developed by using a local community kitchen in Muizenberg in western cape province, cape town, south Africa, a case study to map out the future of food security in times of crisis. This kitchen aims to provide nutritious, affordable, plant-based meals to our community. It is also a place of diverse learning, sharing, empowering the volunteers, and growth to support the local economy and future resilience by sustaining our community kitchen for the community. This document contains an overview of the story of the community kitchen on how we create self-sustainability as a new pathway development to sustain the community and reduce Zero hunger in the regional food system. This paper describes the key elements of how we respond to covid-19 pandemic by sharing food parcels and creating 13 soup kitchens across the community to tackle the immediate response to covid-19 pandemic and agricultural systems by growing home food gardening in different homes, also having a consciousness Dry goods store to reduce Zero waste and a local currency as an innovation to reduce food crisis. Insights gained from our article and outreach and their value in how we create adaptation, transformation, and sustainability as a new development pathway to solve any future problem crisis in the food security system in our society.Keywords: sustainability, food security, community development, adapatation, transformation
Procedia PDF Downloads 793821 The Effects of the New Silk Road Initiatives and the Eurasian Union to the East-Central-Europe’s East Opening Policies
Authors: Tamas Dani
Abstract:
The author’s research explores the geo-economical role and importance of some small and medium sized states, reviews their adaption strategies in foreign trade and also in foreign affairs in the course of changing into a multipolar world, uses international background. With these, the paper analyses the recent years and the future of ‘Opening towards Eastern foreign economic policies’ from East-Central Europe and parallel with that the ‘Western foreign economy policies’ from Asia, as the Chinese One Belt One Road new silk route plans (so far its huge part is an infrastructural development plan to reach international trade and investment aims). It can be today’s question whether these ideas will reshape the global trade or not. How does the new silk road initiatives and the Eurasian Union reflect the effect of globalization? It is worth to analyse that how did Central and Eastern European countries open to Asia; why does China have the focus of the opening policies in many countries and why could China be seen as the ‘winner’ of the world economic crisis after 2008. The research is based on the following methodologies: national and international literature, policy documents and related design documents, complemented by processing of international databases, statistics and live interviews with leaders from East-Central European countries’ companies and public administration, diplomats and international traders. The results also illustrated by mapping and graphs. The research will find out as major findings whether the state decision-makers have enough margin for manoeuvres to strengthen foreign economic relations. This work has a hypothesis that countries in East-Central Europe have real chance to diversify their relations in foreign trade, focus beyond their traditional partners. This essay focuses on the opportunities of East-Central-European countries in diversification of foreign trade relations towards China and Russia in terms of ‘Eastern Openings’. The effects of the new silk road initiatives and the Eurasian Union to Hungary’s economy with a comparing outlook on East-Central European countries and exploring common regional cooperation opportunities in this area. The essay concentrate on the changing trade relations between East-Central-Europe and China as well as Russia, try to analyse the effects of the new silk road initiatives and the Eurasian Union also. In the conclusion part, it shows how the cooperation is necessary for the East-Central European countries if they want to have a non-asymmetric trade with Russia, China or some Chinese regions (Pearl River Delta, Hainan, …). The form of the cooperation for the East-Central European nations can be Visegrad 4 Cooperation (V4), Central and Eastern European Countries (CEEC16), 3 SEAS Cooperation (or BABS – Baltic, Adriatic, Black Seas Initiative).Keywords: China, East-Central Europe, foreign trade relations, geoeconomics, geopolitics, Russia
Procedia PDF Downloads 1833820 Holding the Stick from the Middle: The European Union's Attempt to Balance Between Its Inward and Outward Building Resilience Approach in Response to the Syrian Refugee Crisis
Authors: Lina Aleassa
Abstract:
When the EU launched the European Union Global strategy in 2016, state and societal resilience to the EU's East and South was a main priority, and it was a ‘Governing Principle’ when responding to crises, including its migration crisis of 2015. Yet, with the launching of the EU strategic compass in 2022, after the return of high-intensity war, namely the Ukrainian war, the emphasis became on the EU’s own resilience. Consequently, this can be interpreted as a shift from outward building resilience into inward-building resilience. However, this paper argues that the EU effort is not a shift but rather an attempt to balance between building the EU's own resilience and its neighbors’ resilience. Thus, the main question of this paper is about the EU’s balance between building its own resilience and building the resilience of its neighbors in the case of Jordan in response to crises. To answer this question, this article attempts an in-depth analysis considering the case of displacement from Syria and the Ukrainian war focuses on the EU’s approach to building its own resilience and building resilience in its neighborhood through the EU’s refugee cooperation with Jordan, one of the key regional hosts of Syrian refugees. Textual analysis of secondary data of various texts from official European and Jordanian websites, news reports, and scholarly literature on resilience, as well as document analysis of different EU and the EU-Jordan policies, including their bilateral and multilateral agreements, will be examined to trace the EU's effort to maintain a balance between building its own resilience in its neighbor’s resilience.Keywords: inward approach, outward approach, resilience, Syrian refugee crisis
Procedia PDF Downloads 23819 Nigeria Energy Security: The Role of Solar Batteries
Authors: Ihugba Okezie A., Oguzie Emeka E.
Abstract:
Nigeria's renewable energy market is expanding due to increased environmental awareness, supportive government policies, and the need for energy diversification. This paper examines the role of solar batteries in enhancing Nigeria's energy security. With growing energy demands and frequent power outages, integrating solar batteries presents a viable solution to stabilize the energy supply. The study investigates the current state of solar battery technology in Nigeria, its economic and environmental benefits, and the challenges to implementation. Through a literature review, case studies, and stakeholder interviews, the paper provides a comprehensive analysis of solar batteries' contribution to a resilient energy future. Key players include Engie SA, TotalEnergies SE, Starsight Energy, Enel SpA, and North-South Power Co. Ltd. Challenges include high upfront costs, inadequate policies, weak infrastructure, and security risks. The paper recommends that the government should strengthen policies and incentives to encourage investments through tax breaks, subsidies, and financial incentives.Keywords: renewable energy, solar batteries, energy security, Nigeria’s electricity generation, job creation
Procedia PDF Downloads 443818 Nonparametric Specification Testing for the Drift of the Short Rate Diffusion Process Using a Panel of Yields
Authors: John Knight, Fuchun Li, Yan Xu
Abstract:
Based on a new method of the nonparametric estimator of the drift function, we propose a consistent test for the parametric specification of the drift function in the short rate diffusion process using observations from a panel of yields. The test statistic is shown to follow an asymptotic normal distribution under the null hypothesis that the parametric drift function is correctly specified, and converges to infinity under the alternative. Taking the daily 7-day European rates as a proxy of the short rate, we use our test to examine whether the drift of the short rate diffusion process is linear or nonlinear, which is an unresolved important issue in the short rate modeling literature. The testing results indicate that none of the drift functions in this literature adequately captures the dynamics of the drift, but nonlinear specification performs better than the linear specification.Keywords: diffusion process, nonparametric estimation, derivative security price, drift function and volatility function
Procedia PDF Downloads 3693817 Linkages between Climate Change, Agricultural Productivity, Food Security and Economic Growth
Authors: Jihène Khalifa
Abstract:
This study analyzed the relationships between Tunisia’s economic growth, food security, agricultural productivity, and climate change using the ARDL model for the period from 1990 to 2022. The ARDL model reveals a positive correlation between economic growth and lagged agricultural productivity. Additionally, the vector autoregressive (VAR) model highlights the beneficial impact of lagged agricultural productivity on economic growth and the negative effect of rainfall on economic growth. Granger causality analysis identifies unidirectional relationships from economic growth to agricultural productivity, crop production, food security, and temperature variations, as well as from temperature variations to crop production. Furthermore, a bidirectional causality is established between crop production and food security. The study underscores the impact of climate change on crop production and suggests the need for adaptive strategies to mitigate these climate effects.Keywords: economic growth, climate change, agriculture, ARDL, Granger causality, VAR
Procedia PDF Downloads 353816 The Effect of Sustainable Land Management Technologies on Food Security of Farming Households in Kwara State, Nigeria
Authors: Shehu A. Salau, Robiu O. Aliu, Nofiu B. Nofiu
Abstract:
Nigeria is among countries of the world confronted with food insecurity problem. The agricultural production systems that produces food for the teaming population is not endurable. Attention is thus being given to alternative approaches of intensification such as the use of Sustainable Land Management (SLM) technologies. Thus, this study assessed the effect of SLM technologies on food security of farming households in Kwara State, Nigeria. A-three stage sampling technique was used to select a sample of 200 farming households for this study. Descriptive statistics, Shriar index, Likert scale, food security index and logistic regression were employed for the analysis. The result indicated that majority (41%) of the household heads were between the ages of 51 and 70 years with an average of 60.5 years. Food security index revealed that 35% and 65% of the households were food secure and food insecure respectively. The logistic regression showed that SLM technologies, estimated income, household size, gender and age of the household heads were the critical determinants of food security among farming households. The most effective coping strategies adopted by households geared towards lessening the effects of food insecurity are reduced quality of food consumed, employed off-farm jobs to raise household income and diversion of money budgeted for other uses to purchase foods. Governments should encourage the adoption and use of SLM technologies at all levels. Policies and strategies that reduce household size should be enthusiastically pursued to reduce food insecurity.Keywords: agricultural practices, coping strategies, farming households, food security, SLM technologies, logistic regression
Procedia PDF Downloads 1743815 Health Effect of the Central European Diet in Postmenopausal Women with Increased Waist Circumference: A Preliminary Study
Authors: Joanna Bajerska, Agata Chmurzyńska, Agata Muzsik, Patrycja Krzyżanowska, Klaudia Łochocka, Jarosław Walkowiak
Abstract:
The Mediterranean diet (MED) is regarded as beneficial in the therapy of central obesity-associated metabolic abnormalities. However, in the traditional diet of the Central European countries, food items with positive nutritional profiles (rye bread, oats, buckwheat, herrings, linseed and rapeseed oil, berries, apples, plums, root vegetables etc.) are also used. We hypothesized that the Central European Diet (CED) may be comparatively effective in reducing symptoms of central obesity as MED. We tested the health effects of the CED, which is an environmentally friendly regional diet and the traditional MED diet in a group of postmenopausal centrally obese women. A total 58 with a mean age of 60 y (50-70y), body mass index (in kg/m(2)) of 33.4 (22.6-47.3), and waist circumference of 105 cm (87.5-137 cm) were randomly assigned to receive either the diet based on food items commonly used in Central Europe (the CED group; n = 29) or the Mediterranean diet (the MED group; n = 29) for 15 weeks. Body mass and body composition were measured with a Bod Pod (Cosmed, Italy). A non-elastic flexible measuring tape was used to measure waist circumference. Additionally, blood pressure, plasma lipid and glucose levels were assessed with the use of a biochemical analyzer. A total of 50 subjects [86% (CED 83%; MED 90%)] completed the intervention. A high dietary compliance for both described diets was achieved. The mean (±SEM) weight and waist circumference changes were -7.4 ± 0.7 kg; -8.3 ± 0.7 cm and -8.1 ± 0.5 kg; -7.1 ± 0.6 cm for the CED and MED groups, respectively. Moreover, there were no differences between the effectiveness of the diets used in terms of the influence on fat mass, blood pressure, and biochemical parameters. The preliminary data suggest that both described diets may be successfully used for improving central obesity-associated metabolic abnormalities. The project was financed by the National Science Centre awarded based on the number of decision DEC-013/09/B/NZ9/02365Keywords: central european diet, central obesity, Mediterranean diet, metabolic abnormalities
Procedia PDF Downloads 4293814 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case
Authors: Azin Karami, Bahareh Heydari
Abstract:
There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.Keywords: human rights, human security, national sovereignty, irregular immigrants
Procedia PDF Downloads 1843813 Planning Healthy, Livable, and Sustainable Community in Terms of Effective Indicators on Policy Maker
Authors: Reihaneh Rafiemanzelat, Maryam Baradaran
Abstract:
Creating healthy communities that are sustainable and livable is a desire of policy makers in European countries. Indicators have used at the level of international, national, state to evaluate the level of health in cities and regions. Therefore, there are many challenges in the assumption of health and planning indicators. This research provides an overview of health indicators used to date in Europe according to World Health Organization (WHO) strategy. It then discusses on how indicators have been successful to the creation of healthy, livable and sustainable cities in Europe. This research is based on qualitative research to review the documentary researches on health issue and urban planning. The result will show the positive and negative effects of in process indicators on European cities.Keywords: healthy community, livability, sustainability, WHO strategy
Procedia PDF Downloads 3473812 Forms of Social Provision for Housing Investments in Local Planning Acts for European Capitals: Comparative Study and Spatial References
Authors: Agata Twardoch
Abstract:
The processes of commodification of real estate and changes in housing markets have led to a situation where the prices of free market housing in European capitals are significantly higher than the purchasing value of average wages. This phenomenon has many negative social and spatial consequences. At the same time, the attractiveness of real estate as an asset makes these processes progress. Out of concern for sustainable social development, city authorities apply solutions to balance the burdensome effects of codification of housing. One of them is a social provision for housing investments. The article presents a comparative study of solutions applied in selected European capitals, on the example of Warsaw, Paris, London, Berlin, Copenhagen, and Vienna. The study was conducted along with works on expert report for the master plan for Warsaw. The forms of commissions applied in Local Planning Acts were compared, with particular reference to spatial solutions. The results of the analysis made it possible to determine common features of the solutions applied and to establish recommendations for further practice. Major findings of the study indicate that requirement of social provision is achievable in spatial planning documents. Study shows that application of social provision in private housing investments is a useful tool in housing policy against commodification.Keywords: affordable housing, housing provision, spatial planning, sustainable social development
Procedia PDF Downloads 1823811 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement
Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al
Abstract:
Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security
Procedia PDF Downloads 1303810 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture
Authors: Mirad Böhm, Diede De Kok
Abstract:
It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder
Procedia PDF Downloads 3323809 A Study Regarding Nanotechnologies as a Vector of New European Business Model
Authors: Adriana Radan Ungureanu
Abstract:
The industrial landscape is changing due to the financial crises, poor availability of raw materials, new discoveries and interdisciplinary collaborations. New ideas shape the change through technologies and bring responses for a better life. The process of change is leaded by big players like states and companies, but they cannot keep their places on the market without the help of the small ones. The main tool of change is technology and the entire developed world dedicated efforts for decades in this direction. Even the expectations are not yet met, the research for finding adequate solutions is far from to be stopped. A relevant example is nanotechnology where most of discoveries still remain into laboratory and could not succeed to find the right way to the market. In front of this situation the right question could be: ”Is it worth investing in nanotechnology in the name of an uncertain future but with very little impact on present?” This paper tries to find a positive answer from a three-dimensional approach using a descriptive analyse based on available database supplied by the European case studies, reports, and literature.Keywords: Europe, KET’s, nanotechnology, technology
Procedia PDF Downloads 4173808 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"
Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad
Abstract:
In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation
Procedia PDF Downloads 3853807 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model
Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek
Abstract:
Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.Keywords: optimum balance model, knowledge management, security environment, supporting peace
Procedia PDF Downloads 3983806 A Secure Survey against Black Hole Attack in MANET
Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi
Abstract:
Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security
Procedia PDF Downloads 4073805 Democracy and Security Challenge in Nigeria, 1999, Till Date
Authors: Abdulsalami M. Deji
Abstract:
Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.Keywords: democracy, interest, militia, security
Procedia PDF Downloads 3373804 As a Secure Bridge Country about Oil and Gas Sources Transfer after Arab Spring: Turkey
Authors: Fatih Ercin Guney, Hami Karagol
Abstract:
Day by day, humanity's energy needs increase, to facilitate access to energy sources by energy importing countries is of great importance in terms of issues both in terms of economic security and political security. The geographical location of the oil exporting countries in the Middle East (Iran, Iraq, Kuwait, Libya, Saudi Arabia, United Arab Emirates, Qatar) today, it is observed that evaluated by emerging Arab Spring(from Tunisia to Egypt) and freedom battles(in Syria) with security issues arise sourced from terrorist activities(ISIS). Progresses related with limited natural resources, energy and it's transportation issues which worries the developing countries, the energy in the region is considered to how to transfer safely. North Region of the Black Sea , the beginning of the conflict in the regional nature formed between Russia and Ukraine (2010), followed by the relevant regions of the power transmission line (From Russia to Europe) the discovery is considered to be the east's hand began to strengthen in terms of both the economical and political sides. With the growing need for safe access to the west of the new energy transmission lines are followed by Turkey, re-interest is considered to be shifted to the Mediterranean and the Middle East by West. Also, Russia, Iran and China (three axis of east) are generally performing as carry out parallel policies about energy , economical side and security in both United Nations Security Council (Two of Five Permanent Members are Russia and China) and Shanghai Cooperation Organization. In addition, Eastern Mediterranean Region Tension are rapidly increasing about research new oil and natural gas sources by Israel, Egypt, Cyprus, Lebanon. This paper provides, new energy corridor(s) are needed to transfer sources (Oil&Natural Gas) by Europe from East to West. So The West needs either safe bridge country to transfer natural sources to Europe in region or is needed to discovery new natural sources in extraterritorial waters of Eastern Mediterranean Region. But in two opportunities are evaluated with secure transfer corridors form region to Europe in safely. Even if the natural sources can be discovered, they are considered to transfer in safe manner. This paper involved, Turkey’s importance as a leader country in region over both of political and safe energy transfer sides as bridge country between south and north of Turkey why natural sources shall be transferred over Turkey, Even if diplomatic issues-For Example; Cyprus membership in European Union, Turkey membership candidate duration, Israel-Cyprus- Egypt-Lebanon researches about new natural sources in Mediterranean - occurred. But politic balance in Middle-East is changing quickly because of lack of democratic governments in region. So it is evaluated that the alliance of natural sources researches may not be long-time relations due to share sources after discoveries. After evaluating over causes and reasons, aim to reach finding foresight about future of region for energy transfer periods in secure manner.Keywords: Middle East, natural gas, oil, Turkey
Procedia PDF Downloads 2973803 Applications of Multi-Path Futures Analyses for Homeland Security Assessments
Authors: John Hardy
Abstract:
A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning
Procedia PDF Downloads 1393802 Modern Sports and Imperial Solidarity: Sports, Mutiny and British Army in Colonial Malabar (1900-1930)
Authors: Anas Ali
Abstract:
The British administration at Malabar, the southern coastal commercial outpost in the Indian Subcontinent, faced with a series of perpetual revolts from the Mappila Muslim peasants during the last decades of the 19th and early decades of the 20th century. The control of Malabar region was a concern for the British administrators as the region was a prime centre of spice trade and plantation products. The Madras government set up a special police battalion called the Malabar Special Police in 1884 and summoned different army battalions to Malabar to crush the revolts. The setting up of army camps in the rural Malabar led to the diffusion of modern sports as the army men played different games in the garrisons and with the local people. For the imperial army men deployed in Malabar, sports acted as a viable medium to strengthen solidarity with other European settlers. They actively participated in the ‘Canterbury Week’, an annual sporting event organized by the European planters and organized tournaments among themselves. This paper would argue that, sports enabled the imperial army men, European planters and British administrators to build camaraderie that enabled them to manifest their imperial solidarity during the time of these constant revolts. Based on newspaper reports and colonial memoirs, this paper would look at how modern sports enabled the imperial army men to be ‘good in health’ and create a feeling of ‘being at home’ during this period.Keywords: imperial army, Malabar, modern sports, mutiny
Procedia PDF Downloads 213