Search results for: instrument security factor
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8641

Search results for: instrument security factor

8071 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 26
8070 Comparison of Safety Factor Evaluation Methods for Buckling of High Strength Steel Welded Box Section Columns

Authors: Balazs Somodi, Balazs Kovesdi

Abstract:

In the research praxis of civil engineering the statistical evaluation of experimental and numerical investigations is an essential task in order to compare the experimental and numerical resistances of a specific structural problem with the proposed resistances of the standards. However, in the standards and in the international literature there are several different safety factor evaluation methods that can be used to check the necessary safety level (e.g.: 5% quantile level, 2.3% quantile level, 1‰ quantile level, γM partial safety factor, γM* partial safety factor, β reliability index). Moreover, in the international literature different calculation methods could be found even for the same safety factor as well. In the present study the flexural buckling resistance of high strength steel (HSS) welded closed sections are analyzed. The authors investigated the flexural buckling resistances of the analyzed columns by laboratory experiments. In the present study the safety levels of the obtained experimental resistances are calculated based on several safety approaches and compared with the EN 1990. The results of the different safety approaches are compared and evaluated. Based on the evaluation tendencies are identified and the differences between the statistical evaluation methods are explained.

Keywords: flexural buckling, high strength steel, partial safety factor, statistical evaluation

Procedia PDF Downloads 145
8069 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 113
8068 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 45
8067 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 396
8066 Forest Soil Greenhouse Gas Real-Time Analysis Using Quadrupole Mass Spectrometry

Authors: Timothy L. Porter, T. Randy Dillingham

Abstract:

Vegetation growth and decomposition, along with soil microbial activity play a complex role in the production of greenhouse gases originating in forest soils. The absorption or emission (respiration) of these gases is a function of many factors relating to the soils themselves, the plants, and the environment in which the plants are growing. For this study, we have constructed a battery-powered, portable field mass spectrometer for use in analyzing gases in the soils surrounding trees, plants, and other areas. We have used the instrument to sample in real-time the greenhouse gases carbon dioxide and methane in soils where plant life may be contributing to the production of gases such as methane. Gases such as isoprene, which may help correlate gas respiration to microbial activity have also been measured. The instrument is composed of a quadrupole mass spectrometer with part per billion or better sensitivity, coupled to battery-powered turbo and diaphragm pumps. A unique ambient air pressure differentially pumped intake apparatus allows for the real-time sampling of gases in the soils from the surface to several inches below the surface. Results show that this instrument is capable of instant, part-per-billion sensitivity measurement of carbon dioxide and methane in the near surface region of various forest soils. We have measured differences in soil respiration resulting from forest thinning, forest burning, and forest logging as compared to pristine, untouched forests. Further studies will include measurements of greenhouse gas respiration as a function of temperature, microbial activity as measured by isoprene production, and forest restoration after fire.

Keywords: forest, soil, greenhouse, quadrupole

Procedia PDF Downloads 92
8065 The U.S. Missile Defense Shield and Global Security Destabilization: An Inconclusive Link

Authors: Michael A. Unbehauen, Gregory D. Sloan, Alberto J. Squatrito

Abstract:

Missile proliferation and global stability are intrinsically linked. Missile threats continually appear at the forefront of global security issues. North Korea’s recently demonstrated nuclear and intercontinental ballistic missile (ICBM) capabilities, for the first time since the Cold War, renewed public interest in strategic missile defense capabilities. To protect from limited ICBM attacks from so-called rogue actors, the United States developed the Ground-based Midcourse Defense (GMD) system. This study examines if the GMD missile defense shield has contributed to a safer world or triggered a new arms race. Based upon increased missile-related developments and the lack of adherence to international missile treaties, it is generally perceived that the GMD system is a destabilizing factor for global security. By examining the current state of arms control treaties as well as existing missile arsenals and ongoing efforts in technologies to overcome U.S. missile defenses, this study seeks to analyze the contribution of GMD to global stability. A thorough investigation cannot ignore that, through the establishment of this limited capability, the U.S. violated longstanding, successful weapons treaties and caused concern among states that possess ICBMs. GMD capability contributes to the perception that ICBM arsenals could become ineffective, creating an imbalance in favor of the United States, leading to increased global instability and tension. While blame for the deterioration of global stability and non-adherence to arms control treaties is often placed on U.S. missile defense, the facts do not necessarily support this view. The notion of a renewed arms race due to GMD is supported neither by current missile arsenals nor by the inevitable development of new and enhanced missile technology, to include multiple independently targeted reentry vehicles (MIRVs), maneuverable reentry vehicles (MaRVs), and hypersonic glide vehicles (HGVs). The methodology in this study encapsulates a period of time, pre- and post-GMD introduction, while analyzing international treaty adherence, missile counts and types, and research in new missile technologies. The decline in international treaty adherence, coupled with a measurable increase in the number and types of missiles or research in new missile technologies during the period after the introduction of GMD, could be perceived as a clear indicator of GMD contributing to global instability. However, research into improved technology (MIRV, MaRV and HGV) prior to GMD, as well as a decline of various global missile inventories and testing of systems during this same period, would seem to invalidate this theory. U.S. adversaries have exploited the perception of the U.S. missile defense shield as a destabilizing factor as a pretext to strengthen and modernize their militaries and justify their policies. As a result, it can be concluded that global stability has not significantly decreased due to GMD; but rather, the natural progression of technological and missile development would inherently include innovative and dynamic approaches to target engagement, deterrence, and national defense.

Keywords: arms control, arms race, global security, GMD, ICBM, missile defense, proliferation

Procedia PDF Downloads 125
8064 Length Weight Relationship and Relative Condition Factor of Atropus atropos (Bloch and Schneider, 1801) from Mangalore Coast, India

Authors: D. P. Rajesh, H. N. Anjanayappa, P. Nayana, S. Benakappa

Abstract:

The present study deals with length-weight relationship of Atropus atropos for which no information is available on this aspect from Mangalore coast. Therefore the present investigation was undertaken. Fish samples were collected from fish landing center (Mangalore) and fish market. The regression co-efficient of male was found to be lower than female. From this observation it may be opined that female gained more weight with increase in length compared to male. Data on seasonal variation in condition factor (Kn) showed that Kn values were more or less similar in both the sexes, indicating almost identical metabolic activity. Gonadal development and high feeding intensity are the factors which influenced the condition factor. The seasonal fluctuations in the relative condition factor of both the sexes could be attributed to the sexual cycle, food intake and environmental factors. From the present study, it can be inferred that the variation in the condition of Atropus atropos was due to feeding activity and gonadal maturity.

Keywords: Atropus atropos, length-weight relationship, Mangalore coast, relative condition factor, Kn

Procedia PDF Downloads 323
8063 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 472
8062 Preserving Privacy in Workflow Delegation Models

Authors: Noha Nagy, Hoda Mokhtar, Mohamed El Sherkawi

Abstract:

The popularity of workflow delegation models and the increasing number of workflow provenance-aware systems motivate the need for finding more strict delegation models. Such models combine different approaches for enhanced security and respecting workflow privacy. Although modern enterprises seek conformance to workflow constraints to ensure correctness of their work, these constraints pose a threat to security, because these constraints can be good seeds for attacking privacy even in secure models. This paper introduces a comprehensive Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegate from attacking workflow privacy as well as extending the delegation functionalities. In addition, we argue the need for exploiting workflow constraints to improve workflow security models.

Keywords: workflow delegation models, secure workflow, workflow privacy, workflow provenance

Procedia PDF Downloads 312
8061 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 513
8060 Factor Analysis of Self-Efficacy among Traniees in the National Service for the Healthy Lifestyle Program

Authors: Nuzsep Almigo, Md Amin Md Taff, Yusop Ahmad, Norkhalid Salimin, Gunathevan Elumalai

Abstract:

This research aimed to determine the level of self-efficacy in obese trainees before and after the Healthy Lifestyle Program. Self-efficacy is defined as the feeling, belief, perception, belief in the ability to cope with a particular situation that will influence the way individuals cope with the situation. Research instrument used was self efficacy questionnaire consisting of four main factors: (i) cognitive (abilities in a positive and realistic attitudes to the potential of to perform the duties, restrictions, or social desire), (ii) effective (mental management ability, feeling and mood), (iii) motivation (determination and the level of ability to achieve the purpose or goal), and (iv) selective (ability to choose the social conditions confronting and adapting to situations). The study sample consisted of 118 trainees from Healthy Lifestyle Program. The analysis showed there was a significant difference in self-efficacy before and after the Healthy Lifestyle Program (p = 0.00) indicated by increasing self-efficacy in the program.

Keywords: self efficacy, self-confidence, affective, motivation, selective

Procedia PDF Downloads 410
8059 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 107
8058 Water Security and Transboundary Issues for Food Security of Ethiopia. The Case of Nile River

Authors: Kebron Asnake

Abstract:

Water security and transboundary issues are critical concerns for countries, particularly in regions where shared water resources are significant. This Research focuses on exploring the challenges and opportunities related to water security and transboundary issues in Ethiopia, using the case of the Nile River. Ethiopia, as a riparian country of the Nile River, faces complex water security issues due to its dependence on this transboundary water resource. This abstract aims to analyze the various factors that affect water security in Ethiopia, including population growth, climate change, and competing water demands. The Study examines the challenges linked to transboundary water management of the Nile River. It delves into the complexities of negotiating water allocations and addressing potential conflicts among the downstream riparian countries. The paper also discusses the role of international agreements and cooperation in promoting sustainable water resource management. Additionally, the paper highlights the opportunities for collaboration and sustainable development that arise from transboundary water management. It explores the potential for joint investments in water infrastructure, hydropower generation, and irrigation systems that can contribute to regional economic growth and water security. Furthermore, the study emphasizes the need for integrated water management approaches in Ethiopia to ensure the equitable and sustainable use of the Nile River's waters. It highlights the importance of involving stakeholders from diverse sectors, including agriculture, energy, and environmental conservation, in decision-making processes. By presenting the case of the Nile River in Ethiopia, this Abstract contributes to the understanding of water security and transboundary issues. It underscores the significance of regional cooperation and informed policy-making to address the challenges and opportunities presented by transboundary water resources. The paper serves as a foundation for further research and policy in water management in Ethiopia and other regions facing similar challenges.

Keywords: water, health, agriculture, medicine

Procedia PDF Downloads 59
8057 The Role of Climate-Smart Agriculture in the Contribution of Small-Scale Farming towards Ensuring Food Security in South Africa

Authors: Victor O. Abegunde, Melusi Sibanda

Abstract:

There is need for a great deal of attention on small-scale agriculture for livelihood and food security because of the expanding global population. Small-scale agriculture has been identified as a major driving force of agricultural and rural development. However, the high dependence of the sector on natural and climatic resources has made small-scale farmers highly vulnerable to the adverse impact of climatic change thereby necessitating the need for embracing practices or concepts that will help absorb shocks from changes in climatic condition. This study examines the strategic position of small-scale farming in South African agriculture and in ensuring food security in the country, the vulnerability of small-scale agriculture to climate change and the potential of the concept of climate-smart agriculture to tackle the challenge of climate change. The study carried out a systematic review of peer-reviewed literature touching small-scale agriculture, climate change, food security and climate-smart agriculture, employing the realist review method. Findings revealed that increased productivity in the small-scale agricultural sector has a great potential of improving the food security of households in South Africa and reducing dependence on food purchase in a context of high food price inflation. Findings, however, also revealed that climate change affects small-scale subsistence farmers in terms of productivity, food security and family income, categorizing the impact on smallholder livelihoods into three major groups; biological processes, environmental and physical processes and impact on health. Analysis of the literature consistently showed that climate-smart agriculture integrates the benefits of adaptation and resilience to climate change, mitigation, and food security. As a result, farming households adopting climate-smart agriculture will be better off than their counterparts who do not. This study concludes that climate-smart agriculture could be a very good bridge linking small-scale agricultural sector and agricultural productivity and development which could bring about the much needed food security.

Keywords: climate change, climate-smart agriculture, food security, small-scale

Procedia PDF Downloads 215
8056 Probabilistic Analysis of Bearing Capacity of Isolated Footing using Monte Carlo Simulation

Authors: Sameer Jung Karki, Gokhan Saygili

Abstract:

The allowable bearing capacity of foundation systems is determined by applying a factor of safety to the ultimate bearing capacity. Conventional ultimate bearing capacity calculations routines are based on deterministic input parameters where the nonuniformity and inhomogeneity of soil and site properties are not accounted for. Hence, the laws of mathematics like probability calculus and statistical analysis cannot be directly applied to foundation engineering. It’s assumed that the Factor of Safety, typically as high as 3.0, incorporates the uncertainty of the input parameters. This factor of safety is estimated based on subjective judgement rather than objective facts. It is an ambiguous term. Hence, a probabilistic analysis of the bearing capacity of an isolated footing on a clayey soil is carried out by using the Monte Carlo Simulation method. This simulated model was compared with the traditional discrete model. It was found out that the bearing capacity of soil was found higher for the simulated model compared with the discrete model. This was verified by doing the sensitivity analysis. As the number of simulations was increased, there was a significant % increase of the bearing capacity compared with discrete bearing capacity. The bearing capacity values obtained by simulation was found to follow a normal distribution. While using the traditional value of Factor of safety 3, the allowable bearing capacity had lower probability (0.03717) of occurring in the field compared to a higher probability (0.15866), while using the simulation derived factor of safety of 1.5. This means the traditional factor of safety is giving us bearing capacity that is less likely occurring/available in the field. This shows the subjective nature of factor of safety, and hence probability method is suggested to address the variability of the input parameters in bearing capacity equations.

Keywords: bearing capacity, factor of safety, isolated footing, montecarlo simulation

Procedia PDF Downloads 165
8055 Predicting the Effects of Counseling Psychology on the Sexual Risk Behavior of In-School Adolescents: Implication for National Development

Authors: Olusola Joseph Adesina, Adebayo Adeyinka Salako

Abstract:

The study adopted a descriptive research design. Two hundred (200) in-school adolescents were purposely selected in Afijio Local Government Area of Oyo State. Two hypotheses were also raised to pilot the study. The researchers developed an instrument which was validated by psychological experts, the instrument tagged counseling psychology and sexual risk behavior questionnaire (CPSRBQ)(r = 0.78). The results were analysed using t-test at 0.05 level of significance. The result showed that there is a significant relationship between counseling psychology and sexual risk behavior of in-school adolescents. It was also noticed that there is a significant difference in the sexual risk behavior of male and female adolescents. Based on the findings, it was recommended that more counselors are still needed in Nigeria schools. There is need for restructuring Nigeria Curriculum most especially on sex education and related diseases. Lastly, adolescents should be more exposed to seminars on HIV/AIDS, sex education enlightenment programmes and marital counseling.

Keywords: counseling psychology, sexual behavior, risk and adolescent, cognitive sciences

Procedia PDF Downloads 485
8054 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System

Authors: Mobarok Hossain Bhuyain

Abstract:

Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.

Keywords: human detection, target tracking, neural network, particle filter

Procedia PDF Downloads 150
8053 Growth Pattern, Condition Factor and Relative Condition Factor of Twenty Important Demersal Marine Fish Species in Nigerian Coastal Water

Authors: Omogoriola Hannah Omoloye

Abstract:

Fish is a key ingredient on the global menu, a vital factor in the global environment and an important basis for livelihood worldwide1. The length – weight relationships (LWRs) is of great importance in fishery assessment2,3. Its importance is pronounced in estimated the average weight at a given length group4 and in assessing the relative well being of a fish population5. Length and weight measurement in conjunction with age data can give information on the stock composition, age at maturity, life span, mortality, growth and production4,5,6,7. In addition, the data on length and weight can also provides important clues to climatic and environmental changes and the change in human consumption practices8,9. However, the size attained by the individual fish may also vary because of variation in food supply, and these in turn may reflect variation in climatic parameters and in the supply of nutrient or in the degree of competition for food. Environment deterioration, for example, may reduce growth rates and will cause a decrease in the average age of the fish. The condition factor and the relative condition factor10 are the quantitative parameters of the well being state of the fish and reflect recent feeding condition of the fish. It is based on the hypothesis that heavier fish of a given length are in better condition11. This factor varies according to influences of physiological factors, fluctuating according to different stages of the development. Condition factor has been used as an index of growth and feeding intensity12. Condition factor decrease with increase in length 12,13 and also influences the reproductive cycle in fish14. The objective here is to determine the length-weight relationships and condition factor for direct use in fishery assessment and for future comparisons between populations of the same species at different locations. To provide quantitative information on the biology of marine fish species trawl from Nigeria coastal water.

Keywords: condition factor, growth pattern, marine fish species, Nigerian Coastal water

Procedia PDF Downloads 401
8052 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 292
8051 The Connection Between the International Law and the Legal Consultation on the Social Media

Authors: Amir Farouk Ahmed Ali Hussin

Abstract:

Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues.

Keywords: international legal, consultation mix, legal research, small and medium-sized enterprises, strategic International law, strategy alignment, house of laws, deployment, production strategy, legal strategy, business strategy

Procedia PDF Downloads 37
8050 From Plate to Self-Perception: Unravelling the Interplay Between Food Security and Self-Esteem Among Malaysian University Students

Authors: Amiraa Ali Mansor, Haslinda Abdullah, Angela Chan Nguk Fong, Norhaida Hanim Binti Ahmad Tajudin, Asnarulkhadi Abu Samah

Abstract:

Obesity has risen sharply over the past three decades, posing a grave public health concern globally. In Malaysia, it has also emerged as a significant health threat. While the second Sustainable Development Goal, "Zero Hunger", aims to ensure equitable access to nutritious food for all, a key challenge lies in addressing food insecurity. Food insecurity not only pertains to the quantity but also the quality of food, with both dimensions playing a pivotal role in health outcomes. To date, much of the research on food security has focused on household levels. There remains a research gap concerning university students, a population transitioning to independence from parental support and grappling with limited resources. This study seeks to bridge this gap by extending the Food Security Theory to incorporate the psychological dimension of self-esteem. Using a quantitative approach, data was collected from 452 public university students in Malaysia through a cross-sectional research design and a multi-stage cluster sampling technique. The anticipated findings will provide novel insights by linking food security with self-esteem. Such insights have implications for healthcare policy and the framing of preventive strategies against obesity. It is hoped that this research will not only contribute to the academic discourse on Food Security Theory but also serve as a foundation for refining national health policies and programs aimed at fostering a healthier lifestyle.

Keywords: obesity, food security, body image, self-esteem

Procedia PDF Downloads 59
8049 Sports Preferente Intervention as a Predictor of Sustainable Participation at Risk Teenagers in Ibadan Metropolis, Ibadan Nigerian

Authors: Felix Olajide Ibikunle

Abstract:

Introductory Statement: Sustainable participation of teenagers in sport requires deliberate and concerted plan and managerial policy rooted in the “philosophy of catch them young”. At risk, teenagers need proper integration into societal aspiration: This direction will go a long way to streamline them into the security breach and attractive nuisance free lifestyles. Basic Methodology: The population consists of children within 13-19 years old. A proportionate sampling size technique of 60% was adopted to select seven zones out of 11 geo-political zones in the Ibadan metropolis. Qualitative information and interview were used to collect needed information. Majority of the teenagers were out of school, street hawkers, motor pack, touts, and unserious vocation apprentices. These groups have the potentials of security breaches in the metropolis and beyond. Five hundred and thirty-four (534) respondents were used for the study. They were drawn from Ojoo, Akingbile, and Moniya axis = 72, Agbowo, Ajibode, and Apete axis = 74; Akobo, Basorun, and Idi-ape axis 79; Wofun, Monatan, and Iyana-Church axis = 78; Molete, Oke-ado and Oke-Bola axis = 75; Beere, Odinjo, Elekuro axis = 77; Eleyele, Ologuneru, and Alesinloye axis = 79. Major Findings: Multiple regression was used to analyze the independent variables and percentage. The respondents average age was 15.6 years old, and with 100% male. The instrument(questionnaire) used yielded; sport preference (r = 0.72); intervention (r = 0.68) and the sustainable participation (r = 0.70).The relative contributions of sport preference on participation of at risk teenagers was (F-ratio = 1.067); Intervention contribution of sport on participation of at risk teenagers = produced (F-ratio of 12.095) was significant while sustainable participation of at risk teenager produced (F-ratio = 1.062) was significant. Closing Statement: The respondents’ sport preference stimulated their participation in sport. The intervention exposed at risk-teenagers to coaching, which activated their interest and participation in sport. While sustainable participation contributed positively to evolve at risk teenagers participation in their preferred sport.

Keywords: sport, preference, intervention, teenagers, sustainable, participation and risk teenagers

Procedia PDF Downloads 89
8048 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 368
8047 New Security Approach of Confidential Resources in Hybrid Clouds

Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel

Abstract:

Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.

Keywords: cloud, confidentiality, cryptography, security issues, trust issues

Procedia PDF Downloads 352
8046 Exchange Traded Products on the Warsaw Stock Exchange

Authors: Piotr Prewysz-Kwinto

Abstract:

A dynamic development of financial market is accompanied by the emergence of new products on stock exchanges which give absolutely new possibilities of investing money. Currently, the most innovative financial instruments offered to investors are exchange traded products (ETP). They can be defined as financial instruments whose price depends on the value of the underlying instrument. Thus, they offer investors a possibility of making a profit that results from the change in value of the underlying instrument without having to buy it. Currently, the Warsaw Stock Exchange offers many types of ETPs. They are investment products with full or partial capital protection, products without capital protection as well as leverage products, issued on such underlying instruments as indices, sector indices, commodity indices, prices of energy commodities, precious metals, agricultural produce or prices of shares of domestic and foreign companies. This paper presents the mechanism of functioning of ETP available on the Warsaw Stock Exchange and the results of the analysis of statistical data on these financial instruments.

Keywords: exchange traded products, financial market, investment, stock exchange

Procedia PDF Downloads 330
8045 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique

Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam

Abstract:

With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.

Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services

Procedia PDF Downloads 98
8044 Adolescent Obesity Leading to Adulthood Cardiovascular Diseases among Punjabi Population

Authors: Manpreet Kaur, Badaruddoza, Sandeep Kaur Brar

Abstract:

The increasing prevalence of adolescent obesity is one of the major causes to be hypertensive in adulthood. Various statistical methods have been applied to examine the performance of anthropometric indices for the identification of adverse cardiovascular risk profile. The present work was undertaken to determine the significant traditional risk factors through principal component factor analysis (PCFA) among population based Punjabi adolescents aged 10-18 years. Data was collected among adolescent children from different schools situated in urban areas of Punjab, India. Principal component factor analysis (PCFA) was applied to extract orthogonal components from anthropometric and physiometric variables. Association between components were explained by factor loadings. The PCFA extracted four factors, which explained 84.21%, 84.06% and 83.15% of the total variance of the 14 original quantitative traits among boys, girls and combined subjects respectively. Factor 1 has high loading of the traits that reflect adiposity such as waist circumference, BMI and skinfolds among both sexes. However, waist circumference and body mass index are the indicator of abdominal obesity which increases the risk of cardiovascular diseases. The loadings of these two traits have found maximum in girls adolescents (WC=0.924; BMI=0.905). Therefore, factor 1 is the strong indicator of atherosclerosis in adolescents. Factor 2 is predominantly loaded with blood pressures and related traits (SBP, DBP, MBP and pulse rate) which reflect the risk of essential hypertension in adolescent girls and combined subjects, whereas, factor 2 loaded with obesity related traits in boys (weight and hip circumferences). Comparably, factor 3 is loaded with blood pressures in boys and with height and WHR in girls, while factor 4 contains high loading of pulse pressure among boys, girls and combined group of adolescents.

Keywords: adolescent obesity, cvd, hypertension, punjabi population

Procedia PDF Downloads 355
8043 Security Practices of the European Union on Migration: An Analysis of the Frontex Within the Framework of Biopolitics

Authors: Gizem Ertürk, Nursena Dinç

Abstract:

The Aegean area has always been an important transit point for migration; however, the establishment of the European Union gave further impetus to the migration phenomenon and increased the significance of the area within this context. The migration waves have been more visible in the area in recent decades, and particularly after the “2015 Migration Crisis,” this issue has been subject to further securitization in the EU. In this conjuncture, the Frontex, which is an agency set up by the EU in 2005 for the purpose of managing and coordinating the border control efforts, has become more functional in the relevant area, but at the same time, have some questionable actions within the context of human rights. This paper problematizes the rationality behind the existence and practices of such a structure and attempts to make a political and legal analysis of the security practices of the European Union against migration within a framework based on the biopolitics approaches of Michel Foucault and Giorgio Agamben. The dataset of this paper, which focuses on the agency in question by taking it as a case, is formed by making use of the existing literature on the EU’s security policies, the relevant official texts of the Union and Frontex reports on migration practices in and around the Aegean Sea.

Keywords: migration, biopolitics, Frontex, security, European union, securitization

Procedia PDF Downloads 119
8042 Role of Agriculture Equipment toward Food Security: Case Study of Agriculture Equipment Assistance during President Joko Widodo Era in Indonesia

Authors: Raihan Zahirah Mauludy Ridwan, Frisca Devi Choirina

Abstract:

Indonesia is an agrarian country endowed by fertile soil, supportive weather, and natural resources which can support agricultural activities. There are commodities which produced by local farmers. Even though Indonesia had commodities, it still imports stocks of staple food. To reduce the dependency on imported staple food, President Joko Widodo wants to generate more locally-produced staple food by giving 69.000 tractors, free seeds, and fertilizers to the local farmers. In Indonesia, the problem revolves around the amount of food production especially rice derived from farmers who cannot afford technologies which can support the agricultural activities. Moreover, they cannot afford seeds and fertilizers which can make the production of commodities more effective and have high quality. Therefore, the paper would like to answer how agriculture equipment assistance during President Joko Widodo era can give significant impact towards food security. The purpose of this paper is to explore the role of agriculture equipment assistance and its impact towards Indonesia’s food security. This paper uses Boserup and Ruthenberg theory of agricultural intensification to link agriculture equipment and intensification of production which in the end will have impact towards food security through case study method. The paper affirms that the role of agricultural equipment assistance toward food security in Indonesia is significant toward Indonesia’s food production and security.

Keywords: agricultural equipment, agricultural intensification, Boserup, Indonesia, Joko Widodo, Ruthenberg

Procedia PDF Downloads 164